Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe
Resource
win10v2004-20240226-en
General
-
Target
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe
-
Size
163KB
-
MD5
d4bbd02e0e2f4c7b24b5aeb0a50e3a47
-
SHA1
9dcc3ac21681b2933a747d8bb8aecacb0e2bf933
-
SHA256
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660
-
SHA512
a32c66496176f4a09feb5798b15861e724a2307543260c6ec63a9151732d0bfa1b934513ad72027ca93add65148def9cb2e417ea64f6216db96f48321c714a64
-
SSDEEP
1536:PE3YO7Uf7/Y5IRUJFG8NlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:M317eDsIROGyltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Pmphaaln.exeAjlpepbi.exeFlfjjkgi.exeKpccmhdg.exeIjkdkq32.exeLdkhlcnb.exeBekmei32.exeHabndbpf.exeIpckqnja.exeEedmlo32.exeOinbgk32.exeMbamcm32.exeGqfohdjd.exeGejhef32.exeDidqkeeq.exeMjcngpjh.exeHppeim32.exeHphfac32.exeEjcaidlp.exeNkagndmc.exeGlkdejcd.exeJhfihp32.exeJncapf32.exeOknnanhj.exeDngjff32.exeDhdmfljb.exeMjhqcmjo.exeKhgbqkhj.exeHcedmkmp.exeInidkb32.exeNhbmnj32.exeBglgdi32.exeBajqda32.exeLpgmhg32.exeNqioqf32.exeCiioaa32.exeJjklcf32.exeGcqhcgqi.exeEcpomiok.exeAhiiqafa.exeCgmhcaac.exeGhdhja32.exeJkplilgk.exeOdifjipd.exeKnhkkfod.exePdbbfadn.exeKffphhmj.exeHdcnpd32.exeFaopah32.exeOkbhlm32.exeHiipmhmk.exeMnojcb32.exeFjfgealk.exeJanpnfee.exePoagma32.exeKjeiodek.exeKoggehff.exeKkfkod32.exeIocchhof.exeHhhkjj32.exeGffkpa32.exeDbcbnlcl.exeKpgoolbl.exeApcead32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmphaaln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajlpepbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flfjjkgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpccmhdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijkdkq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldkhlcnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bekmei32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Habndbpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipckqnja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eedmlo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oinbgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbamcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gqfohdjd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gejhef32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Didqkeeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjcngpjh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hppeim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hphfac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejcaidlp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkagndmc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glkdejcd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhfihp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jncapf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oknnanhj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dngjff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhdmfljb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjhqcmjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khgbqkhj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcedmkmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inidkb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhbmnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bglgdi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bajqda32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpgmhg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqioqf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciioaa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjklcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcqhcgqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecpomiok.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahiiqafa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgmhcaac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghdhja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkplilgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odifjipd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knhkkfod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdbbfadn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kffphhmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdcnpd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faopah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Okbhlm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiipmhmk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnojcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjfgealk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Janpnfee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Poagma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjeiodek.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koggehff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkfkod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iocchhof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhhkjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gffkpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbcbnlcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpgoolbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apcead32.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Dbicpfdk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Doaneiop.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dngjff32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eiokinbk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Enkdaepb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eokqkh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Enpmld32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ekdnei32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fpbflg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fligqhga.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fnlmhc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gidnkkpc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hfhgkmpj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hiipmhmk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iohejo32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4488-121-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ilcldb32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4564-128-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jenmcggo.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/456-137-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jgmjmjnb.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4432-145-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jinboekc.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4940-152-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jjpode32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3860-161-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Klahfp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kjeiodek.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1252-176-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Klfaapbl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Loighj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lokdnjkg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mmhgmmbf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mqfpckhm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mqimikfj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mjcngpjh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Npbceggm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nfohgqlg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Npiiffqe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ojdgnn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Opeiadfg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pffgom32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Panhbfep.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ahmjjoig.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bajqda32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdmfllhn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cogddd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eiekog32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/5204-519-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gejhef32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/5248-525-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5292-531-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5380-539-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5460-550-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4524-605-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nodiqp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ookoaokf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aaiqcnhg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dalofi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gjkbnfha.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hannao32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ihaidhgf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iloajfml.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Leoejh32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Dbicpfdk.exe UPX behavioral2/memory/3100-8-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Doaneiop.exe UPX C:\Windows\SysWOW64\Dngjff32.exe UPX C:\Windows\SysWOW64\Eiokinbk.exe UPX C:\Windows\SysWOW64\Enkdaepb.exe UPX C:\Windows\SysWOW64\Eokqkh32.exe UPX C:\Windows\SysWOW64\Enpmld32.exe UPX C:\Windows\SysWOW64\Ekdnei32.exe UPX C:\Windows\SysWOW64\Fpbflg32.exe UPX C:\Windows\SysWOW64\Fligqhga.exe UPX C:\Windows\SysWOW64\Fnlmhc32.exe UPX C:\Windows\SysWOW64\Gidnkkpc.exe UPX C:\Windows\SysWOW64\Hfhgkmpj.exe UPX C:\Windows\SysWOW64\Hiipmhmk.exe UPX C:\Windows\SysWOW64\Iohejo32.exe UPX behavioral2/memory/4488-121-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ilcldb32.exe UPX behavioral2/memory/4564-128-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Jenmcggo.exe UPX behavioral2/memory/456-137-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Jgmjmjnb.exe UPX behavioral2/memory/4432-145-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Jinboekc.exe UPX behavioral2/memory/4940-152-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Jjpode32.exe UPX behavioral2/memory/3860-161-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Klahfp32.exe UPX C:\Windows\SysWOW64\Kjeiodek.exe UPX behavioral2/memory/1252-176-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Klfaapbl.exe UPX C:\Windows\SysWOW64\Loighj32.exe UPX C:\Windows\SysWOW64\Lokdnjkg.exe UPX C:\Windows\SysWOW64\Mmhgmmbf.exe UPX behavioral2/memory/668-209-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Mqfpckhm.exe UPX behavioral2/memory/5076-216-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Mqimikfj.exe UPX behavioral2/memory/4720-225-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Mjcngpjh.exe UPX behavioral2/memory/3900-232-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Npbceggm.exe UPX behavioral2/memory/4908-240-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Nfohgqlg.exe UPX behavioral2/memory/4308-249-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Npiiffqe.exe UPX C:\Windows\SysWOW64\Ojdgnn32.exe UPX C:\Windows\SysWOW64\Opeiadfg.exe UPX C:\Windows\SysWOW64\Pffgom32.exe UPX C:\Windows\SysWOW64\Panhbfep.exe UPX C:\Windows\SysWOW64\Ahmjjoig.exe UPX C:\Windows\SysWOW64\Bajqda32.exe UPX C:\Windows\SysWOW64\Cdmfllhn.exe UPX C:\Windows\SysWOW64\Cogddd32.exe UPX behavioral2/memory/1596-459-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5052-470-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Eiekog32.exe UPX behavioral2/memory/5204-519-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Gejhef32.exe UPX behavioral2/memory/5248-525-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5292-531-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5380-539-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5460-550-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5508-561-0x0000000000400000-0x0000000000453000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
Dbicpfdk.exeDoaneiop.exeDngjff32.exeEiokinbk.exeEnkdaepb.exeEokqkh32.exeEnpmld32.exeEkdnei32.exeFpbflg32.exeFligqhga.exeFnlmhc32.exeGidnkkpc.exeHfhgkmpj.exeHiipmhmk.exeIohejo32.exeIlcldb32.exeJenmcggo.exeJgmjmjnb.exeJinboekc.exeJjpode32.exeKlahfp32.exeKjeiodek.exeKlfaapbl.exeLoighj32.exeLokdnjkg.exeMmhgmmbf.exeMqfpckhm.exeMqimikfj.exeMjcngpjh.exeNpbceggm.exeNfohgqlg.exeNpiiffqe.exeOjajin32.exeOjdgnn32.exeOjfcdnjc.exeOgjdmbil.exeOpeiadfg.exePaeelgnj.exePffgom32.exePalklf32.exePanhbfep.exeQpcecb32.exeAhmjjoig.exeAoioli32.exeAmnlme32.exeAhdpjn32.exeAgimkk32.exeAaoaic32.exeBkgeainn.exeBoenhgdd.exeBgpcliao.exeBddcenpi.exeBoihcf32.exeBajqda32.exeCammjakm.exeCdmfllhn.exeCnhgjaml.exeCogddd32.exeDojqjdbl.exeDakikoom.exeDkcndeen.exeDgjoif32.exeEnfckp32.exeEgohdegl.exepid process 3100 Dbicpfdk.exe 1064 Doaneiop.exe 2920 Dngjff32.exe 5084 Eiokinbk.exe 4524 Enkdaepb.exe 1452 Eokqkh32.exe 4512 Enpmld32.exe 2708 Ekdnei32.exe 2632 Fpbflg32.exe 2888 Fligqhga.exe 2624 Fnlmhc32.exe 4236 Gidnkkpc.exe 1752 Hfhgkmpj.exe 3292 Hiipmhmk.exe 4488 Iohejo32.exe 4564 Ilcldb32.exe 456 Jenmcggo.exe 4432 Jgmjmjnb.exe 4940 Jinboekc.exe 3860 Jjpode32.exe 4200 Klahfp32.exe 1252 Kjeiodek.exe 4988 Klfaapbl.exe 2168 Loighj32.exe 5008 Lokdnjkg.exe 668 Mmhgmmbf.exe 5076 Mqfpckhm.exe 4720 Mqimikfj.exe 3900 Mjcngpjh.exe 4908 Npbceggm.exe 4308 Nfohgqlg.exe 2176 Npiiffqe.exe 3940 Ojajin32.exe 1416 Ojdgnn32.exe 2628 Ojfcdnjc.exe 552 Ogjdmbil.exe 4040 Opeiadfg.exe 3004 Paeelgnj.exe 4796 Pffgom32.exe 3716 Palklf32.exe 2660 Panhbfep.exe 4932 Qpcecb32.exe 3696 Ahmjjoig.exe 3424 Aoioli32.exe 232 Amnlme32.exe 3680 Ahdpjn32.exe 2980 Agimkk32.exe 2184 Aaoaic32.exe 1884 Bkgeainn.exe 2380 Boenhgdd.exe 1600 Bgpcliao.exe 2936 Bddcenpi.exe 2928 Boihcf32.exe 3484 Bajqda32.exe 3504 Cammjakm.exe 2992 Cdmfllhn.exe 2192 Cnhgjaml.exe 3384 Cogddd32.exe 2208 Dojqjdbl.exe 3912 Dakikoom.exe 4252 Dkcndeen.exe 5064 Dgjoif32.exe 5044 Enfckp32.exe 1612 Egohdegl.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kebodc32.exeHlhaee32.exeLipmoo32.exeOeqagi32.exeOgqcon32.exePlocob32.exeApdkmn32.exeEnkdaepb.exeJenmcggo.exeDbcbnlcl.exeKoeajo32.exePmbcik32.exeBfpkbfdi.exeDjnhne32.exeFjfgealk.exeDgjoif32.exeFeqeog32.exeModpib32.exeAaiqcnhg.exeJanpnfee.exeMnojcb32.exePelacg32.exeFjlmdmqj.exeApddce32.exeCgnmpbec.exeIlglgfjd.exeElccpife.exeFoplnb32.exeHfhgkmpj.exeKbfjljhf.exeBpjkbcbe.exeHdcnpd32.exeNfpghccm.exeHfnpca32.exeJfdafa32.exeIholohii.exeFebogbhg.exeGlhgojef.exeFqcilgji.exeCdaile32.exeEgpgehnb.exeLoecgfjf.exeEbbinp32.exeDmbiackg.exeBfghlhmd.exeHipdpbgf.exeNojfic32.exeBefmpdmq.exeFcnlng32.exeDeiblamk.exeMepnaf32.exeOkbhlm32.exeIheaqolo.exeGmggac32.exeKdbjbfjl.exeGaoihfoo.exeKkfkod32.exeLmqggncn.exeCmgqpkip.exeHljnkdnk.exeCfpfqiha.exeDphipidf.exedescription ioc process File created C:\Windows\SysWOW64\Kjpgmj32.exe Kebodc32.exe File opened for modification C:\Windows\SysWOW64\Hljnkdnk.exe Hlhaee32.exe File created C:\Windows\SysWOW64\Libido32.exe Lipmoo32.exe File created C:\Windows\SysWOW64\Obdbqm32.exe Oeqagi32.exe File created C:\Windows\SysWOW64\Peddhb32.exe Ogqcon32.exe File created C:\Windows\SysWOW64\Flhpen32.dll Plocob32.exe File created C:\Windows\SysWOW64\Bhppap32.exe Apdkmn32.exe File created C:\Windows\SysWOW64\Kfbdfl32.dll Enkdaepb.exe File created C:\Windows\SysWOW64\Jgmjmjnb.exe Jenmcggo.exe File created C:\Windows\SysWOW64\Abbbel32.dll Dbcbnlcl.exe File opened for modification C:\Windows\SysWOW64\Kdbjbfjl.exe Koeajo32.exe File created C:\Windows\SysWOW64\Haaqllnf.dll Pmbcik32.exe File opened for modification C:\Windows\SysWOW64\Cgagjo32.exe Bfpkbfdi.exe File created C:\Windows\SysWOW64\Lpdlpnie.dll Djnhne32.exe File created C:\Windows\SysWOW64\Fcnlng32.exe Fjfgealk.exe File opened for modification C:\Windows\SysWOW64\Enfckp32.exe Dgjoif32.exe File created C:\Windows\SysWOW64\Bfcklp32.dll Feqeog32.exe File created C:\Windows\SysWOW64\Ebdoljdi.dll Modpib32.exe File created C:\Windows\SysWOW64\Dccfkp32.dll Aaiqcnhg.exe File created C:\Windows\SysWOW64\Jfkhfmdm.exe Janpnfee.exe File created C:\Windows\SysWOW64\Mkcjlf32.exe Mnojcb32.exe File created C:\Windows\SysWOW64\Ppbepp32.exe Pelacg32.exe File created C:\Windows\SysWOW64\Fcdbmb32.exe Fjlmdmqj.exe File created C:\Windows\SysWOW64\Acbmjcgd.exe Apddce32.exe File opened for modification C:\Windows\SysWOW64\Cdbmifdl.exe Cgnmpbec.exe File created C:\Windows\SysWOW64\Inhion32.exe Ilglgfjd.exe File created C:\Windows\SysWOW64\Jkjikd32.dll Elccpife.exe File opened for modification C:\Windows\SysWOW64\Fjepkk32.exe Foplnb32.exe File created C:\Windows\SysWOW64\Hiipmhmk.exe Hfhgkmpj.exe File created C:\Windows\SysWOW64\Kkooep32.exe Kbfjljhf.exe File created C:\Windows\SysWOW64\Camial32.dll Bpjkbcbe.exe File opened for modification C:\Windows\SysWOW64\Idfkednq.exe Hdcnpd32.exe File created C:\Windows\SysWOW64\Okmpqjad.exe Nfpghccm.exe File opened for modification C:\Windows\SysWOW64\Hmhhpkcj.exe Hfnpca32.exe File created C:\Windows\SysWOW64\Hicobn32.dll Jfdafa32.exe File created C:\Windows\SysWOW64\Inidkb32.exe Iholohii.exe File created C:\Windows\SysWOW64\Kbpdggme.dll Febogbhg.exe File created C:\Windows\SysWOW64\Geqlhp32.exe Glhgojef.exe File opened for modification C:\Windows\SysWOW64\Fjlmdmqj.exe Fqcilgji.exe File created C:\Windows\SysWOW64\Mgqaip32.dll Cdaile32.exe File created C:\Windows\SysWOW64\Gklcce32.dll Egpgehnb.exe File created C:\Windows\SysWOW64\Fecibala.dll Loecgfjf.exe File created C:\Windows\SysWOW64\Fqcilgji.exe Ebbinp32.exe File opened for modification C:\Windows\SysWOW64\Ecoaijio.exe Dmbiackg.exe File created C:\Windows\SysWOW64\Mglcla32.dll Bfghlhmd.exe File created C:\Windows\SysWOW64\Ijjgbqlh.dll Hipdpbgf.exe File created C:\Windows\SysWOW64\Nkagndmc.exe Nojfic32.exe File opened for modification C:\Windows\SysWOW64\Bammeebe.exe Befmpdmq.exe File created C:\Windows\SysWOW64\Gcqhcgqi.exe Fcnlng32.exe File created C:\Windows\SysWOW64\Hikkeb32.dll Deiblamk.exe File opened for modification C:\Windows\SysWOW64\Mafofggd.exe Mepnaf32.exe File created C:\Windows\SysWOW64\Olikhnjp.dll Okbhlm32.exe File created C:\Windows\SysWOW64\Ijdnka32.exe Iheaqolo.exe File created C:\Windows\SysWOW64\Fgpijd32.dll Gmggac32.exe File created C:\Windows\SysWOW64\Ifhldi32.dll Kdbjbfjl.exe File created C:\Windows\SysWOW64\Pccopc32.dll Hfhgkmpj.exe File created C:\Windows\SysWOW64\Hleneo32.exe Gaoihfoo.exe File created C:\Windows\SysWOW64\Dbkfia32.dll Kkfkod32.exe File created C:\Windows\SysWOW64\Lkdgqbag.exe Lmqggncn.exe File created C:\Windows\SysWOW64\Cdaile32.exe Cmgqpkip.exe File created C:\Windows\SysWOW64\Kljhfc32.dll Hlhaee32.exe File opened for modification C:\Windows\SysWOW64\Hgpbhmna.exe Hljnkdnk.exe File created C:\Windows\SysWOW64\Cfbcfh32.exe Cfpfqiha.exe File created C:\Windows\SysWOW64\Kbejcm32.dll Dphipidf.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 444 5468 WerFault.exe Pqkdmc32.exe -
Modifies registry class 64 IoCs
Processes:
Emgblc32.exeKjpgmj32.exeNlcidopb.exeIlfodgeg.exeNbjpjl32.exeIbojgikg.exeKgmlde32.exeAmnlme32.exeEhnpmkbg.exeQhddgofo.exeBammeebe.exeOdgjdibf.exePfdbpjmi.exeHmhhpkcj.exeMankaked.exeJbpkfa32.exeGmggac32.exeLmeapbpa.exeNqdlpmce.exeNofoki32.exePpafpm32.exeBnnklg32.exeBikeni32.exeFdnhih32.exeJdjfohjg.exeHcembe32.exeAkogio32.exeFcodfa32.exeHembndee.exeIfnkeb32.exePanhbfep.exeHklpaeno.exeKffphhmj.exeLgfojd32.exeCajjjk32.exeHgnlmdcp.exeHmbkfjko.exePkjegb32.exeHipdpbgf.exeLkfeeo32.exeAhdpjn32.exeChinkndp.exeKfhnme32.exeGhdaokfe.exeHdcnpd32.exePhhpic32.exePfbfjk32.exeKlfaapbl.exeHannao32.exeDagajlal.exeNnlqig32.exeDcalae32.exeDphipidf.exeJjpode32.exeLnepbm32.exeAgimkk32.exeCnpbgajc.exeNgaabfio.exeBdapehop.exeNolekd32.exeGnkflo32.exeFiajfi32.exeAaoaic32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emgblc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjpgmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlcidopb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilfodgeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbjpjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibojgikg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgmlde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amnlme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehnpmkbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lccigdih.dll" Qhddgofo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bammeebe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odgjdibf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfdbpjmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdannb32.dll" Hmhhpkcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gonngd32.dll" Mankaked.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbpkfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgpijd32.dll" Gmggac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emhmgmph.dll" Lmeapbpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icpnjl32.dll" Nqdlpmce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nofoki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppafpm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnnklg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bikeni32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdnhih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdjfohjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcembe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akogio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcodfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hembndee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifnkeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Panhbfep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcimnfna.dll" Hklpaeno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kffphhmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgfojd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcidlo32.dll" Cajjjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hgnlmdcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhjgfkpf.dll" Hmbkfjko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkjegb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijjgbqlh.dll" Hipdpbgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkfeeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahdpjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmlafe32.dll" Chinkndp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfhnme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghdaokfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdcnpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpihpm32.dll" Phhpic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epiflfbm.dll" Pfbfjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Klfaapbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejahec32.dll" Hannao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dagajlal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Joalnp32.dll" Nnlqig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcalae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dphipidf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjpode32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnepbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agimkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnpbgajc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnnklg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngaabfio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdapehop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nolekd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhemnd32.dll" Gnkflo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkanbk32.dll" Fiajfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpmkebjc.dll" Aaoaic32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exeDbicpfdk.exeDoaneiop.exeDngjff32.exeEiokinbk.exeEnkdaepb.exeEokqkh32.exeEnpmld32.exeEkdnei32.exeFpbflg32.exeFligqhga.exeFnlmhc32.exeGidnkkpc.exeHfhgkmpj.exeHiipmhmk.exeIohejo32.exeIlcldb32.exeJenmcggo.exeJgmjmjnb.exeJinboekc.exeJjpode32.exeKlahfp32.exedescription pid process target process PID 1516 wrote to memory of 3100 1516 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe Dbicpfdk.exe PID 1516 wrote to memory of 3100 1516 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe Dbicpfdk.exe PID 1516 wrote to memory of 3100 1516 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe Dbicpfdk.exe PID 3100 wrote to memory of 1064 3100 Dbicpfdk.exe Doaneiop.exe PID 3100 wrote to memory of 1064 3100 Dbicpfdk.exe Doaneiop.exe PID 3100 wrote to memory of 1064 3100 Dbicpfdk.exe Doaneiop.exe PID 1064 wrote to memory of 2920 1064 Doaneiop.exe Dngjff32.exe PID 1064 wrote to memory of 2920 1064 Doaneiop.exe Dngjff32.exe PID 1064 wrote to memory of 2920 1064 Doaneiop.exe Dngjff32.exe PID 2920 wrote to memory of 5084 2920 Dngjff32.exe Eiokinbk.exe PID 2920 wrote to memory of 5084 2920 Dngjff32.exe Eiokinbk.exe PID 2920 wrote to memory of 5084 2920 Dngjff32.exe Eiokinbk.exe PID 5084 wrote to memory of 4524 5084 Eiokinbk.exe Enkdaepb.exe PID 5084 wrote to memory of 4524 5084 Eiokinbk.exe Enkdaepb.exe PID 5084 wrote to memory of 4524 5084 Eiokinbk.exe Enkdaepb.exe PID 4524 wrote to memory of 1452 4524 Enkdaepb.exe Eokqkh32.exe PID 4524 wrote to memory of 1452 4524 Enkdaepb.exe Eokqkh32.exe PID 4524 wrote to memory of 1452 4524 Enkdaepb.exe Eokqkh32.exe PID 1452 wrote to memory of 4512 1452 Eokqkh32.exe Enpmld32.exe PID 1452 wrote to memory of 4512 1452 Eokqkh32.exe Enpmld32.exe PID 1452 wrote to memory of 4512 1452 Eokqkh32.exe Enpmld32.exe PID 4512 wrote to memory of 2708 4512 Enpmld32.exe Ekdnei32.exe PID 4512 wrote to memory of 2708 4512 Enpmld32.exe Ekdnei32.exe PID 4512 wrote to memory of 2708 4512 Enpmld32.exe Ekdnei32.exe PID 2708 wrote to memory of 2632 2708 Ekdnei32.exe Fpbflg32.exe PID 2708 wrote to memory of 2632 2708 Ekdnei32.exe Fpbflg32.exe PID 2708 wrote to memory of 2632 2708 Ekdnei32.exe Fpbflg32.exe PID 2632 wrote to memory of 2888 2632 Fpbflg32.exe Fligqhga.exe PID 2632 wrote to memory of 2888 2632 Fpbflg32.exe Fligqhga.exe PID 2632 wrote to memory of 2888 2632 Fpbflg32.exe Fligqhga.exe PID 2888 wrote to memory of 2624 2888 Fligqhga.exe Fnlmhc32.exe PID 2888 wrote to memory of 2624 2888 Fligqhga.exe Fnlmhc32.exe PID 2888 wrote to memory of 2624 2888 Fligqhga.exe Fnlmhc32.exe PID 2624 wrote to memory of 4236 2624 Fnlmhc32.exe Gidnkkpc.exe PID 2624 wrote to memory of 4236 2624 Fnlmhc32.exe Gidnkkpc.exe PID 2624 wrote to memory of 4236 2624 Fnlmhc32.exe Gidnkkpc.exe PID 4236 wrote to memory of 1752 4236 Gidnkkpc.exe Hfhgkmpj.exe PID 4236 wrote to memory of 1752 4236 Gidnkkpc.exe Hfhgkmpj.exe PID 4236 wrote to memory of 1752 4236 Gidnkkpc.exe Hfhgkmpj.exe PID 1752 wrote to memory of 3292 1752 Hfhgkmpj.exe Hiipmhmk.exe PID 1752 wrote to memory of 3292 1752 Hfhgkmpj.exe Hiipmhmk.exe PID 1752 wrote to memory of 3292 1752 Hfhgkmpj.exe Hiipmhmk.exe PID 3292 wrote to memory of 4488 3292 Hiipmhmk.exe Iohejo32.exe PID 3292 wrote to memory of 4488 3292 Hiipmhmk.exe Iohejo32.exe PID 3292 wrote to memory of 4488 3292 Hiipmhmk.exe Iohejo32.exe PID 4488 wrote to memory of 4564 4488 Iohejo32.exe Ilcldb32.exe PID 4488 wrote to memory of 4564 4488 Iohejo32.exe Ilcldb32.exe PID 4488 wrote to memory of 4564 4488 Iohejo32.exe Ilcldb32.exe PID 4564 wrote to memory of 456 4564 Ilcldb32.exe Jenmcggo.exe PID 4564 wrote to memory of 456 4564 Ilcldb32.exe Jenmcggo.exe PID 4564 wrote to memory of 456 4564 Ilcldb32.exe Jenmcggo.exe PID 456 wrote to memory of 4432 456 Jenmcggo.exe Jgmjmjnb.exe PID 456 wrote to memory of 4432 456 Jenmcggo.exe Jgmjmjnb.exe PID 456 wrote to memory of 4432 456 Jenmcggo.exe Jgmjmjnb.exe PID 4432 wrote to memory of 4940 4432 Jgmjmjnb.exe Jinboekc.exe PID 4432 wrote to memory of 4940 4432 Jgmjmjnb.exe Jinboekc.exe PID 4432 wrote to memory of 4940 4432 Jgmjmjnb.exe Jinboekc.exe PID 4940 wrote to memory of 3860 4940 Jinboekc.exe Jjpode32.exe PID 4940 wrote to memory of 3860 4940 Jinboekc.exe Jjpode32.exe PID 4940 wrote to memory of 3860 4940 Jinboekc.exe Jjpode32.exe PID 3860 wrote to memory of 4200 3860 Jjpode32.exe Klahfp32.exe PID 3860 wrote to memory of 4200 3860 Jjpode32.exe Klahfp32.exe PID 3860 wrote to memory of 4200 3860 Jjpode32.exe Klahfp32.exe PID 4200 wrote to memory of 1252 4200 Klahfp32.exe Kjeiodek.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe"C:\Users\Admin\AppData\Local\Temp\bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dbicpfdk.exeC:\Windows\system32\Dbicpfdk.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Doaneiop.exeC:\Windows\system32\Doaneiop.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dngjff32.exeC:\Windows\system32\Dngjff32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Eiokinbk.exeC:\Windows\system32\Eiokinbk.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Enkdaepb.exeC:\Windows\system32\Enkdaepb.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Eokqkh32.exeC:\Windows\system32\Eokqkh32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Enpmld32.exeC:\Windows\system32\Enpmld32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ekdnei32.exeC:\Windows\system32\Ekdnei32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Fpbflg32.exeC:\Windows\system32\Fpbflg32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Fligqhga.exeC:\Windows\system32\Fligqhga.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Fnlmhc32.exeC:\Windows\system32\Fnlmhc32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gidnkkpc.exeC:\Windows\system32\Gidnkkpc.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hfhgkmpj.exeC:\Windows\system32\Hfhgkmpj.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hiipmhmk.exeC:\Windows\system32\Hiipmhmk.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iohejo32.exeC:\Windows\system32\Iohejo32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ilcldb32.exeC:\Windows\system32\Ilcldb32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jenmcggo.exeC:\Windows\system32\Jenmcggo.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jgmjmjnb.exeC:\Windows\system32\Jgmjmjnb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jinboekc.exeC:\Windows\system32\Jinboekc.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jjpode32.exeC:\Windows\system32\Jjpode32.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Klahfp32.exeC:\Windows\system32\Klahfp32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kjeiodek.exeC:\Windows\system32\Kjeiodek.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Klfaapbl.exeC:\Windows\system32\Klfaapbl.exe24⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Loighj32.exeC:\Windows\system32\Loighj32.exe25⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lokdnjkg.exeC:\Windows\system32\Lokdnjkg.exe26⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mmhgmmbf.exeC:\Windows\system32\Mmhgmmbf.exe27⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mqfpckhm.exeC:\Windows\system32\Mqfpckhm.exe28⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mqimikfj.exeC:\Windows\system32\Mqimikfj.exe29⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mjcngpjh.exeC:\Windows\system32\Mjcngpjh.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Npbceggm.exeC:\Windows\system32\Npbceggm.exe31⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nfohgqlg.exeC:\Windows\system32\Nfohgqlg.exe32⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Npiiffqe.exeC:\Windows\system32\Npiiffqe.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ojajin32.exeC:\Windows\system32\Ojajin32.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ojdgnn32.exeC:\Windows\system32\Ojdgnn32.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ojfcdnjc.exeC:\Windows\system32\Ojfcdnjc.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ogjdmbil.exeC:\Windows\system32\Ogjdmbil.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Opeiadfg.exeC:\Windows\system32\Opeiadfg.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Paeelgnj.exeC:\Windows\system32\Paeelgnj.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pffgom32.exeC:\Windows\system32\Pffgom32.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Palklf32.exeC:\Windows\system32\Palklf32.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Panhbfep.exeC:\Windows\system32\Panhbfep.exe42⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Qpcecb32.exeC:\Windows\system32\Qpcecb32.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ahmjjoig.exeC:\Windows\system32\Ahmjjoig.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Aoioli32.exeC:\Windows\system32\Aoioli32.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Amnlme32.exeC:\Windows\system32\Amnlme32.exe46⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ahdpjn32.exeC:\Windows\system32\Ahdpjn32.exe47⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Agimkk32.exeC:\Windows\system32\Agimkk32.exe48⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Aaoaic32.exeC:\Windows\system32\Aaoaic32.exe49⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Bkgeainn.exeC:\Windows\system32\Bkgeainn.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Boenhgdd.exeC:\Windows\system32\Boenhgdd.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bgpcliao.exeC:\Windows\system32\Bgpcliao.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bddcenpi.exeC:\Windows\system32\Bddcenpi.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Boihcf32.exeC:\Windows\system32\Boihcf32.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bajqda32.exeC:\Windows\system32\Bajqda32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cammjakm.exeC:\Windows\system32\Cammjakm.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cdmfllhn.exeC:\Windows\system32\Cdmfllhn.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cnhgjaml.exeC:\Windows\system32\Cnhgjaml.exe58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cogddd32.exeC:\Windows\system32\Cogddd32.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dojqjdbl.exeC:\Windows\system32\Dojqjdbl.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dakikoom.exeC:\Windows\system32\Dakikoom.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dkcndeen.exeC:\Windows\system32\Dkcndeen.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dgjoif32.exeC:\Windows\system32\Dgjoif32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Enfckp32.exeC:\Windows\system32\Enfckp32.exe64⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Egohdegl.exeC:\Windows\system32\Egohdegl.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ebfign32.exeC:\Windows\system32\Ebfign32.exe66⤵
-
C:\Windows\SysWOW64\Egcaod32.exeC:\Windows\system32\Egcaod32.exe67⤵
-
C:\Windows\SysWOW64\Edgbii32.exeC:\Windows\system32\Edgbii32.exe68⤵
-
C:\Windows\SysWOW64\Eiekog32.exeC:\Windows\system32\Eiekog32.exe69⤵
-
C:\Windows\SysWOW64\Fqppci32.exeC:\Windows\system32\Fqppci32.exe70⤵
-
C:\Windows\SysWOW64\Fdnhih32.exeC:\Windows\system32\Fdnhih32.exe71⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Feqeog32.exeC:\Windows\system32\Feqeog32.exe72⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fqgedh32.exeC:\Windows\system32\Fqgedh32.exe73⤵
-
C:\Windows\SysWOW64\Fohfbpgi.exeC:\Windows\system32\Fohfbpgi.exe74⤵
-
C:\Windows\SysWOW64\Gokbgpeg.exeC:\Windows\system32\Gokbgpeg.exe75⤵
-
C:\Windows\SysWOW64\Gejhef32.exeC:\Windows\system32\Gejhef32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ggkqgaol.exeC:\Windows\system32\Ggkqgaol.exe77⤵
-
C:\Windows\SysWOW64\Ggmmlamj.exeC:\Windows\system32\Ggmmlamj.exe78⤵
-
C:\Windows\SysWOW64\Hppeim32.exeC:\Windows\system32\Hppeim32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Iijfhbhl.exeC:\Windows\system32\Iijfhbhl.exe80⤵
-
C:\Windows\SysWOW64\Jpegkj32.exeC:\Windows\system32\Jpegkj32.exe81⤵
-
C:\Windows\SysWOW64\Kibeoo32.exeC:\Windows\system32\Kibeoo32.exe82⤵
-
C:\Windows\SysWOW64\Khgbqkhj.exeC:\Windows\system32\Khgbqkhj.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kpccmhdg.exeC:\Windows\system32\Kpccmhdg.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Lpgmhg32.exeC:\Windows\system32\Lpgmhg32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Modpib32.exeC:\Windows\system32\Modpib32.exe86⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mjlalkmd.exeC:\Windows\system32\Mjlalkmd.exe87⤵
-
C:\Windows\SysWOW64\Mfenglqf.exeC:\Windows\system32\Mfenglqf.exe88⤵
-
C:\Windows\SysWOW64\Nciopppp.exeC:\Windows\system32\Nciopppp.exe89⤵
-
C:\Windows\SysWOW64\Noppeaed.exeC:\Windows\system32\Noppeaed.exe90⤵
-
C:\Windows\SysWOW64\Noblkqca.exeC:\Windows\system32\Noblkqca.exe91⤵
-
C:\Windows\SysWOW64\Nodiqp32.exeC:\Windows\system32\Nodiqp32.exe92⤵
-
C:\Windows\SysWOW64\Nimmifgo.exeC:\Windows\system32\Nimmifgo.exe93⤵
-
C:\Windows\SysWOW64\Obgohklm.exeC:\Windows\system32\Obgohklm.exe94⤵
-
C:\Windows\SysWOW64\Ookoaokf.exeC:\Windows\system32\Ookoaokf.exe95⤵
-
C:\Windows\SysWOW64\Oblhcj32.exeC:\Windows\system32\Oblhcj32.exe96⤵
-
C:\Windows\SysWOW64\Padnaq32.exeC:\Windows\system32\Padnaq32.exe97⤵
-
C:\Windows\SysWOW64\Pfagighf.exeC:\Windows\system32\Pfagighf.exe98⤵
-
C:\Windows\SysWOW64\Pmphaaln.exeC:\Windows\system32\Pmphaaln.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Aabkbono.exeC:\Windows\system32\Aabkbono.exe100⤵
-
C:\Windows\SysWOW64\Afockelf.exeC:\Windows\system32\Afockelf.exe101⤵
-
C:\Windows\SysWOW64\Aaiqcnhg.exeC:\Windows\system32\Aaiqcnhg.exe102⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Aalmimfd.exeC:\Windows\system32\Aalmimfd.exe103⤵
-
C:\Windows\SysWOW64\Bdapehop.exeC:\Windows\system32\Bdapehop.exe104⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bmidnm32.exeC:\Windows\system32\Bmidnm32.exe105⤵
-
C:\Windows\SysWOW64\Bagmdllg.exeC:\Windows\system32\Bagmdllg.exe106⤵
-
C:\Windows\SysWOW64\Bgdemb32.exeC:\Windows\system32\Bgdemb32.exe107⤵
-
C:\Windows\SysWOW64\Cajjjk32.exeC:\Windows\system32\Cajjjk32.exe108⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cgfbbb32.exeC:\Windows\system32\Cgfbbb32.exe109⤵
-
C:\Windows\SysWOW64\Cmpjoloh.exeC:\Windows\system32\Cmpjoloh.exe110⤵
-
C:\Windows\SysWOW64\Cgiohbfi.exeC:\Windows\system32\Cgiohbfi.exe111⤵
-
C:\Windows\SysWOW64\Cpcpfg32.exeC:\Windows\system32\Cpcpfg32.exe112⤵
-
C:\Windows\SysWOW64\Cgmhcaac.exeC:\Windows\system32\Cgmhcaac.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cmgqpkip.exeC:\Windows\system32\Cmgqpkip.exe114⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cdaile32.exeC:\Windows\system32\Cdaile32.exe115⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dmjmekgn.exeC:\Windows\system32\Dmjmekgn.exe116⤵
-
C:\Windows\SysWOW64\Dalofi32.exeC:\Windows\system32\Dalofi32.exe117⤵
-
C:\Windows\SysWOW64\Dkedonpo.exeC:\Windows\system32\Dkedonpo.exe118⤵
-
C:\Windows\SysWOW64\Enlcahgh.exeC:\Windows\system32\Enlcahgh.exe119⤵
-
C:\Windows\SysWOW64\Ecikjoep.exeC:\Windows\system32\Ecikjoep.exe120⤵
-
C:\Windows\SysWOW64\Eajlhg32.exeC:\Windows\system32\Eajlhg32.exe121⤵
-
C:\Windows\SysWOW64\Gkefmjcj.exeC:\Windows\system32\Gkefmjcj.exe122⤵
-
C:\Windows\SysWOW64\Gjkbnfha.exeC:\Windows\system32\Gjkbnfha.exe123⤵
-
C:\Windows\SysWOW64\Hepgkohh.exeC:\Windows\system32\Hepgkohh.exe124⤵
-
C:\Windows\SysWOW64\Hbdgec32.exeC:\Windows\system32\Hbdgec32.exe125⤵
-
C:\Windows\SysWOW64\Hcedmkmp.exeC:\Windows\system32\Hcedmkmp.exe126⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Haidfpki.exeC:\Windows\system32\Haidfpki.exe127⤵
-
C:\Windows\SysWOW64\Hkaeih32.exeC:\Windows\system32\Hkaeih32.exe128⤵
-
C:\Windows\SysWOW64\Hannao32.exeC:\Windows\system32\Hannao32.exe129⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hjfbjdnd.exeC:\Windows\system32\Hjfbjdnd.exe130⤵
-
C:\Windows\SysWOW64\Ilfodgeg.exeC:\Windows\system32\Ilfodgeg.exe131⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Iholohii.exeC:\Windows\system32\Iholohii.exe132⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Inidkb32.exeC:\Windows\system32\Inidkb32.exe133⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ihaidhgf.exeC:\Windows\system32\Ihaidhgf.exe134⤵
-
C:\Windows\SysWOW64\Ibgmaqfl.exeC:\Windows\system32\Ibgmaqfl.exe135⤵
-
C:\Windows\SysWOW64\Iloajfml.exeC:\Windows\system32\Iloajfml.exe136⤵
-
C:\Windows\SysWOW64\Jdjfohjg.exeC:\Windows\system32\Jdjfohjg.exe137⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jnbgaa32.exeC:\Windows\system32\Jnbgaa32.exe138⤵
-
C:\Windows\SysWOW64\Jlidpe32.exeC:\Windows\system32\Jlidpe32.exe139⤵
-
C:\Windows\SysWOW64\Jaemilci.exeC:\Windows\system32\Jaemilci.exe140⤵
-
C:\Windows\SysWOW64\Jhoeef32.exeC:\Windows\system32\Jhoeef32.exe141⤵
-
C:\Windows\SysWOW64\Kbjbnnfg.exeC:\Windows\system32\Kbjbnnfg.exe142⤵
-
C:\Windows\SysWOW64\Kbnlim32.exeC:\Windows\system32\Kbnlim32.exe143⤵
-
C:\Windows\SysWOW64\Khkdad32.exeC:\Windows\system32\Khkdad32.exe144⤵
-
C:\Windows\SysWOW64\Leoejh32.exeC:\Windows\system32\Leoejh32.exe145⤵
-
C:\Windows\SysWOW64\Lbcedmnl.exeC:\Windows\system32\Lbcedmnl.exe146⤵
-
C:\Windows\SysWOW64\Lhpnlclc.exeC:\Windows\system32\Lhpnlclc.exe147⤵
-
C:\Windows\SysWOW64\Ledoegkm.exeC:\Windows\system32\Ledoegkm.exe148⤵
-
C:\Windows\SysWOW64\Lbhool32.exeC:\Windows\system32\Lbhool32.exe149⤵
-
C:\Windows\SysWOW64\Lhdggb32.exeC:\Windows\system32\Lhdggb32.exe150⤵
-
C:\Windows\SysWOW64\Loopdmpk.exeC:\Windows\system32\Loopdmpk.exe151⤵
-
C:\Windows\SysWOW64\Ldkhlcnb.exeC:\Windows\system32\Ldkhlcnb.exe152⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mociol32.exeC:\Windows\system32\Mociol32.exe153⤵
-
C:\Windows\SysWOW64\Mkjjdmaj.exeC:\Windows\system32\Mkjjdmaj.exe154⤵
-
C:\Windows\SysWOW64\Mepnaf32.exeC:\Windows\system32\Mepnaf32.exe155⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mafofggd.exeC:\Windows\system32\Mafofggd.exe156⤵
-
C:\Windows\SysWOW64\Nchhfild.exeC:\Windows\system32\Nchhfild.exe157⤵
-
C:\Windows\SysWOW64\Nlcidopb.exeC:\Windows\system32\Nlcidopb.exe158⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nfknmd32.exeC:\Windows\system32\Nfknmd32.exe159⤵
-
C:\Windows\SysWOW64\Nocbfjmc.exeC:\Windows\system32\Nocbfjmc.exe160⤵
-
C:\Windows\SysWOW64\Nofoki32.exeC:\Windows\system32\Nofoki32.exe161⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nfpghccm.exeC:\Windows\system32\Nfpghccm.exe162⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Okmpqjad.exeC:\Windows\system32\Okmpqjad.exe163⤵
-
C:\Windows\SysWOW64\Ofbdncaj.exeC:\Windows\system32\Ofbdncaj.exe164⤵
-
C:\Windows\SysWOW64\Okolfj32.exeC:\Windows\system32\Okolfj32.exe165⤵
-
C:\Windows\SysWOW64\Ofdqcc32.exeC:\Windows\system32\Ofdqcc32.exe166⤵
-
C:\Windows\SysWOW64\Oomelheh.exeC:\Windows\system32\Oomelheh.exe167⤵
-
C:\Windows\SysWOW64\Ooangh32.exeC:\Windows\system32\Ooangh32.exe168⤵
-
C:\Windows\SysWOW64\Pdngpo32.exeC:\Windows\system32\Pdngpo32.exe169⤵
-
C:\Windows\SysWOW64\Podkmgop.exeC:\Windows\system32\Podkmgop.exe170⤵
-
C:\Windows\SysWOW64\Pilpfm32.exeC:\Windows\system32\Pilpfm32.exe171⤵
-
C:\Windows\SysWOW64\Pcbdcf32.exeC:\Windows\system32\Pcbdcf32.exe172⤵
-
C:\Windows\SysWOW64\Piolkm32.exeC:\Windows\system32\Piolkm32.exe173⤵
-
C:\Windows\SysWOW64\Pbgqdb32.exeC:\Windows\system32\Pbgqdb32.exe174⤵
-
C:\Windows\SysWOW64\Piaiqlak.exeC:\Windows\system32\Piaiqlak.exe175⤵
-
C:\Windows\SysWOW64\Pbimjb32.exeC:\Windows\system32\Pbimjb32.exe176⤵
-
C:\Windows\SysWOW64\Pmoagk32.exeC:\Windows\system32\Pmoagk32.exe177⤵
-
C:\Windows\SysWOW64\Pcijce32.exeC:\Windows\system32\Pcijce32.exe178⤵
-
C:\Windows\SysWOW64\Qifbll32.exeC:\Windows\system32\Qifbll32.exe179⤵
-
C:\Windows\SysWOW64\Qckfid32.exeC:\Windows\system32\Qckfid32.exe180⤵
-
C:\Windows\SysWOW64\Qihoak32.exeC:\Windows\system32\Qihoak32.exe181⤵
-
C:\Windows\SysWOW64\Abpcja32.exeC:\Windows\system32\Abpcja32.exe182⤵
-
C:\Windows\SysWOW64\Aijlgkjq.exeC:\Windows\system32\Aijlgkjq.exe183⤵
-
C:\Windows\SysWOW64\Apddce32.exeC:\Windows\system32\Apddce32.exe184⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Acbmjcgd.exeC:\Windows\system32\Acbmjcgd.exe185⤵
-
C:\Windows\SysWOW64\Alpnde32.exeC:\Windows\system32\Alpnde32.exe186⤵
-
C:\Windows\SysWOW64\Afeban32.exeC:\Windows\system32\Afeban32.exe187⤵
-
C:\Windows\SysWOW64\Amoknh32.exeC:\Windows\system32\Amoknh32.exe188⤵
-
C:\Windows\SysWOW64\Bcicjbal.exeC:\Windows\system32\Bcicjbal.exe189⤵
-
C:\Windows\SysWOW64\Bmagch32.exeC:\Windows\system32\Bmagch32.exe190⤵
-
C:\Windows\SysWOW64\Bboplo32.exeC:\Windows\system32\Bboplo32.exe191⤵
-
C:\Windows\SysWOW64\Bcnleb32.exeC:\Windows\system32\Bcnleb32.exe192⤵
-
C:\Windows\SysWOW64\Bikeni32.exeC:\Windows\system32\Bikeni32.exe193⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bcpika32.exeC:\Windows\system32\Bcpika32.exe194⤵
-
C:\Windows\SysWOW64\Bcbeqaia.exeC:\Windows\system32\Bcbeqaia.exe195⤵
-
C:\Windows\SysWOW64\Blnjecfl.exeC:\Windows\system32\Blnjecfl.exe196⤵
-
C:\Windows\SysWOW64\Clpgkcdj.exeC:\Windows\system32\Clpgkcdj.exe197⤵
-
C:\Windows\SysWOW64\Cbjogmlf.exeC:\Windows\system32\Cbjogmlf.exe198⤵
-
C:\Windows\SysWOW64\Cpnpqakp.exeC:\Windows\system32\Cpnpqakp.exe199⤵
-
C:\Windows\SysWOW64\Cekhihig.exeC:\Windows\system32\Cekhihig.exe200⤵
-
C:\Windows\SysWOW64\Cleqfb32.exeC:\Windows\system32\Cleqfb32.exe201⤵
-
C:\Windows\SysWOW64\Cfjeckpj.exeC:\Windows\system32\Cfjeckpj.exe202⤵
-
C:\Windows\SysWOW64\Cfmahknh.exeC:\Windows\system32\Cfmahknh.exe203⤵
-
C:\Windows\SysWOW64\Dbcbnlcl.exeC:\Windows\system32\Dbcbnlcl.exe204⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dmifkecb.exeC:\Windows\system32\Dmifkecb.exe205⤵
-
C:\Windows\SysWOW64\Dbfoclai.exeC:\Windows\system32\Dbfoclai.exe206⤵
-
C:\Windows\SysWOW64\Didqkeeq.exeC:\Windows\system32\Didqkeeq.exe207⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dcmedk32.exeC:\Windows\system32\Dcmedk32.exe208⤵
-
C:\Windows\SysWOW64\Dmbiackg.exeC:\Windows\system32\Dmbiackg.exe209⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ecoaijio.exeC:\Windows\system32\Ecoaijio.exe210⤵
-
C:\Windows\SysWOW64\Edoncm32.exeC:\Windows\system32\Edoncm32.exe211⤵
-
C:\Windows\SysWOW64\Emgblc32.exeC:\Windows\system32\Emgblc32.exe212⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Egpgehnb.exeC:\Windows\system32\Egpgehnb.exe213⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ellpmolj.exeC:\Windows\system32\Ellpmolj.exe214⤵
-
C:\Windows\SysWOW64\Eippgckc.exeC:\Windows\system32\Eippgckc.exe215⤵
-
C:\Windows\SysWOW64\Fnnimbaj.exeC:\Windows\system32\Fnnimbaj.exe216⤵
-
C:\Windows\SysWOW64\Fpandm32.exeC:\Windows\system32\Fpandm32.exe217⤵
-
C:\Windows\SysWOW64\Ffnglc32.exeC:\Windows\system32\Ffnglc32.exe218⤵
-
C:\Windows\SysWOW64\Fpckjlje.exeC:\Windows\system32\Fpckjlje.exe219⤵
-
C:\Windows\SysWOW64\Ffpcbchm.exeC:\Windows\system32\Ffpcbchm.exe220⤵
-
C:\Windows\SysWOW64\Gqagkjne.exeC:\Windows\system32\Gqagkjne.exe221⤵
-
C:\Windows\SysWOW64\Hfnpca32.exeC:\Windows\system32\Hfnpca32.exe222⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hmhhpkcj.exeC:\Windows\system32\Hmhhpkcj.exe223⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hgnlmdcp.exeC:\Windows\system32\Hgnlmdcp.exe224⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hmkeekag.exeC:\Windows\system32\Hmkeekag.exe225⤵
-
C:\Windows\SysWOW64\Hcembe32.exeC:\Windows\system32\Hcembe32.exe226⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hnjaonij.exeC:\Windows\system32\Hnjaonij.exe227⤵
-
C:\Windows\SysWOW64\Hcgjhega.exeC:\Windows\system32\Hcgjhega.exe228⤵
-
C:\Windows\SysWOW64\Hnmnengg.exeC:\Windows\system32\Hnmnengg.exe229⤵
-
C:\Windows\SysWOW64\Hcifmdeo.exeC:\Windows\system32\Hcifmdeo.exe230⤵
-
C:\Windows\SysWOW64\Hmbkfjko.exeC:\Windows\system32\Hmbkfjko.exe231⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ifjoop32.exeC:\Windows\system32\Ifjoop32.exe232⤵
-
C:\Windows\SysWOW64\Iqpclh32.exeC:\Windows\system32\Iqpclh32.exe233⤵
-
C:\Windows\SysWOW64\Igjlibib.exeC:\Windows\system32\Igjlibib.exe234⤵
-
C:\Windows\SysWOW64\Imfdaigj.exeC:\Windows\system32\Imfdaigj.exe235⤵
-
C:\Windows\SysWOW64\Ifoijonj.exeC:\Windows\system32\Ifoijonj.exe236⤵
-
C:\Windows\SysWOW64\Iqdmghnp.exeC:\Windows\system32\Iqdmghnp.exe237⤵
-
C:\Windows\SysWOW64\Ifaepolg.exeC:\Windows\system32\Ifaepolg.exe238⤵
-
C:\Windows\SysWOW64\Imknli32.exeC:\Windows\system32\Imknli32.exe239⤵
-
C:\Windows\SysWOW64\Ijonfmbn.exeC:\Windows\system32\Ijonfmbn.exe240⤵
-
C:\Windows\SysWOW64\Jnmglk32.exeC:\Windows\system32\Jnmglk32.exe241⤵