Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe
Resource
win10v2004-20240611-en
General
-
Target
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe
-
Size
163KB
-
MD5
053ff9fdd0d1d063d496a33eca89b8ca
-
SHA1
b9bf169836c3c93fe60ed67c285badd47f2554ca
-
SHA256
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377
-
SHA512
f42c02d06493fcfd77aa94a6c6f0406802b64dbe720caae52a51233c5b539b25557f681137041f6fba3d8be721c1e93bab6dbf3794998824b8deefd4896816a3
-
SSDEEP
1536:P0URnrXXSZEo828X6YZ5AH8ilProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:BRri1DYZ+HzltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Klngdpdd.exeOdmgcgbi.exeDlojkddn.exeIinlemia.exeNnaikd32.exeGcimkc32.exePcojkhap.exeAaqgek32.exeJmbdbd32.exePmoahijl.exeFjhmgeao.exePgnilpah.exeBjagjhnc.exeCfpnph32.exeGqkhjn32.exeCefoce32.exeIikhfg32.exeOqhacgdh.exeKfankifm.exeMmlpoqpg.exeHpgkkioa.exeJigollag.exeAngddopp.exeFhgjblfq.exeBnlnon32.exeFoabofnn.exeHbgmcnhf.exeIkpaldog.exeHfljmdjc.exeIjhodq32.exePkhoae32.exeAdapgfqj.exeJidklf32.exeMgddhf32.exeDfknkg32.exeDmjocp32.exeObdkma32.exeDlncan32.exeKpbmco32.exeNfjjppmm.exeDkifae32.exeDchbhn32.exeIjkljp32.exeKckbqpnj.exeOgogoi32.exeFobiilai.exeNjcpee32.exeBaocghgi.exeChagok32.exeKinemkko.exePbbgnpgl.exeAnbkio32.exeGmjlcj32.exeHcnnaikp.exeQnkdhpjn.exeAdgbpc32.exeBfdodjhm.exeGbbkaako.exeIldkgc32.exeLekehdgp.exeLmgfda32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klngdpdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odmgcgbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlojkddn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iinlemia.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnaikd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcimkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcojkhap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaqgek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmbdbd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmoahijl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjhmgeao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgnilpah.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjagjhnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gqkhjn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cefoce32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iikhfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oqhacgdh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfankifm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmlpoqpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpgkkioa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Angddopp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhgjblfq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnlnon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Foabofnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbgmcnhf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikpaldog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfljmdjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijhodq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkhoae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adapgfqj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jidklf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgddhf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obdkma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlncan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpbmco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfjjppmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkifae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dchbhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijkljp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kckbqpnj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogogoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fobiilai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njcpee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baocghgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjagjhnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kinemkko.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbbgnpgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anbkio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmjlcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcnnaikp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qnkdhpjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adgbpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfdodjhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jigollag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbbkaako.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ildkgc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lekehdgp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmgfda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adapgfqj.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Blbaihmn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bbljeb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Baojaoke.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bhibni32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bekfan32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Baaggo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Biiohl32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2220-56-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bpcgdfaa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bbacqape.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Beppmmoi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Clihig32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cccpfa32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ceblbm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chphoh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cpgqpe32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Caimgncj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Clnadfbp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Commqb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cakjmm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cibank32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cpljkdig.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ccjfgphj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cidncj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Coagla32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Capchmmb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dhjkdg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dpacfd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dabpnlkp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dhlhjf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dlgdkeje.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dcalgo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dephckaf.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1872-262-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dllmfd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eckonn32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3332-347-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4692-376-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1532-421-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2188-445-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2644-446-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3204-452-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hapaemll.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hpihai32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jpjqhgol.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jjbako32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kaqcbi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kmlnbi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kckbqpnj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lalcng32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ldmlpbbj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lnepih32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lcbiao32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mdiklqhm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mcnhmm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnaikd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ogjmdigk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ocqnij32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Obangb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ogaceh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pbkamqmd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pgjfkg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pndohaqe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pkjlge32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Blbaihmn.exe UPX C:\Windows\SysWOW64\Bbljeb32.exe UPX C:\Windows\SysWOW64\Baojaoke.exe UPX C:\Windows\SysWOW64\Bhibni32.exe UPX C:\Windows\SysWOW64\Bekfan32.exe UPX C:\Windows\SysWOW64\Baaggo32.exe UPX C:\Windows\SysWOW64\Biiohl32.exe UPX behavioral2/memory/2220-56-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Bpcgdfaa.exe UPX C:\Windows\SysWOW64\Bbacqape.exe UPX C:\Windows\SysWOW64\Beppmmoi.exe UPX C:\Windows\SysWOW64\Clihig32.exe UPX C:\Windows\SysWOW64\Cccpfa32.exe UPX C:\Windows\SysWOW64\Ceblbm32.exe UPX C:\Windows\SysWOW64\Chphoh32.exe UPX C:\Windows\SysWOW64\Cpgqpe32.exe UPX C:\Windows\SysWOW64\Caimgncj.exe UPX C:\Windows\SysWOW64\Clnadfbp.exe UPX C:\Windows\SysWOW64\Commqb32.exe UPX C:\Windows\SysWOW64\Cakjmm32.exe UPX C:\Windows\SysWOW64\Cibank32.exe UPX C:\Windows\SysWOW64\Cpljkdig.exe UPX C:\Windows\SysWOW64\Ccjfgphj.exe UPX C:\Windows\SysWOW64\Cidncj32.exe UPX C:\Windows\SysWOW64\Coagla32.exe UPX C:\Windows\SysWOW64\Capchmmb.exe UPX C:\Windows\SysWOW64\Dhjkdg32.exe UPX C:\Windows\SysWOW64\Dpacfd32.exe UPX C:\Windows\SysWOW64\Dabpnlkp.exe UPX C:\Windows\SysWOW64\Dhlhjf32.exe UPX C:\Windows\SysWOW64\Dlgdkeje.exe UPX C:\Windows\SysWOW64\Dcalgo32.exe UPX C:\Windows\SysWOW64\Dephckaf.exe UPX behavioral2/memory/1872-262-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Dllmfd32.exe UPX C:\Windows\SysWOW64\Eckonn32.exe UPX behavioral2/memory/3332-347-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4692-376-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1532-421-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3092-428-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2188-445-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2644-446-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3204-452-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4992-496-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1864-498-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1428-561-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3604-565-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Hapaemll.exe UPX C:\Windows\SysWOW64\Hpihai32.exe UPX C:\Windows\SysWOW64\Jpjqhgol.exe UPX C:\Windows\SysWOW64\Jjbako32.exe UPX C:\Windows\SysWOW64\Kaqcbi32.exe UPX C:\Windows\SysWOW64\Kmlnbi32.exe UPX C:\Windows\SysWOW64\Kckbqpnj.exe UPX C:\Windows\SysWOW64\Lalcng32.exe UPX C:\Windows\SysWOW64\Ldmlpbbj.exe UPX C:\Windows\SysWOW64\Lnepih32.exe UPX C:\Windows\SysWOW64\Lcbiao32.exe UPX C:\Windows\SysWOW64\Mdiklqhm.exe UPX C:\Windows\SysWOW64\Mcnhmm32.exe UPX C:\Windows\SysWOW64\Nnaikd32.exe UPX C:\Windows\SysWOW64\Ogjmdigk.exe UPX C:\Windows\SysWOW64\Ocqnij32.exe UPX C:\Windows\SysWOW64\Obangb32.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Blbaihmn.exeBbljeb32.exeBaojaoke.exeBekfan32.exeBhibni32.exeBaaggo32.exeBiiohl32.exeBpcgdfaa.exeBbacqape.exeBeppmmoi.exeClihig32.exeCccpfa32.exeCeblbm32.exeChphoh32.exeCpgqpe32.exeCaimgncj.exeClnadfbp.exeCommqb32.exeCakjmm32.exeCibank32.exeCpljkdig.exeCcjfgphj.exeCidncj32.exeCoagla32.exeCapchmmb.exeDhjkdg32.exeDpacfd32.exeDabpnlkp.exeDhlhjf32.exeDlgdkeje.exeDcalgo32.exeDephckaf.exeDohmlp32.exeDcdimopp.exeDebeijoc.exeDhqaefng.exeDllmfd32.exeDcfebonm.exeDaifnk32.exeDjpnohej.exeDlojkddn.exeDchbhn32.exeDakbckbe.exeEjbkehcg.exeElagacbk.exeEckonn32.exeEfikji32.exeEhhgfdho.exeEpopgbia.exeEcmlcmhe.exeEflhoigi.exeEjgdpg32.exeEleplc32.exeEqalmafo.exeEcphimfb.exeEbbidj32.exeEfneehef.exeEhlaaddj.exeEqciba32.exeEofinnkf.exeEbeejijj.exeEfpajh32.exeEmjjgbjp.exeEoifcnid.exepid process 4860 Blbaihmn.exe 1292 Bbljeb32.exe 1428 Baojaoke.exe 1708 Bekfan32.exe 4904 Bhibni32.exe 3604 Baaggo32.exe 2220 Biiohl32.exe 1416 Bpcgdfaa.exe 1316 Bbacqape.exe 3000 Beppmmoi.exe 3376 Clihig32.exe 396 Cccpfa32.exe 1764 Ceblbm32.exe 2940 Chphoh32.exe 3612 Cpgqpe32.exe 1452 Caimgncj.exe 1616 Clnadfbp.exe 5080 Commqb32.exe 3412 Cakjmm32.exe 4228 Cibank32.exe 4188 Cpljkdig.exe 1672 Ccjfgphj.exe 3084 Cidncj32.exe 5092 Coagla32.exe 1440 Capchmmb.exe 1604 Dhjkdg32.exe 1096 Dpacfd32.exe 4160 Dabpnlkp.exe 3980 Dhlhjf32.exe 4404 Dlgdkeje.exe 4000 Dcalgo32.exe 4348 Dephckaf.exe 1872 Dohmlp32.exe 1468 Dcdimopp.exe 3340 Debeijoc.exe 4708 Dhqaefng.exe 5024 Dllmfd32.exe 3268 Dcfebonm.exe 3968 Daifnk32.exe 1816 Djpnohej.exe 3404 Dlojkddn.exe 1044 Dchbhn32.exe 4652 Dakbckbe.exe 4328 Ejbkehcg.exe 1564 Elagacbk.exe 1984 Eckonn32.exe 3332 Efikji32.exe 3040 Ehhgfdho.exe 3028 Epopgbia.exe 1276 Ecmlcmhe.exe 1600 Eflhoigi.exe 4692 Ejgdpg32.exe 2232 Eleplc32.exe 4836 Eqalmafo.exe 5096 Ecphimfb.exe 3148 Ebbidj32.exe 3004 Efneehef.exe 3032 Ehlaaddj.exe 2304 Eqciba32.exe 1532 Eofinnkf.exe 3092 Ebeejijj.exe 3456 Efpajh32.exe 2760 Emjjgbjp.exe 2188 Eoifcnid.exe -
Drops file in System32 directory 64 IoCs
Processes:
Edihepnm.exeMlopkm32.exePgnilpah.exeDfknkg32.exeLgkhlnbn.exeMcbahlip.exeLdoaklml.exeAeklkchg.exeEqciba32.exeLgpagm32.exeNnhfee32.exeOcpgod32.exeOcgdji32.exeJpppnp32.exeNphhmj32.exeOfqpqo32.exeGfcgge32.exeOcdqjceo.exeCjpckf32.exeBagflcje.exeBahmfj32.exeEkcpbj32.exeQecppkdm.exeKfjhkjle.exeLiimncmf.exeOdmgcgbi.exeAgjhgngj.exeCfpnph32.exeChagok32.exeAbbpem32.exePggbkagp.exeMglack32.exeAcocaf32.exeMpjlklok.exeDhjkdg32.exeIckchq32.exeLekehdgp.exeBanllbdn.exeDebeijoc.exeFjepaecb.exeOgjmdigk.exeGkoiefmj.exeLphfpbdi.exeDllfkn32.exeKmncnb32.exeLmgfda32.exeOnhhamgg.exeGcidfi32.exeOdbgim32.exeKimnbd32.exeCeckcp32.exeJplmmfmi.exeBlbaihmn.exeFmclmabe.exeJiphkm32.exeLlgjjnlj.exeAminee32.exeBfhhoi32.exeIlghlc32.exeMedgncoe.exeCaimgncj.exeKckbqpnj.exedescription ioc process File created C:\Windows\SysWOW64\Ehedfo32.exe Edihepnm.exe File created C:\Windows\SysWOW64\Ecaobgnf.dll Mlopkm32.exe File created C:\Windows\SysWOW64\Pfaigm32.exe Pgnilpah.exe File created C:\Windows\SysWOW64\Beeppfin.dll Dfknkg32.exe File created C:\Windows\SysWOW64\Nngcpm32.dll Lgkhlnbn.exe File created C:\Windows\SysWOW64\Nkjjij32.exe Mcbahlip.exe File created C:\Windows\SysWOW64\Lgmngglp.exe Ldoaklml.exe File created C:\Windows\SysWOW64\Ffcnippo.dll Aeklkchg.exe File opened for modification C:\Windows\SysWOW64\Eofinnkf.exe Eqciba32.exe File created C:\Windows\SysWOW64\Gefncbmc.dll Lgpagm32.exe File created C:\Windows\SysWOW64\Npckna32.dll Nnhfee32.exe File opened for modification C:\Windows\SysWOW64\Oneklm32.exe Ocpgod32.exe File opened for modification C:\Windows\SysWOW64\Okolkg32.exe Ocgdji32.exe File opened for modification C:\Windows\SysWOW64\Kfjhkjle.exe Jpppnp32.exe File opened for modification C:\Windows\SysWOW64\Ncfdie32.exe Nphhmj32.exe File created C:\Windows\SysWOW64\Clbcapmm.dll Ofqpqo32.exe File opened for modification C:\Windows\SysWOW64\Gmmocpjk.exe Gfcgge32.exe File created C:\Windows\SysWOW64\Gcdmai32.dll Ocdqjceo.exe File created C:\Windows\SysWOW64\Ffpmlcim.dll Cjpckf32.exe File opened for modification C:\Windows\SysWOW64\Bcebhoii.exe Bagflcje.exe File created C:\Windows\SysWOW64\Becifhfj.exe Bahmfj32.exe File created C:\Windows\SysWOW64\Ocalcppo.dll Ekcpbj32.exe File created C:\Windows\SysWOW64\Qgallfcq.exe Qecppkdm.exe File created C:\Windows\SysWOW64\Bjjplc32.dll Kfjhkjle.exe File created C:\Windows\SysWOW64\Llgjjnlj.exe Liimncmf.exe File created C:\Windows\SysWOW64\Ocpgod32.exe Odmgcgbi.exe File opened for modification C:\Windows\SysWOW64\Andqdh32.exe Agjhgngj.exe File opened for modification C:\Windows\SysWOW64\Cjkjpgfi.exe Cfpnph32.exe File opened for modification C:\Windows\SysWOW64\Cjpckf32.exe Chagok32.exe File created C:\Windows\SysWOW64\Eeijge32.dll Abbpem32.exe File created C:\Windows\SysWOW64\Pnakhkol.exe Pggbkagp.exe File created C:\Windows\SysWOW64\Gbbkdl32.dll Mglack32.exe File created C:\Windows\SysWOW64\Phfkqkek.dll Acocaf32.exe File created C:\Windows\SysWOW64\Hhmkaf32.dll Mpjlklok.exe File created C:\Windows\SysWOW64\Dpacfd32.exe Dhjkdg32.exe File opened for modification C:\Windows\SysWOW64\Iemppiab.exe Ickchq32.exe File opened for modification C:\Windows\SysWOW64\Lmbmibhb.exe Lekehdgp.exe File created C:\Windows\SysWOW64\Jjlogcip.dll Banllbdn.exe File opened for modification C:\Windows\SysWOW64\Dhqaefng.exe Debeijoc.exe File created C:\Windows\SysWOW64\Fmclmabe.exe Fjepaecb.exe File opened for modification C:\Windows\SysWOW64\Oqbamo32.exe Ogjmdigk.exe File created C:\Windows\SysWOW64\Khkaedic.dll Gkoiefmj.exe File opened for modification C:\Windows\SysWOW64\Lcgblncm.exe Lphfpbdi.exe File created C:\Windows\SysWOW64\Dojcgi32.exe Dllfkn32.exe File created C:\Windows\SysWOW64\Kplpjn32.exe Kmncnb32.exe File created C:\Windows\SysWOW64\Lljfpnjg.exe Lmgfda32.exe File created C:\Windows\SysWOW64\Gpaekf32.dll Onhhamgg.exe File created C:\Windows\SysWOW64\Empbnb32.dll Pgnilpah.exe File created C:\Windows\SysWOW64\Gfhqbe32.exe Gcidfi32.exe File opened for modification C:\Windows\SysWOW64\Ogaceh32.exe Odbgim32.exe File created C:\Windows\SysWOW64\Hqdeld32.dll Kimnbd32.exe File created C:\Windows\SysWOW64\Qlgene32.dll Ceckcp32.exe File opened for modification C:\Windows\SysWOW64\Jjbako32.exe Jplmmfmi.exe File created C:\Windows\SysWOW64\Lcgblncm.exe Lphfpbdi.exe File created C:\Windows\SysWOW64\Gnkchm32.dll Blbaihmn.exe File opened for modification C:\Windows\SysWOW64\Fobiilai.exe Fmclmabe.exe File opened for modification C:\Windows\SysWOW64\Jpjqhgol.exe Jiphkm32.exe File created C:\Windows\SysWOW64\Lpcfkm32.exe Llgjjnlj.exe File opened for modification C:\Windows\SysWOW64\Aepefb32.exe Aminee32.exe File created C:\Windows\SysWOW64\Hfggmg32.dll Bfhhoi32.exe File created C:\Windows\SysWOW64\Icnpmp32.exe Ilghlc32.exe File created C:\Windows\SysWOW64\Bnecbhin.dll Medgncoe.exe File opened for modification C:\Windows\SysWOW64\Clnadfbp.exe Caimgncj.exe File opened for modification C:\Windows\SysWOW64\Liekmj32.exe Kckbqpnj.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 14076 13824 WerFault.exe Dmllipeg.exe -
Modifies registry class 64 IoCs
Processes:
Agjhgngj.exeEmjjgbjp.exeKilhgk32.exeOnjegled.exeEqalmafo.exeHihicplj.exeIapjlk32.exeBapiabak.exeClnadfbp.exeOgjmdigk.exeAbkjdnoa.exeFlnlhk32.exeOjgbfocc.exeCmlcbbcj.exeBeeflhdh.exeFhqcam32.exeDmjocp32.exeCidncj32.exeAbbpem32.exeMmnldp32.exePflplnlg.exeBffkij32.exeChphoh32.exeOqhacgdh.exeLgmngglp.exeDmefhako.exeMpkbebbf.exeCefoce32.exeMgimcebb.exeDelnin32.exeEfneehef.exeOdgqdlnj.exeDeoaid32.exeEaklidoi.exeAmbgef32.exeChagok32.exeBbljeb32.exeFqhbmqqg.exeJplmmfmi.exeJfhlejnh.exeIjkljp32.exeKdffocib.exeFcckif32.exeJcioiood.exePjjhbl32.exeEbeejijj.exeAlfkbc32.exeIckchq32.exeDebeijoc.exeHpihai32.exeChpada32.exeFhgjblfq.exeCajlhqjp.exePndohaqe.exeFomhdg32.exe22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exeKacphh32.exeLekehdgp.exeNjnpppkn.exeQddfkd32.exeJaedgjjd.exeNdkahnhh.exeEdnaqo32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agjhgngj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emjjgbjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kilhgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Onjegled.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eqalmafo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hihicplj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikjmhmfd.dll" Iapjlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Echegpbb.dll" Agjhgngj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bapiabak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfifda32.dll" Clnadfbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fklfdo32.dll" Ogjmdigk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abkjdnoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flnlhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojgbfocc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Beeflhdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fhqcam32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iindogea.dll" Cidncj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eeijge32.dll" Abbpem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfhkicbi.dll" Mmnldp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlaqpipg.dll" Pflplnlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bffkij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chphoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oqhacgdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgmngglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmefhako.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpkbebbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Picpfp32.dll" Cefoce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgimcebb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efneehef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Odgqdlnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deoaid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Linjpeof.dll" Eaklidoi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ambgef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cacamdcd.dll" Chagok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbljeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqhbmqqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jplmmfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndqgbjkm.dll" Jfhlejnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijkljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdffocib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcckif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bagplp32.dll" Jcioiood.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjjhbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebeejijj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alfkbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ickchq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Debeijoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlmpolji.dll" Hpihai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgqddl32.dll" Chpada32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhgjblfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cajlhqjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pndohaqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knkffk32.dll" Fomhdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgjnbc32.dll" 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kacphh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lekehdgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njnpppkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qddfkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jaedgjjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndkahnhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ednaqo32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exeBlbaihmn.exeBbljeb32.exeBaojaoke.exeBekfan32.exeBhibni32.exeBaaggo32.exeBiiohl32.exeBpcgdfaa.exeBbacqape.exeBeppmmoi.exeClihig32.exeCccpfa32.exeCeblbm32.exeChphoh32.exeCpgqpe32.exeCaimgncj.exeClnadfbp.exeCommqb32.exeCakjmm32.exeCibank32.exeCpljkdig.exedescription pid process target process PID 2184 wrote to memory of 4860 2184 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe Blbaihmn.exe PID 2184 wrote to memory of 4860 2184 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe Blbaihmn.exe PID 2184 wrote to memory of 4860 2184 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe Blbaihmn.exe PID 4860 wrote to memory of 1292 4860 Blbaihmn.exe Bbljeb32.exe PID 4860 wrote to memory of 1292 4860 Blbaihmn.exe Bbljeb32.exe PID 4860 wrote to memory of 1292 4860 Blbaihmn.exe Bbljeb32.exe PID 1292 wrote to memory of 1428 1292 Bbljeb32.exe Baojaoke.exe PID 1292 wrote to memory of 1428 1292 Bbljeb32.exe Baojaoke.exe PID 1292 wrote to memory of 1428 1292 Bbljeb32.exe Baojaoke.exe PID 1428 wrote to memory of 1708 1428 Baojaoke.exe Bekfan32.exe PID 1428 wrote to memory of 1708 1428 Baojaoke.exe Bekfan32.exe PID 1428 wrote to memory of 1708 1428 Baojaoke.exe Bekfan32.exe PID 1708 wrote to memory of 4904 1708 Bekfan32.exe Bhibni32.exe PID 1708 wrote to memory of 4904 1708 Bekfan32.exe Bhibni32.exe PID 1708 wrote to memory of 4904 1708 Bekfan32.exe Bhibni32.exe PID 4904 wrote to memory of 3604 4904 Bhibni32.exe Baaggo32.exe PID 4904 wrote to memory of 3604 4904 Bhibni32.exe Baaggo32.exe PID 4904 wrote to memory of 3604 4904 Bhibni32.exe Baaggo32.exe PID 3604 wrote to memory of 2220 3604 Baaggo32.exe Biiohl32.exe PID 3604 wrote to memory of 2220 3604 Baaggo32.exe Biiohl32.exe PID 3604 wrote to memory of 2220 3604 Baaggo32.exe Biiohl32.exe PID 2220 wrote to memory of 1416 2220 Biiohl32.exe Bpcgdfaa.exe PID 2220 wrote to memory of 1416 2220 Biiohl32.exe Bpcgdfaa.exe PID 2220 wrote to memory of 1416 2220 Biiohl32.exe Bpcgdfaa.exe PID 1416 wrote to memory of 1316 1416 Bpcgdfaa.exe Bbacqape.exe PID 1416 wrote to memory of 1316 1416 Bpcgdfaa.exe Bbacqape.exe PID 1416 wrote to memory of 1316 1416 Bpcgdfaa.exe Bbacqape.exe PID 1316 wrote to memory of 3000 1316 Bbacqape.exe Beppmmoi.exe PID 1316 wrote to memory of 3000 1316 Bbacqape.exe Beppmmoi.exe PID 1316 wrote to memory of 3000 1316 Bbacqape.exe Beppmmoi.exe PID 3000 wrote to memory of 3376 3000 Beppmmoi.exe Clihig32.exe PID 3000 wrote to memory of 3376 3000 Beppmmoi.exe Clihig32.exe PID 3000 wrote to memory of 3376 3000 Beppmmoi.exe Clihig32.exe PID 3376 wrote to memory of 396 3376 Clihig32.exe Cccpfa32.exe PID 3376 wrote to memory of 396 3376 Clihig32.exe Cccpfa32.exe PID 3376 wrote to memory of 396 3376 Clihig32.exe Cccpfa32.exe PID 396 wrote to memory of 1764 396 Cccpfa32.exe Ceblbm32.exe PID 396 wrote to memory of 1764 396 Cccpfa32.exe Ceblbm32.exe PID 396 wrote to memory of 1764 396 Cccpfa32.exe Ceblbm32.exe PID 1764 wrote to memory of 2940 1764 Ceblbm32.exe Chphoh32.exe PID 1764 wrote to memory of 2940 1764 Ceblbm32.exe Chphoh32.exe PID 1764 wrote to memory of 2940 1764 Ceblbm32.exe Chphoh32.exe PID 2940 wrote to memory of 3612 2940 Chphoh32.exe Cpgqpe32.exe PID 2940 wrote to memory of 3612 2940 Chphoh32.exe Cpgqpe32.exe PID 2940 wrote to memory of 3612 2940 Chphoh32.exe Cpgqpe32.exe PID 3612 wrote to memory of 1452 3612 Cpgqpe32.exe Caimgncj.exe PID 3612 wrote to memory of 1452 3612 Cpgqpe32.exe Caimgncj.exe PID 3612 wrote to memory of 1452 3612 Cpgqpe32.exe Caimgncj.exe PID 1452 wrote to memory of 1616 1452 Caimgncj.exe Clnadfbp.exe PID 1452 wrote to memory of 1616 1452 Caimgncj.exe Clnadfbp.exe PID 1452 wrote to memory of 1616 1452 Caimgncj.exe Clnadfbp.exe PID 1616 wrote to memory of 5080 1616 Clnadfbp.exe Commqb32.exe PID 1616 wrote to memory of 5080 1616 Clnadfbp.exe Commqb32.exe PID 1616 wrote to memory of 5080 1616 Clnadfbp.exe Commqb32.exe PID 5080 wrote to memory of 3412 5080 Commqb32.exe Cakjmm32.exe PID 5080 wrote to memory of 3412 5080 Commqb32.exe Cakjmm32.exe PID 5080 wrote to memory of 3412 5080 Commqb32.exe Cakjmm32.exe PID 3412 wrote to memory of 4228 3412 Cakjmm32.exe Cibank32.exe PID 3412 wrote to memory of 4228 3412 Cakjmm32.exe Cibank32.exe PID 3412 wrote to memory of 4228 3412 Cakjmm32.exe Cibank32.exe PID 4228 wrote to memory of 4188 4228 Cibank32.exe Cpljkdig.exe PID 4228 wrote to memory of 4188 4228 Cibank32.exe Cpljkdig.exe PID 4228 wrote to memory of 4188 4228 Cibank32.exe Cpljkdig.exe PID 4188 wrote to memory of 1672 4188 Cpljkdig.exe Ccjfgphj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe"C:\Users\Admin\AppData\Local\Temp\22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Blbaihmn.exeC:\Windows\system32\Blbaihmn.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bbljeb32.exeC:\Windows\system32\Bbljeb32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Baojaoke.exeC:\Windows\system32\Baojaoke.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bekfan32.exeC:\Windows\system32\Bekfan32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bhibni32.exeC:\Windows\system32\Bhibni32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Baaggo32.exeC:\Windows\system32\Baaggo32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Biiohl32.exeC:\Windows\system32\Biiohl32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bpcgdfaa.exeC:\Windows\system32\Bpcgdfaa.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bbacqape.exeC:\Windows\system32\Bbacqape.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Beppmmoi.exeC:\Windows\system32\Beppmmoi.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Clihig32.exeC:\Windows\system32\Clihig32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cccpfa32.exeC:\Windows\system32\Cccpfa32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ceblbm32.exeC:\Windows\system32\Ceblbm32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Chphoh32.exeC:\Windows\system32\Chphoh32.exe15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cpgqpe32.exeC:\Windows\system32\Cpgqpe32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Caimgncj.exeC:\Windows\system32\Caimgncj.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Clnadfbp.exeC:\Windows\system32\Clnadfbp.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Commqb32.exeC:\Windows\system32\Commqb32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cakjmm32.exeC:\Windows\system32\Cakjmm32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cibank32.exeC:\Windows\system32\Cibank32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cpljkdig.exeC:\Windows\system32\Cpljkdig.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ccjfgphj.exeC:\Windows\system32\Ccjfgphj.exe23⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cidncj32.exeC:\Windows\system32\Cidncj32.exe24⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Coagla32.exeC:\Windows\system32\Coagla32.exe25⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Capchmmb.exeC:\Windows\system32\Capchmmb.exe26⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dhjkdg32.exeC:\Windows\system32\Dhjkdg32.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dpacfd32.exeC:\Windows\system32\Dpacfd32.exe28⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dabpnlkp.exeC:\Windows\system32\Dabpnlkp.exe29⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dhlhjf32.exeC:\Windows\system32\Dhlhjf32.exe30⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dlgdkeje.exeC:\Windows\system32\Dlgdkeje.exe31⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dcalgo32.exeC:\Windows\system32\Dcalgo32.exe32⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dephckaf.exeC:\Windows\system32\Dephckaf.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dohmlp32.exeC:\Windows\system32\Dohmlp32.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dcdimopp.exeC:\Windows\system32\Dcdimopp.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Debeijoc.exeC:\Windows\system32\Debeijoc.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Dhqaefng.exeC:\Windows\system32\Dhqaefng.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dllmfd32.exeC:\Windows\system32\Dllmfd32.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dcfebonm.exeC:\Windows\system32\Dcfebonm.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Daifnk32.exeC:\Windows\system32\Daifnk32.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Djpnohej.exeC:\Windows\system32\Djpnohej.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dlojkddn.exeC:\Windows\system32\Dlojkddn.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dchbhn32.exeC:\Windows\system32\Dchbhn32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dakbckbe.exeC:\Windows\system32\Dakbckbe.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ejbkehcg.exeC:\Windows\system32\Ejbkehcg.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Elagacbk.exeC:\Windows\system32\Elagacbk.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eckonn32.exeC:\Windows\system32\Eckonn32.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Efikji32.exeC:\Windows\system32\Efikji32.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ehhgfdho.exeC:\Windows\system32\Ehhgfdho.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Epopgbia.exeC:\Windows\system32\Epopgbia.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ecmlcmhe.exeC:\Windows\system32\Ecmlcmhe.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eflhoigi.exeC:\Windows\system32\Eflhoigi.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ejgdpg32.exeC:\Windows\system32\Ejgdpg32.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eleplc32.exeC:\Windows\system32\Eleplc32.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eqalmafo.exeC:\Windows\system32\Eqalmafo.exe55⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ecphimfb.exeC:\Windows\system32\Ecphimfb.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ebbidj32.exeC:\Windows\system32\Ebbidj32.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Efneehef.exeC:\Windows\system32\Efneehef.exe58⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ehlaaddj.exeC:\Windows\system32\Ehlaaddj.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eqciba32.exeC:\Windows\system32\Eqciba32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eofinnkf.exeC:\Windows\system32\Eofinnkf.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ebeejijj.exeC:\Windows\system32\Ebeejijj.exe62⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Efpajh32.exeC:\Windows\system32\Efpajh32.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Emjjgbjp.exeC:\Windows\system32\Emjjgbjp.exe64⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Eoifcnid.exeC:\Windows\system32\Eoifcnid.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ecdbdl32.exeC:\Windows\system32\Ecdbdl32.exe66⤵
-
C:\Windows\SysWOW64\Ffbnph32.exeC:\Windows\system32\Ffbnph32.exe67⤵
-
C:\Windows\SysWOW64\Fhajlc32.exeC:\Windows\system32\Fhajlc32.exe68⤵
-
C:\Windows\SysWOW64\Fqhbmqqg.exeC:\Windows\system32\Fqhbmqqg.exe69⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fokbim32.exeC:\Windows\system32\Fokbim32.exe70⤵
-
C:\Windows\SysWOW64\Ffekegon.exeC:\Windows\system32\Ffekegon.exe71⤵
-
C:\Windows\SysWOW64\Fjqgff32.exeC:\Windows\system32\Fjqgff32.exe72⤵
-
C:\Windows\SysWOW64\Fmocba32.exeC:\Windows\system32\Fmocba32.exe73⤵
-
C:\Windows\SysWOW64\Fqkocpod.exeC:\Windows\system32\Fqkocpod.exe74⤵
-
C:\Windows\SysWOW64\Fcikolnh.exeC:\Windows\system32\Fcikolnh.exe75⤵
-
C:\Windows\SysWOW64\Fjcclf32.exeC:\Windows\system32\Fjcclf32.exe76⤵
-
C:\Windows\SysWOW64\Fopldmcl.exeC:\Windows\system32\Fopldmcl.exe77⤵
-
C:\Windows\SysWOW64\Fbnhphbp.exeC:\Windows\system32\Fbnhphbp.exe78⤵
-
C:\Windows\SysWOW64\Fjepaecb.exeC:\Windows\system32\Fjepaecb.exe79⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fmclmabe.exeC:\Windows\system32\Fmclmabe.exe80⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fobiilai.exeC:\Windows\system32\Fobiilai.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fjhmgeao.exeC:\Windows\system32\Fjhmgeao.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fijmbb32.exeC:\Windows\system32\Fijmbb32.exe83⤵
-
C:\Windows\SysWOW64\Gcpapkgp.exeC:\Windows\system32\Gcpapkgp.exe84⤵
-
C:\Windows\SysWOW64\Gjjjle32.exeC:\Windows\system32\Gjjjle32.exe85⤵
-
C:\Windows\SysWOW64\Gimjhafg.exeC:\Windows\system32\Gimjhafg.exe86⤵
-
C:\Windows\SysWOW64\Gcbnejem.exeC:\Windows\system32\Gcbnejem.exe87⤵
-
C:\Windows\SysWOW64\Gfqjafdq.exeC:\Windows\system32\Gfqjafdq.exe88⤵
-
C:\Windows\SysWOW64\Giofnacd.exeC:\Windows\system32\Giofnacd.exe89⤵
-
C:\Windows\SysWOW64\Gqfooodg.exeC:\Windows\system32\Gqfooodg.exe90⤵
-
C:\Windows\SysWOW64\Goiojk32.exeC:\Windows\system32\Goiojk32.exe91⤵
-
C:\Windows\SysWOW64\Gfcgge32.exeC:\Windows\system32\Gfcgge32.exe92⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gmmocpjk.exeC:\Windows\system32\Gmmocpjk.exe93⤵
-
C:\Windows\SysWOW64\Gpklpkio.exeC:\Windows\system32\Gpklpkio.exe94⤵
-
C:\Windows\SysWOW64\Gbjhlfhb.exeC:\Windows\system32\Gbjhlfhb.exe95⤵
-
C:\Windows\SysWOW64\Gqkhjn32.exeC:\Windows\system32\Gqkhjn32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gcidfi32.exeC:\Windows\system32\Gcidfi32.exe97⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gfhqbe32.exeC:\Windows\system32\Gfhqbe32.exe98⤵
-
C:\Windows\SysWOW64\Gifmnpnl.exeC:\Windows\system32\Gifmnpnl.exe99⤵
-
C:\Windows\SysWOW64\Gppekj32.exeC:\Windows\system32\Gppekj32.exe100⤵
-
C:\Windows\SysWOW64\Hboagf32.exeC:\Windows\system32\Hboagf32.exe101⤵
-
C:\Windows\SysWOW64\Hjfihc32.exeC:\Windows\system32\Hjfihc32.exe102⤵
-
C:\Windows\SysWOW64\Hihicplj.exeC:\Windows\system32\Hihicplj.exe103⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hapaemll.exeC:\Windows\system32\Hapaemll.exe104⤵
-
C:\Windows\SysWOW64\Hcnnaikp.exeC:\Windows\system32\Hcnnaikp.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hfljmdjc.exeC:\Windows\system32\Hfljmdjc.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hikfip32.exeC:\Windows\system32\Hikfip32.exe107⤵
-
C:\Windows\SysWOW64\Hmfbjnbp.exeC:\Windows\system32\Hmfbjnbp.exe108⤵
-
C:\Windows\SysWOW64\Hpenfjad.exeC:\Windows\system32\Hpenfjad.exe109⤵
-
C:\Windows\SysWOW64\Hcqjfh32.exeC:\Windows\system32\Hcqjfh32.exe110⤵
-
C:\Windows\SysWOW64\Hjjbcbqj.exeC:\Windows\system32\Hjjbcbqj.exe111⤵
-
C:\Windows\SysWOW64\Hmioonpn.exeC:\Windows\system32\Hmioonpn.exe112⤵
-
C:\Windows\SysWOW64\Hpgkkioa.exeC:\Windows\system32\Hpgkkioa.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hccglh32.exeC:\Windows\system32\Hccglh32.exe114⤵
-
C:\Windows\SysWOW64\Hpihai32.exeC:\Windows\system32\Hpihai32.exe115⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hfcpncdk.exeC:\Windows\system32\Hfcpncdk.exe116⤵
-
C:\Windows\SysWOW64\Hmmhjm32.exeC:\Windows\system32\Hmmhjm32.exe117⤵
-
C:\Windows\SysWOW64\Ipldfi32.exeC:\Windows\system32\Ipldfi32.exe118⤵
-
C:\Windows\SysWOW64\Icgqggce.exeC:\Windows\system32\Icgqggce.exe119⤵
-
C:\Windows\SysWOW64\Iffmccbi.exeC:\Windows\system32\Iffmccbi.exe120⤵
-
C:\Windows\SysWOW64\Iidipnal.exeC:\Windows\system32\Iidipnal.exe121⤵
-
C:\Windows\SysWOW64\Iakaql32.exeC:\Windows\system32\Iakaql32.exe122⤵
-
C:\Windows\SysWOW64\Ibmmhdhm.exeC:\Windows\system32\Ibmmhdhm.exe123⤵
-
C:\Windows\SysWOW64\Iannfk32.exeC:\Windows\system32\Iannfk32.exe124⤵
-
C:\Windows\SysWOW64\Ibojncfj.exeC:\Windows\system32\Ibojncfj.exe125⤵
-
C:\Windows\SysWOW64\Ifjfnb32.exeC:\Windows\system32\Ifjfnb32.exe126⤵
-
C:\Windows\SysWOW64\Ijfboafl.exeC:\Windows\system32\Ijfboafl.exe127⤵
-
C:\Windows\SysWOW64\Imdnklfp.exeC:\Windows\system32\Imdnklfp.exe128⤵
-
C:\Windows\SysWOW64\Iapjlk32.exeC:\Windows\system32\Iapjlk32.exe129⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ipckgh32.exeC:\Windows\system32\Ipckgh32.exe130⤵
-
C:\Windows\SysWOW64\Ibagcc32.exeC:\Windows\system32\Ibagcc32.exe131⤵
-
C:\Windows\SysWOW64\Ijhodq32.exeC:\Windows\system32\Ijhodq32.exe132⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Iikopmkd.exeC:\Windows\system32\Iikopmkd.exe133⤵
-
C:\Windows\SysWOW64\Imgkql32.exeC:\Windows\system32\Imgkql32.exe134⤵
-
C:\Windows\SysWOW64\Iabgaklg.exeC:\Windows\system32\Iabgaklg.exe135⤵
-
C:\Windows\SysWOW64\Idacmfkj.exeC:\Windows\system32\Idacmfkj.exe136⤵
-
C:\Windows\SysWOW64\Ibccic32.exeC:\Windows\system32\Ibccic32.exe137⤵
-
C:\Windows\SysWOW64\Ijkljp32.exeC:\Windows\system32\Ijkljp32.exe138⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Iinlemia.exeC:\Windows\system32\Iinlemia.exe139⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jaedgjjd.exeC:\Windows\system32\Jaedgjjd.exe140⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jpgdbg32.exeC:\Windows\system32\Jpgdbg32.exe141⤵
-
C:\Windows\SysWOW64\Jfaloa32.exeC:\Windows\system32\Jfaloa32.exe142⤵
-
C:\Windows\SysWOW64\Jjmhppqd.exeC:\Windows\system32\Jjmhppqd.exe143⤵
-
C:\Windows\SysWOW64\Jiphkm32.exeC:\Windows\system32\Jiphkm32.exe144⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jpjqhgol.exeC:\Windows\system32\Jpjqhgol.exe145⤵
-
C:\Windows\SysWOW64\Jfdida32.exeC:\Windows\system32\Jfdida32.exe146⤵
-
C:\Windows\SysWOW64\Jjpeepnb.exeC:\Windows\system32\Jjpeepnb.exe147⤵
-
C:\Windows\SysWOW64\Jplmmfmi.exeC:\Windows\system32\Jplmmfmi.exe148⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jjbako32.exeC:\Windows\system32\Jjbako32.exe149⤵
-
C:\Windows\SysWOW64\Jaljgidl.exeC:\Windows\system32\Jaljgidl.exe150⤵
-
C:\Windows\SysWOW64\Jdjfcecp.exeC:\Windows\system32\Jdjfcecp.exe151⤵
-
C:\Windows\SysWOW64\Jkdnpo32.exeC:\Windows\system32\Jkdnpo32.exe152⤵
-
C:\Windows\SysWOW64\Jigollag.exeC:\Windows\system32\Jigollag.exe153⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jpaghf32.exeC:\Windows\system32\Jpaghf32.exe154⤵
-
C:\Windows\SysWOW64\Jbocea32.exeC:\Windows\system32\Jbocea32.exe155⤵
-
C:\Windows\SysWOW64\Kaqcbi32.exeC:\Windows\system32\Kaqcbi32.exe156⤵
-
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe157⤵
-
C:\Windows\SysWOW64\Kkihknfg.exeC:\Windows\system32\Kkihknfg.exe158⤵
-
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe159⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kacphh32.exeC:\Windows\system32\Kacphh32.exe160⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kbdmpqcb.exeC:\Windows\system32\Kbdmpqcb.exe161⤵
-
C:\Windows\SysWOW64\Kkkdan32.exeC:\Windows\system32\Kkkdan32.exe162⤵
-
C:\Windows\SysWOW64\Kinemkko.exeC:\Windows\system32\Kinemkko.exe163⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kphmie32.exeC:\Windows\system32\Kphmie32.exe164⤵
-
C:\Windows\SysWOW64\Kgbefoji.exeC:\Windows\system32\Kgbefoji.exe165⤵
-
C:\Windows\SysWOW64\Kmlnbi32.exeC:\Windows\system32\Kmlnbi32.exe166⤵
-
C:\Windows\SysWOW64\Kdffocib.exeC:\Windows\system32\Kdffocib.exe167⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe168⤵
-
C:\Windows\SysWOW64\Kibnhjgj.exeC:\Windows\system32\Kibnhjgj.exe169⤵
-
C:\Windows\SysWOW64\Kajfig32.exeC:\Windows\system32\Kajfig32.exe170⤵
-
C:\Windows\SysWOW64\Kckbqpnj.exeC:\Windows\system32\Kckbqpnj.exe171⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe172⤵
-
C:\Windows\SysWOW64\Lalcng32.exeC:\Windows\system32\Lalcng32.exe173⤵
-
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe174⤵
-
C:\Windows\SysWOW64\Liggbi32.exeC:\Windows\system32\Liggbi32.exe175⤵
-
C:\Windows\SysWOW64\Ldmlpbbj.exeC:\Windows\system32\Ldmlpbbj.exe176⤵
-
C:\Windows\SysWOW64\Lgkhlnbn.exeC:\Windows\system32\Lgkhlnbn.exe177⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lnepih32.exeC:\Windows\system32\Lnepih32.exe178⤵
-
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe179⤵
-
C:\Windows\SysWOW64\Lcbiao32.exeC:\Windows\system32\Lcbiao32.exe180⤵
-
C:\Windows\SysWOW64\Laciofpa.exeC:\Windows\system32\Laciofpa.exe181⤵
-
C:\Windows\SysWOW64\Ldaeka32.exeC:\Windows\system32\Ldaeka32.exe182⤵
-
C:\Windows\SysWOW64\Lgpagm32.exeC:\Windows\system32\Lgpagm32.exe183⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ljnnch32.exeC:\Windows\system32\Ljnnch32.exe184⤵
-
C:\Windows\SysWOW64\Lphfpbdi.exeC:\Windows\system32\Lphfpbdi.exe185⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe186⤵
-
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe187⤵
-
C:\Windows\SysWOW64\Mahbje32.exeC:\Windows\system32\Mahbje32.exe188⤵
-
C:\Windows\SysWOW64\Mpkbebbf.exeC:\Windows\system32\Mpkbebbf.exe189⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe190⤵
-
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe191⤵
-
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe192⤵
-
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe193⤵
-
C:\Windows\SysWOW64\Mcnhmm32.exeC:\Windows\system32\Mcnhmm32.exe194⤵
-
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe195⤵
-
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe196⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe197⤵
-
C:\Windows\SysWOW64\Mcbahlip.exeC:\Windows\system32\Mcbahlip.exe198⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe199⤵
-
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe200⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe201⤵
-
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe202⤵
-
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe203⤵
-
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe204⤵
-
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe205⤵
-
C:\Windows\SysWOW64\Njacpf32.exeC:\Windows\system32\Njacpf32.exe206⤵
-
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe207⤵
-
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe208⤵
-
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe209⤵
-
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe210⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nbkhfc32.exeC:\Windows\system32\Nbkhfc32.exe211⤵
-
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe212⤵
-
C:\Windows\SysWOW64\Nggqoj32.exeC:\Windows\system32\Nggqoj32.exe213⤵
-
C:\Windows\SysWOW64\Nnaikd32.exeC:\Windows\system32\Nnaikd32.exe214⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ndkahnhh.exeC:\Windows\system32\Ndkahnhh.exe215⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ogjmdigk.exeC:\Windows\system32\Ogjmdigk.exe216⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Oqbamo32.exeC:\Windows\system32\Oqbamo32.exe217⤵
-
C:\Windows\SysWOW64\Ocqnij32.exeC:\Windows\system32\Ocqnij32.exe218⤵
-
C:\Windows\SysWOW64\Ojjffddl.exeC:\Windows\system32\Ojjffddl.exe219⤵
-
C:\Windows\SysWOW64\Obangb32.exeC:\Windows\system32\Obangb32.exe220⤵
-
C:\Windows\SysWOW64\Ogogoi32.exeC:\Windows\system32\Ogogoi32.exe221⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Obdkma32.exeC:\Windows\system32\Obdkma32.exe222⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Odbgim32.exeC:\Windows\system32\Odbgim32.exe223⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ogaceh32.exeC:\Windows\system32\Ogaceh32.exe224⤵
-
C:\Windows\SysWOW64\Onklabip.exeC:\Windows\system32\Onklabip.exe225⤵
-
C:\Windows\SysWOW64\Ocgdji32.exeC:\Windows\system32\Ocgdji32.exe226⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Okolkg32.exeC:\Windows\system32\Okolkg32.exe227⤵
-
C:\Windows\SysWOW64\Onmhgb32.exeC:\Windows\system32\Onmhgb32.exe228⤵
-
C:\Windows\SysWOW64\Odgqdlnj.exeC:\Windows\system32\Odgqdlnj.exe229⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pgemphmn.exeC:\Windows\system32\Pgemphmn.exe230⤵
-
C:\Windows\SysWOW64\Pkaiqf32.exeC:\Windows\system32\Pkaiqf32.exe231⤵
-
C:\Windows\SysWOW64\Pbkamqmd.exeC:\Windows\system32\Pbkamqmd.exe232⤵
-
C:\Windows\SysWOW64\Pkceffcd.exeC:\Windows\system32\Pkceffcd.exe233⤵
-
C:\Windows\SysWOW64\Pbmncp32.exeC:\Windows\system32\Pbmncp32.exe234⤵
-
C:\Windows\SysWOW64\Pqpnombl.exeC:\Windows\system32\Pqpnombl.exe235⤵
-
C:\Windows\SysWOW64\Pcojkhap.exeC:\Windows\system32\Pcojkhap.exe236⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pgjfkg32.exeC:\Windows\system32\Pgjfkg32.exe237⤵
-
C:\Windows\SysWOW64\Pndohaqe.exeC:\Windows\system32\Pndohaqe.exe238⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pengdk32.exeC:\Windows\system32\Pengdk32.exe239⤵
-
C:\Windows\SysWOW64\Pkhoae32.exeC:\Windows\system32\Pkhoae32.exe240⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pbbgnpgl.exeC:\Windows\system32\Pbbgnpgl.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup