Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe
Resource
win10v2004-20240508-en
General
-
Target
557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe
-
Size
163KB
-
MD5
aa9e324fddce197033facf5659def570
-
SHA1
1bdc91c0a147f2dbb614a9b80c2c7489c44c9fc7
-
SHA256
557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15
-
SHA512
56f4207916caea8e3ccf5beeb7a4b2d7166e8f566bb918fe91622a8e9f054bfd4b4dadc479be28ea7ef29a09bdece83c2d5e640b5c6088de59913d5db5370833
-
SSDEEP
1536:PIqyHdQ7uEk9COgwh+3ZjlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:f8jEk9CfwYJjltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Adeplhib.exeDqelenlc.exeDcknbh32.exeGhmiam32.exeClcflkic.exeDngoibmo.exeDfijnd32.exeEcpgmhai.exeFeeiob32.exePpmdbe32.exeDqjepm32.exeEmhlfmgj.exeEiaiqn32.exeGhhofmql.exeGkkemh32.exePhjelg32.exeChcqpmep.exeDjnpnc32.exeDqlafm32.exeEnihne32.exeFehjeo32.exeQaefjm32.exeAilkjmpo.exeDjbiicon.exeEmeopn32.exeEbbgid32.exeFnpnndgp.exeGpmjak32.exeInljnfkg.exePnbacbac.exeAfiecb32.exeAiinen32.exeBpafkknm.exeCjndop32.exeDdokpmfo.exeHgdbhi32.exeBkaqmeah.exeChhjkl32.exeEkklaj32.exeFfnphf32.exeGaqcoc32.exeGhoegl32.exeHggomh32.exeAdhlaggp.exeApcfahio.exeBgknheej.exeFjdbnf32.exeFjlhneio.exeGeolea32.exeGdamqndn.exeHiekid32.exeHenidd32.exeHkkalk32.exePchpbded.exeFpfdalii.exeHlfdkoin.exeBhcdaibd.exeCcdlbf32.exeComimg32.exeEcmkghcl.exeGegfdb32.exeIhoafpmp.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adeplhib.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqelenlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcknbh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghmiam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clcflkic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dngoibmo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfijnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecpgmhai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feeiob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppmdbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dqjepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emhlfmgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eiaiqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghhofmql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkkemh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phjelg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chcqpmep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djnpnc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqlafm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enihne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fehjeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qaefjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ailkjmpo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djbiicon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emeopn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebbgid32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnpnndgp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpmjak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inljnfkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnbacbac.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afiecb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aiinen32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpafkknm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjndop32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddokpmfo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghhofmql.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgdbhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aiinen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkaqmeah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chhjkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekklaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffnphf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gaqcoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghoegl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hggomh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adhlaggp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apcfahio.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgknheej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjdbnf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjlhneio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Geolea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdamqndn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hiekid32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Henidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkkalk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pchpbded.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpfdalii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlfdkoin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhcdaibd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccdlbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Comimg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecmkghcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gegfdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihoafpmp.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Pphjgfqq.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pmlkpjpj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pbiciana.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pfdpip32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pmnhfjmg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ppmdbe32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pchpbded.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pbkpna32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pmqdkj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Plcdgfbo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pelipl32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Phjelg32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pndniaop.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qjknnbed.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qeqbkkej.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Adeplhib.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ajbdna32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Afiecb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aiinen32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Apcfahio.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bebkpn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bhcdaibd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bkaqmeah.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Beehencq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Begeknan.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bkdmcdoe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bpafkknm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bhhnli32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bpcbqk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cjlgiqbk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ccdlbf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cjndop32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cllpkl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cgbdhd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chcqpmep.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Comimg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cciemedf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cbkeib32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cbnbobin.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cobbhfhg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgmglh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dhjgal32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dngoibmo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Djnpnc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dqhhknjp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Djpmccqq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dnneja32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Doobajme.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgfjbgmh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eihfjo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Epaogi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ejgcdb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eijcpoac.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ekholjqg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ebedndfa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Epieghdk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ebgacddo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eeempocb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Egdilkbf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ennaieib.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fhffaj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fmcoja32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fejgko32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fjgoce32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Pphjgfqq.exe UPX \Windows\SysWOW64\Pmlkpjpj.exe UPX C:\Windows\SysWOW64\Pbiciana.exe UPX \Windows\SysWOW64\Pfdpip32.exe UPX \Windows\SysWOW64\Pmnhfjmg.exe UPX C:\Windows\SysWOW64\Ppmdbe32.exe UPX C:\Windows\SysWOW64\Pchpbded.exe UPX \Windows\SysWOW64\Pbkpna32.exe UPX \Windows\SysWOW64\Pmqdkj32.exe UPX C:\Windows\SysWOW64\Plcdgfbo.exe UPX C:\Windows\SysWOW64\Pelipl32.exe UPX \Windows\SysWOW64\Phjelg32.exe UPX \Windows\SysWOW64\Pndniaop.exe UPX C:\Windows\SysWOW64\Qjknnbed.exe UPX C:\Windows\SysWOW64\Qeqbkkej.exe UPX C:\Windows\SysWOW64\Adeplhib.exe UPX C:\Windows\SysWOW64\Ajbdna32.exe UPX C:\Windows\SysWOW64\Afiecb32.exe UPX C:\Windows\SysWOW64\Aiinen32.exe UPX C:\Windows\SysWOW64\Apcfahio.exe UPX C:\Windows\SysWOW64\Bebkpn32.exe UPX C:\Windows\SysWOW64\Bhcdaibd.exe UPX C:\Windows\SysWOW64\Bkaqmeah.exe UPX C:\Windows\SysWOW64\Beehencq.exe UPX C:\Windows\SysWOW64\Begeknan.exe UPX C:\Windows\SysWOW64\Bkdmcdoe.exe UPX C:\Windows\SysWOW64\Bpafkknm.exe UPX C:\Windows\SysWOW64\Bhhnli32.exe UPX C:\Windows\SysWOW64\Bpcbqk32.exe UPX C:\Windows\SysWOW64\Cjlgiqbk.exe UPX C:\Windows\SysWOW64\Ccdlbf32.exe UPX C:\Windows\SysWOW64\Cjndop32.exe UPX C:\Windows\SysWOW64\Cllpkl32.exe UPX C:\Windows\SysWOW64\Cgbdhd32.exe UPX C:\Windows\SysWOW64\Chcqpmep.exe UPX C:\Windows\SysWOW64\Comimg32.exe UPX C:\Windows\SysWOW64\Cciemedf.exe UPX C:\Windows\SysWOW64\Cbkeib32.exe UPX C:\Windows\SysWOW64\Cbnbobin.exe UPX C:\Windows\SysWOW64\Cobbhfhg.exe UPX C:\Windows\SysWOW64\Dgmglh32.exe UPX C:\Windows\SysWOW64\Dhjgal32.exe UPX C:\Windows\SysWOW64\Dngoibmo.exe UPX C:\Windows\SysWOW64\Djnpnc32.exe UPX C:\Windows\SysWOW64\Dqhhknjp.exe UPX C:\Windows\SysWOW64\Djpmccqq.exe UPX C:\Windows\SysWOW64\Dnneja32.exe UPX C:\Windows\SysWOW64\Doobajme.exe UPX C:\Windows\SysWOW64\Dgfjbgmh.exe UPX C:\Windows\SysWOW64\Eihfjo32.exe UPX C:\Windows\SysWOW64\Epaogi32.exe UPX C:\Windows\SysWOW64\Ejgcdb32.exe UPX C:\Windows\SysWOW64\Eijcpoac.exe UPX C:\Windows\SysWOW64\Ekholjqg.exe UPX C:\Windows\SysWOW64\Ebedndfa.exe UPX C:\Windows\SysWOW64\Epieghdk.exe UPX C:\Windows\SysWOW64\Ebgacddo.exe UPX C:\Windows\SysWOW64\Eeempocb.exe UPX C:\Windows\SysWOW64\Egdilkbf.exe UPX C:\Windows\SysWOW64\Ennaieib.exe UPX C:\Windows\SysWOW64\Fhffaj32.exe UPX C:\Windows\SysWOW64\Fmcoja32.exe UPX C:\Windows\SysWOW64\Fejgko32.exe UPX C:\Windows\SysWOW64\Fjgoce32.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Pphjgfqq.exePmlkpjpj.exePbiciana.exePfdpip32.exePmnhfjmg.exePpmdbe32.exePchpbded.exePbkpna32.exePmqdkj32.exePlcdgfbo.exePnbacbac.exePelipl32.exePhjelg32.exePndniaop.exePenfelgm.exeQhmbagfa.exeQjknnbed.exeQnfjna32.exeQaefjm32.exeQeqbkkej.exeQhooggdn.exeQljkhe32.exeQnigda32.exeAdeplhib.exeAfdlhchf.exeAnkdiqih.exeAdhlaggp.exeAjbdna32.exeAiedjneg.exeApomfh32.exeAbmibdlh.exeAfiecb32.exeAlenki32.exeAdmemg32.exeAfkbib32.exeAiinen32.exeApcfahio.exeAoffmd32.exeAfmonbqk.exeAilkjmpo.exeBoiccdnf.exeBbdocc32.exeBebkpn32.exeBingpmnl.exeBlmdlhmp.exeBbflib32.exeBeehencq.exeBhcdaibd.exeBkaqmeah.exeBommnc32.exeBegeknan.exeBhfagipa.exeBkdmcdoe.exeBnbjopoi.exeBpafkknm.exeBhhnli32.exeBgknheej.exeBjijdadm.exeBnefdp32.exeBpcbqk32.exeBdooajdc.exeCgmkmecg.exeCkignd32.exeCjlgiqbk.exepid process 3044 Pphjgfqq.exe 2732 Pmlkpjpj.exe 2576 Pbiciana.exe 2652 Pfdpip32.exe 2504 Pmnhfjmg.exe 2352 Ppmdbe32.exe 2980 Pchpbded.exe 2668 Pbkpna32.exe 2816 Pmqdkj32.exe 108 Plcdgfbo.exe 1880 Pnbacbac.exe 2512 Pelipl32.exe 2860 Phjelg32.exe 1972 Pndniaop.exe 2276 Penfelgm.exe 2288 Qhmbagfa.exe 608 Qjknnbed.exe 1328 Qnfjna32.exe 1020 Qaefjm32.exe 2420 Qeqbkkej.exe 848 Qhooggdn.exe 1232 Qljkhe32.exe 1760 Qnigda32.exe 3048 Adeplhib.exe 2012 Afdlhchf.exe 1540 Ankdiqih.exe 2580 Adhlaggp.exe 2604 Ajbdna32.exe 2780 Aiedjneg.exe 2448 Apomfh32.exe 2624 Abmibdlh.exe 2540 Afiecb32.exe 2820 Alenki32.exe 284 Admemg32.exe 2628 Afkbib32.exe 1364 Aiinen32.exe 2804 Apcfahio.exe 1524 Aoffmd32.exe 320 Afmonbqk.exe 1284 Ailkjmpo.exe 656 Boiccdnf.exe 1156 Bbdocc32.exe 3036 Bebkpn32.exe 1636 Bingpmnl.exe 972 Blmdlhmp.exe 916 Bbflib32.exe 1120 Beehencq.exe 2348 Bhcdaibd.exe 2944 Bkaqmeah.exe 2064 Bommnc32.exe 2896 Begeknan.exe 1048 Bhfagipa.exe 1252 Bkdmcdoe.exe 2584 Bnbjopoi.exe 2964 Bpafkknm.exe 712 Bhhnli32.exe 2588 Bgknheej.exe 1652 Bjijdadm.exe 1528 Bnefdp32.exe 824 Bpcbqk32.exe 2312 Bdooajdc.exe 2776 Cgmkmecg.exe 3004 Ckignd32.exe 2244 Cjlgiqbk.exe -
Loads dropped DLL 64 IoCs
Processes:
557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exePphjgfqq.exePmlkpjpj.exePbiciana.exePfdpip32.exePmnhfjmg.exePpmdbe32.exePchpbded.exePbkpna32.exePmqdkj32.exePlcdgfbo.exePnbacbac.exePelipl32.exePhjelg32.exePndniaop.exePenfelgm.exeQhmbagfa.exeQjknnbed.exeQnfjna32.exeQaefjm32.exeQeqbkkej.exeQhooggdn.exeQljkhe32.exeQnigda32.exeAdeplhib.exeAfdlhchf.exeAnkdiqih.exeAdhlaggp.exeAjbdna32.exeAiedjneg.exeApomfh32.exeAbmibdlh.exepid process 2388 557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe 2388 557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe 3044 Pphjgfqq.exe 3044 Pphjgfqq.exe 2732 Pmlkpjpj.exe 2732 Pmlkpjpj.exe 2576 Pbiciana.exe 2576 Pbiciana.exe 2652 Pfdpip32.exe 2652 Pfdpip32.exe 2504 Pmnhfjmg.exe 2504 Pmnhfjmg.exe 2352 Ppmdbe32.exe 2352 Ppmdbe32.exe 2980 Pchpbded.exe 2980 Pchpbded.exe 2668 Pbkpna32.exe 2668 Pbkpna32.exe 2816 Pmqdkj32.exe 2816 Pmqdkj32.exe 108 Plcdgfbo.exe 108 Plcdgfbo.exe 1880 Pnbacbac.exe 1880 Pnbacbac.exe 2512 Pelipl32.exe 2512 Pelipl32.exe 2860 Phjelg32.exe 2860 Phjelg32.exe 1972 Pndniaop.exe 1972 Pndniaop.exe 2276 Penfelgm.exe 2276 Penfelgm.exe 2288 Qhmbagfa.exe 2288 Qhmbagfa.exe 608 Qjknnbed.exe 608 Qjknnbed.exe 1328 Qnfjna32.exe 1328 Qnfjna32.exe 1020 Qaefjm32.exe 1020 Qaefjm32.exe 2420 Qeqbkkej.exe 2420 Qeqbkkej.exe 848 Qhooggdn.exe 848 Qhooggdn.exe 1232 Qljkhe32.exe 1232 Qljkhe32.exe 1760 Qnigda32.exe 1760 Qnigda32.exe 3048 Adeplhib.exe 3048 Adeplhib.exe 2012 Afdlhchf.exe 2012 Afdlhchf.exe 1540 Ankdiqih.exe 1540 Ankdiqih.exe 2580 Adhlaggp.exe 2580 Adhlaggp.exe 2604 Ajbdna32.exe 2604 Ajbdna32.exe 2780 Aiedjneg.exe 2780 Aiedjneg.exe 2448 Apomfh32.exe 2448 Apomfh32.exe 2624 Abmibdlh.exe 2624 Abmibdlh.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ppmdbe32.exeAoffmd32.exeDqlafm32.exeGdamqndn.exeApcfahio.exeDodonf32.exeFnpnndgp.exeEnihne32.exeFmcoja32.exeGbijhg32.exeFiaeoang.exeDfgmhd32.exeEbedndfa.exeGejcjbah.exePlcdgfbo.exeQeqbkkej.exeDhjgal32.exeDjpmccqq.exeDbehoa32.exeEflgccbp.exeFaagpp32.exeHicodd32.exeQjknnbed.exeEmeopn32.exePenfelgm.exeFjilieka.exeGldkfl32.exeFehjeo32.exeGangic32.exeGelppaof.exeFphafl32.exeDgodbh32.exeAlenki32.exeEbpkce32.exeEkklaj32.exeAdmemg32.exeApomfh32.exeFmjejphb.exeEeqdep32.exeHpapln32.exeIaeiieeb.exeQnfjna32.exeQnigda32.exeCgpgce32.exeCbkeib32.exeGpmjak32.exeHdhbam32.exeDjefobmk.exeEfncicpm.exeEnkece32.exeGhmiam32.exeAilkjmpo.exeCobbhfhg.exeCcdlbf32.exeQhooggdn.exeFacdeo32.exeHiekid32.exeCllpkl32.exeFhhcgj32.exedescription ioc process File created C:\Windows\SysWOW64\Ajenen32.dll Ppmdbe32.exe File created C:\Windows\SysWOW64\Afmonbqk.exe Aoffmd32.exe File opened for modification C:\Windows\SysWOW64\Jfpjfeia.dll Dqlafm32.exe File opened for modification C:\Windows\SysWOW64\Ghmiam32.exe Gdamqndn.exe File created C:\Windows\SysWOW64\Aoffmd32.exe Apcfahio.exe File created C:\Windows\SysWOW64\Dngoibmo.exe Dodonf32.exe File created C:\Windows\SysWOW64\Lghegkoc.dll Fnpnndgp.exe File created C:\Windows\SysWOW64\Enihne32.exe Enihne32.exe File created C:\Windows\SysWOW64\Faokjpfd.exe Fmcoja32.exe File opened for modification C:\Windows\SysWOW64\Lnnhje32.dll Gbijhg32.exe File opened for modification C:\Windows\SysWOW64\Fmlapp32.exe Fiaeoang.exe File created C:\Windows\SysWOW64\Djbiicon.exe Dfgmhd32.exe File opened for modification C:\Windows\SysWOW64\Eecqjpee.exe Ebedndfa.exe File created C:\Windows\SysWOW64\Lkoabpeg.dll Gejcjbah.exe File opened for modification C:\Windows\SysWOW64\Pnbacbac.exe Plcdgfbo.exe File created C:\Windows\SysWOW64\Qhooggdn.exe Qeqbkkej.exe File opened for modification C:\Windows\SysWOW64\Dgmglh32.exe Dhjgal32.exe File opened for modification C:\Windows\SysWOW64\Dmoipopd.exe Djpmccqq.exe File opened for modification C:\Windows\SysWOW64\Dqhhknjp.exe Dbehoa32.exe File created C:\Windows\SysWOW64\Njqaac32.dll Eflgccbp.exe File created C:\Windows\SysWOW64\Bccnbmal.dll Faagpp32.exe File created C:\Windows\SysWOW64\Odpegjpg.dll Hicodd32.exe File created C:\Windows\SysWOW64\Qnfjna32.exe Qjknnbed.exe File opened for modification C:\Windows\SysWOW64\Ekholjqg.exe Emeopn32.exe File created C:\Windows\SysWOW64\Cqmnhocj.dll Fmcoja32.exe File created C:\Windows\SysWOW64\Kodppf32.dll Penfelgm.exe File created C:\Windows\SysWOW64\Filldb32.exe Fjilieka.exe File opened for modification C:\Windows\SysWOW64\Gkgkbipp.exe Gldkfl32.exe File opened for modification C:\Windows\SysWOW64\Fckjalhj.exe Fehjeo32.exe File created C:\Windows\SysWOW64\Gejcjbah.exe Gangic32.exe File opened for modification C:\Windows\SysWOW64\Gdopkn32.exe Gelppaof.exe File opened for modification C:\Windows\SysWOW64\Fddmgjpo.exe Fphafl32.exe File opened for modification C:\Windows\SysWOW64\Djnpnc32.exe Dgodbh32.exe File created C:\Windows\SysWOW64\Jolfcj32.dll Alenki32.exe File created C:\Windows\SysWOW64\Odbhmo32.dll Ebpkce32.exe File created C:\Windows\SysWOW64\Enihne32.exe Ekklaj32.exe File opened for modification C:\Windows\SysWOW64\Afkbib32.exe Admemg32.exe File opened for modification C:\Windows\SysWOW64\Afmonbqk.exe Aoffmd32.exe File opened for modification C:\Windows\SysWOW64\Abmibdlh.exe Apomfh32.exe File created C:\Windows\SysWOW64\Flmefm32.exe Fmjejphb.exe File created C:\Windows\SysWOW64\Gdopkn32.exe Gelppaof.exe File opened for modification C:\Windows\SysWOW64\Eilpeooq.exe Eeqdep32.exe File created C:\Windows\SysWOW64\Hodpgjha.exe Hpapln32.exe File opened for modification C:\Windows\SysWOW64\Ieqeidnl.exe Iaeiieeb.exe File created C:\Windows\SysWOW64\Qaefjm32.exe Qnfjna32.exe File created C:\Windows\SysWOW64\Adeplhib.exe Qnigda32.exe File created C:\Windows\SysWOW64\Cjndop32.exe Cgpgce32.exe File opened for modification C:\Windows\SysWOW64\Cjbmjplb.exe Cbkeib32.exe File opened for modification C:\Windows\SysWOW64\Gopkmhjk.exe Gpmjak32.exe File opened for modification C:\Windows\SysWOW64\Hckcmjep.exe Hdhbam32.exe File created C:\Windows\SysWOW64\Fclomp32.dll Djefobmk.exe File created C:\Windows\SysWOW64\Ndkakief.dll Efncicpm.exe File created C:\Windows\SysWOW64\Ebgacddo.exe Enkece32.exe File opened for modification C:\Windows\SysWOW64\Gkkemh32.exe Ghmiam32.exe File opened for modification C:\Windows\SysWOW64\Boiccdnf.exe Ailkjmpo.exe File created C:\Windows\SysWOW64\Cndbcc32.exe Cobbhfhg.exe File created C:\Windows\SysWOW64\Lbjhdo32.dll Qnfjna32.exe File created C:\Windows\SysWOW64\Gclcefmh.dll Ccdlbf32.exe File created C:\Windows\SysWOW64\Cibcni32.dll Qhooggdn.exe File opened for modification C:\Windows\SysWOW64\Enihne32.exe Ekklaj32.exe File opened for modification C:\Windows\SysWOW64\Fpfdalii.exe Facdeo32.exe File created C:\Windows\SysWOW64\Hnagjbdf.exe Hiekid32.exe File created C:\Windows\SysWOW64\Coklgg32.exe Cllpkl32.exe File opened for modification C:\Windows\SysWOW64\Fjgoce32.exe Fhhcgj32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3744 3576 WerFault.exe Iagfoe32.exe -
Modifies registry class 64 IoCs
Processes:
Dngoibmo.exeEmhlfmgj.exeFphafl32.exeGhhofmql.exeIoijbj32.exeClomqk32.exeFmjejphb.exe557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exeDkmmhf32.exeDqlafm32.exeHpkjko32.exeAfdlhchf.exeCgmkmecg.exeDdeaalpg.exeCljcelan.exeFiaeoang.exeCbkeib32.exeDgodbh32.exeFjlhneio.exeHjjddchg.exeCfinoq32.exeDbehoa32.exeGlaoalkh.exeHkkalk32.exeDfgmhd32.exeEmcbkn32.exeEijcpoac.exeEnihne32.exeEiaiqn32.exeFpfdalii.exeBoiccdnf.exeEcpgmhai.exeAiinen32.exeCciemedf.exeEbbgid32.exeHnojdcfi.exeEeqdep32.exeFmcoja32.exeHgbebiao.exeCbnbobin.exeEflgccbp.exeCcdlbf32.exeEbpkce32.exeEfncicpm.exeHodpgjha.exeCkdjbh32.exeFmcoja32.exeFejgko32.exeApcfahio.exeCjndop32.exeEihfjo32.exeFehjeo32.exeBdooajdc.exeHckcmjep.exeDmoipopd.exeDgdmmgpj.exeEkklaj32.exeFhkpmjln.exeFjilieka.exeGobgcg32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dngoibmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emhlfmgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fphafl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnnclg32.dll" Ghhofmql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ioijbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkfmal32.dll" Clomqk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmjejphb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klidkobf.dll" Dkmmhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cillgpen.dll" Dqlafm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpkjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afdlhchf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgmkmecg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nobdlg32.dll" Ddeaalpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cljcelan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddeaalpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fiaeoang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maomqp32.dll" Cbkeib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgodbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghqknigk.dll" Fjlhneio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjjddchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfinoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dbehoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Glaoalkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkkalk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfgmhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emcbkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eijcpoac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enihne32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eiaiqn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpfdalii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dobkmdfq.dll" Boiccdnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jamfqeie.dll" Ecpgmhai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aiinen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cciemedf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkojpojq.dll" Ebbgid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hnojdcfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnoillim.dll" Eeqdep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lghegkoc.dll" Fmcoja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpajnpao.dll" Hgbebiao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbnbobin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eflgccbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojhcelga.dll" Hkkalk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccdlbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebpkce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efncicpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lponfjoo.dll" Hodpgjha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckdjbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmcoja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fejgko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apcfahio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjndop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmqgncdn.dll" Eihfjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fehjeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdooajdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hckcmjep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmoipopd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgdmmgpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eihfjo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eeqdep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ekklaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kegiig32.dll" Fhkpmjln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjilieka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gobgcg32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exePphjgfqq.exePmlkpjpj.exePbiciana.exePfdpip32.exePmnhfjmg.exePpmdbe32.exePchpbded.exePbkpna32.exePmqdkj32.exePlcdgfbo.exePnbacbac.exePelipl32.exePhjelg32.exePndniaop.exePenfelgm.exedescription pid process target process PID 2388 wrote to memory of 3044 2388 557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe Pphjgfqq.exe PID 2388 wrote to memory of 3044 2388 557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe Pphjgfqq.exe PID 2388 wrote to memory of 3044 2388 557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe Pphjgfqq.exe PID 2388 wrote to memory of 3044 2388 557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe Pphjgfqq.exe PID 3044 wrote to memory of 2732 3044 Pphjgfqq.exe Pmlkpjpj.exe PID 3044 wrote to memory of 2732 3044 Pphjgfqq.exe Pmlkpjpj.exe PID 3044 wrote to memory of 2732 3044 Pphjgfqq.exe Pmlkpjpj.exe PID 3044 wrote to memory of 2732 3044 Pphjgfqq.exe Pmlkpjpj.exe PID 2732 wrote to memory of 2576 2732 Pmlkpjpj.exe Pbiciana.exe PID 2732 wrote to memory of 2576 2732 Pmlkpjpj.exe Pbiciana.exe PID 2732 wrote to memory of 2576 2732 Pmlkpjpj.exe Pbiciana.exe PID 2732 wrote to memory of 2576 2732 Pmlkpjpj.exe Pbiciana.exe PID 2576 wrote to memory of 2652 2576 Pbiciana.exe Pfdpip32.exe PID 2576 wrote to memory of 2652 2576 Pbiciana.exe Pfdpip32.exe PID 2576 wrote to memory of 2652 2576 Pbiciana.exe Pfdpip32.exe PID 2576 wrote to memory of 2652 2576 Pbiciana.exe Pfdpip32.exe PID 2652 wrote to memory of 2504 2652 Pfdpip32.exe Pmnhfjmg.exe PID 2652 wrote to memory of 2504 2652 Pfdpip32.exe Pmnhfjmg.exe PID 2652 wrote to memory of 2504 2652 Pfdpip32.exe Pmnhfjmg.exe PID 2652 wrote to memory of 2504 2652 Pfdpip32.exe Pmnhfjmg.exe PID 2504 wrote to memory of 2352 2504 Pmnhfjmg.exe Ppmdbe32.exe PID 2504 wrote to memory of 2352 2504 Pmnhfjmg.exe Ppmdbe32.exe PID 2504 wrote to memory of 2352 2504 Pmnhfjmg.exe Ppmdbe32.exe PID 2504 wrote to memory of 2352 2504 Pmnhfjmg.exe Ppmdbe32.exe PID 2352 wrote to memory of 2980 2352 Ppmdbe32.exe Pchpbded.exe PID 2352 wrote to memory of 2980 2352 Ppmdbe32.exe Pchpbded.exe PID 2352 wrote to memory of 2980 2352 Ppmdbe32.exe Pchpbded.exe PID 2352 wrote to memory of 2980 2352 Ppmdbe32.exe Pchpbded.exe PID 2980 wrote to memory of 2668 2980 Pchpbded.exe Pbkpna32.exe PID 2980 wrote to memory of 2668 2980 Pchpbded.exe Pbkpna32.exe PID 2980 wrote to memory of 2668 2980 Pchpbded.exe Pbkpna32.exe PID 2980 wrote to memory of 2668 2980 Pchpbded.exe Pbkpna32.exe PID 2668 wrote to memory of 2816 2668 Pbkpna32.exe Pmqdkj32.exe PID 2668 wrote to memory of 2816 2668 Pbkpna32.exe Pmqdkj32.exe PID 2668 wrote to memory of 2816 2668 Pbkpna32.exe Pmqdkj32.exe PID 2668 wrote to memory of 2816 2668 Pbkpna32.exe Pmqdkj32.exe PID 2816 wrote to memory of 108 2816 Pmqdkj32.exe Plcdgfbo.exe PID 2816 wrote to memory of 108 2816 Pmqdkj32.exe Plcdgfbo.exe PID 2816 wrote to memory of 108 2816 Pmqdkj32.exe Plcdgfbo.exe PID 2816 wrote to memory of 108 2816 Pmqdkj32.exe Plcdgfbo.exe PID 108 wrote to memory of 1880 108 Plcdgfbo.exe Pnbacbac.exe PID 108 wrote to memory of 1880 108 Plcdgfbo.exe Pnbacbac.exe PID 108 wrote to memory of 1880 108 Plcdgfbo.exe Pnbacbac.exe PID 108 wrote to memory of 1880 108 Plcdgfbo.exe Pnbacbac.exe PID 1880 wrote to memory of 2512 1880 Pnbacbac.exe Pelipl32.exe PID 1880 wrote to memory of 2512 1880 Pnbacbac.exe Pelipl32.exe PID 1880 wrote to memory of 2512 1880 Pnbacbac.exe Pelipl32.exe PID 1880 wrote to memory of 2512 1880 Pnbacbac.exe Pelipl32.exe PID 2512 wrote to memory of 2860 2512 Pelipl32.exe Phjelg32.exe PID 2512 wrote to memory of 2860 2512 Pelipl32.exe Phjelg32.exe PID 2512 wrote to memory of 2860 2512 Pelipl32.exe Phjelg32.exe PID 2512 wrote to memory of 2860 2512 Pelipl32.exe Phjelg32.exe PID 2860 wrote to memory of 1972 2860 Phjelg32.exe Pndniaop.exe PID 2860 wrote to memory of 1972 2860 Phjelg32.exe Pndniaop.exe PID 2860 wrote to memory of 1972 2860 Phjelg32.exe Pndniaop.exe PID 2860 wrote to memory of 1972 2860 Phjelg32.exe Pndniaop.exe PID 1972 wrote to memory of 2276 1972 Pndniaop.exe Penfelgm.exe PID 1972 wrote to memory of 2276 1972 Pndniaop.exe Penfelgm.exe PID 1972 wrote to memory of 2276 1972 Pndniaop.exe Penfelgm.exe PID 1972 wrote to memory of 2276 1972 Pndniaop.exe Penfelgm.exe PID 2276 wrote to memory of 2288 2276 Penfelgm.exe Qhmbagfa.exe PID 2276 wrote to memory of 2288 2276 Penfelgm.exe Qhmbagfa.exe PID 2276 wrote to memory of 2288 2276 Penfelgm.exe Qhmbagfa.exe PID 2276 wrote to memory of 2288 2276 Penfelgm.exe Qhmbagfa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe"C:\Users\Admin\AppData\Local\Temp\557579d493fe320ae8b529af2019139becf0a0fd6b0bb593631319308dce3c15.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pphjgfqq.exeC:\Windows\system32\Pphjgfqq.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pmlkpjpj.exeC:\Windows\system32\Pmlkpjpj.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pbiciana.exeC:\Windows\system32\Pbiciana.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pfdpip32.exeC:\Windows\system32\Pfdpip32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pmnhfjmg.exeC:\Windows\system32\Pmnhfjmg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ppmdbe32.exeC:\Windows\system32\Ppmdbe32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pchpbded.exeC:\Windows\system32\Pchpbded.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pbkpna32.exeC:\Windows\system32\Pbkpna32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pmqdkj32.exeC:\Windows\system32\Pmqdkj32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Plcdgfbo.exeC:\Windows\system32\Plcdgfbo.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pnbacbac.exeC:\Windows\system32\Pnbacbac.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pelipl32.exeC:\Windows\system32\Pelipl32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Phjelg32.exeC:\Windows\system32\Phjelg32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pndniaop.exeC:\Windows\system32\Pndniaop.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Penfelgm.exeC:\Windows\system32\Penfelgm.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qhmbagfa.exeC:\Windows\system32\Qhmbagfa.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Qjknnbed.exeC:\Windows\system32\Qjknnbed.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qnfjna32.exeC:\Windows\system32\Qnfjna32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qaefjm32.exeC:\Windows\system32\Qaefjm32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Qeqbkkej.exeC:\Windows\system32\Qeqbkkej.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qhooggdn.exeC:\Windows\system32\Qhooggdn.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qljkhe32.exeC:\Windows\system32\Qljkhe32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Qnigda32.exeC:\Windows\system32\Qnigda32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Adeplhib.exeC:\Windows\system32\Adeplhib.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Afdlhchf.exeC:\Windows\system32\Afdlhchf.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Ankdiqih.exeC:\Windows\system32\Ankdiqih.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Adhlaggp.exeC:\Windows\system32\Adhlaggp.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ajbdna32.exeC:\Windows\system32\Ajbdna32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Aiedjneg.exeC:\Windows\system32\Aiedjneg.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Apomfh32.exeC:\Windows\system32\Apomfh32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Abmibdlh.exeC:\Windows\system32\Abmibdlh.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Afiecb32.exeC:\Windows\system32\Afiecb32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Alenki32.exeC:\Windows\system32\Alenki32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Admemg32.exeC:\Windows\system32\Admemg32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Afkbib32.exeC:\Windows\system32\Afkbib32.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Aiinen32.exeC:\Windows\system32\Aiinen32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Apcfahio.exeC:\Windows\system32\Apcfahio.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Aoffmd32.exeC:\Windows\system32\Aoffmd32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Afmonbqk.exeC:\Windows\system32\Afmonbqk.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ailkjmpo.exeC:\Windows\system32\Ailkjmpo.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Boiccdnf.exeC:\Windows\system32\Boiccdnf.exe42⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Bbdocc32.exeC:\Windows\system32\Bbdocc32.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bebkpn32.exeC:\Windows\system32\Bebkpn32.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bingpmnl.exeC:\Windows\system32\Bingpmnl.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Blmdlhmp.exeC:\Windows\system32\Blmdlhmp.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bbflib32.exeC:\Windows\system32\Bbflib32.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Beehencq.exeC:\Windows\system32\Beehencq.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bhcdaibd.exeC:\Windows\system32\Bhcdaibd.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bkaqmeah.exeC:\Windows\system32\Bkaqmeah.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bommnc32.exeC:\Windows\system32\Bommnc32.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Begeknan.exeC:\Windows\system32\Begeknan.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bhfagipa.exeC:\Windows\system32\Bhfagipa.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bkdmcdoe.exeC:\Windows\system32\Bkdmcdoe.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bnbjopoi.exeC:\Windows\system32\Bnbjopoi.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bpafkknm.exeC:\Windows\system32\Bpafkknm.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bhhnli32.exeC:\Windows\system32\Bhhnli32.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bgknheej.exeC:\Windows\system32\Bgknheej.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bjijdadm.exeC:\Windows\system32\Bjijdadm.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bnefdp32.exeC:\Windows\system32\Bnefdp32.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bpcbqk32.exeC:\Windows\system32\Bpcbqk32.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bdooajdc.exeC:\Windows\system32\Bdooajdc.exe62⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Cgmkmecg.exeC:\Windows\system32\Cgmkmecg.exe63⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ckignd32.exeC:\Windows\system32\Ckignd32.exe64⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cjlgiqbk.exeC:\Windows\system32\Cjlgiqbk.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cljcelan.exeC:\Windows\system32\Cljcelan.exe66⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cpeofk32.exeC:\Windows\system32\Cpeofk32.exe67⤵
-
C:\Windows\SysWOW64\Ccdlbf32.exeC:\Windows\system32\Ccdlbf32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Cgpgce32.exeC:\Windows\system32\Cgpgce32.exe69⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cjndop32.exeC:\Windows\system32\Cjndop32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Cllpkl32.exeC:\Windows\system32\Cllpkl32.exe71⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Coklgg32.exeC:\Windows\system32\Coklgg32.exe72⤵
-
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe73⤵
-
C:\Windows\SysWOW64\Cjpqdp32.exeC:\Windows\system32\Cjpqdp32.exe74⤵
-
C:\Windows\SysWOW64\Chcqpmep.exeC:\Windows\system32\Chcqpmep.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Clomqk32.exeC:\Windows\system32\Clomqk32.exe76⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Comimg32.exeC:\Windows\system32\Comimg32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cciemedf.exeC:\Windows\system32\Cciemedf.exe78⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cbkeib32.exeC:\Windows\system32\Cbkeib32.exe79⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Cjbmjplb.exeC:\Windows\system32\Cjbmjplb.exe80⤵
-
C:\Windows\SysWOW64\Claifkkf.exeC:\Windows\system32\Claifkkf.exe81⤵
-
C:\Windows\SysWOW64\Ckdjbh32.exeC:\Windows\system32\Ckdjbh32.exe82⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cckace32.exeC:\Windows\system32\Cckace32.exe83⤵
-
C:\Windows\SysWOW64\Cbnbobin.exeC:\Windows\system32\Cbnbobin.exe84⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cfinoq32.exeC:\Windows\system32\Cfinoq32.exe85⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Chhjkl32.exeC:\Windows\system32\Chhjkl32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Clcflkic.exeC:\Windows\system32\Clcflkic.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cobbhfhg.exeC:\Windows\system32\Cobbhfhg.exe88⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cndbcc32.exeC:\Windows\system32\Cndbcc32.exe89⤵
-
C:\Windows\SysWOW64\Dflkdp32.exeC:\Windows\system32\Dflkdp32.exe90⤵
-
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dhjgal32.exeC:\Windows\system32\Dhjgal32.exe92⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dgmglh32.exeC:\Windows\system32\Dgmglh32.exe93⤵
-
C:\Windows\SysWOW64\Dodonf32.exeC:\Windows\system32\Dodonf32.exe94⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dngoibmo.exeC:\Windows\system32\Dngoibmo.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Dqelenlc.exeC:\Windows\system32\Dqelenlc.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ddagfm32.exeC:\Windows\system32\Ddagfm32.exe97⤵
-
C:\Windows\SysWOW64\Dhmcfkme.exeC:\Windows\system32\Dhmcfkme.exe98⤵
-
C:\Windows\SysWOW64\Dgodbh32.exeC:\Windows\system32\Dgodbh32.exe99⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Djnpnc32.exeC:\Windows\system32\Djnpnc32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dbehoa32.exeC:\Windows\system32\Dbehoa32.exe101⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Dqhhknjp.exeC:\Windows\system32\Dqhhknjp.exe102⤵
-
C:\Windows\SysWOW64\Ddcdkl32.exeC:\Windows\system32\Ddcdkl32.exe103⤵
-
C:\Windows\SysWOW64\Dgaqgh32.exeC:\Windows\system32\Dgaqgh32.exe104⤵
-
C:\Windows\SysWOW64\Dkmmhf32.exeC:\Windows\system32\Dkmmhf32.exe105⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Djpmccqq.exeC:\Windows\system32\Djpmccqq.exe106⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dmoipopd.exeC:\Windows\system32\Dmoipopd.exe107⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dqjepm32.exeC:\Windows\system32\Dqjepm32.exe108⤵
-
C:\Windows\SysWOW64\Dqjepm32.exeC:\Windows\system32\Dqjepm32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ddeaalpg.exeC:\Windows\system32\Ddeaalpg.exe110⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dchali32.exeC:\Windows\system32\Dchali32.exe111⤵
-
C:\Windows\SysWOW64\Dgdmmgpj.exeC:\Windows\system32\Dgdmmgpj.exe112⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dfgmhd32.exeC:\Windows\system32\Dfgmhd32.exe113⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Djbiicon.exeC:\Windows\system32\Djbiicon.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dnneja32.exeC:\Windows\system32\Dnneja32.exe115⤵
-
C:\Windows\SysWOW64\Dqlafm32.exeC:\Windows\system32\Dqlafm32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dqlafm32.exeC:\Windows\system32\Dqlafm32.exe117⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Doobajme.exeC:\Windows\system32\Doobajme.exe118⤵
-
C:\Windows\SysWOW64\Dcknbh32.exeC:\Windows\system32\Dcknbh32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe120⤵
-
C:\Windows\SysWOW64\Dfijnd32.exeC:\Windows\system32\Dfijnd32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Djefobmk.exeC:\Windows\system32\Djefobmk.exe122⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eihfjo32.exeC:\Windows\system32\Eihfjo32.exe123⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Emcbkn32.exeC:\Windows\system32\Emcbkn32.exe124⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eqonkmdh.exeC:\Windows\system32\Eqonkmdh.exe125⤵
-
C:\Windows\SysWOW64\Epaogi32.exeC:\Windows\system32\Epaogi32.exe126⤵
-
C:\Windows\SysWOW64\Ecmkghcl.exeC:\Windows\system32\Ecmkghcl.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ebpkce32.exeC:\Windows\system32\Ebpkce32.exe128⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Eflgccbp.exeC:\Windows\system32\Eflgccbp.exe129⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ejgcdb32.exeC:\Windows\system32\Ejgcdb32.exe130⤵
-
C:\Windows\SysWOW64\Eijcpoac.exeC:\Windows\system32\Eijcpoac.exe131⤵
-
C:\Windows\SysWOW64\Eijcpoac.exeC:\Windows\system32\Eijcpoac.exe132⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Emeopn32.exeC:\Windows\system32\Emeopn32.exe133⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ekholjqg.exeC:\Windows\system32\Ekholjqg.exe134⤵
-
C:\Windows\SysWOW64\Ecpgmhai.exeC:\Windows\system32\Ecpgmhai.exe135⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ecpgmhai.exeC:\Windows\system32\Ecpgmhai.exe136⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ebbgid32.exeC:\Windows\system32\Ebbgid32.exe137⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Efncicpm.exeC:\Windows\system32\Efncicpm.exe138⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Eeqdep32.exeC:\Windows\system32\Eeqdep32.exe139⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Eilpeooq.exeC:\Windows\system32\Eilpeooq.exe140⤵
-
C:\Windows\SysWOW64\Emhlfmgj.exeC:\Windows\system32\Emhlfmgj.exe141⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Ekklaj32.exeC:\Windows\system32\Ekklaj32.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Enihne32.exeC:\Windows\system32\Enihne32.exe143⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Enihne32.exeC:\Windows\system32\Enihne32.exe144⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ebedndfa.exeC:\Windows\system32\Ebedndfa.exe145⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eecqjpee.exeC:\Windows\system32\Eecqjpee.exe146⤵
-
C:\Windows\SysWOW64\Eiomkn32.exeC:\Windows\system32\Eiomkn32.exe147⤵
-
C:\Windows\SysWOW64\Egamfkdh.exeC:\Windows\system32\Egamfkdh.exe148⤵
-
C:\Windows\SysWOW64\Elmigj32.exeC:\Windows\system32\Elmigj32.exe149⤵
-
C:\Windows\SysWOW64\Epieghdk.exeC:\Windows\system32\Epieghdk.exe150⤵
-
C:\Windows\SysWOW64\Enkece32.exeC:\Windows\system32\Enkece32.exe151⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ebgacddo.exeC:\Windows\system32\Ebgacddo.exe152⤵
-
C:\Windows\SysWOW64\Eeempocb.exeC:\Windows\system32\Eeempocb.exe153⤵
-
C:\Windows\SysWOW64\Eiaiqn32.exeC:\Windows\system32\Eiaiqn32.exe154⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Egdilkbf.exeC:\Windows\system32\Egdilkbf.exe155⤵
-
C:\Windows\SysWOW64\Eloemi32.exeC:\Windows\system32\Eloemi32.exe156⤵
-
C:\Windows\SysWOW64\Ejbfhfaj.exeC:\Windows\system32\Ejbfhfaj.exe157⤵
-
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe158⤵
-
C:\Windows\SysWOW64\Ebinic32.exeC:\Windows\system32\Ebinic32.exe159⤵
-
C:\Windows\SysWOW64\Ealnephf.exeC:\Windows\system32\Ealnephf.exe160⤵
-
C:\Windows\SysWOW64\Fehjeo32.exeC:\Windows\system32\Fehjeo32.exe161⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Fckjalhj.exeC:\Windows\system32\Fckjalhj.exe162⤵
-
C:\Windows\SysWOW64\Fhffaj32.exeC:\Windows\system32\Fhffaj32.exe163⤵
-
C:\Windows\SysWOW64\Flabbihl.exeC:\Windows\system32\Flabbihl.exe164⤵
-
C:\Windows\SysWOW64\Fjdbnf32.exeC:\Windows\system32\Fjdbnf32.exe165⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fnpnndgp.exeC:\Windows\system32\Fnpnndgp.exe166⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fmcoja32.exeC:\Windows\system32\Fmcoja32.exe167⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fmcoja32.exeC:\Windows\system32\Fmcoja32.exe168⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Faokjpfd.exeC:\Windows\system32\Faokjpfd.exe169⤵
-
C:\Windows\SysWOW64\Fejgko32.exeC:\Windows\system32\Fejgko32.exe170⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fhhcgj32.exeC:\Windows\system32\Fhhcgj32.exe171⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fjgoce32.exeC:\Windows\system32\Fjgoce32.exe172⤵
-
C:\Windows\SysWOW64\Fnbkddem.exeC:\Windows\system32\Fnbkddem.exe173⤵
-
C:\Windows\SysWOW64\Faagpp32.exeC:\Windows\system32\Faagpp32.exe174⤵
-
C:\Windows\SysWOW64\Faagpp32.exeC:\Windows\system32\Faagpp32.exe175⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fpdhklkl.exeC:\Windows\system32\Fpdhklkl.exe176⤵
-
C:\Windows\SysWOW64\Fdoclk32.exeC:\Windows\system32\Fdoclk32.exe177⤵
-
C:\Windows\SysWOW64\Fhkpmjln.exeC:\Windows\system32\Fhkpmjln.exe178⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ffnphf32.exeC:\Windows\system32\Ffnphf32.exe179⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fjilieka.exeC:\Windows\system32\Fjilieka.exe180⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Filldb32.exeC:\Windows\system32\Filldb32.exe181⤵
-
C:\Windows\SysWOW64\Fmhheqje.exeC:\Windows\system32\Fmhheqje.exe182⤵
-
C:\Windows\SysWOW64\Facdeo32.exeC:\Windows\system32\Facdeo32.exe183⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fpfdalii.exeC:\Windows\system32\Fpfdalii.exe184⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Fdapak32.exeC:\Windows\system32\Fdapak32.exe185⤵
-
C:\Windows\SysWOW64\Fbdqmghm.exeC:\Windows\system32\Fbdqmghm.exe186⤵
-
C:\Windows\SysWOW64\Ffpmnf32.exeC:\Windows\system32\Ffpmnf32.exe187⤵
-
C:\Windows\SysWOW64\Fjlhneio.exeC:\Windows\system32\Fjlhneio.exe188⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Fioija32.exeC:\Windows\system32\Fioija32.exe189⤵
-
C:\Windows\SysWOW64\Fioija32.exeC:\Windows\system32\Fioija32.exe190⤵
-
C:\Windows\SysWOW64\Fmjejphb.exeC:\Windows\system32\Fmjejphb.exe191⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Flmefm32.exeC:\Windows\system32\Flmefm32.exe192⤵
-
C:\Windows\SysWOW64\Fphafl32.exeC:\Windows\system32\Fphafl32.exe193⤵
-
C:\Windows\SysWOW64\Fphafl32.exeC:\Windows\system32\Fphafl32.exe194⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Fddmgjpo.exeC:\Windows\system32\Fddmgjpo.exe195⤵
-
C:\Windows\SysWOW64\Fbgmbg32.exeC:\Windows\system32\Fbgmbg32.exe196⤵
-
C:\Windows\SysWOW64\Ffbicfoc.exeC:\Windows\system32\Ffbicfoc.exe197⤵
-
C:\Windows\SysWOW64\Feeiob32.exeC:\Windows\system32\Feeiob32.exe198⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe199⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Fmlapp32.exeC:\Windows\system32\Fmlapp32.exe200⤵
-
C:\Windows\SysWOW64\Gpknlk32.exeC:\Windows\system32\Gpknlk32.exe201⤵
-
C:\Windows\SysWOW64\Gonnhhln.exeC:\Windows\system32\Gonnhhln.exe202⤵
-
C:\Windows\SysWOW64\Gbijhg32.exeC:\Windows\system32\Gbijhg32.exe203⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gbijhg32.exeC:\Windows\system32\Gbijhg32.exe204⤵
-
C:\Windows\SysWOW64\Gfefiemq.exeC:\Windows\system32\Gfefiemq.exe205⤵
-
C:\Windows\SysWOW64\Gegfdb32.exeC:\Windows\system32\Gegfdb32.exe206⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ghfbqn32.exeC:\Windows\system32\Ghfbqn32.exe207⤵
-
C:\Windows\SysWOW64\Glaoalkh.exeC:\Windows\system32\Glaoalkh.exe208⤵
-
C:\Windows\SysWOW64\Glaoalkh.exeC:\Windows\system32\Glaoalkh.exe209⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Gpmjak32.exeC:\Windows\system32\Gpmjak32.exe210⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gopkmhjk.exeC:\Windows\system32\Gopkmhjk.exe211⤵
-
C:\Windows\SysWOW64\Gbkgnfbd.exeC:\Windows\system32\Gbkgnfbd.exe212⤵
-
C:\Windows\SysWOW64\Gbkgnfbd.exeC:\Windows\system32\Gbkgnfbd.exe213⤵
-
C:\Windows\SysWOW64\Gangic32.exeC:\Windows\system32\Gangic32.exe214⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gejcjbah.exeC:\Windows\system32\Gejcjbah.exe215⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gieojq32.exeC:\Windows\system32\Gieojq32.exe216⤵
-
C:\Windows\SysWOW64\Ghhofmql.exeC:\Windows\system32\Ghhofmql.exe217⤵
-
C:\Windows\SysWOW64\Ghhofmql.exeC:\Windows\system32\Ghhofmql.exe218⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Gldkfl32.exeC:\Windows\system32\Gldkfl32.exe219⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gkgkbipp.exeC:\Windows\system32\Gkgkbipp.exe220⤵
-
C:\Windows\SysWOW64\Gobgcg32.exeC:\Windows\system32\Gobgcg32.exe221⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Gbnccfpb.exeC:\Windows\system32\Gbnccfpb.exe222⤵
-
C:\Windows\SysWOW64\Gaqcoc32.exeC:\Windows\system32\Gaqcoc32.exe223⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe224⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gdopkn32.exeC:\Windows\system32\Gdopkn32.exe225⤵
-
C:\Windows\SysWOW64\Goddhg32.exeC:\Windows\system32\Goddhg32.exe226⤵
-
C:\Windows\SysWOW64\Gacpdbej.exeC:\Windows\system32\Gacpdbej.exe227⤵
-
C:\Windows\SysWOW64\Geolea32.exeC:\Windows\system32\Geolea32.exe228⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gdamqndn.exeC:\Windows\system32\Gdamqndn.exe229⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ghmiam32.exeC:\Windows\system32\Ghmiam32.exe230⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gkkemh32.exeC:\Windows\system32\Gkkemh32.exe231⤵
-
C:\Windows\SysWOW64\Gkkemh32.exeC:\Windows\system32\Gkkemh32.exe232⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gogangdc.exeC:\Windows\system32\Gogangdc.exe233⤵
-
C:\Windows\SysWOW64\Gddifnbk.exeC:\Windows\system32\Gddifnbk.exe234⤵
-
C:\Windows\SysWOW64\Ghoegl32.exeC:\Windows\system32\Ghoegl32.exe235⤵
-
C:\Windows\SysWOW64\Ghoegl32.exeC:\Windows\system32\Ghoegl32.exe236⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hgbebiao.exeC:\Windows\system32\Hgbebiao.exe237⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hknach32.exeC:\Windows\system32\Hknach32.exe238⤵
-
C:\Windows\SysWOW64\Hmlnoc32.exeC:\Windows\system32\Hmlnoc32.exe239⤵
-
C:\Windows\SysWOW64\Hahjpbad.exeC:\Windows\system32\Hahjpbad.exe240⤵
-
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe241⤵
- Modifies registry class