Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe
Resource
win10v2004-20240508-en
General
-
Target
24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe
-
Size
163KB
-
MD5
05a7359cf1b2e7076202a8655a7ee9b7
-
SHA1
87b94eb610608086b320eacce94cbebcabdfe85a
-
SHA256
24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e
-
SHA512
7b3f2556b835173ecfe6bad484e35014d17f400d5d8823e952970401ec7412a316634a7a26de5d1f785c5605adf4b6f377c1e4675373b9a9a82d64c722023b6c
-
SSDEEP
1536:PG0OWrcHET+hOX6KWyqv4/yqwGcHku7lylProNVU4qNVUrk/9QbfBr+7GwKrPAsf:O0OFET+qi/iyqwV7lyltOrWKDBr+yJb
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Cnmfdb32.exeCcgklc32.exeEdlafebn.exeFqglggcp.exeDafmqb32.exeQcogbdkg.exeIjkocg32.exeNlilqbgp.exeBeackp32.exeMgjnhaco.exeNidmfh32.exeJkchmo32.exeKgbipf32.exeCbdgqimc.exeJpigma32.exeJhahanie.exeQkielpdf.exeHhejnc32.exeNnafnopi.exePkcbnanl.exeNmcmgm32.exeGnaooi32.exeHidcef32.exeIjclol32.exePkofjijm.exeFlqmbd32.exeNmqpam32.exeEdibhmml.exeMdogedmh.exeBoemlbpk.exeFchkbg32.exeGhgfekpn.exeIaeegh32.exeOalhqohl.exeKnhjjj32.exeGqaafn32.exeHiqoeplo.exeDeondj32.exeDacnbjml.exeDjdgic32.exeCqfbjhgf.exeBfabnl32.exeDgiaefgg.exeFgocmc32.exeDakmfh32.exeDeollamj.exeIflmjihl.exeFgldnkkf.exeNfahomfd.exePddjlb32.exeFefqdl32.exeLmfhil32.exeIipiljgf.exeOmefkplm.exeLdokfakl.exeEelkeeah.exeFgdnnl32.exeNoljjglk.exeAccnekon.exeNoffdd32.exeLkicbk32.exeIjaaae32.exeIeagbm32.exeKglcogeo.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnmfdb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccgklc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edlafebn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqglggcp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dafmqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcogbdkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijkocg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlilqbgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beackp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgjnhaco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nidmfh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkchmo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgbipf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbdgqimc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpigma32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhahanie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkielpdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhejnc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnafnopi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkcbnanl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmcmgm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnaooi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hidcef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijclol32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkofjijm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flqmbd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmqpam32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edibhmml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdogedmh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boemlbpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fchkbg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghgfekpn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iaeegh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oalhqohl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knhjjj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqaafn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiqoeplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deondj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dacnbjml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djdgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cqfbjhgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfabnl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgiaefgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgocmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dakmfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deollamj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iflmjihl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgldnkkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfahomfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pddjlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fefqdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmfhil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iipiljgf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omefkplm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldokfakl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eelkeeah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgdnnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noljjglk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Accnekon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noffdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkicbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijaaae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ieagbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kglcogeo.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Nofdklgl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oagmmgdm.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Odeiibdq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oalfhf32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Onecbg32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pjldghjm.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pmojocel.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pkdgpo32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Poapfn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qodlkm32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Aaheie32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Aajbne32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Abphal32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Abbeflpf.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Biojif32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Bhdgjb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bhfcpb32.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/2052-226-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chkmkacq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cpfaocal.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cgbfamff.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chfpoeja.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/2036-270-0x0000000000220000-0x0000000000273000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Candgk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Daqamj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dacnbjml.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgbcpq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ddfcje32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Enqdhj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Elfaifaq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Egdlec32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fnqqgm32.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/2576-363-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fgiepced.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fqcfnhjb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fjlkgn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ffcllo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Glpdde32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gnpmfqap.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gbqbaofc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ghmkjedk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hafock32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hahlhkhi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hfedqagp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hbnbkbja.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hoebpc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ipdojfgh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ieagbm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Idfdcijh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iefamlak.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Igijkd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ipbocjlg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jliohkak.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jgncfcaa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jfcqgpfi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jpiedieo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jjaimn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jcjnfdbp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kncofa32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kglcogeo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kdpcikdi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kkileele.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kgpmjf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kmmebm32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Nofdklgl.exe UPX C:\Windows\SysWOW64\Oagmmgdm.exe UPX \Windows\SysWOW64\Odeiibdq.exe UPX C:\Windows\SysWOW64\Oalfhf32.exe UPX \Windows\SysWOW64\Onecbg32.exe UPX \Windows\SysWOW64\Pjldghjm.exe UPX \Windows\SysWOW64\Pmojocel.exe UPX \Windows\SysWOW64\Pkdgpo32.exe UPX \Windows\SysWOW64\Poapfn32.exe UPX C:\Windows\SysWOW64\Qodlkm32.exe UPX \Windows\SysWOW64\Aaheie32.exe UPX \Windows\SysWOW64\Aajbne32.exe UPX \Windows\SysWOW64\Abphal32.exe UPX \Windows\SysWOW64\Abbeflpf.exe UPX \Windows\SysWOW64\Biojif32.exe UPX \Windows\SysWOW64\Bhdgjb32.exe UPX C:\Windows\SysWOW64\Bhfcpb32.exe UPX behavioral1/memory/2052-226-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Chkmkacq.exe UPX C:\Windows\SysWOW64\Cpfaocal.exe UPX C:\Windows\SysWOW64\Cgbfamff.exe UPX C:\Windows\SysWOW64\Chfpoeja.exe UPX behavioral1/memory/2036-270-0x0000000000220000-0x0000000000273000-memory.dmp UPX C:\Windows\SysWOW64\Candgk32.exe UPX C:\Windows\SysWOW64\Daqamj32.exe UPX C:\Windows\SysWOW64\Dacnbjml.exe UPX C:\Windows\SysWOW64\Dgbcpq32.exe UPX C:\Windows\SysWOW64\Ddfcje32.exe UPX C:\Windows\SysWOW64\Enqdhj32.exe UPX C:\Windows\SysWOW64\Elfaifaq.exe UPX C:\Windows\SysWOW64\Egdlec32.exe UPX C:\Windows\SysWOW64\Fnqqgm32.exe UPX behavioral1/memory/2576-363-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Fgiepced.exe UPX C:\Windows\SysWOW64\Fqcfnhjb.exe UPX C:\Windows\SysWOW64\Fjlkgn32.exe UPX C:\Windows\SysWOW64\Ffcllo32.exe UPX C:\Windows\SysWOW64\Glpdde32.exe UPX C:\Windows\SysWOW64\Gnpmfqap.exe UPX C:\Windows\SysWOW64\Gbqbaofc.exe UPX C:\Windows\SysWOW64\Ghmkjedk.exe UPX C:\Windows\SysWOW64\Hafock32.exe UPX C:\Windows\SysWOW64\Hahlhkhi.exe UPX C:\Windows\SysWOW64\Hfedqagp.exe UPX C:\Windows\SysWOW64\Hbnbkbja.exe UPX C:\Windows\SysWOW64\Hoebpc32.exe UPX C:\Windows\SysWOW64\Ipdojfgh.exe UPX C:\Windows\SysWOW64\Ieagbm32.exe UPX C:\Windows\SysWOW64\Idfdcijh.exe UPX C:\Windows\SysWOW64\Iefamlak.exe UPX C:\Windows\SysWOW64\Igijkd32.exe UPX C:\Windows\SysWOW64\Ipbocjlg.exe UPX C:\Windows\SysWOW64\Jliohkak.exe UPX C:\Windows\SysWOW64\Jgncfcaa.exe UPX C:\Windows\SysWOW64\Jfcqgpfi.exe UPX C:\Windows\SysWOW64\Jpiedieo.exe UPX C:\Windows\SysWOW64\Jjaimn32.exe UPX C:\Windows\SysWOW64\Jcjnfdbp.exe UPX C:\Windows\SysWOW64\Kncofa32.exe UPX C:\Windows\SysWOW64\Kglcogeo.exe UPX C:\Windows\SysWOW64\Kdpcikdi.exe UPX C:\Windows\SysWOW64\Kkileele.exe UPX C:\Windows\SysWOW64\Kgpmjf32.exe UPX C:\Windows\SysWOW64\Kmmebm32.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Nofdklgl.exeOagmmgdm.exeOdeiibdq.exeOalfhf32.exeOnecbg32.exePjldghjm.exePmojocel.exePkdgpo32.exePoapfn32.exeQodlkm32.exeAaheie32.exeAajbne32.exeAbphal32.exeAbbeflpf.exeBiojif32.exeBhdgjb32.exeBhfcpb32.exeChkmkacq.exeCpfaocal.exeCgbfamff.exeChfpoeja.exeCandgk32.exeDaqamj32.exeDacnbjml.exeDgbcpq32.exeDdfcje32.exeEnqdhj32.exeElfaifaq.exeEgdlec32.exeFnqqgm32.exeFgiepced.exeFqcfnhjb.exeFjlkgn32.exeFfcllo32.exeGlpdde32.exeGnpmfqap.exeGbqbaofc.exeGhmkjedk.exeHafock32.exeHahlhkhi.exeHfedqagp.exeHbnbkbja.exeHoebpc32.exeIpdojfgh.exeIeagbm32.exeIdfdcijh.exeIefamlak.exeIgijkd32.exeIpbocjlg.exeJliohkak.exeJgncfcaa.exeJfcqgpfi.exeJpiedieo.exeJjaimn32.exeJcjnfdbp.exeKncofa32.exeKglcogeo.exeKdpcikdi.exeKkileele.exeKgpmjf32.exeKmmebm32.exeKgbipf32.exeKmobhmnn.exeKcijeg32.exepid process 3040 Nofdklgl.exe 3000 Oagmmgdm.exe 2620 Odeiibdq.exe 2736 Oalfhf32.exe 2520 Onecbg32.exe 2512 Pjldghjm.exe 1680 Pmojocel.exe 660 Pkdgpo32.exe 1932 Poapfn32.exe 2760 Qodlkm32.exe 2380 Aaheie32.exe 1096 Aajbne32.exe 1988 Abphal32.exe 1924 Abbeflpf.exe 1628 Biojif32.exe 2128 Bhdgjb32.exe 2052 Bhfcpb32.exe 1568 Chkmkacq.exe 1056 Cpfaocal.exe 2332 Cgbfamff.exe 2036 Chfpoeja.exe 1164 Candgk32.exe 1112 Daqamj32.exe 580 Dacnbjml.exe 2828 Dgbcpq32.exe 688 Ddfcje32.exe 2864 Enqdhj32.exe 2900 Elfaifaq.exe 1588 Egdlec32.exe 2576 Fnqqgm32.exe 2668 Fgiepced.exe 2356 Fqcfnhjb.exe 2788 Fjlkgn32.exe 1148 Ffcllo32.exe 2916 Glpdde32.exe 2188 Gnpmfqap.exe 1020 Gbqbaofc.exe 1204 Ghmkjedk.exe 2556 Hafock32.exe 2412 Hahlhkhi.exe 1520 Hfedqagp.exe 1620 Hbnbkbja.exe 936 Hoebpc32.exe 804 Ipdojfgh.exe 3060 Ieagbm32.exe 3028 Idfdcijh.exe 2308 Iefamlak.exe 2344 Igijkd32.exe 2000 Ipbocjlg.exe 1608 Jliohkak.exe 2108 Jgncfcaa.exe 672 Jfcqgpfi.exe 2936 Jpiedieo.exe 2428 Jjaimn32.exe 872 Jcjnfdbp.exe 2824 Kncofa32.exe 2028 Kglcogeo.exe 2336 Kdpcikdi.exe 2696 Kkileele.exe 2640 Kgpmjf32.exe 2952 Kmmebm32.exe 728 Kgbipf32.exe 1804 Kmobhmnn.exe 2184 Kcijeg32.exe -
Loads dropped DLL 64 IoCs
Processes:
24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exeNofdklgl.exeOagmmgdm.exeOdeiibdq.exeOalfhf32.exeOnecbg32.exePjldghjm.exePmojocel.exePkdgpo32.exePoapfn32.exeQodlkm32.exeAaheie32.exeAajbne32.exeAbphal32.exeAbbeflpf.exeBiojif32.exeBhdgjb32.exeBhfcpb32.exeChkmkacq.exeCpfaocal.exeCgbfamff.exeChfpoeja.exeCandgk32.exeDaqamj32.exeDacnbjml.exeDgbcpq32.exeDdfcje32.exeEnqdhj32.exeElfaifaq.exeEgdlec32.exeFnqqgm32.exeFgiepced.exepid process 1724 24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe 1724 24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe 3040 Nofdklgl.exe 3040 Nofdklgl.exe 3000 Oagmmgdm.exe 3000 Oagmmgdm.exe 2620 Odeiibdq.exe 2620 Odeiibdq.exe 2736 Oalfhf32.exe 2736 Oalfhf32.exe 2520 Onecbg32.exe 2520 Onecbg32.exe 2512 Pjldghjm.exe 2512 Pjldghjm.exe 1680 Pmojocel.exe 1680 Pmojocel.exe 660 Pkdgpo32.exe 660 Pkdgpo32.exe 1932 Poapfn32.exe 1932 Poapfn32.exe 2760 Qodlkm32.exe 2760 Qodlkm32.exe 2380 Aaheie32.exe 2380 Aaheie32.exe 1096 Aajbne32.exe 1096 Aajbne32.exe 1988 Abphal32.exe 1988 Abphal32.exe 1924 Abbeflpf.exe 1924 Abbeflpf.exe 1628 Biojif32.exe 1628 Biojif32.exe 2128 Bhdgjb32.exe 2128 Bhdgjb32.exe 2052 Bhfcpb32.exe 2052 Bhfcpb32.exe 1568 Chkmkacq.exe 1568 Chkmkacq.exe 1056 Cpfaocal.exe 1056 Cpfaocal.exe 2332 Cgbfamff.exe 2332 Cgbfamff.exe 2036 Chfpoeja.exe 2036 Chfpoeja.exe 1164 Candgk32.exe 1164 Candgk32.exe 1112 Daqamj32.exe 1112 Daqamj32.exe 580 Dacnbjml.exe 580 Dacnbjml.exe 2828 Dgbcpq32.exe 2828 Dgbcpq32.exe 688 Ddfcje32.exe 688 Ddfcje32.exe 2864 Enqdhj32.exe 2864 Enqdhj32.exe 2900 Elfaifaq.exe 2900 Elfaifaq.exe 1588 Egdlec32.exe 1588 Egdlec32.exe 2576 Fnqqgm32.exe 2576 Fnqqgm32.exe 2668 Fgiepced.exe 2668 Fgiepced.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fefqdl32.exeJcciqi32.exeOalhqohl.exeJpigma32.exePhnpagdp.exeEegkpo32.exeFjegog32.exeDlofgj32.exeNckkgp32.exeIgijkd32.exeLlnaoh32.exeMapccndn.exeBgibnj32.exeCpfaocal.exeGfnjne32.exeGhgfekpn.exeHjcaha32.exeGlklejoo.exeIdkpganf.exeKoaqcn32.exeLdokfakl.exeAdfbpega.exeIebldo32.exePadeldeo.exeCbajkiof.exeNmcmgm32.exePecgea32.exeAbmdafpp.exeLkdhoc32.exeJhbold32.exeObmnna32.exeIpbocjlg.exeEkdchf32.exeHjcppidk.exeQodlkm32.exeOpplolac.exeMjnjjbbh.exeCcbphk32.exeNnafnopi.exeAcnlgajg.exeFgiepced.exeJcjnfdbp.exeKghpoa32.exeKlpdaf32.exeDjlfma32.exeEblelb32.exeGlpdde32.exeKmobhmnn.exeMhgoji32.exeFqalaa32.exePkdgpo32.exePqphnp32.exeBiaign32.exePjldghjm.exeLmfhil32.exeDbifnj32.exeJoidhh32.exeOhiffh32.exeHbkqdepm.exeGonale32.exeAbphal32.exedescription ioc process File created C:\Windows\SysWOW64\Bapefloq.dll Fefqdl32.exe File opened for modification C:\Windows\SysWOW64\Jpjifjdg.exe Jcciqi32.exe File opened for modification C:\Windows\SysWOW64\Ogiaif32.exe Oalhqohl.exe File created C:\Windows\SysWOW64\Jkchmo32.exe Jpigma32.exe File created C:\Windows\SysWOW64\Fkfnnoge.dll Phnpagdp.exe File opened for modification C:\Windows\SysWOW64\Ekdchf32.exe Eegkpo32.exe File opened for modification C:\Windows\SysWOW64\Fdkklp32.exe Fjegog32.exe File created C:\Windows\SysWOW64\Eegkpo32.exe Dlofgj32.exe File created C:\Windows\SysWOW64\Gfbliabl.dll Nckkgp32.exe File opened for modification C:\Windows\SysWOW64\Ipbocjlg.exe Igijkd32.exe File created C:\Windows\SysWOW64\Chiimh32.dll Llnaoh32.exe File created C:\Windows\SysWOW64\Cmhjho32.dll Mapccndn.exe File created C:\Windows\SysWOW64\Cpdgbm32.exe Bgibnj32.exe File created C:\Windows\SysWOW64\Cgbfamff.exe Cpfaocal.exe File created C:\Windows\SysWOW64\Hofngkga.exe Gfnjne32.exe File created C:\Windows\SysWOW64\Gdnfjl32.exe Ghgfekpn.exe File opened for modification C:\Windows\SysWOW64\Hfjbmb32.exe Hjcaha32.exe File opened for modification C:\Windows\SysWOW64\Goldfelp.exe Glklejoo.exe File created C:\Windows\SysWOW64\Cpehmcmg.dll Idkpganf.exe File created C:\Windows\SysWOW64\Qlgnpgja.dll Koaqcn32.exe File opened for modification C:\Windows\SysWOW64\Lkicbk32.exe Ldokfakl.exe File created C:\Windows\SysWOW64\Ageompfe.exe Adfbpega.exe File opened for modification C:\Windows\SysWOW64\Iogpag32.exe Iebldo32.exe File opened for modification C:\Windows\SysWOW64\Phnnho32.exe Padeldeo.exe File opened for modification C:\Windows\SysWOW64\Cbdgqimc.exe Cbajkiof.exe File opened for modification C:\Windows\SysWOW64\Ndmecgba.exe Nmcmgm32.exe File opened for modification C:\Windows\SysWOW64\Poklngnf.exe Pecgea32.exe File created C:\Windows\SysWOW64\Bnapob32.dll Abmdafpp.exe File created C:\Windows\SysWOW64\Dnoldn32.dll Lkdhoc32.exe File opened for modification C:\Windows\SysWOW64\Jpigma32.exe Jhbold32.exe File created C:\Windows\SysWOW64\Ohiffh32.exe Obmnna32.exe File created C:\Windows\SysWOW64\Bepejfpc.dll Ipbocjlg.exe File opened for modification C:\Windows\SysWOW64\Ekfpmf32.exe Ekdchf32.exe File created C:\Windows\SysWOW64\Hfjbmb32.exe Hjcaha32.exe File opened for modification C:\Windows\SysWOW64\Hmdhad32.exe Hjcppidk.exe File opened for modification C:\Windows\SysWOW64\Aaheie32.exe Qodlkm32.exe File opened for modification C:\Windows\SysWOW64\Ocohkh32.exe Opplolac.exe File created C:\Windows\SysWOW64\Ncfoch32.exe Mjnjjbbh.exe File created C:\Windows\SysWOW64\Ijppackl.dll Ccbphk32.exe File created C:\Windows\SysWOW64\Hnoefj32.dll Nnafnopi.exe File created C:\Windows\SysWOW64\Boemlbpk.exe Acnlgajg.exe File created C:\Windows\SysWOW64\Fqcfnhjb.exe Fgiepced.exe File opened for modification C:\Windows\SysWOW64\Kncofa32.exe Jcjnfdbp.exe File created C:\Windows\SysWOW64\Klehgh32.exe Kghpoa32.exe File created C:\Windows\SysWOW64\Fdkklp32.exe Fjegog32.exe File created C:\Windows\SysWOW64\Ihnijmcj.dll Klpdaf32.exe File opened for modification C:\Windows\SysWOW64\Dcdkef32.exe Djlfma32.exe File created C:\Windows\SysWOW64\Fhohnoea.dll Eblelb32.exe File opened for modification C:\Windows\SysWOW64\Gnpmfqap.exe Glpdde32.exe File created C:\Windows\SysWOW64\Kcijeg32.exe Kmobhmnn.exe File created C:\Windows\SysWOW64\Mjekfd32.exe Mhgoji32.exe File created C:\Windows\SysWOW64\Mfnnbf32.dll Fqalaa32.exe File created C:\Windows\SysWOW64\Lbbjgn32.dll Pkdgpo32.exe File created C:\Windows\SysWOW64\Igcale32.dll Pqphnp32.exe File opened for modification C:\Windows\SysWOW64\Bammlq32.exe Biaign32.exe File created C:\Windows\SysWOW64\Adagkoae.dll Pjldghjm.exe File created C:\Windows\SysWOW64\Lbcpac32.exe Lmfhil32.exe File created C:\Windows\SysWOW64\Mnkgen32.dll Dbifnj32.exe File created C:\Windows\SysWOW64\Cpnifncd.dll Joidhh32.exe File created C:\Windows\SysWOW64\Pofkha32.exe Ohiffh32.exe File opened for modification C:\Windows\SysWOW64\Hghillnd.exe Hbkqdepm.exe File created C:\Windows\SysWOW64\Gnlnhm32.dll Gonale32.exe File created C:\Windows\SysWOW64\Jpjifjdg.exe Jcciqi32.exe File opened for modification C:\Windows\SysWOW64\Abbeflpf.exe Abphal32.exe -
Modifies registry class 64 IoCs
Processes:
Mcfemmna.exeAjckilei.exeHnhgha32.exeFgiepced.exeCkahkk32.exeIbmgpoia.exeLkgngb32.exeFpbnjjkm.exePohfehdi.exeIabhah32.exeKljabgnh.exeHakkgc32.exeLoqmba32.exeLjfogake.exeMjekfd32.exeMbcmpfhi.exeInbnhihl.exeCeebklai.exeDlofgj32.exeEegkpo32.exeOhncbdbd.exeBoemlbpk.exeEhnfpifm.exeGdnfjl32.exeNofdklgl.exeMjhhld32.exeAbmdafpp.exeAdaiee32.exeKhcomhbi.exeOniebmda.exeCkolek32.exeEjpdai32.exeFfibkj32.exeFfaaoh32.exeBkbdabog.exeCmfmojcb.exeIjklknbn.exeMjnjjbbh.exeEeohkeoe.exeMejlalji.exeDmhdkdlg.exeCbffoabe.exeMdbiji32.exePacajg32.exeAcnlgajg.exeDhplhc32.exeLgmeid32.exeEldglp32.exeFgldnkkf.exeKnhjjj32.exePafbadcm.exePgegok32.exePqphnp32.exeGlklejoo.exeAlihaioe.exeHghillnd.exeJhahanie.exeAababceh.exeKbigpn32.exeCcgklc32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iagcpm32.dll" Mcfemmna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajckilei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gflfedag.dll" Hnhgha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fgiepced.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckahkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibmgpoia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgknkqan.dll" Lkgngb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gacdld32.dll" Fpbnjjkm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pohfehdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iabhah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kljabgnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hakkgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qpceaipi.dll" Loqmba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljfogake.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdcpnn32.dll" Mjekfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjfnik32.dll" Mbcmpfhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Inbnhihl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efeckm32.dll" Ceebklai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmndgq32.dll" Dlofgj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eegkpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohncbdbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Boemlbpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehnfpifm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdnfjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nofdklgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjhhld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abmdafpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkajkp32.dll" Eegkpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hannfn32.dll" Adaiee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jianlbkj.dll" Khcomhbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oniebmda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcoaml32.dll" Ajckilei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckolek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejpdai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acddagag.dll" Ffibkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffaaoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkgngb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oniebmda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkbdabog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npepblac.dll" Cmfmojcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njoocijc.dll" Ijklknbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjnjjbbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eeohkeoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mejlalji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmhdkdlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbffoabe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdbiji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pacajg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihlnih32.dll" Acnlgajg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Peipigfb.dll" Dhplhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgmeid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eldglp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgldnkkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knhjjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pafbadcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgegok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqphnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Glklejoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alihaioe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oqelhkhc.dll" Hghillnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jhahanie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aababceh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbigpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abgacn32.dll" Ccgklc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exeNofdklgl.exeOagmmgdm.exeOdeiibdq.exeOalfhf32.exeOnecbg32.exePjldghjm.exePmojocel.exePkdgpo32.exePoapfn32.exeQodlkm32.exeAaheie32.exeAajbne32.exeAbphal32.exeAbbeflpf.exeBiojif32.exedescription pid process target process PID 1724 wrote to memory of 3040 1724 24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe Nofdklgl.exe PID 1724 wrote to memory of 3040 1724 24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe Nofdklgl.exe PID 1724 wrote to memory of 3040 1724 24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe Nofdklgl.exe PID 1724 wrote to memory of 3040 1724 24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe Nofdklgl.exe PID 3040 wrote to memory of 3000 3040 Nofdklgl.exe Oagmmgdm.exe PID 3040 wrote to memory of 3000 3040 Nofdklgl.exe Oagmmgdm.exe PID 3040 wrote to memory of 3000 3040 Nofdklgl.exe Oagmmgdm.exe PID 3040 wrote to memory of 3000 3040 Nofdklgl.exe Oagmmgdm.exe PID 3000 wrote to memory of 2620 3000 Oagmmgdm.exe Odeiibdq.exe PID 3000 wrote to memory of 2620 3000 Oagmmgdm.exe Odeiibdq.exe PID 3000 wrote to memory of 2620 3000 Oagmmgdm.exe Odeiibdq.exe PID 3000 wrote to memory of 2620 3000 Oagmmgdm.exe Odeiibdq.exe PID 2620 wrote to memory of 2736 2620 Odeiibdq.exe Oalfhf32.exe PID 2620 wrote to memory of 2736 2620 Odeiibdq.exe Oalfhf32.exe PID 2620 wrote to memory of 2736 2620 Odeiibdq.exe Oalfhf32.exe PID 2620 wrote to memory of 2736 2620 Odeiibdq.exe Oalfhf32.exe PID 2736 wrote to memory of 2520 2736 Oalfhf32.exe Onecbg32.exe PID 2736 wrote to memory of 2520 2736 Oalfhf32.exe Onecbg32.exe PID 2736 wrote to memory of 2520 2736 Oalfhf32.exe Onecbg32.exe PID 2736 wrote to memory of 2520 2736 Oalfhf32.exe Onecbg32.exe PID 2520 wrote to memory of 2512 2520 Onecbg32.exe Pjldghjm.exe PID 2520 wrote to memory of 2512 2520 Onecbg32.exe Pjldghjm.exe PID 2520 wrote to memory of 2512 2520 Onecbg32.exe Pjldghjm.exe PID 2520 wrote to memory of 2512 2520 Onecbg32.exe Pjldghjm.exe PID 2512 wrote to memory of 1680 2512 Pjldghjm.exe Pmojocel.exe PID 2512 wrote to memory of 1680 2512 Pjldghjm.exe Pmojocel.exe PID 2512 wrote to memory of 1680 2512 Pjldghjm.exe Pmojocel.exe PID 2512 wrote to memory of 1680 2512 Pjldghjm.exe Pmojocel.exe PID 1680 wrote to memory of 660 1680 Pmojocel.exe Pkdgpo32.exe PID 1680 wrote to memory of 660 1680 Pmojocel.exe Pkdgpo32.exe PID 1680 wrote to memory of 660 1680 Pmojocel.exe Pkdgpo32.exe PID 1680 wrote to memory of 660 1680 Pmojocel.exe Pkdgpo32.exe PID 660 wrote to memory of 1932 660 Pkdgpo32.exe Poapfn32.exe PID 660 wrote to memory of 1932 660 Pkdgpo32.exe Poapfn32.exe PID 660 wrote to memory of 1932 660 Pkdgpo32.exe Poapfn32.exe PID 660 wrote to memory of 1932 660 Pkdgpo32.exe Poapfn32.exe PID 1932 wrote to memory of 2760 1932 Poapfn32.exe Qodlkm32.exe PID 1932 wrote to memory of 2760 1932 Poapfn32.exe Qodlkm32.exe PID 1932 wrote to memory of 2760 1932 Poapfn32.exe Qodlkm32.exe PID 1932 wrote to memory of 2760 1932 Poapfn32.exe Qodlkm32.exe PID 2760 wrote to memory of 2380 2760 Qodlkm32.exe Aaheie32.exe PID 2760 wrote to memory of 2380 2760 Qodlkm32.exe Aaheie32.exe PID 2760 wrote to memory of 2380 2760 Qodlkm32.exe Aaheie32.exe PID 2760 wrote to memory of 2380 2760 Qodlkm32.exe Aaheie32.exe PID 2380 wrote to memory of 1096 2380 Aaheie32.exe Aajbne32.exe PID 2380 wrote to memory of 1096 2380 Aaheie32.exe Aajbne32.exe PID 2380 wrote to memory of 1096 2380 Aaheie32.exe Aajbne32.exe PID 2380 wrote to memory of 1096 2380 Aaheie32.exe Aajbne32.exe PID 1096 wrote to memory of 1988 1096 Aajbne32.exe Abphal32.exe PID 1096 wrote to memory of 1988 1096 Aajbne32.exe Abphal32.exe PID 1096 wrote to memory of 1988 1096 Aajbne32.exe Abphal32.exe PID 1096 wrote to memory of 1988 1096 Aajbne32.exe Abphal32.exe PID 1988 wrote to memory of 1924 1988 Abphal32.exe Abbeflpf.exe PID 1988 wrote to memory of 1924 1988 Abphal32.exe Abbeflpf.exe PID 1988 wrote to memory of 1924 1988 Abphal32.exe Abbeflpf.exe PID 1988 wrote to memory of 1924 1988 Abphal32.exe Abbeflpf.exe PID 1924 wrote to memory of 1628 1924 Abbeflpf.exe Biojif32.exe PID 1924 wrote to memory of 1628 1924 Abbeflpf.exe Biojif32.exe PID 1924 wrote to memory of 1628 1924 Abbeflpf.exe Biojif32.exe PID 1924 wrote to memory of 1628 1924 Abbeflpf.exe Biojif32.exe PID 1628 wrote to memory of 2128 1628 Biojif32.exe Bhdgjb32.exe PID 1628 wrote to memory of 2128 1628 Biojif32.exe Bhdgjb32.exe PID 1628 wrote to memory of 2128 1628 Biojif32.exe Bhdgjb32.exe PID 1628 wrote to memory of 2128 1628 Biojif32.exe Bhdgjb32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe"C:\Users\Admin\AppData\Local\Temp\24652daf7e2c64682d566143f95abb4da0b6845eded2f2761f0c08bbb1b62b7e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Nofdklgl.exeC:\Windows\system32\Nofdklgl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oagmmgdm.exeC:\Windows\system32\Oagmmgdm.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Odeiibdq.exeC:\Windows\system32\Odeiibdq.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oalfhf32.exeC:\Windows\system32\Oalfhf32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Onecbg32.exeC:\Windows\system32\Onecbg32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pjldghjm.exeC:\Windows\system32\Pjldghjm.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pmojocel.exeC:\Windows\system32\Pmojocel.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pkdgpo32.exeC:\Windows\system32\Pkdgpo32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Poapfn32.exeC:\Windows\system32\Poapfn32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qodlkm32.exeC:\Windows\system32\Qodlkm32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Aaheie32.exeC:\Windows\system32\Aaheie32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Aajbne32.exeC:\Windows\system32\Aajbne32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Abphal32.exeC:\Windows\system32\Abphal32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Abbeflpf.exeC:\Windows\system32\Abbeflpf.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Biojif32.exeC:\Windows\system32\Biojif32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bhdgjb32.exeC:\Windows\system32\Bhdgjb32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Bhfcpb32.exeC:\Windows\system32\Bhfcpb32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Chkmkacq.exeC:\Windows\system32\Chkmkacq.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Cpfaocal.exeC:\Windows\system32\Cpfaocal.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cgbfamff.exeC:\Windows\system32\Cgbfamff.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Chfpoeja.exeC:\Windows\system32\Chfpoeja.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Candgk32.exeC:\Windows\system32\Candgk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Daqamj32.exeC:\Windows\system32\Daqamj32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dacnbjml.exeC:\Windows\system32\Dacnbjml.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dgbcpq32.exeC:\Windows\system32\Dgbcpq32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ddfcje32.exeC:\Windows\system32\Ddfcje32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Enqdhj32.exeC:\Windows\system32\Enqdhj32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Elfaifaq.exeC:\Windows\system32\Elfaifaq.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Egdlec32.exeC:\Windows\system32\Egdlec32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fnqqgm32.exeC:\Windows\system32\Fnqqgm32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fgiepced.exeC:\Windows\system32\Fgiepced.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Fqcfnhjb.exeC:\Windows\system32\Fqcfnhjb.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fjlkgn32.exeC:\Windows\system32\Fjlkgn32.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ffcllo32.exeC:\Windows\system32\Ffcllo32.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Glpdde32.exeC:\Windows\system32\Glpdde32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gnpmfqap.exeC:\Windows\system32\Gnpmfqap.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gbqbaofc.exeC:\Windows\system32\Gbqbaofc.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ghmkjedk.exeC:\Windows\system32\Ghmkjedk.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hafock32.exeC:\Windows\system32\Hafock32.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hahlhkhi.exeC:\Windows\system32\Hahlhkhi.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hfedqagp.exeC:\Windows\system32\Hfedqagp.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hbnbkbja.exeC:\Windows\system32\Hbnbkbja.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hoebpc32.exeC:\Windows\system32\Hoebpc32.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ipdojfgh.exeC:\Windows\system32\Ipdojfgh.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ieagbm32.exeC:\Windows\system32\Ieagbm32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Idfdcijh.exeC:\Windows\system32\Idfdcijh.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iefamlak.exeC:\Windows\system32\Iefamlak.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Igijkd32.exeC:\Windows\system32\Igijkd32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ipbocjlg.exeC:\Windows\system32\Ipbocjlg.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jliohkak.exeC:\Windows\system32\Jliohkak.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jgncfcaa.exeC:\Windows\system32\Jgncfcaa.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jfcqgpfi.exeC:\Windows\system32\Jfcqgpfi.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jpiedieo.exeC:\Windows\system32\Jpiedieo.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jjaimn32.exeC:\Windows\system32\Jjaimn32.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jcjnfdbp.exeC:\Windows\system32\Jcjnfdbp.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kncofa32.exeC:\Windows\system32\Kncofa32.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kglcogeo.exeC:\Windows\system32\Kglcogeo.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kdpcikdi.exeC:\Windows\system32\Kdpcikdi.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kkileele.exeC:\Windows\system32\Kkileele.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kgpmjf32.exeC:\Windows\system32\Kgpmjf32.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kmmebm32.exeC:\Windows\system32\Kmmebm32.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kgbipf32.exeC:\Windows\system32\Kgbipf32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kmobhmnn.exeC:\Windows\system32\Kmobhmnn.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kcijeg32.exeC:\Windows\system32\Kcijeg32.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lmbonmll.exeC:\Windows\system32\Lmbonmll.exe66⤵
-
C:\Windows\SysWOW64\Ljfogake.exeC:\Windows\system32\Ljfogake.exe67⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lmdkcl32.exeC:\Windows\system32\Lmdkcl32.exe68⤵
-
C:\Windows\SysWOW64\Lflplbpi.exeC:\Windows\system32\Lflplbpi.exe69⤵
-
C:\Windows\SysWOW64\Lmfhil32.exeC:\Windows\system32\Lmfhil32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lbcpac32.exeC:\Windows\system32\Lbcpac32.exe71⤵
-
C:\Windows\SysWOW64\Lklejh32.exeC:\Windows\system32\Lklejh32.exe72⤵
-
C:\Windows\SysWOW64\Ledibnco.exeC:\Windows\system32\Ledibnco.exe73⤵
-
C:\Windows\SysWOW64\Llnaoh32.exeC:\Windows\system32\Llnaoh32.exe74⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mlpneh32.exeC:\Windows\system32\Mlpneh32.exe75⤵
-
C:\Windows\SysWOW64\Mhgoji32.exeC:\Windows\system32\Mhgoji32.exe76⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mjekfd32.exeC:\Windows\system32\Mjekfd32.exe77⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mapccndn.exeC:\Windows\system32\Mapccndn.exe78⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mjhhld32.exeC:\Windows\system32\Mjhhld32.exe79⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mbcmpfhi.exeC:\Windows\system32\Mbcmpfhi.exe80⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mdbiji32.exeC:\Windows\system32\Mdbiji32.exe81⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nlnnnk32.exeC:\Windows\system32\Nlnnnk32.exe82⤵
-
C:\Windows\SysWOW64\Noljjglk.exeC:\Windows\system32\Noljjglk.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nhdocl32.exeC:\Windows\system32\Nhdocl32.exe84⤵
-
C:\Windows\SysWOW64\Opifnm32.exeC:\Windows\system32\Opifnm32.exe85⤵
-
C:\Windows\SysWOW64\Ocgbji32.exeC:\Windows\system32\Ocgbji32.exe86⤵
-
C:\Windows\SysWOW64\Oehklddp.exeC:\Windows\system32\Oehklddp.exe87⤵
-
C:\Windows\SysWOW64\Opplolac.exeC:\Windows\system32\Opplolac.exe88⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ocohkh32.exeC:\Windows\system32\Ocohkh32.exe89⤵
-
C:\Windows\SysWOW64\Oihqgbhd.exeC:\Windows\system32\Oihqgbhd.exe90⤵
-
C:\Windows\SysWOW64\Pkjmoj32.exeC:\Windows\system32\Pkjmoj32.exe91⤵
-
C:\Windows\SysWOW64\Padeldeo.exeC:\Windows\system32\Padeldeo.exe92⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Phnnho32.exeC:\Windows\system32\Phnnho32.exe93⤵
-
C:\Windows\SysWOW64\Pohfehdi.exeC:\Windows\system32\Pohfehdi.exe94⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pafbadcm.exeC:\Windows\system32\Pafbadcm.exe95⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pkofjijm.exeC:\Windows\system32\Pkofjijm.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pojbkh32.exeC:\Windows\system32\Pojbkh32.exe97⤵
-
C:\Windows\SysWOW64\Pqkobqhd.exeC:\Windows\system32\Pqkobqhd.exe98⤵
-
C:\Windows\SysWOW64\Pgegok32.exeC:\Windows\system32\Pgegok32.exe99⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pjcckf32.exeC:\Windows\system32\Pjcckf32.exe100⤵
-
C:\Windows\SysWOW64\Pqnlhpfb.exeC:\Windows\system32\Pqnlhpfb.exe101⤵
-
C:\Windows\SysWOW64\Pggdejno.exeC:\Windows\system32\Pggdejno.exe102⤵
-
C:\Windows\SysWOW64\Pqphnp32.exeC:\Windows\system32\Pqphnp32.exe103⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Pdldnomh.exeC:\Windows\system32\Pdldnomh.exe104⤵
-
C:\Windows\SysWOW64\Qqbecp32.exeC:\Windows\system32\Qqbecp32.exe105⤵
-
C:\Windows\SysWOW64\Qjkjle32.exeC:\Windows\system32\Qjkjle32.exe106⤵
-
C:\Windows\SysWOW64\Accnekon.exeC:\Windows\system32\Accnekon.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Akncimmh.exeC:\Windows\system32\Akncimmh.exe108⤵
-
C:\Windows\SysWOW64\Amnocpdk.exeC:\Windows\system32\Amnocpdk.exe109⤵
-
C:\Windows\SysWOW64\Abmdafpp.exeC:\Windows\system32\Abmdafpp.exe110⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Agjmim32.exeC:\Windows\system32\Agjmim32.exe111⤵
-
C:\Windows\SysWOW64\Aababceh.exeC:\Windows\system32\Aababceh.exe112⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bmibgd32.exeC:\Windows\system32\Bmibgd32.exe113⤵
-
C:\Windows\SysWOW64\Bjmbqhif.exeC:\Windows\system32\Bjmbqhif.exe114⤵
-
C:\Windows\SysWOW64\Bcegin32.exeC:\Windows\system32\Bcegin32.exe115⤵
-
C:\Windows\SysWOW64\Bbjdjjdn.exeC:\Windows\system32\Bbjdjjdn.exe116⤵
-
C:\Windows\SysWOW64\Bleeioil.exeC:\Windows\system32\Bleeioil.exe117⤵
-
C:\Windows\SysWOW64\Cemjae32.exeC:\Windows\system32\Cemjae32.exe118⤵
-
C:\Windows\SysWOW64\Cbajkiof.exeC:\Windows\system32\Cbajkiof.exe119⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cbdgqimc.exeC:\Windows\system32\Cbdgqimc.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ckolek32.exeC:\Windows\system32\Ckolek32.exe121⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ckahkk32.exeC:\Windows\system32\Ckahkk32.exe122⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dpqnhadq.exeC:\Windows\system32\Dpqnhadq.exe123⤵
-
C:\Windows\SysWOW64\Dmdnbecj.exeC:\Windows\system32\Dmdnbecj.exe124⤵
-
C:\Windows\SysWOW64\Dikogf32.exeC:\Windows\system32\Dikogf32.exe125⤵
-
C:\Windows\SysWOW64\Dcccpl32.exeC:\Windows\system32\Dcccpl32.exe126⤵
-
C:\Windows\SysWOW64\Dhplhc32.exeC:\Windows\system32\Dhplhc32.exe127⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dcfpel32.exeC:\Windows\system32\Dcfpel32.exe128⤵
-
C:\Windows\SysWOW64\Dkadjn32.exeC:\Windows\system32\Dkadjn32.exe129⤵
-
C:\Windows\SysWOW64\Dakmfh32.exeC:\Windows\system32\Dakmfh32.exe130⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ekcaonhe.exeC:\Windows\system32\Ekcaonhe.exe131⤵
-
C:\Windows\SysWOW64\Eapfagno.exeC:\Windows\system32\Eapfagno.exe132⤵
-
C:\Windows\SysWOW64\Ekhkjm32.exeC:\Windows\system32\Ekhkjm32.exe133⤵
-
C:\Windows\SysWOW64\Eniclh32.exeC:\Windows\system32\Eniclh32.exe134⤵
-
C:\Windows\SysWOW64\Ejpdai32.exeC:\Windows\system32\Ejpdai32.exe135⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eolmip32.exeC:\Windows\system32\Eolmip32.exe136⤵
-
C:\Windows\SysWOW64\Flqmbd32.exeC:\Windows\system32\Flqmbd32.exe137⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ffibkj32.exeC:\Windows\system32\Ffibkj32.exe138⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fkejcq32.exeC:\Windows\system32\Fkejcq32.exe139⤵
-
C:\Windows\SysWOW64\Ffkoai32.exeC:\Windows\system32\Ffkoai32.exe140⤵
-
C:\Windows\SysWOW64\Fgohna32.exeC:\Windows\system32\Fgohna32.exe141⤵
-
C:\Windows\SysWOW64\Fqglggcp.exeC:\Windows\system32\Fqglggcp.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gnkmqkbi.exeC:\Windows\system32\Gnkmqkbi.exe143⤵
-
C:\Windows\SysWOW64\Gcheib32.exeC:\Windows\system32\Gcheib32.exe144⤵
-
C:\Windows\SysWOW64\Gegabegc.exeC:\Windows\system32\Gegabegc.exe145⤵
-
C:\Windows\SysWOW64\Gjdjklek.exeC:\Windows\system32\Gjdjklek.exe146⤵
-
C:\Windows\SysWOW64\Gpabcbdb.exeC:\Windows\system32\Gpabcbdb.exe147⤵
-
C:\Windows\SysWOW64\Hhejnc32.exeC:\Windows\system32\Hhejnc32.exe148⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hnpbjnpo.exeC:\Windows\system32\Hnpbjnpo.exe149⤵
-
C:\Windows\SysWOW64\Hhhgcc32.exeC:\Windows\system32\Hhhgcc32.exe150⤵
-
C:\Windows\SysWOW64\Hnbopmnm.exeC:\Windows\system32\Hnbopmnm.exe151⤵
-
C:\Windows\SysWOW64\Helgmg32.exeC:\Windows\system32\Helgmg32.exe152⤵
-
C:\Windows\SysWOW64\Hhjcic32.exeC:\Windows\system32\Hhjcic32.exe153⤵
-
C:\Windows\SysWOW64\Iabhah32.exeC:\Windows\system32\Iabhah32.exe154⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ijklknbn.exeC:\Windows\system32\Ijklknbn.exe155⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Iaeegh32.exeC:\Windows\system32\Iaeegh32.exe156⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Iipiljgf.exeC:\Windows\system32\Iipiljgf.exe157⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Imnbbi32.exeC:\Windows\system32\Imnbbi32.exe158⤵
-
C:\Windows\SysWOW64\Ifffkncm.exeC:\Windows\system32\Ifffkncm.exe159⤵
-
C:\Windows\SysWOW64\Ihhcbf32.exeC:\Windows\system32\Ihhcbf32.exe160⤵
-
C:\Windows\SysWOW64\Ibmgpoia.exeC:\Windows\system32\Ibmgpoia.exe161⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jenpajfb.exeC:\Windows\system32\Jenpajfb.exe162⤵
-
C:\Windows\SysWOW64\Jniefm32.exeC:\Windows\system32\Jniefm32.exe163⤵
-
C:\Windows\SysWOW64\Jkmeoa32.exeC:\Windows\system32\Jkmeoa32.exe164⤵
-
C:\Windows\SysWOW64\Jpjngh32.exeC:\Windows\system32\Jpjngh32.exe165⤵
-
C:\Windows\SysWOW64\Jdhgnf32.exeC:\Windows\system32\Jdhgnf32.exe166⤵
-
C:\Windows\SysWOW64\Jkbojpna.exeC:\Windows\system32\Jkbojpna.exe167⤵
-
C:\Windows\SysWOW64\Kghpoa32.exeC:\Windows\system32\Kghpoa32.exe168⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Klehgh32.exeC:\Windows\system32\Klehgh32.exe169⤵
-
C:\Windows\SysWOW64\Khlili32.exeC:\Windows\system32\Khlili32.exe170⤵
-
C:\Windows\SysWOW64\Kcamjb32.exeC:\Windows\system32\Kcamjb32.exe171⤵
-
C:\Windows\SysWOW64\Kljabgnh.exeC:\Windows\system32\Kljabgnh.exe172⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kdefgj32.exeC:\Windows\system32\Kdefgj32.exe173⤵
-
C:\Windows\SysWOW64\Kbigpn32.exeC:\Windows\system32\Kbigpn32.exe174⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Khcomhbi.exeC:\Windows\system32\Khcomhbi.exe175⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lnpgeopa.exeC:\Windows\system32\Lnpgeopa.exe176⤵
-
C:\Windows\SysWOW64\Lkdhoc32.exeC:\Windows\system32\Lkdhoc32.exe177⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ldllgiek.exeC:\Windows\system32\Ldllgiek.exe178⤵
-
C:\Windows\SysWOW64\Lqcmmjko.exeC:\Windows\system32\Lqcmmjko.exe179⤵
-
C:\Windows\SysWOW64\Lgmeid32.exeC:\Windows\system32\Lgmeid32.exe180⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lgoboc32.exeC:\Windows\system32\Lgoboc32.exe181⤵
-
C:\Windows\SysWOW64\Lokgcf32.exeC:\Windows\system32\Lokgcf32.exe182⤵
-
C:\Windows\SysWOW64\Mkaghg32.exeC:\Windows\system32\Mkaghg32.exe183⤵
-
C:\Windows\SysWOW64\Mejlalji.exeC:\Windows\system32\Mejlalji.exe184⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mpopnejo.exeC:\Windows\system32\Mpopnejo.exe185⤵
-
C:\Windows\SysWOW64\Mlfacfpc.exeC:\Windows\system32\Mlfacfpc.exe186⤵
-
C:\Windows\SysWOW64\Mbpipp32.exeC:\Windows\system32\Mbpipp32.exe187⤵
-
C:\Windows\SysWOW64\Maefamlh.exeC:\Windows\system32\Maefamlh.exe188⤵
-
C:\Windows\SysWOW64\Mjnjjbbh.exeC:\Windows\system32\Mjnjjbbh.exe189⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ncfoch32.exeC:\Windows\system32\Ncfoch32.exe190⤵
-
C:\Windows\SysWOW64\Nnkcpq32.exeC:\Windows\system32\Nnkcpq32.exe191⤵
-
C:\Windows\SysWOW64\Nfghdcfj.exeC:\Windows\system32\Nfghdcfj.exe192⤵
-
C:\Windows\SysWOW64\Nmqpam32.exeC:\Windows\system32\Nmqpam32.exe193⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nmcmgm32.exeC:\Windows\system32\Nmcmgm32.exe194⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ndmecgba.exeC:\Windows\system32\Ndmecgba.exe195⤵
-
C:\Windows\SysWOW64\Nijnln32.exeC:\Windows\system32\Nijnln32.exe196⤵
-
C:\Windows\SysWOW64\Noffdd32.exeC:\Windows\system32\Noffdd32.exe197⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Olkfmi32.exeC:\Windows\system32\Olkfmi32.exe198⤵
-
C:\Windows\SysWOW64\Oeckfndj.exeC:\Windows\system32\Oeckfndj.exe199⤵
-
C:\Windows\SysWOW64\Oajlkojn.exeC:\Windows\system32\Oajlkojn.exe200⤵
-
C:\Windows\SysWOW64\Ohcdhi32.exeC:\Windows\system32\Ohcdhi32.exe201⤵
-
C:\Windows\SysWOW64\Oalhqohl.exeC:\Windows\system32\Oalhqohl.exe202⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ogiaif32.exeC:\Windows\system32\Ogiaif32.exe203⤵
-
C:\Windows\SysWOW64\Ohhmcinf.exeC:\Windows\system32\Ohhmcinf.exe204⤵
-
C:\Windows\SysWOW64\Omefkplm.exeC:\Windows\system32\Omefkplm.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pkifdd32.exeC:\Windows\system32\Pkifdd32.exe206⤵
-
C:\Windows\SysWOW64\Ppfomk32.exeC:\Windows\system32\Ppfomk32.exe207⤵
-
C:\Windows\SysWOW64\Pecgea32.exeC:\Windows\system32\Pecgea32.exe208⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Poklngnf.exeC:\Windows\system32\Poklngnf.exe209⤵
-
C:\Windows\SysWOW64\Phcpgm32.exeC:\Windows\system32\Phcpgm32.exe210⤵
-
C:\Windows\SysWOW64\Aihfap32.exeC:\Windows\system32\Aihfap32.exe211⤵
-
C:\Windows\SysWOW64\Abpjjeim.exeC:\Windows\system32\Abpjjeim.exe212⤵
-
C:\Windows\SysWOW64\Akiobk32.exeC:\Windows\system32\Akiobk32.exe213⤵
-
C:\Windows\SysWOW64\Beackp32.exeC:\Windows\system32\Beackp32.exe214⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bnihdemo.exeC:\Windows\system32\Bnihdemo.exe215⤵
-
C:\Windows\SysWOW64\Biolanld.exeC:\Windows\system32\Biolanld.exe216⤵
-
C:\Windows\SysWOW64\Biaign32.exeC:\Windows\system32\Biaign32.exe217⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bammlq32.exeC:\Windows\system32\Bammlq32.exe218⤵
-
C:\Windows\SysWOW64\Bkbaii32.exeC:\Windows\system32\Bkbaii32.exe219⤵
-
C:\Windows\SysWOW64\Bmcnqama.exeC:\Windows\system32\Bmcnqama.exe220⤵
-
C:\Windows\SysWOW64\Bgibnj32.exeC:\Windows\system32\Bgibnj32.exe221⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cpdgbm32.exeC:\Windows\system32\Cpdgbm32.exe222⤵
-
C:\Windows\SysWOW64\Cfnoogbo.exeC:\Windows\system32\Cfnoogbo.exe223⤵
-
C:\Windows\SysWOW64\Ccbphk32.exeC:\Windows\system32\Ccbphk32.exe224⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cpiqmlfm.exeC:\Windows\system32\Cpiqmlfm.exe225⤵
-
C:\Windows\SysWOW64\Cmmagpef.exeC:\Windows\system32\Cmmagpef.exe226⤵
-
C:\Windows\SysWOW64\Cehfkb32.exeC:\Windows\system32\Cehfkb32.exe227⤵
-
C:\Windows\SysWOW64\Copjdhib.exeC:\Windows\system32\Copjdhib.exe228⤵
-
C:\Windows\SysWOW64\Dldkmlhl.exeC:\Windows\system32\Dldkmlhl.exe229⤵
-
C:\Windows\SysWOW64\Ddpobo32.exeC:\Windows\system32\Ddpobo32.exe230⤵
-
C:\Windows\SysWOW64\Dmhdkdlg.exeC:\Windows\system32\Dmhdkdlg.exe231⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Deollamj.exeC:\Windows\system32\Deollamj.exe232⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dafmqb32.exeC:\Windows\system32\Dafmqb32.exe233⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dknajh32.exeC:\Windows\system32\Dknajh32.exe234⤵
-
C:\Windows\SysWOW64\Dbifnj32.exeC:\Windows\system32\Dbifnj32.exe235⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Edibhmml.exeC:\Windows\system32\Edibhmml.exe236⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Eldglp32.exeC:\Windows\system32\Eldglp32.exe237⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eelkeeah.exeC:\Windows\system32\Eelkeeah.exe238⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Eeohkeoe.exeC:\Windows\system32\Eeohkeoe.exe239⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eeaepd32.exeC:\Windows\system32\Eeaepd32.exe240⤵
-
C:\Windows\SysWOW64\Eknmhk32.exeC:\Windows\system32\Eknmhk32.exe241⤵