Analysis
-
max time kernel
143s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe
Resource
win10v2004-20240508-en
General
-
Target
79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe
-
Size
163KB
-
MD5
571fc61d185519b537075f746c316064
-
SHA1
21a8d9676d926a8080d2154375a7e07277a3a0fc
-
SHA256
79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166
-
SHA512
1fd741427744c64523a5bcad74890c47c845ca88c32e411a58d622f7d42df0c9d0486eb36f08d5a8d50ce8371a0087c134c98215007831e9c83219c15c2be754
-
SSDEEP
1536:P5VJDvLShJo/599BUreEUCJwyzJlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:xrt99BUrwcJltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Legmbd32.exeNmpnhdfc.exePfdabino.exeIdhopq32.exeCpnojioo.exeFikejl32.exeGiieco32.exeJgagfi32.exePndpajgd.exeMmceigep.exeJabbhcfe.exeMkklljmg.exeOdjbdb32.exeJcjdpj32.exeJmbiipml.exeAepojo32.exeDngoibmo.exeFiaeoang.exeNpdjje32.exeFiglolbf.exeJnicmdli.exeAkmjfn32.exeQmlgonbe.exeClaifkkf.exeGldkfl32.exeMhgmapfi.exeAnojbobe.exeKjdilgpc.exeAhokfj32.exeFjgoce32.exeAplifb32.exeDhdcji32.exeKegqdqbl.exeIcpigm32.exeJjjacf32.exeLjmlbfhi.exeKiqpop32.exePlahag32.exeEecqjpee.exeFejgko32.exeKpmlkp32.exeMdmmfa32.exeKkgmgmfd.exeBldcpf32.exeDknekeef.exeBehgcf32.exePciifc32.exeAadloj32.exeEbodiofk.exeFpcqaf32.exeHeglio32.exeGkgkbipp.exeMgqcmlgl.exeEibbcm32.exeHpbiommg.exeIamimc32.exeEdnpej32.exeQiladcdh.exeBalkchpi.exeDqjepm32.exeFfbicfoc.exePiphee32.exeBemgilhh.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Legmbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmpnhdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfdabino.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idhopq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpnojioo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fikejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Giieco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgagfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pndpajgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmceigep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jabbhcfe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkklljmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odjbdb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcjdpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmbiipml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aepojo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dngoibmo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiaeoang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npdjje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Figlolbf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnicmdli.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akmjfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmlgonbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Claifkkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gldkfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhgmapfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anojbobe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjdilgpc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahokfj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjgoce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aplifb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhdcji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kegqdqbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icpigm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjjacf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljmlbfhi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kiqpop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plahag32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eecqjpee.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fejgko32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpmlkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdmmfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkgmgmfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bldcpf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknekeef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Behgcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pciifc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aadloj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebodiofk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpcqaf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Heglio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkgkbipp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgqcmlgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eibbcm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpbiommg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iamimc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ednpej32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qiladcdh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Balkchpi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ednpej32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqjepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffbicfoc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Piphee32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bemgilhh.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Oqqapjnk.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Omgaek32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ogmfbd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pminkk32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pgobhcac.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pmlkpjpj.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pjpkjond.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Plahag32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Piehkkcl.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pnbacbac.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pelipl32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Plfamfpm.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pabjem32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Qjknnbed.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qaefjm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qljkhe32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qmlgonbe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Adeplhib.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ajphib32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aajpelhl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Affhncfc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aiedjneg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aigaon32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Abpfhcje.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Alhjai32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Apcfahio.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aepojo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bingpmnl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bbflib32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bdhhqk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bghabf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bkdmcdoe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cgmkmecg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cjndop32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cphlljge.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ccfhhffh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cpjiajeb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Comimg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cfgaiaci.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Claifkkf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cbnbobin.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdlnkmha.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Copfbfjj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ddokpmfo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dngoibmo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dhmcfkme.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Djnpnc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dqhhknjp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgaqgh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Djpmccqq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ddeaalpg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dqjepm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dfgmhd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dmafennb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Doobajme.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgfjbgmh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ecmkghcl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Emeopn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Epdkli32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eijcpoac.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ebbgid32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eeqdep32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ejgcdb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ekklaj32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Oqqapjnk.exe UPX \Windows\SysWOW64\Omgaek32.exe UPX \Windows\SysWOW64\Ogmfbd32.exe UPX C:\Windows\SysWOW64\Pminkk32.exe UPX \Windows\SysWOW64\Pgobhcac.exe UPX \Windows\SysWOW64\Pmlkpjpj.exe UPX \Windows\SysWOW64\Pjpkjond.exe UPX C:\Windows\SysWOW64\Plahag32.exe UPX \Windows\SysWOW64\Piehkkcl.exe UPX \Windows\SysWOW64\Pnbacbac.exe UPX \Windows\SysWOW64\Pelipl32.exe UPX \Windows\SysWOW64\Plfamfpm.exe UPX \Windows\SysWOW64\Pabjem32.exe UPX \Windows\SysWOW64\Qjknnbed.exe UPX C:\Windows\SysWOW64\Qaefjm32.exe UPX C:\Windows\SysWOW64\Qljkhe32.exe UPX C:\Windows\SysWOW64\Qmlgonbe.exe UPX C:\Windows\SysWOW64\Adeplhib.exe UPX C:\Windows\SysWOW64\Ajphib32.exe UPX C:\Windows\SysWOW64\Aajpelhl.exe UPX C:\Windows\SysWOW64\Affhncfc.exe UPX C:\Windows\SysWOW64\Aiedjneg.exe UPX C:\Windows\SysWOW64\Aigaon32.exe UPX C:\Windows\SysWOW64\Abpfhcje.exe UPX C:\Windows\SysWOW64\Alhjai32.exe UPX C:\Windows\SysWOW64\Apcfahio.exe UPX behavioral1/memory/1656-324-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Aepojo32.exe UPX C:\Windows\SysWOW64\Bingpmnl.exe UPX C:\Windows\SysWOW64\Bbflib32.exe UPX C:\Windows\SysWOW64\Bdhhqk32.exe UPX C:\Windows\SysWOW64\Bghabf32.exe UPX C:\Windows\SysWOW64\Bkdmcdoe.exe UPX C:\Windows\SysWOW64\Cgmkmecg.exe UPX C:\Windows\SysWOW64\Cjndop32.exe UPX C:\Windows\SysWOW64\Cphlljge.exe UPX C:\Windows\SysWOW64\Ccfhhffh.exe UPX C:\Windows\SysWOW64\Cpjiajeb.exe UPX C:\Windows\SysWOW64\Comimg32.exe UPX C:\Windows\SysWOW64\Cfgaiaci.exe UPX C:\Windows\SysWOW64\Claifkkf.exe UPX C:\Windows\SysWOW64\Cbnbobin.exe UPX C:\Windows\SysWOW64\Cdlnkmha.exe UPX C:\Windows\SysWOW64\Copfbfjj.exe UPX C:\Windows\SysWOW64\Ddokpmfo.exe UPX C:\Windows\SysWOW64\Dngoibmo.exe UPX C:\Windows\SysWOW64\Dhmcfkme.exe UPX C:\Windows\SysWOW64\Djnpnc32.exe UPX C:\Windows\SysWOW64\Dqhhknjp.exe UPX C:\Windows\SysWOW64\Dgaqgh32.exe UPX C:\Windows\SysWOW64\Djpmccqq.exe UPX C:\Windows\SysWOW64\Ddeaalpg.exe UPX C:\Windows\SysWOW64\Dqjepm32.exe UPX C:\Windows\SysWOW64\Dfgmhd32.exe UPX C:\Windows\SysWOW64\Dmafennb.exe UPX C:\Windows\SysWOW64\Doobajme.exe UPX C:\Windows\SysWOW64\Dgfjbgmh.exe UPX C:\Windows\SysWOW64\Ecmkghcl.exe UPX C:\Windows\SysWOW64\Emeopn32.exe UPX C:\Windows\SysWOW64\Epdkli32.exe UPX C:\Windows\SysWOW64\Eijcpoac.exe UPX C:\Windows\SysWOW64\Ebbgid32.exe UPX C:\Windows\SysWOW64\Eeqdep32.exe UPX C:\Windows\SysWOW64\Ejgcdb32.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Oqqapjnk.exeOmgaek32.exeOgmfbd32.exePminkk32.exePgobhcac.exePmlkpjpj.exePjpkjond.exePlahag32.exePiehkkcl.exePnbacbac.exePelipl32.exePlfamfpm.exePabjem32.exeQjknnbed.exeQaefjm32.exeQljkhe32.exeQmlgonbe.exeAdeplhib.exeAjphib32.exeAajpelhl.exeAffhncfc.exeAiedjneg.exeAigaon32.exeAbpfhcje.exeAlhjai32.exeApcfahio.exeAbbbnchb.exeAepojo32.exeAhokfj32.exeBebkpn32.exeBingpmnl.exeBkodhe32.exeBbflib32.exeBdhhqk32.exeBnpmipql.exeBghabf32.exeBkdmcdoe.exeBhhnli32.exeBkfjhd32.exeBdooajdc.exeCgmkmecg.exeCjlgiqbk.exeCljcelan.exeCcdlbf32.exeCjndop32.exeCphlljge.exeCcfhhffh.exeCpjiajeb.exeComimg32.exeCfgaiaci.exeClaifkkf.exeCopfbfjj.exeCbnbobin.exeCdlnkmha.exeClcflkic.exeCkffgg32.exeCndbcc32.exeDbpodagk.exeDdokpmfo.exeDgmglh32.exeDkhcmgnl.exeDngoibmo.exeDqelenlc.exeDhmcfkme.exepid process 2420 Oqqapjnk.exe 3060 Omgaek32.exe 2736 Ogmfbd32.exe 2760 Pminkk32.exe 2196 Pgobhcac.exe 2516 Pmlkpjpj.exe 2964 Pjpkjond.exe 2784 Plahag32.exe 2848 Piehkkcl.exe 344 Pnbacbac.exe 1696 Pelipl32.exe 1552 Plfamfpm.exe 2056 Pabjem32.exe 2060 Qjknnbed.exe 2588 Qaefjm32.exe 1144 Qljkhe32.exe 2540 Qmlgonbe.exe 856 Adeplhib.exe 2356 Ajphib32.exe 2040 Aajpelhl.exe 1336 Affhncfc.exe 2916 Aiedjneg.exe 1136 Aigaon32.exe 2304 Abpfhcje.exe 2376 Alhjai32.exe 1656 Apcfahio.exe 2428 Abbbnchb.exe 2868 Aepojo32.exe 2792 Ahokfj32.exe 2704 Bebkpn32.exe 2264 Bingpmnl.exe 3008 Bkodhe32.exe 2676 Bbflib32.exe 2960 Bdhhqk32.exe 2600 Bnpmipql.exe 2812 Bghabf32.exe 2368 Bkdmcdoe.exe 1908 Bhhnli32.exe 1612 Bkfjhd32.exe 2392 Bdooajdc.exe 1420 Cgmkmecg.exe 2128 Cjlgiqbk.exe 568 Cljcelan.exe 1080 Ccdlbf32.exe 1760 Cjndop32.exe 1832 Cphlljge.exe 2032 Ccfhhffh.exe 2448 Cpjiajeb.exe 3028 Comimg32.exe 1040 Cfgaiaci.exe 2164 Claifkkf.exe 1732 Copfbfjj.exe 1548 Cbnbobin.exe 2172 Cdlnkmha.exe 2224 Clcflkic.exe 2636 Ckffgg32.exe 2616 Cndbcc32.exe 2572 Dbpodagk.exe 2984 Ddokpmfo.exe 2752 Dgmglh32.exe 1556 Dkhcmgnl.exe 2240 Dngoibmo.exe 804 Dqelenlc.exe 820 Dhmcfkme.exe -
Loads dropped DLL 64 IoCs
Processes:
79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exeOqqapjnk.exeOmgaek32.exeOgmfbd32.exePminkk32.exePgobhcac.exePmlkpjpj.exePjpkjond.exePlahag32.exePiehkkcl.exePnbacbac.exePelipl32.exePlfamfpm.exePabjem32.exeQjknnbed.exeQaefjm32.exeQljkhe32.exeQmlgonbe.exeAdeplhib.exeAjphib32.exeAajpelhl.exeAffhncfc.exeAiedjneg.exeAigaon32.exeAbpfhcje.exeAlhjai32.exeApcfahio.exeAbbbnchb.exeAepojo32.exeAhokfj32.exeBebkpn32.exeBingpmnl.exepid process 1916 79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe 1916 79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe 2420 Oqqapjnk.exe 2420 Oqqapjnk.exe 3060 Omgaek32.exe 3060 Omgaek32.exe 2736 Ogmfbd32.exe 2736 Ogmfbd32.exe 2760 Pminkk32.exe 2760 Pminkk32.exe 2196 Pgobhcac.exe 2196 Pgobhcac.exe 2516 Pmlkpjpj.exe 2516 Pmlkpjpj.exe 2964 Pjpkjond.exe 2964 Pjpkjond.exe 2784 Plahag32.exe 2784 Plahag32.exe 2848 Piehkkcl.exe 2848 Piehkkcl.exe 344 Pnbacbac.exe 344 Pnbacbac.exe 1696 Pelipl32.exe 1696 Pelipl32.exe 1552 Plfamfpm.exe 1552 Plfamfpm.exe 2056 Pabjem32.exe 2056 Pabjem32.exe 2060 Qjknnbed.exe 2060 Qjknnbed.exe 2588 Qaefjm32.exe 2588 Qaefjm32.exe 1144 Qljkhe32.exe 1144 Qljkhe32.exe 2540 Qmlgonbe.exe 2540 Qmlgonbe.exe 856 Adeplhib.exe 856 Adeplhib.exe 2356 Ajphib32.exe 2356 Ajphib32.exe 2040 Aajpelhl.exe 2040 Aajpelhl.exe 1336 Affhncfc.exe 1336 Affhncfc.exe 2916 Aiedjneg.exe 2916 Aiedjneg.exe 1136 Aigaon32.exe 1136 Aigaon32.exe 2304 Abpfhcje.exe 2304 Abpfhcje.exe 2376 Alhjai32.exe 2376 Alhjai32.exe 1656 Apcfahio.exe 1656 Apcfahio.exe 2428 Abbbnchb.exe 2428 Abbbnchb.exe 2868 Aepojo32.exe 2868 Aepojo32.exe 2792 Ahokfj32.exe 2792 Ahokfj32.exe 2704 Bebkpn32.exe 2704 Bebkpn32.exe 2264 Bingpmnl.exe 2264 Bingpmnl.exe -
Drops file in System32 directory 64 IoCs
Processes:
Npagjpcd.exeHacmcfge.exeDcknbh32.exeDjefobmk.exeHoamgd32.exeOjigbhlp.exeCphlljge.exeFddmgjpo.exeEojnkg32.exeGiieco32.exeOohqqlei.exeOaiibg32.exeQodlkm32.exeElmigj32.exeDqjepm32.exeDdeaalpg.exeEkklaj32.exeIoijbj32.exeIajcde32.exeAadloj32.exeEjobhppq.exeOmgaek32.exeGebbnpfp.exeGlfhll32.exeHlakpp32.exeEgllae32.exeAgfgqo32.exeBlobjaba.exeOqqapjnk.exeJgfqaiod.exePqemdbaj.exeNehmdhja.exeGfmemc32.exeKmgbdo32.exeAlegac32.exeAidnohbk.exeAaobdjof.exeBjlqhoba.exeDoehqead.exeFpngfgle.exeLabkdack.exeOgmhkmki.exeGphmeo32.exeEecqjpee.exeDhbfdjdp.exePgobhcac.exeIcpigm32.exeFfbicfoc.exeFbdjbaea.exeHaiccald.exeJabbhcfe.exeMlcbenjb.exeNkbalifo.exeAdpkee32.exeBmkmdk32.exeGdniqh32.exeMeijhc32.exePjenhm32.exeFhffaj32.exeHmlnoc32.exeEbgacddo.exeGikaio32.exeOalfhf32.exeCkffgg32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ngkogj32.exe Npagjpcd.exe File created C:\Windows\SysWOW64\Hhmepp32.exe Hacmcfge.exe File opened for modification C:\Windows\SysWOW64\Dgfjbgmh.exe Dcknbh32.exe File opened for modification C:\Windows\SysWOW64\Eihfjo32.exe Djefobmk.exe File opened for modification C:\Windows\SysWOW64\Hapicp32.exe Hoamgd32.exe File created C:\Windows\SysWOW64\Jbhihkig.dll Ojigbhlp.exe File created C:\Windows\SysWOW64\Jkbcpgjj.dll Cphlljge.exe File created C:\Windows\SysWOW64\Fbgmbg32.exe Fddmgjpo.exe File created C:\Windows\SysWOW64\Pgicjg32.dll Eojnkg32.exe File opened for modification C:\Windows\SysWOW64\Glgaok32.exe Giieco32.exe File created C:\Windows\SysWOW64\Odeiibdq.exe Oohqqlei.exe File created C:\Windows\SysWOW64\Odhfob32.exe Oaiibg32.exe File created C:\Windows\SysWOW64\Qngmgjeb.exe Qodlkm32.exe File opened for modification C:\Windows\SysWOW64\Epieghdk.exe Elmigj32.exe File created C:\Windows\SysWOW64\Ddeaalpg.exe Dqjepm32.exe File opened for modification C:\Windows\SysWOW64\Dchali32.exe Ddeaalpg.exe File created C:\Windows\SysWOW64\Chcphm32.dll Ekklaj32.exe File created C:\Windows\SysWOW64\Ghlpli32.dll Ioijbj32.exe File created C:\Windows\SysWOW64\Idhopq32.exe Iajcde32.exe File opened for modification C:\Windows\SysWOW64\Bpgljfbl.exe Aadloj32.exe File created C:\Windows\SysWOW64\Eibbcm32.exe Ejobhppq.exe File opened for modification C:\Windows\SysWOW64\Ogmfbd32.exe Omgaek32.exe File opened for modification C:\Windows\SysWOW64\Ginnnooi.exe Gebbnpfp.exe File created C:\Windows\SysWOW64\Elpbcapg.dll Glfhll32.exe File created C:\Windows\SysWOW64\Cabknqko.dll Hlakpp32.exe File opened for modification C:\Windows\SysWOW64\Ejkima32.exe Egllae32.exe File created C:\Windows\SysWOW64\Afiglkle.exe Agfgqo32.exe File created C:\Windows\SysWOW64\Bonoflae.exe Blobjaba.exe File created C:\Windows\SysWOW64\Omgaek32.exe Oqqapjnk.exe File created C:\Windows\SysWOW64\Jnpinc32.exe Jgfqaiod.exe File opened for modification C:\Windows\SysWOW64\Pgpeal32.exe Pqemdbaj.exe File created C:\Windows\SysWOW64\Amdhhh32.dll Nehmdhja.exe File created C:\Windows\SysWOW64\Ehdqecfo.dll Gfmemc32.exe File created C:\Windows\SysWOW64\Kofopj32.exe Kmgbdo32.exe File created C:\Windows\SysWOW64\Anccmo32.exe Alegac32.exe File opened for modification C:\Windows\SysWOW64\Albjlcao.exe Aidnohbk.exe File opened for modification C:\Windows\SysWOW64\Ahikqd32.exe Aaobdjof.exe File opened for modification C:\Windows\SysWOW64\Bmkmdk32.exe Bjlqhoba.exe File created C:\Windows\SysWOW64\Kijbioba.dll Doehqead.exe File created C:\Windows\SysWOW64\Fbmcbbki.exe Fpngfgle.exe File created C:\Windows\SysWOW64\Djmffb32.dll Labkdack.exe File opened for modification C:\Windows\SysWOW64\Pjldghjm.exe Ogmhkmki.exe File created C:\Windows\SysWOW64\Gpekfank.dll Gphmeo32.exe File created C:\Windows\SysWOW64\Eiomkn32.exe Eecqjpee.exe File opened for modification C:\Windows\SysWOW64\Dkqbaecc.exe Dhbfdjdp.exe File opened for modification C:\Windows\SysWOW64\Pmlkpjpj.exe Pgobhcac.exe File opened for modification C:\Windows\SysWOW64\Jjjacf32.exe Icpigm32.exe File created C:\Windows\SysWOW64\Cmbmkg32.dll Ffbicfoc.exe File created C:\Windows\SysWOW64\Febfomdd.exe Fbdjbaea.exe File created C:\Windows\SysWOW64\Mfbnag32.dll Haiccald.exe File created C:\Windows\SysWOW64\Qfgkcdoe.dll Jabbhcfe.exe File opened for modification C:\Windows\SysWOW64\Moanaiie.exe Mlcbenjb.exe File created C:\Windows\SysWOW64\Nmpnhdfc.exe Nkbalifo.exe File created C:\Windows\SysWOW64\Nemacb32.dll Adpkee32.exe File opened for modification C:\Windows\SysWOW64\Bpiipf32.exe Bmkmdk32.exe File opened for modification C:\Windows\SysWOW64\Gfmemc32.exe Gdniqh32.exe File opened for modification C:\Windows\SysWOW64\Mieeibkn.exe Meijhc32.exe File created C:\Windows\SysWOW64\Pmdjdh32.exe Pjenhm32.exe File created C:\Windows\SysWOW64\Fjdbnf32.exe Fhffaj32.exe File created C:\Windows\SysWOW64\Fealjk32.dll Hmlnoc32.exe File created C:\Windows\SysWOW64\Eeempocb.exe Ebgacddo.exe File created C:\Windows\SysWOW64\Gmgninie.exe Gikaio32.exe File created C:\Windows\SysWOW64\Ajcfjgdj.dll Oalfhf32.exe File created C:\Windows\SysWOW64\Hpenlb32.dll Ckffgg32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 7012 6968 WerFault.exe Cacacg32.exe -
Modifies registry class 64 IoCs
Processes:
Pminkk32.exeBkfjhd32.exeCbnbobin.exeDchali32.exePndpajgd.exeBaohhgnf.exePlfamfpm.exeOcimgp32.exeKnjbnh32.exeAnlmmp32.exeDoehqead.exeEpieghdk.exeOjfaijcc.exeOqacic32.exePdlkiepd.exeGhoegl32.exeKemejc32.exeChbjffad.exeHoopae32.exeKocbkk32.exeAfkdakjb.exeBkdmcdoe.exeLpdbloof.exeEojnkg32.exeOgmfbd32.exePabjem32.exeAjphib32.exeDjefobmk.exeIajcde32.exeKfbcbd32.exeNpagjpcd.exeMabgcd32.exeOgmhkmki.exeGdllkhdg.exeGmgninie.exeLegmbd32.exePqhijbog.exeGedbdlbb.exeIedkbc32.exeJnpinc32.exeMhloponc.exeCfgaiaci.exeDgfjbgmh.exeAibajhdn.exeDkqbaecc.exeEjkima32.exeFnhnbb32.exeEfppoc32.exeFjgoce32.exeMmceigep.exeEqijej32.exeKkolkk32.exeLabkdack.exeAeenochi.exeClaifkkf.exeDqjepm32.exeIdnaoohk.exeKbbngf32.exeGkgkbipp.exeBppoqeja.exePckoam32.exeQeaedd32.exeBecnhgmg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbfdaihk.dll" Pminkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkfjhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbnbobin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dchali32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aeqmqeba.dll" Pndpajgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Baohhgnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqmoql32.dll" Plfamfpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbikjlnd.dll" Ocimgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knjbnh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anlmmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Doehqead.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clnlnhop.dll" Epieghdk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojfaijcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oqacic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdlkiepd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghoegl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kemejc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chbjffad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmmhnm32.dll" Hoopae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kocbkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjphijco.dll" Afkdakjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkdmcdoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gqncakcq.dll" Lpdbloof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eojnkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogmfbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mefagn32.dll" Pabjem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajphib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fclomp32.dll" Djefobmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iajcde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfbcbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npagjpcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnqkpajk.dll" Mabgcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogmhkmki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjehnpjo.dll" Gdllkhdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gmgninie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hoopae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Legmbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqhijbog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pefgcifd.dll" Gedbdlbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iedkbc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnpinc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaajloig.dll" Mhloponc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfgaiaci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgfjbgmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aibajhdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkqbaecc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejkima32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnhnbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efppoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjgoce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmceigep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eqijej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ancjqghh.dll" Kkolkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Labkdack.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aeenochi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Claifkkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dqjepm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idnaoohk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbbngf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkgkbipp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bppoqeja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pckoam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpbche32.dll" Qeaedd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Becnhgmg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exeOqqapjnk.exeOmgaek32.exeOgmfbd32.exePminkk32.exePgobhcac.exePmlkpjpj.exePjpkjond.exePlahag32.exePiehkkcl.exePnbacbac.exePelipl32.exePlfamfpm.exePabjem32.exeQjknnbed.exeQaefjm32.exedescription pid process target process PID 1916 wrote to memory of 2420 1916 79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe Oqqapjnk.exe PID 1916 wrote to memory of 2420 1916 79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe Oqqapjnk.exe PID 1916 wrote to memory of 2420 1916 79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe Oqqapjnk.exe PID 1916 wrote to memory of 2420 1916 79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe Oqqapjnk.exe PID 2420 wrote to memory of 3060 2420 Oqqapjnk.exe Omgaek32.exe PID 2420 wrote to memory of 3060 2420 Oqqapjnk.exe Omgaek32.exe PID 2420 wrote to memory of 3060 2420 Oqqapjnk.exe Omgaek32.exe PID 2420 wrote to memory of 3060 2420 Oqqapjnk.exe Omgaek32.exe PID 3060 wrote to memory of 2736 3060 Omgaek32.exe Ogmfbd32.exe PID 3060 wrote to memory of 2736 3060 Omgaek32.exe Ogmfbd32.exe PID 3060 wrote to memory of 2736 3060 Omgaek32.exe Ogmfbd32.exe PID 3060 wrote to memory of 2736 3060 Omgaek32.exe Ogmfbd32.exe PID 2736 wrote to memory of 2760 2736 Ogmfbd32.exe Pminkk32.exe PID 2736 wrote to memory of 2760 2736 Ogmfbd32.exe Pminkk32.exe PID 2736 wrote to memory of 2760 2736 Ogmfbd32.exe Pminkk32.exe PID 2736 wrote to memory of 2760 2736 Ogmfbd32.exe Pminkk32.exe PID 2760 wrote to memory of 2196 2760 Pminkk32.exe Pgobhcac.exe PID 2760 wrote to memory of 2196 2760 Pminkk32.exe Pgobhcac.exe PID 2760 wrote to memory of 2196 2760 Pminkk32.exe Pgobhcac.exe PID 2760 wrote to memory of 2196 2760 Pminkk32.exe Pgobhcac.exe PID 2196 wrote to memory of 2516 2196 Pgobhcac.exe Pmlkpjpj.exe PID 2196 wrote to memory of 2516 2196 Pgobhcac.exe Pmlkpjpj.exe PID 2196 wrote to memory of 2516 2196 Pgobhcac.exe Pmlkpjpj.exe PID 2196 wrote to memory of 2516 2196 Pgobhcac.exe Pmlkpjpj.exe PID 2516 wrote to memory of 2964 2516 Pmlkpjpj.exe Pjpkjond.exe PID 2516 wrote to memory of 2964 2516 Pmlkpjpj.exe Pjpkjond.exe PID 2516 wrote to memory of 2964 2516 Pmlkpjpj.exe Pjpkjond.exe PID 2516 wrote to memory of 2964 2516 Pmlkpjpj.exe Pjpkjond.exe PID 2964 wrote to memory of 2784 2964 Pjpkjond.exe Plahag32.exe PID 2964 wrote to memory of 2784 2964 Pjpkjond.exe Plahag32.exe PID 2964 wrote to memory of 2784 2964 Pjpkjond.exe Plahag32.exe PID 2964 wrote to memory of 2784 2964 Pjpkjond.exe Plahag32.exe PID 2784 wrote to memory of 2848 2784 Plahag32.exe Piehkkcl.exe PID 2784 wrote to memory of 2848 2784 Plahag32.exe Piehkkcl.exe PID 2784 wrote to memory of 2848 2784 Plahag32.exe Piehkkcl.exe PID 2784 wrote to memory of 2848 2784 Plahag32.exe Piehkkcl.exe PID 2848 wrote to memory of 344 2848 Piehkkcl.exe Pnbacbac.exe PID 2848 wrote to memory of 344 2848 Piehkkcl.exe Pnbacbac.exe PID 2848 wrote to memory of 344 2848 Piehkkcl.exe Pnbacbac.exe PID 2848 wrote to memory of 344 2848 Piehkkcl.exe Pnbacbac.exe PID 344 wrote to memory of 1696 344 Pnbacbac.exe Pelipl32.exe PID 344 wrote to memory of 1696 344 Pnbacbac.exe Pelipl32.exe PID 344 wrote to memory of 1696 344 Pnbacbac.exe Pelipl32.exe PID 344 wrote to memory of 1696 344 Pnbacbac.exe Pelipl32.exe PID 1696 wrote to memory of 1552 1696 Pelipl32.exe Plfamfpm.exe PID 1696 wrote to memory of 1552 1696 Pelipl32.exe Plfamfpm.exe PID 1696 wrote to memory of 1552 1696 Pelipl32.exe Plfamfpm.exe PID 1696 wrote to memory of 1552 1696 Pelipl32.exe Plfamfpm.exe PID 1552 wrote to memory of 2056 1552 Plfamfpm.exe Pabjem32.exe PID 1552 wrote to memory of 2056 1552 Plfamfpm.exe Pabjem32.exe PID 1552 wrote to memory of 2056 1552 Plfamfpm.exe Pabjem32.exe PID 1552 wrote to memory of 2056 1552 Plfamfpm.exe Pabjem32.exe PID 2056 wrote to memory of 2060 2056 Pabjem32.exe Qjknnbed.exe PID 2056 wrote to memory of 2060 2056 Pabjem32.exe Qjknnbed.exe PID 2056 wrote to memory of 2060 2056 Pabjem32.exe Qjknnbed.exe PID 2056 wrote to memory of 2060 2056 Pabjem32.exe Qjknnbed.exe PID 2060 wrote to memory of 2588 2060 Qjknnbed.exe Qaefjm32.exe PID 2060 wrote to memory of 2588 2060 Qjknnbed.exe Qaefjm32.exe PID 2060 wrote to memory of 2588 2060 Qjknnbed.exe Qaefjm32.exe PID 2060 wrote to memory of 2588 2060 Qjknnbed.exe Qaefjm32.exe PID 2588 wrote to memory of 1144 2588 Qaefjm32.exe Qljkhe32.exe PID 2588 wrote to memory of 1144 2588 Qaefjm32.exe Qljkhe32.exe PID 2588 wrote to memory of 1144 2588 Qaefjm32.exe Qljkhe32.exe PID 2588 wrote to memory of 1144 2588 Qaefjm32.exe Qljkhe32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe"C:\Users\Admin\AppData\Local\Temp\79f0fa9f91a1b2205f6ff58997f82b422c0b636c82470a55c0ba98c1e1539166.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oqqapjnk.exeC:\Windows\system32\Oqqapjnk.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Omgaek32.exeC:\Windows\system32\Omgaek32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ogmfbd32.exeC:\Windows\system32\Ogmfbd32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pminkk32.exeC:\Windows\system32\Pminkk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pgobhcac.exeC:\Windows\system32\Pgobhcac.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pmlkpjpj.exeC:\Windows\system32\Pmlkpjpj.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pjpkjond.exeC:\Windows\system32\Pjpkjond.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Plahag32.exeC:\Windows\system32\Plahag32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Piehkkcl.exeC:\Windows\system32\Piehkkcl.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pnbacbac.exeC:\Windows\system32\Pnbacbac.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pelipl32.exeC:\Windows\system32\Pelipl32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Plfamfpm.exeC:\Windows\system32\Plfamfpm.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pabjem32.exeC:\Windows\system32\Pabjem32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qjknnbed.exeC:\Windows\system32\Qjknnbed.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qaefjm32.exeC:\Windows\system32\Qaefjm32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qljkhe32.exeC:\Windows\system32\Qljkhe32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Qmlgonbe.exeC:\Windows\system32\Qmlgonbe.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Adeplhib.exeC:\Windows\system32\Adeplhib.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ajphib32.exeC:\Windows\system32\Ajphib32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Aajpelhl.exeC:\Windows\system32\Aajpelhl.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Affhncfc.exeC:\Windows\system32\Affhncfc.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Aiedjneg.exeC:\Windows\system32\Aiedjneg.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Aigaon32.exeC:\Windows\system32\Aigaon32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Abpfhcje.exeC:\Windows\system32\Abpfhcje.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Alhjai32.exeC:\Windows\system32\Alhjai32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Apcfahio.exeC:\Windows\system32\Apcfahio.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Abbbnchb.exeC:\Windows\system32\Abbbnchb.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Aepojo32.exeC:\Windows\system32\Aepojo32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ahokfj32.exeC:\Windows\system32\Ahokfj32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Bebkpn32.exeC:\Windows\system32\Bebkpn32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Bingpmnl.exeC:\Windows\system32\Bingpmnl.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Bkodhe32.exeC:\Windows\system32\Bkodhe32.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bbflib32.exeC:\Windows\system32\Bbflib32.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bdhhqk32.exeC:\Windows\system32\Bdhhqk32.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bnpmipql.exeC:\Windows\system32\Bnpmipql.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bghabf32.exeC:\Windows\system32\Bghabf32.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bkdmcdoe.exeC:\Windows\system32\Bkdmcdoe.exe38⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Bhhnli32.exeC:\Windows\system32\Bhhnli32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bkfjhd32.exeC:\Windows\system32\Bkfjhd32.exe40⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Bdooajdc.exeC:\Windows\system32\Bdooajdc.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cgmkmecg.exeC:\Windows\system32\Cgmkmecg.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cjlgiqbk.exeC:\Windows\system32\Cjlgiqbk.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cljcelan.exeC:\Windows\system32\Cljcelan.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ccdlbf32.exeC:\Windows\system32\Ccdlbf32.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cjndop32.exeC:\Windows\system32\Cjndop32.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cphlljge.exeC:\Windows\system32\Cphlljge.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ccfhhffh.exeC:\Windows\system32\Ccfhhffh.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cpjiajeb.exeC:\Windows\system32\Cpjiajeb.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Comimg32.exeC:\Windows\system32\Comimg32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cfgaiaci.exeC:\Windows\system32\Cfgaiaci.exe51⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Claifkkf.exeC:\Windows\system32\Claifkkf.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Copfbfjj.exeC:\Windows\system32\Copfbfjj.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cbnbobin.exeC:\Windows\system32\Cbnbobin.exe54⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Cdlnkmha.exeC:\Windows\system32\Cdlnkmha.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Clcflkic.exeC:\Windows\system32\Clcflkic.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ckffgg32.exeC:\Windows\system32\Ckffgg32.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cndbcc32.exeC:\Windows\system32\Cndbcc32.exe58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dbpodagk.exeC:\Windows\system32\Dbpodagk.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dgmglh32.exeC:\Windows\system32\Dgmglh32.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dkhcmgnl.exeC:\Windows\system32\Dkhcmgnl.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dngoibmo.exeC:\Windows\system32\Dngoibmo.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dqelenlc.exeC:\Windows\system32\Dqelenlc.exe64⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dhmcfkme.exeC:\Windows\system32\Dhmcfkme.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dgodbh32.exeC:\Windows\system32\Dgodbh32.exe66⤵
-
C:\Windows\SysWOW64\Djnpnc32.exeC:\Windows\system32\Djnpnc32.exe67⤵
-
C:\Windows\SysWOW64\Dnilobkm.exeC:\Windows\system32\Dnilobkm.exe68⤵
-
C:\Windows\SysWOW64\Dqhhknjp.exeC:\Windows\system32\Dqhhknjp.exe69⤵
-
C:\Windows\SysWOW64\Dcfdgiid.exeC:\Windows\system32\Dcfdgiid.exe70⤵
-
C:\Windows\SysWOW64\Dgaqgh32.exeC:\Windows\system32\Dgaqgh32.exe71⤵
-
C:\Windows\SysWOW64\Djpmccqq.exeC:\Windows\system32\Djpmccqq.exe72⤵
-
C:\Windows\SysWOW64\Dnlidb32.exeC:\Windows\system32\Dnlidb32.exe73⤵
-
C:\Windows\SysWOW64\Dqjepm32.exeC:\Windows\system32\Dqjepm32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ddeaalpg.exeC:\Windows\system32\Ddeaalpg.exe75⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dchali32.exeC:\Windows\system32\Dchali32.exe76⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dfgmhd32.exeC:\Windows\system32\Dfgmhd32.exe77⤵
-
C:\Windows\SysWOW64\Dnneja32.exeC:\Windows\system32\Dnneja32.exe78⤵
-
C:\Windows\SysWOW64\Dmafennb.exeC:\Windows\system32\Dmafennb.exe79⤵
-
C:\Windows\SysWOW64\Doobajme.exeC:\Windows\system32\Doobajme.exe80⤵
-
C:\Windows\SysWOW64\Dcknbh32.exeC:\Windows\system32\Dcknbh32.exe81⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe82⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Djefobmk.exeC:\Windows\system32\Djefobmk.exe83⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Eihfjo32.exeC:\Windows\system32\Eihfjo32.exe84⤵
-
C:\Windows\SysWOW64\Epaogi32.exeC:\Windows\system32\Epaogi32.exe85⤵
-
C:\Windows\SysWOW64\Ecmkghcl.exeC:\Windows\system32\Ecmkghcl.exe86⤵
-
C:\Windows\SysWOW64\Ebpkce32.exeC:\Windows\system32\Ebpkce32.exe87⤵
-
C:\Windows\SysWOW64\Ejgcdb32.exeC:\Windows\system32\Ejgcdb32.exe88⤵
-
C:\Windows\SysWOW64\Eijcpoac.exeC:\Windows\system32\Eijcpoac.exe89⤵
-
C:\Windows\SysWOW64\Emeopn32.exeC:\Windows\system32\Emeopn32.exe90⤵
-
C:\Windows\SysWOW64\Epdkli32.exeC:\Windows\system32\Epdkli32.exe91⤵
-
C:\Windows\SysWOW64\Ebbgid32.exeC:\Windows\system32\Ebbgid32.exe92⤵
-
C:\Windows\SysWOW64\Eeqdep32.exeC:\Windows\system32\Eeqdep32.exe93⤵
-
C:\Windows\SysWOW64\Eilpeooq.exeC:\Windows\system32\Eilpeooq.exe94⤵
-
C:\Windows\SysWOW64\Ekklaj32.exeC:\Windows\system32\Ekklaj32.exe95⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Epfhbign.exeC:\Windows\system32\Epfhbign.exe96⤵
-
C:\Windows\SysWOW64\Ebedndfa.exeC:\Windows\system32\Ebedndfa.exe97⤵
-
C:\Windows\SysWOW64\Efppoc32.exeC:\Windows\system32\Efppoc32.exe98⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eecqjpee.exeC:\Windows\system32\Eecqjpee.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eiomkn32.exeC:\Windows\system32\Eiomkn32.exe100⤵
-
C:\Windows\SysWOW64\Elmigj32.exeC:\Windows\system32\Elmigj32.exe101⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Epieghdk.exeC:\Windows\system32\Epieghdk.exe102⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ebgacddo.exeC:\Windows\system32\Ebgacddo.exe103⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eeempocb.exeC:\Windows\system32\Eeempocb.exe104⤵
-
C:\Windows\SysWOW64\Eiaiqn32.exeC:\Windows\system32\Eiaiqn32.exe105⤵
-
C:\Windows\SysWOW64\Eloemi32.exeC:\Windows\system32\Eloemi32.exe106⤵
-
C:\Windows\SysWOW64\Eloemi32.exeC:\Windows\system32\Eloemi32.exe107⤵
-
C:\Windows\SysWOW64\Ejbfhfaj.exeC:\Windows\system32\Ejbfhfaj.exe108⤵
-
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe109⤵
-
C:\Windows\SysWOW64\Ealnephf.exeC:\Windows\system32\Ealnephf.exe110⤵
-
C:\Windows\SysWOW64\Fehjeo32.exeC:\Windows\system32\Fehjeo32.exe111⤵
-
C:\Windows\SysWOW64\Fckjalhj.exeC:\Windows\system32\Fckjalhj.exe112⤵
-
C:\Windows\SysWOW64\Fhffaj32.exeC:\Windows\system32\Fhffaj32.exe113⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fjdbnf32.exeC:\Windows\system32\Fjdbnf32.exe114⤵
-
C:\Windows\SysWOW64\Fjdbnf32.exeC:\Windows\system32\Fjdbnf32.exe115⤵
-
C:\Windows\SysWOW64\Fnpnndgp.exeC:\Windows\system32\Fnpnndgp.exe116⤵
-
C:\Windows\SysWOW64\Fmcoja32.exeC:\Windows\system32\Fmcoja32.exe117⤵
-
C:\Windows\SysWOW64\Fejgko32.exeC:\Windows\system32\Fejgko32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fhhcgj32.exeC:\Windows\system32\Fhhcgj32.exe119⤵
-
C:\Windows\SysWOW64\Fjgoce32.exeC:\Windows\system32\Fjgoce32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Fmekoalh.exeC:\Windows\system32\Fmekoalh.exe121⤵
-
C:\Windows\SysWOW64\Fpdhklkl.exeC:\Windows\system32\Fpdhklkl.exe122⤵
-
C:\Windows\SysWOW64\Fhkpmjln.exeC:\Windows\system32\Fhkpmjln.exe123⤵
-
C:\Windows\SysWOW64\Ffnphf32.exeC:\Windows\system32\Ffnphf32.exe124⤵
-
C:\Windows\SysWOW64\Fjilieka.exeC:\Windows\system32\Fjilieka.exe125⤵
-
C:\Windows\SysWOW64\Fmhheqje.exeC:\Windows\system32\Fmhheqje.exe126⤵
-
C:\Windows\SysWOW64\Facdeo32.exeC:\Windows\system32\Facdeo32.exe127⤵
-
C:\Windows\SysWOW64\Fdapak32.exeC:\Windows\system32\Fdapak32.exe128⤵
-
C:\Windows\SysWOW64\Fbdqmghm.exeC:\Windows\system32\Fbdqmghm.exe129⤵
-
C:\Windows\SysWOW64\Fjlhneio.exeC:\Windows\system32\Fjlhneio.exe130⤵
-
C:\Windows\SysWOW64\Fioija32.exeC:\Windows\system32\Fioija32.exe131⤵
-
C:\Windows\SysWOW64\Flmefm32.exeC:\Windows\system32\Flmefm32.exe132⤵
-
C:\Windows\SysWOW64\Fphafl32.exeC:\Windows\system32\Fphafl32.exe133⤵
-
C:\Windows\SysWOW64\Fddmgjpo.exeC:\Windows\system32\Fddmgjpo.exe134⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fbgmbg32.exeC:\Windows\system32\Fbgmbg32.exe135⤵
-
C:\Windows\SysWOW64\Ffbicfoc.exeC:\Windows\system32\Ffbicfoc.exe136⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe137⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fmlapp32.exeC:\Windows\system32\Fmlapp32.exe138⤵
-
C:\Windows\SysWOW64\Globlmmj.exeC:\Windows\system32\Globlmmj.exe139⤵
-
C:\Windows\SysWOW64\Gbijhg32.exeC:\Windows\system32\Gbijhg32.exe140⤵
-
C:\Windows\SysWOW64\Gegfdb32.exeC:\Windows\system32\Gegfdb32.exe141⤵
-
C:\Windows\SysWOW64\Gicbeald.exeC:\Windows\system32\Gicbeald.exe142⤵
-
C:\Windows\SysWOW64\Glaoalkh.exeC:\Windows\system32\Glaoalkh.exe143⤵
-
C:\Windows\SysWOW64\Gopkmhjk.exeC:\Windows\system32\Gopkmhjk.exe144⤵
-
C:\Windows\SysWOW64\Gbkgnfbd.exeC:\Windows\system32\Gbkgnfbd.exe145⤵
-
C:\Windows\SysWOW64\Gangic32.exeC:\Windows\system32\Gangic32.exe146⤵
-
C:\Windows\SysWOW64\Gejcjbah.exeC:\Windows\system32\Gejcjbah.exe147⤵
-
C:\Windows\SysWOW64\Ghhofmql.exeC:\Windows\system32\Ghhofmql.exe148⤵
-
C:\Windows\SysWOW64\Gldkfl32.exeC:\Windows\system32\Gldkfl32.exe149⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gkgkbipp.exeC:\Windows\system32\Gkgkbipp.exe150⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Gaqcoc32.exeC:\Windows\system32\Gaqcoc32.exe151⤵
-
C:\Windows\SysWOW64\Glfhll32.exeC:\Windows\system32\Glfhll32.exe152⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gacpdbej.exeC:\Windows\system32\Gacpdbej.exe153⤵
-
C:\Windows\SysWOW64\Gkkemh32.exeC:\Windows\system32\Gkkemh32.exe154⤵
-
C:\Windows\SysWOW64\Gphmeo32.exeC:\Windows\system32\Gphmeo32.exe155⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ghoegl32.exeC:\Windows\system32\Ghoegl32.exe156⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hmlnoc32.exeC:\Windows\system32\Hmlnoc32.exe157⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hcifgjgc.exeC:\Windows\system32\Hcifgjgc.exe158⤵
-
C:\Windows\SysWOW64\Hgdbhi32.exeC:\Windows\system32\Hgdbhi32.exe159⤵
-
C:\Windows\SysWOW64\Hicodd32.exeC:\Windows\system32\Hicodd32.exe160⤵
-
C:\Windows\SysWOW64\Hlakpp32.exeC:\Windows\system32\Hlakpp32.exe161⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hckcmjep.exeC:\Windows\system32\Hckcmjep.exe162⤵
-
C:\Windows\SysWOW64\Hnagjbdf.exeC:\Windows\system32\Hnagjbdf.exe163⤵
-
C:\Windows\SysWOW64\Hgilchkf.exeC:\Windows\system32\Hgilchkf.exe164⤵
-
C:\Windows\SysWOW64\Hjhhocjj.exeC:\Windows\system32\Hjhhocjj.exe165⤵
-
C:\Windows\SysWOW64\Hpapln32.exeC:\Windows\system32\Hpapln32.exe166⤵
-
C:\Windows\SysWOW64\Hacmcfge.exeC:\Windows\system32\Hacmcfge.exe167⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hhmepp32.exeC:\Windows\system32\Hhmepp32.exe168⤵
-
C:\Windows\SysWOW64\Icbimi32.exeC:\Windows\system32\Icbimi32.exe169⤵
-
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe170⤵
-
C:\Windows\SysWOW64\Ioijbj32.exeC:\Windows\system32\Ioijbj32.exe171⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ihankokm.exeC:\Windows\system32\Ihankokm.exe172⤵
-
C:\Windows\SysWOW64\Igdogl32.exeC:\Windows\system32\Igdogl32.exe173⤵
-
C:\Windows\SysWOW64\Inngcfid.exeC:\Windows\system32\Inngcfid.exe174⤵
-
C:\Windows\SysWOW64\Iajcde32.exeC:\Windows\system32\Iajcde32.exe175⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Idhopq32.exeC:\Windows\system32\Idhopq32.exe176⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Iggkllpe.exeC:\Windows\system32\Iggkllpe.exe177⤵
-
C:\Windows\SysWOW64\Inqcif32.exeC:\Windows\system32\Inqcif32.exe178⤵
-
C:\Windows\SysWOW64\Iqopea32.exeC:\Windows\system32\Iqopea32.exe179⤵
-
C:\Windows\SysWOW64\Igihbknb.exeC:\Windows\system32\Igihbknb.exe180⤵
-
C:\Windows\SysWOW64\Ijgdngmf.exeC:\Windows\system32\Ijgdngmf.exe181⤵
-
C:\Windows\SysWOW64\Imfqjbli.exeC:\Windows\system32\Imfqjbli.exe182⤵
-
C:\Windows\SysWOW64\Iqalka32.exeC:\Windows\system32\Iqalka32.exe183⤵
-
C:\Windows\SysWOW64\Icpigm32.exeC:\Windows\system32\Icpigm32.exe184⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jjjacf32.exeC:\Windows\system32\Jjjacf32.exe185⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jmhmpb32.exeC:\Windows\system32\Jmhmpb32.exe186⤵
-
C:\Windows\SysWOW64\Jgnamk32.exeC:\Windows\system32\Jgnamk32.exe187⤵
-
C:\Windows\SysWOW64\Jmjjea32.exeC:\Windows\system32\Jmjjea32.exe188⤵
-
C:\Windows\SysWOW64\Joifam32.exeC:\Windows\system32\Joifam32.exe189⤵
-
C:\Windows\SysWOW64\Jiakjb32.exeC:\Windows\system32\Jiakjb32.exe190⤵
-
C:\Windows\SysWOW64\Jbjochdi.exeC:\Windows\system32\Jbjochdi.exe191⤵
-
C:\Windows\SysWOW64\Jfekcg32.exeC:\Windows\system32\Jfekcg32.exe192⤵
-
C:\Windows\SysWOW64\Jehkodcm.exeC:\Windows\system32\Jehkodcm.exe193⤵
-
C:\Windows\SysWOW64\Jkbcln32.exeC:\Windows\system32\Jkbcln32.exe194⤵
-
C:\Windows\SysWOW64\Jnqphi32.exeC:\Windows\system32\Jnqphi32.exe195⤵
-
C:\Windows\SysWOW64\Jfghif32.exeC:\Windows\system32\Jfghif32.exe196⤵
-
C:\Windows\SysWOW64\Jifdebic.exeC:\Windows\system32\Jifdebic.exe197⤵
-
C:\Windows\SysWOW64\Joplbl32.exeC:\Windows\system32\Joplbl32.exe198⤵
-
C:\Windows\SysWOW64\Jnclnihj.exeC:\Windows\system32\Jnclnihj.exe199⤵
-
C:\Windows\SysWOW64\Kemejc32.exeC:\Windows\system32\Kemejc32.exe200⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kkgmgmfd.exeC:\Windows\system32\Kkgmgmfd.exe201⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kaceodek.exeC:\Windows\system32\Kaceodek.exe202⤵
-
C:\Windows\SysWOW64\Kgnnln32.exeC:\Windows\system32\Kgnnln32.exe203⤵
-
C:\Windows\SysWOW64\Kngfih32.exeC:\Windows\system32\Kngfih32.exe204⤵
-
C:\Windows\SysWOW64\Kafbec32.exeC:\Windows\system32\Kafbec32.exe205⤵
-
C:\Windows\SysWOW64\Kfbkmk32.exeC:\Windows\system32\Kfbkmk32.exe206⤵
-
C:\Windows\SysWOW64\Knjbnh32.exeC:\Windows\system32\Knjbnh32.exe207⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kcfkfo32.exeC:\Windows\system32\Kcfkfo32.exe208⤵
-
C:\Windows\SysWOW64\Kjqccigf.exeC:\Windows\system32\Kjqccigf.exe209⤵
-
C:\Windows\SysWOW64\Kpmlkp32.exeC:\Windows\system32\Kpmlkp32.exe210⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kfgdhjmk.exeC:\Windows\system32\Kfgdhjmk.exe211⤵
-
C:\Windows\SysWOW64\Kifpdelo.exeC:\Windows\system32\Kifpdelo.exe212⤵
-
C:\Windows\SysWOW64\Kmaled32.exeC:\Windows\system32\Kmaled32.exe213⤵
-
C:\Windows\SysWOW64\Lbnemk32.exeC:\Windows\system32\Lbnemk32.exe214⤵
-
C:\Windows\SysWOW64\Lihmjejl.exeC:\Windows\system32\Lihmjejl.exe215⤵
-
C:\Windows\SysWOW64\Loeebl32.exeC:\Windows\system32\Loeebl32.exe216⤵
-
C:\Windows\SysWOW64\Lijjoe32.exeC:\Windows\system32\Lijjoe32.exe217⤵
-
C:\Windows\SysWOW64\Lpdbloof.exeC:\Windows\system32\Lpdbloof.exe218⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lbcnhjnj.exeC:\Windows\system32\Lbcnhjnj.exe219⤵
-
C:\Windows\SysWOW64\Llkbap32.exeC:\Windows\system32\Llkbap32.exe220⤵
-
C:\Windows\SysWOW64\Lahkigca.exeC:\Windows\system32\Lahkigca.exe221⤵
-
C:\Windows\SysWOW64\Lkppbl32.exeC:\Windows\system32\Lkppbl32.exe222⤵
-
C:\Windows\SysWOW64\Lollckbk.exeC:\Windows\system32\Lollckbk.exe223⤵
-
C:\Windows\SysWOW64\Mhdplq32.exeC:\Windows\system32\Mhdplq32.exe224⤵
-
C:\Windows\SysWOW64\Mkclhl32.exeC:\Windows\system32\Mkclhl32.exe225⤵
-
C:\Windows\SysWOW64\Mppepcfg.exeC:\Windows\system32\Mppepcfg.exe226⤵
-
C:\Windows\SysWOW64\Mhgmapfi.exeC:\Windows\system32\Mhgmapfi.exe227⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mmceigep.exeC:\Windows\system32\Mmceigep.exe228⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Mdmmfa32.exeC:\Windows\system32\Mdmmfa32.exe229⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mmfbogcn.exeC:\Windows\system32\Mmfbogcn.exe230⤵
-
C:\Windows\SysWOW64\Mlibjc32.exeC:\Windows\system32\Mlibjc32.exe231⤵
-
C:\Windows\SysWOW64\Mgnfhlin.exeC:\Windows\system32\Mgnfhlin.exe232⤵
-
C:\Windows\SysWOW64\Mimbdhhb.exeC:\Windows\system32\Mimbdhhb.exe233⤵
-
C:\Windows\SysWOW64\Mgqcmlgl.exeC:\Windows\system32\Mgqcmlgl.exe234⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mlmlecec.exeC:\Windows\system32\Mlmlecec.exe235⤵
-
C:\Windows\SysWOW64\Najdnj32.exeC:\Windows\system32\Najdnj32.exe236⤵
-
C:\Windows\SysWOW64\Nialog32.exeC:\Windows\system32\Nialog32.exe237⤵
-
C:\Windows\SysWOW64\Nondgn32.exeC:\Windows\system32\Nondgn32.exe238⤵
-
C:\Windows\SysWOW64\Nehmdhja.exeC:\Windows\system32\Nehmdhja.exe239⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nkeelohh.exeC:\Windows\system32\Nkeelohh.exe240⤵
-
C:\Windows\SysWOW64\Nejiih32.exeC:\Windows\system32\Nejiih32.exe241⤵