Analysis
-
max time kernel
22s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
09ec2458a746ed795c88a62729a3d30e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
09ec2458a746ed795c88a62729a3d30e.exe
Resource
win10v2004-20231215-en
General
-
Target
09ec2458a746ed795c88a62729a3d30e.exe
-
Size
46KB
-
MD5
09ec2458a746ed795c88a62729a3d30e
-
SHA1
750cbd39b147e19cd38c6cf305487ee7d25243d8
-
SHA256
c6e1325d7043ee9af9529565e9a2ac16d56c2f1f8365d1dd469a0d3ea497c62a
-
SHA512
8e96b91af9e65097c41f4edade11219962220418a770d57977fe979bd2c50fe505f8eac367de22c53c9b4baf11cbac73d5a6d5f2190f3e70d672cfbc5402fca4
-
SSDEEP
768:j7RNHmpC97r/hgGxtPuC+uwkIuIe98PXs4/wKUUpWL9Sfc3VkX0BoEoc5un:j7x97r/doawVur4YKUOWxVFIi5un
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 62 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gicctfahzw.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gfphpphxby.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation wwpaehwpxu.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation xybvjdtmdp.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation jhxwxwhqxx.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation yohwwcfmsw.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation qdreyyrnpb.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation tjlqxgkvpd.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation zuqxxyjhsr.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation yymjebcszz.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation mnmjcsfkif.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation clyxbikxqh.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation oumndxevin.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation pftzkyqsgz.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation jcjqtbseyp.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation vrihkhxnwj.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation onlqrfhsud.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation weevfmknig.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation jionsjpual.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation tagaswzgsg.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation lepuvtxows.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation rxoqjvcqet.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation wkieoemqta.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 09ec2458a746ed795c88a62729a3d30e.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation wzwgnwjxys.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation tfjzmrgots.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation uznbbmjtyv.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation dkuvpfovpc.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation eatiwrfkqk.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gvxycrrdmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation rkkedaprjq.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation jjoponyvmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation mraheqzeyi.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation mommyooluq.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation rvluskgdvm.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gdkdeieiam.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation gcasServ32.exe -
Executes dropped EXE 64 IoCs
pid Process 2908 gcasServ32.exe 3336 jhxwxwhqxx.exe 4108 uznbbmjtyv.exe 3964 dkuvpfovpc.exe 544 mommyooluq.exe 3484 gcasServ32.exe 3616 gfphpphxby.exe 1636 gcasServ32.exe 980 clyxbikxqh.exe 3896 gcasServ32.exe 2140 zuqxxyjhsr.exe 5004 gcasServ32.exe 1584 tagaswzgsg.exe 2212 gcasServ32.exe 980 clyxbikxqh.exe 4132 gcasServ32.exe 1560 oumndxevin.exe 4084 gcasServ32.exe 2132 eatiwrfkqk.exe 1632 gcasServ32.exe 1616 wzwgnwjxys.exe 880 gvxycrrdmd.exe 3136 gcasServ32.exe 4420 yymjebcszz.exe 100 sihclient.exe 2408 rvluskgdvm.exe 3016 onlqrfhsud.exe 4524 pftzkyqsgz.exe 1892 rkkedaprjq.exe 884 gcasServ32.exe 3500 lepuvtxows.exe 5100 gcasServ32.exe 4428 jjoponyvmp.exe 4524 pftzkyqsgz.exe 1932 gdkdeieiam.exe 3400 gcasServ32.exe 3380 weevfmknig.exe 1220 gcasServ32.exe 4592 tjlqxgkvpd.exe 676 gcasServ32.exe 1996 jcjqtbseyp.exe 3024 gcasServ32.exe 2704 yohwwcfmsw.exe 4556 tfjzmrgots.exe 4648 gcasServ32.exe 636 mnmjcsfkif.exe 3788 qdreyyrnpb.exe 4148 gcasServ32.exe 2436 mraheqzeyi.exe 2396 gcasServ32.exe 5096 gicctfahzw.exe 4368 gcasServ32.exe 3016 onlqrfhsud.exe 4412 gcasServ32.exe 3964 dkuvpfovpc.exe 3880 gcasServ32.exe 1100 gcasServ32.exe 4908 xybvjdtmdp.exe 3300 rxoqjvcqet.exe 4608 jionsjpual.exe 208 wkieoemqta.exe 3464 gcasServ32.exe 3140 vrihkhxnwj.exe 5008 gcasServ32.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" uznbbmjtyv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" clyxbikxqh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" yymjebcszz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "jjoponyvmp.exe" gcasServ32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" gdkdeieiam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" qdreyyrnpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" 09ec2458a746ed795c88a62729a3d30e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "wzwgnwjxys.exe" gcasServ32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gvxycrrdmd.exe" wzwgnwjxys.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" gvxycrrdmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" rkkedaprjq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" jionsjpual.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" eatiwrfkqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" jjoponyvmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "zuqxxyjhsr.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" lepuvtxows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "wwpaehwpxu.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" tjlqxgkvpd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "mnmjcsfkif.exe" gcasServ32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" xjnefipiib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" tagaswzgsg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "rffnkqrohd.exe" gcasServ32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "yymjebcszz.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "xjnefipiib.exe" mommyooluq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" rkkedaprjq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" gdkdeieiam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "mraheqzeyi.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "rxoqjvcqet.exe" xybvjdtmdp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" vrihkhxnwj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "jhxwxwhqxx.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "clyxbikxqh.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gvxycrrdmd.exe" wzwgnwjxys.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" jjoponyvmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" gfphpphxby.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "yohwwcfmsw.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" gfphpphxby.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" zuqxxyjhsr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "clyxbikxqh.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "dkuvpfovpc.exe" gcasServ32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" vrihkhxnwj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "rffnkqrohd.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "qdreyyrnpb.exe" mnmjcsfkif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" gicctfahzw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "vrihkhxnwj.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" gicctfahzw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "mommyooluq.exe" dkuvpfovpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "rkkedaprjq.exe" pftzkyqsgz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "weevfmknig.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "tjlqxgkvpd.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "jcjqtbseyp.exe" gcasServ32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" jcjqtbseyp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" tfjzmrgots.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" wkieoemqta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "vrihkhxnwj.exe" gcasServ32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" wkieoemqta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "eatiwrfkqk.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "rvluskgdvm.exe" sihclient.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "gcasServ32.exe" rvluskgdvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "jjlepllvig.exe" onlqrfhsud.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gcasServ32 Microsoft® Fix = "gcasServ32.exe" weevfmknig.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "tfjzmrgots.exe" yohwwcfmsw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "onlqrfhsud.exe" gcasServ32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gcasServ32 Microsoft® Fix = "quyvgflpxr.exe" wwpaehwpxu.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\onlqrfhsud.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\zuqxxyjhsr.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\oumndxevin.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\qdreyyrnpb.exe mnmjcsfkif.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe gicctfahzw.exe File opened for modification C:\WINDOWS\SysWOW64\dkuvpfovpc.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\tagaswzgsg.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe pftzkyqsgz.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe lepuvtxows.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\yymjebcszz.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\jjlepllvig.exe onlqrfhsud.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\wgmomgtodx.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\rffnkqrohd.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\rxoqjvcqet.exe xybvjdtmdp.exe File created C:\WINDOWS\SysWOW64\wkieoemqta.exe jionsjpual.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe mnmjcsfkif.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\clyxbikxqh.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\wzwgnwjxys.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\rvluskgdvm.exe sihclient.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe jionsjpual.exe File opened for modification C:\WINDOWS\SysWOW64\quyvgflpxr.exe wwpaehwpxu.exe File opened for modification C:\WINDOWS\SysWOW64\gfphpphxby.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe oumndxevin.exe File opened for modification C:\WINDOWS\SysWOW64\eatiwrfkqk.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe weevfmknig.exe File opened for modification C:\WINDOWS\SysWOW64\mnmjcsfkif.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe onlqrfhsud.exe File created C:\WINDOWS\SysWOW64\mommyooluq.exe dkuvpfovpc.exe File created C:\WINDOWS\SysWOW64\rvluskgdvm.exe sihclient.exe File opened for modification C:\WINDOWS\SysWOW64\jcjqtbseyp.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe yohwwcfmsw.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\weevfmknig.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe jionsjpual.exe File opened for modification C:\WINDOWS\SysWOW64\jionsjpual.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\lepuvtxows.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe tjlqxgkvpd.exe File opened for modification C:\WINDOWS\SysWOW64\yohwwcfmsw.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\uznbbmjtyv.exe jhxwxwhqxx.exe File opened for modification C:\WINDOWS\SysWOW64\uznbbmjtyv.exe jhxwxwhqxx.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe xjnefipiib.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe tagaswzgsg.exe File created C:\WINDOWS\SysWOW64\wwpaehwpxu.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\jjlepllvig.exe onlqrfhsud.exe File created C:\WINDOWS\SysWOW64\yohwwcfmsw.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe wkieoemqta.exe File opened for modification C:\WINDOWS\SysWOW64\vrihkhxnwj.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe 09ec2458a746ed795c88a62729a3d30e.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\yymjebcszz.exe gcasServ32.exe File opened for modification C:\WINDOWS\SysWOW64\gcasServ32.exe jcjqtbseyp.exe File created C:\WINDOWS\SysWOW64\gcasServ32.exe jhxwxwhqxx.exe File created C:\WINDOWS\SysWOW64\gvxycrrdmd.exe wzwgnwjxys.exe File created C:\WINDOWS\SysWOW64\jjoponyvmp.exe gcasServ32.exe File created C:\WINDOWS\SysWOW64\quyvgflpxr.exe wwpaehwpxu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ xjnefipiib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ jjoponyvmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wwpaehwpxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ rvluskgdvm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ yymjebcszz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gdkdeieiam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tfjzmrgots.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vrihkhxnwj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dkuvpfovpc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ clyxbikxqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ zuqxxyjhsr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ eatiwrfkqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tjlqxgkvpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ uznbbmjtyv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ jcjqtbseyp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sihclient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ rkkedaprjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ onlqrfhsud.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 09ec2458a746ed795c88a62729a3d30e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gicctfahzw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gfphpphxby.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wzwgnwjxys.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ lepuvtxows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ yohwwcfmsw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ jhxwxwhqxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ mraheqzeyi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ jionsjpual.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ weevfmknig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wkieoemqta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ mommyooluq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ mnmjcsfkif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tagaswzgsg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oumndxevin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gvxycrrdmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ pftzkyqsgz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ qdreyyrnpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ xybvjdtmdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ rxoqjvcqet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gcasServ32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 2908 868 09ec2458a746ed795c88a62729a3d30e.exe 92 PID 868 wrote to memory of 2908 868 09ec2458a746ed795c88a62729a3d30e.exe 92 PID 868 wrote to memory of 2908 868 09ec2458a746ed795c88a62729a3d30e.exe 92 PID 2908 wrote to memory of 3336 2908 gcasServ32.exe 131 PID 2908 wrote to memory of 3336 2908 gcasServ32.exe 131 PID 2908 wrote to memory of 3336 2908 gcasServ32.exe 131 PID 3336 wrote to memory of 4108 3336 jhxwxwhqxx.exe 130 PID 3336 wrote to memory of 4108 3336 jhxwxwhqxx.exe 130 PID 3336 wrote to memory of 4108 3336 jhxwxwhqxx.exe 130 PID 4108 wrote to memory of 3964 4108 uznbbmjtyv.exe 155 PID 4108 wrote to memory of 3964 4108 uznbbmjtyv.exe 155 PID 4108 wrote to memory of 3964 4108 uznbbmjtyv.exe 155 PID 3964 wrote to memory of 544 3964 dkuvpfovpc.exe 94 PID 3964 wrote to memory of 544 3964 dkuvpfovpc.exe 94 PID 3964 wrote to memory of 544 3964 dkuvpfovpc.exe 94 PID 3780 wrote to memory of 3484 3780 xjnefipiib.exe 97 PID 3780 wrote to memory of 3484 3780 xjnefipiib.exe 97 PID 3780 wrote to memory of 3484 3780 xjnefipiib.exe 97 PID 3484 wrote to memory of 3616 3484 gcasServ32.exe 128 PID 3484 wrote to memory of 3616 3484 gcasServ32.exe 128 PID 3484 wrote to memory of 3616 3484 gcasServ32.exe 128 PID 3616 wrote to memory of 1636 3616 gfphpphxby.exe 126 PID 3616 wrote to memory of 1636 3616 gfphpphxby.exe 126 PID 3616 wrote to memory of 1636 3616 gfphpphxby.exe 126 PID 1636 wrote to memory of 980 1636 gcasServ32.exe 124 PID 1636 wrote to memory of 980 1636 gcasServ32.exe 124 PID 1636 wrote to memory of 980 1636 gcasServ32.exe 124 PID 980 wrote to memory of 3896 980 clyxbikxqh.exe 122 PID 980 wrote to memory of 3896 980 clyxbikxqh.exe 122 PID 980 wrote to memory of 3896 980 clyxbikxqh.exe 122 PID 3896 wrote to memory of 2140 3896 gcasServ32.exe 119 PID 3896 wrote to memory of 2140 3896 gcasServ32.exe 119 PID 3896 wrote to memory of 2140 3896 gcasServ32.exe 119 PID 2140 wrote to memory of 5004 2140 zuqxxyjhsr.exe 118 PID 2140 wrote to memory of 5004 2140 zuqxxyjhsr.exe 118 PID 2140 wrote to memory of 5004 2140 zuqxxyjhsr.exe 118 PID 5004 wrote to memory of 1584 5004 gcasServ32.exe 98 PID 5004 wrote to memory of 1584 5004 gcasServ32.exe 98 PID 5004 wrote to memory of 1584 5004 gcasServ32.exe 98 PID 1584 wrote to memory of 2212 1584 tagaswzgsg.exe 116 PID 1584 wrote to memory of 2212 1584 tagaswzgsg.exe 116 PID 1584 wrote to memory of 2212 1584 tagaswzgsg.exe 116 PID 2212 wrote to memory of 980 2212 gcasServ32.exe 124 PID 2212 wrote to memory of 980 2212 gcasServ32.exe 124 PID 2212 wrote to memory of 980 2212 gcasServ32.exe 124 PID 980 wrote to memory of 4132 980 clyxbikxqh.exe 99 PID 980 wrote to memory of 4132 980 clyxbikxqh.exe 99 PID 980 wrote to memory of 4132 980 clyxbikxqh.exe 99 PID 4132 wrote to memory of 1560 4132 gcasServ32.exe 111 PID 4132 wrote to memory of 1560 4132 gcasServ32.exe 111 PID 4132 wrote to memory of 1560 4132 gcasServ32.exe 111 PID 1560 wrote to memory of 4084 1560 oumndxevin.exe 110 PID 1560 wrote to memory of 4084 1560 oumndxevin.exe 110 PID 1560 wrote to memory of 4084 1560 oumndxevin.exe 110 PID 4084 wrote to memory of 2132 4084 gcasServ32.exe 100 PID 4084 wrote to memory of 2132 4084 gcasServ32.exe 100 PID 4084 wrote to memory of 2132 4084 gcasServ32.exe 100 PID 2132 wrote to memory of 1632 2132 eatiwrfkqk.exe 101 PID 2132 wrote to memory of 1632 2132 eatiwrfkqk.exe 101 PID 2132 wrote to memory of 1632 2132 eatiwrfkqk.exe 101 PID 1632 wrote to memory of 1616 1632 gcasServ32.exe 102 PID 1632 wrote to memory of 1616 1632 gcasServ32.exe 102 PID 1632 wrote to memory of 1616 1632 gcasServ32.exe 102 PID 1616 wrote to memory of 880 1616 wzwgnwjxys.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\09ec2458a746ed795c88a62729a3d30e.exe"C:\Users\Admin\AppData\Local\Temp\09ec2458a746ed795c88a62729a3d30e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:868 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\USERS\ADMIN\APPDATA\LOCAL\TEMP\09EC2458A746ED795C88A62729A3D30E.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\WINDOWS\SysWOW64\jhxwxwhqxx.exe"C:\WINDOWS\SYSTEM32\jhxwxwhqxx.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3336
-
-
-
C:\WINDOWS\SysWOW64\mommyooluq.exe"C:\WINDOWS\SYSTEM32\mommyooluq.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:544 -
C:\WINDOWS\SysWOW64\xjnefipiib.exe"C:\WINDOWS\SYSTEM32\xjnefipiib.exe" mElTC:\WINDOWS\SYSWOW64\MOMMYOOLUQ.EXE2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\XJNEFIPIIB.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\WINDOWS\SysWOW64\gfphpphxby.exe"C:\WINDOWS\SYSTEM32\gfphpphxby.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3616
-
-
-
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\UZNBBMJTYV.EXE1⤵PID:3964
-
C:\WINDOWS\SysWOW64\tagaswzgsg.exe"C:\WINDOWS\SYSTEM32\tagaswzgsg.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\TAGASWZGSG.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2212
-
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\RFFNKQROHD.EXE1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\WINDOWS\SysWOW64\oumndxevin.exe"C:\WINDOWS\SYSTEM32\oumndxevin.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1560
-
-
C:\WINDOWS\SysWOW64\eatiwrfkqk.exe"C:\WINDOWS\SYSTEM32\eatiwrfkqk.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\EATIWRFKQK.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\WINDOWS\SysWOW64\wzwgnwjxys.exe"C:\WINDOWS\SYSTEM32\wzwgnwjxys.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\WINDOWS\SysWOW64\gvxycrrdmd.exe"C:\WINDOWS\SYSTEM32\gvxycrrdmd.exe" mElTC:\WINDOWS\SYSWOW64\WZWGNWJXYS.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:880 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\GVXYCRRDMD.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3136
-
-
-
-
-
C:\WINDOWS\SysWOW64\yymjebcszz.exe"C:\WINDOWS\SYSTEM32\yymjebcszz.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4420 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\YYMJEBCSZZ.EXE2⤵PID:100
-
-
C:\WINDOWS\SysWOW64\rvluskgdvm.exe"C:\WINDOWS\SYSTEM32\rvluskgdvm.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2408 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\RVLUSKGDVM.EXE2⤵PID:3016
-
C:\WINDOWS\SysWOW64\jjlepllvig.exe"C:\WINDOWS\SYSTEM32\jjlepllvig.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE3⤵PID:4524
-
C:\WINDOWS\SysWOW64\rkkedaprjq.exe"C:\WINDOWS\SYSTEM32\rkkedaprjq.exe" mElTC:\WINDOWS\SYSWOW64\JJLEPLLVIG.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:1892 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\RKKEDAPRJQ.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:884 -
C:\WINDOWS\SysWOW64\lepuvtxows.exe"C:\WINDOWS\SYSTEM32\lepuvtxows.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3500 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\LEPUVTXOWS.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5100 -
C:\WINDOWS\SysWOW64\jjoponyvmp.exe"C:\WINDOWS\SYSTEM32\jjoponyvmp.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4428 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\JJOPONYVMP.EXE9⤵PID:4524
-
C:\WINDOWS\SysWOW64\gdkdeieiam.exe"C:\WINDOWS\SYSTEM32\gdkdeieiam.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:1932 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\GDKDEIEIAM.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3400 -
C:\WINDOWS\SysWOW64\weevfmknig.exe"C:\WINDOWS\SYSTEM32\weevfmknig.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3380 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\WEEVFMKNIG.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:1220 -
C:\WINDOWS\SysWOW64\tjlqxgkvpd.exe"C:\WINDOWS\SYSTEM32\tjlqxgkvpd.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4592 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\TJLQXGKVPD.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:676 -
C:\WINDOWS\SysWOW64\jcjqtbseyp.exe"C:\WINDOWS\SYSTEM32\jcjqtbseyp.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:1996 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\JCJQTBSEYP.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3024 -
C:\WINDOWS\SysWOW64\yohwwcfmsw.exe"C:\WINDOWS\SYSTEM32\yohwwcfmsw.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2704 -
C:\WINDOWS\SysWOW64\tfjzmrgots.exe"C:\WINDOWS\SYSTEM32\tfjzmrgots.exe" mElTC:\WINDOWS\SYSWOW64\YOHWWCFMSW.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4556 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\TFJZMRGOTS.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4648 -
C:\WINDOWS\SysWOW64\mnmjcsfkif.exe"C:\WINDOWS\SYSTEM32\mnmjcsfkif.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:636 -
C:\WINDOWS\SysWOW64\qdreyyrnpb.exe"C:\WINDOWS\SYSTEM32\qdreyyrnpb.exe" mElTC:\WINDOWS\SYSWOW64\MNMJCSFKIF.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:3788 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\QDREYYRNPB.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4148 -
C:\WINDOWS\SysWOW64\mraheqzeyi.exe"C:\WINDOWS\SYSTEM32\mraheqzeyi.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2436 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\MRAHEQZEYI.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2396 -
C:\WINDOWS\SysWOW64\gicctfahzw.exe"C:\WINDOWS\SYSTEM32\gicctfahzw.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5096 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\GICCTFAHZW.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4368 -
C:\WINDOWS\SysWOW64\onlqrfhsud.exe"C:\WINDOWS\SYSTEM32\onlqrfhsud.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3016 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\ONLQRFHSUD.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4412 -
C:\WINDOWS\SysWOW64\dkuvpfovpc.exe"C:\WINDOWS\SYSTEM32\dkuvpfovpc.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\DKUVPFOVPC.EXE31⤵PID:3880
-
C:\WINDOWS\SysWOW64\wgmomgtodx.exe"C:\WINDOWS\SYSTEM32\wgmomgtodx.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE32⤵PID:1100
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\WGMOMGTODX.EXE33⤵PID:4908
-
C:\WINDOWS\SysWOW64\rxoqjvcqet.exe"C:\WINDOWS\SYSTEM32\rxoqjvcqet.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3300 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\RXOQJVCQET.EXE35⤵PID:4608
-
C:\WINDOWS\SysWOW64\wkieoemqta.exe"C:\WINDOWS\SYSTEM32\wkieoemqta.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:208 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\WKIEOEMQTA.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3464 -
C:\WINDOWS\SysWOW64\vrihkhxnwj.exe"C:\WINDOWS\SYSTEM32\vrihkhxnwj.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:3140 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\VRIHKHXNWJ.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5008 -
C:\WINDOWS\SysWOW64\jionsjpual.exe"C:\WINDOWS\SYSTEM32\jionsjpual.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4608 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\JIONSJPUAL.EXE41⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3960 -
C:\WINDOWS\SysWOW64\wwpaehwpxu.exe"C:\WINDOWS\SYSTEM32\wwpaehwpxu.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE42⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:1200 -
C:\WINDOWS\SysWOW64\quyvgflpxr.exe"C:\WINDOWS\SYSTEM32\quyvgflpxr.exe" mElTC:\WINDOWS\SYSWOW64\WWPAEHWPXU.EXE43⤵PID:1944
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\QUYVGFLPXR.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3880 -
C:\WINDOWS\SysWOW64\qvjgyzypaz.exe"C:\WINDOWS\SYSTEM32\qvjgyzypaz.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE45⤵PID:4004
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\QVJGYZYPAZ.EXE46⤵PID:100
-
C:\WINDOWS\SysWOW64\whmzwqfgke.exe"C:\WINDOWS\SYSTEM32\whmzwqfgke.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE47⤵PID:3324
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\WHMZWQFGKE.EXE48⤵PID:4436
-
C:\WINDOWS\SysWOW64\otcpkhnnzy.exe"C:\WINDOWS\SYSTEM32\otcpkhnnzy.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE49⤵PID:3668
-
C:\WINDOWS\SysWOW64\izqazzwjts.exe"C:\WINDOWS\SYSTEM32\izqazzwjts.exe" mElTC:\WINDOWS\SYSWOW64\OTCPKHNNZY.EXE50⤵PID:4672
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\IZQAZZWJTS.EXE51⤵PID:512
-
C:\WINDOWS\SysWOW64\ihqdwcpowb.exe"C:\WINDOWS\SYSTEM32\ihqdwcpowb.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE52⤵PID:1720
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\IHQDWCPOWB.EXE53⤵PID:2212
-
C:\WINDOWS\SysWOW64\vxwjeezvad.exe"C:\WINDOWS\SYSTEM32\vxwjeezvad.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE54⤵PID:4728
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\VXWJEEZVAD.EXE55⤵PID:2016
-
C:\WINDOWS\SysWOW64\nmxrfamwxi.exe"C:\WINDOWS\SYSTEM32\nmxrfamwxi.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE56⤵PID:4564
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\NMXRFAMWXI.EXE57⤵PID:1944
-
C:\WINDOWS\SysWOW64\tdefzvaiab.exe"C:\WINDOWS\SYSTEM32\tdefzvaiab.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE58⤵PID:1148
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\TDEFZVAIAB.EXE59⤵PID:3780
-
C:\WINDOWS\SysWOW64\ahyiwasowi.exe"C:\WINDOWS\SYSTEM32\ahyiwasowi.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE60⤵PID:2844
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\AHYIWASOWI.EXE61⤵PID:3768
-
C:\WINDOWS\SysWOW64\qtggwiiffd.exe"C:\WINDOWS\SYSTEM32\qtggwiiffd.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE62⤵PID:4356
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\QTGGWIIFFD.EXE63⤵PID:3816
-
C:\WINDOWS\SysWOW64\atvggbufjs.exe"C:\WINDOWS\SYSTEM32\atvggbufjs.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE64⤵PID:2452
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\ATVGGBUFJS.EXE65⤵PID:664
-
C:\WINDOWS\SysWOW64\pftzkyqsgz.exe"C:\WINDOWS\SYSTEM32\pftzkyqsgz.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE66⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4524 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\PFTZKYQSGZ.EXE67⤵PID:4488
-
C:\WINDOWS\SysWOW64\liiahztyrf.exe"C:\WINDOWS\SYSTEM32\liiahztyrf.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE68⤵PID:3952
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\LIIAHZTYRF.EXE69⤵PID:2668
-
C:\WINDOWS\SysWOW64\igqgmfeemw.exe"C:\WINDOWS\SYSTEM32\igqgmfeemw.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE70⤵PID:1868
-
C:\WINDOWS\SysWOW64\fsmbkikjtt.exe"C:\WINDOWS\SYSTEM32\fsmbkikjtt.exe" mElTC:\WINDOWS\SYSWOW64\IGQGMFEEMW.EXE71⤵PID:2212
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\FSMBKIKJTT.EXE72⤵PID:5116
-
C:\WINDOWS\SysWOW64\nhigifrtvt.exe"C:\WINDOWS\SYSTEM32\nhigifrtvt.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE73⤵PID:4068
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\NHIGIFRTVT.EXE74⤵PID:4004
-
C:\WINDOWS\SysWOW64\pgybzjkfda.exe"C:\WINDOWS\SYSTEM32\pgybzjkfda.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE75⤵PID:4400
-
C:\WINDOWS\SysWOW64\npibnikpxk.exe"C:\WINDOWS\SYSTEM32\npibnikpxk.exe" mElTC:\WINDOWS\SYSWOW64\PGYBZJKFDA.EXE76⤵PID:4780
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\NPIBNIKPXK.EXE77⤵PID:4672
-
C:\WINDOWS\SysWOW64\pkvxfpuzob.exe"C:\WINDOWS\SYSTEM32\pkvxfpuzob.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE78⤵PID:4040
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\PKVXFPUZOB.EXE79⤵PID:516
-
C:\WINDOWS\SysWOW64\cbsxbkopxx.exe"C:\WINDOWS\SYSTEM32\cbsxbkopxx.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE80⤵PID:3868
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\CBSXBKOPXX.EXE81⤵PID:4940
-
C:\WINDOWS\SysWOW64\cfonviarnb.exe"C:\WINDOWS\SYSTEM32\cfonviarnb.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE82⤵PID:1968
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\CFONVIARNB.EXE83⤵PID:4992
-
C:\WINDOWS\SysWOW64\ftrwqxixjw.exe"C:\WINDOWS\SYSTEM32\ftrwqxixjw.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE84⤵PID:2652
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\FTRWQXIXJW.EXE85⤵PID:4996
-
C:\WINDOWS\SysWOW64\ucmbdbtumo.exe"C:\WINDOWS\SYSTEM32\ucmbdbtumo.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE86⤵PID:4320
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\UCMBDBTUMO.EXE87⤵PID:5116
-
C:\WINDOWS\SysWOW64\ksjnjnkrjx.exe"C:\WINDOWS\SYSTEM32\ksjnjnkrjx.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE88⤵PID:1584
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\KSJNJNKRJX.EXE89⤵PID:2444
-
C:\WINDOWS\SysWOW64\xybvjdtmdp.exe"C:\WINDOWS\SYSTEM32\xybvjdtmdp.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE90⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4908 -
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\XYBVJDTMDP.EXE91⤵PID:2776
-
C:\WINDOWS\SysWOW64\ukxizgzzrn.exe"C:\WINDOWS\SYSTEM32\ukxizgzzrn.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE92⤵PID:5040
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\UKXIZGZZRN.EXE93⤵PID:2952
-
C:\WINDOWS\SysWOW64\ssiqueyjtx.exe"C:\WINDOWS\SYSTEM32\ssiqueyjtx.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE94⤵PID:4968
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\SSIQUEYJTX.EXE95⤵PID:3896
-
C:\WINDOWS\SysWOW64\xczqwjkgvj.exe"C:\WINDOWS\SYSTEM32\xczqwjkgvj.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE96⤵PID:4084
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\XCZQWJKGVJ.EXE97⤵PID:920
-
C:\WINDOWS\SysWOW64\uovwgyacqs.exe"C:\WINDOWS\SYSTEM32\uovwgyacqs.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE98⤵PID:4068
-
C:\WINDOWS\SysWOW64\xjyttmudyz.exe"C:\WINDOWS\SYSTEM32\xjyttmudyz.exe" mElTC:\WINDOWS\SYSWOW64\UOVWGYACQS.EXE99⤵PID:664
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\XJYTTMUDYZ.EXE100⤵PID:4968
-
C:\WINDOWS\SysWOW64\zbzwxhibzx.exe"C:\WINDOWS\SYSTEM32\zbzwxhibzx.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE101⤵PID:4692
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\ZBZWXHIBZX.EXE102⤵PID:2352
-
C:\WINDOWS\SysWOW64\fzgcqdondq.exe"C:\WINDOWS\SYSTEM32\fzgcqdondq.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE103⤵PID:4952
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\FZGCQDONDQ.EXE104⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:1100 -
C:\WINDOWS\SysWOW64\hywktpfzyv.exe"C:\WINDOWS\SYSTEM32\hywktpfzyv.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE105⤵PID:2952
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\HYWKTPFZYV.EXE106⤵PID:372
-
C:\WINDOWS\SysWOW64\cxnlobwebz.exe"C:\WINDOWS\SYSTEM32\cxnlobwebz.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE107⤵PID:3896
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\CXNLOBWEBZ.EXE108⤵PID:3264
-
C:\WINDOWS\SysWOW64\rrtedjfdqw.exe"C:\WINDOWS\SYSTEM32\rrtedjfdqw.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE109⤵PID:4116
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\RRTEDJFDQW.EXE110⤵PID:3816
-
C:\WINDOWS\SysWOW64\hzqpjnwavn.exe"C:\WINDOWS\SYSTEM32\hzqpjnwavn.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE111⤵PID:3932
-
C:\WINDOWS\SysWOW64\wwzuhnddqu.exe"C:\WINDOWS\SYSTEM32\wwzuhnddqu.exe" mElTC:\WINDOWS\SYSWOW64\HZQPJNWAVN.EXE112⤵PID:2200
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\WWZUHNDDQU.EXE113⤵PID:2844
-
C:\WINDOWS\SysWOW64\jzinktunzb.exe"C:\WINDOWS\SYSTEM32\jzinktunzb.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE114⤵PID:4500
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\JZINKTUNZB.EXE115⤵PID:1512
-
C:\WINDOWS\SysWOW64\rggybqhodi.exe"C:\WINDOWS\SYSTEM32\rggybqhodi.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE116⤵PID:896
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\RGGYBQHODI.EXE117⤵PID:1164
-
C:\WINDOWS\SysWOW64\urhtzgwvla.exe"C:\WINDOWS\SYSTEM32\urhtzgwvla.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE118⤵PID:3016
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\URHTZGWVLA.EXE119⤵PID:2392
-
C:\WINDOWS\SysWOW64\uohkwwcscd.exe"C:\WINDOWS\SYSTEM32\uohkwwcscd.exe" mElTC:\WINDOWS\SYSWOW64\GCASSERV32.EXE120⤵PID:2800
-
C:\WINDOWS\SysWOW64\klqxuwjdxc.exe"C:\WINDOWS\SYSTEM32\klqxuwjdxc.exe" mElTC:\WINDOWS\SYSWOW64\UOHKWWCSCD.EXE121⤵PID:2776
-
C:\WINDOWS\SysWOW64\gcasServ32.exe"C:\WINDOWS\SYSTEM32\gcasServ32.exe" mElTC:\WINDOWS\SYSWOW64\KLQXUWJDXC.EXE122⤵PID:376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-