Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe
Resource
win10v2004-20240508-en
General
-
Target
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe
-
Size
163KB
-
MD5
acc8339588cf6945181b8f13085d156d
-
SHA1
69d88f424040b2908da2c7f5a0e4bb4c05b35253
-
SHA256
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed
-
SHA512
67b65f161051f51f7646f8e7e16a5e1ebeaba11d430bba8df3d780f4094047698d36b6af30bd70412b20725c2dc689884388849ec66d2be4abd369e9fcc728a4
-
SSDEEP
1536:PguekdY2yqlFcTz8VMuXwNTMJdpFjlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:ISYTkCibJnFjltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Nppofado.exeAicmadmm.exeLljkif32.exeOeegnj32.exeBfioia32.exeNaegmabc.exeBafhff32.exeHofjem32.exeLhlbbg32.exeKpdjaecc.exeKjokokha.exeJggoqimd.exeAjldkhjh.exeCnfqccna.exeKpdcfoph.exeNdggib32.exeInjlkf32.exeKmnlhg32.exeAejlnmkm.exePfchqf32.exeAmhcad32.exeHjddaj32.exeNcloha32.exeDhehfk32.exeOhncbdbd.exeCdqkifmb.exeImjmhkpj.exeBahelebm.exeLkjmfjmi.exeFelcbk32.exeBakaaepk.exeNepach32.exeJeqopcld.exeObeacl32.exePeefcjlg.exeIegeonpc.exeAgeompfe.exeDkmghe32.exec4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exeMmbmeifk.exeIhijhpdo.exeQcogbdkg.exeNnlhab32.exeDcjjkkji.exeBmohjooe.exeBobleeef.exeInnbde32.exeObjmgd32.exeMmngof32.exeDbncjf32.exeJikeeh32.exePpmgfb32.exeLplbjm32.exeNnbjpqoa.exeNacmpj32.exeFgadda32.exeKbnhpdke.exeLeegbnan.exeHhfmbq32.exePljcllqe.exePnchhllf.exeMaiqfl32.exeGpmllpef.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nppofado.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aicmadmm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lljkif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oeegnj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfioia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Naegmabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bafhff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hofjem32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhlbbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpdjaecc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjokokha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jggoqimd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajldkhjh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnfqccna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpdcfoph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndggib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Injlkf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmnlhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aejlnmkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfchqf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amhcad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjddaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncloha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhehfk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohncbdbd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdqkifmb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imjmhkpj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bahelebm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkjmfjmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Felcbk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bakaaepk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nepach32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jeqopcld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obeacl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peefcjlg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iegeonpc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ageompfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkmghe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmbmeifk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihijhpdo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcogbdkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnlhab32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcjjkkji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmohjooe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bobleeef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Innbde32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Objmgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmngof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbncjf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jikeeh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppmgfb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lplbjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnbjpqoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nacmpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgadda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lplbjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbnhpdke.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leegbnan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhfmbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pljcllqe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnchhllf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Maiqfl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpmllpef.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Dkadjn32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Endjaief.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Elldgehk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eqjmncna.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Fcjeon32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Fmcjhdbc.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Fmegncpp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ffmkfifa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fofpoo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fgadda32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gjbmelgm.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ggfnopfg.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Gjfgqk32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Gcokiaji.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Gildahhp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hfpdkl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hnkion32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hpjeialg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hnpbjnpo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ioakoq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jhjphfgi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jbpdeogo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jagnlkjd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jpogbgmi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kljabgnh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Klehgh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kfkpknkq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jplkmgol.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jgdfdbhk.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/1520-373-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jhoice32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jkkija32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kkoncdcp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Imnbbi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ijmipn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Imiigiab.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ipehmebh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Npolmh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nmcmgm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nbpeoc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nfnneb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Opfbngfb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Njbdea32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oeckfndj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oeehln32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Obgkpb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ohcdhi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Omqlpp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ohfqmi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oopijc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Opaebkmc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ogknoe32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oaqbln32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnkcpq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pkifdd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pljcllqe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pcdkif32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mgmahg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hapklimq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pincfpoo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pgbdodnh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Plolgk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pegqpacp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pkdihhag.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Dkadjn32.exe UPX \Windows\SysWOW64\Endjaief.exe UPX \Windows\SysWOW64\Elldgehk.exe UPX C:\Windows\SysWOW64\Eqjmncna.exe UPX \Windows\SysWOW64\Fcjeon32.exe UPX \Windows\SysWOW64\Fmcjhdbc.exe UPX \Windows\SysWOW64\Fmegncpp.exe UPX C:\Windows\SysWOW64\Ffmkfifa.exe UPX C:\Windows\SysWOW64\Fofpoo32.exe UPX C:\Windows\SysWOW64\Fgadda32.exe UPX C:\Windows\SysWOW64\Gjbmelgm.exe UPX \Windows\SysWOW64\Ggfnopfg.exe UPX \Windows\SysWOW64\Gjfgqk32.exe UPX \Windows\SysWOW64\Gcokiaji.exe UPX \Windows\SysWOW64\Gildahhp.exe UPX C:\Windows\SysWOW64\Hfpdkl32.exe UPX C:\Windows\SysWOW64\Hnkion32.exe UPX C:\Windows\SysWOW64\Hpjeialg.exe UPX C:\Windows\SysWOW64\Hnpbjnpo.exe UPX C:\Windows\SysWOW64\Ioakoq32.exe UPX C:\Windows\SysWOW64\Jhjphfgi.exe UPX C:\Windows\SysWOW64\Jbpdeogo.exe UPX C:\Windows\SysWOW64\Jagnlkjd.exe UPX C:\Windows\SysWOW64\Jpogbgmi.exe UPX C:\Windows\SysWOW64\Kljabgnh.exe UPX C:\Windows\SysWOW64\Klehgh32.exe UPX C:\Windows\SysWOW64\Kfkpknkq.exe UPX C:\Windows\SysWOW64\Jplkmgol.exe UPX C:\Windows\SysWOW64\Jgdfdbhk.exe UPX behavioral1/memory/1520-373-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Jhoice32.exe UPX C:\Windows\SysWOW64\Jkkija32.exe UPX C:\Windows\SysWOW64\Kkoncdcp.exe UPX C:\Windows\SysWOW64\Imnbbi32.exe UPX C:\Windows\SysWOW64\Ijmipn32.exe UPX C:\Windows\SysWOW64\Imiigiab.exe UPX C:\Windows\SysWOW64\Ipehmebh.exe UPX C:\Windows\SysWOW64\Npolmh32.exe UPX C:\Windows\SysWOW64\Nmcmgm32.exe UPX C:\Windows\SysWOW64\Nbpeoc32.exe UPX C:\Windows\SysWOW64\Nfnneb32.exe UPX C:\Windows\SysWOW64\Opfbngfb.exe UPX C:\Windows\SysWOW64\Njbdea32.exe UPX C:\Windows\SysWOW64\Oeckfndj.exe UPX C:\Windows\SysWOW64\Oeehln32.exe UPX C:\Windows\SysWOW64\Obgkpb32.exe UPX C:\Windows\SysWOW64\Ohcdhi32.exe UPX C:\Windows\SysWOW64\Omqlpp32.exe UPX C:\Windows\SysWOW64\Ohfqmi32.exe UPX C:\Windows\SysWOW64\Oopijc32.exe UPX C:\Windows\SysWOW64\Opaebkmc.exe UPX C:\Windows\SysWOW64\Ogknoe32.exe UPX C:\Windows\SysWOW64\Oaqbln32.exe UPX C:\Windows\SysWOW64\Nnkcpq32.exe UPX C:\Windows\SysWOW64\Pkifdd32.exe UPX C:\Windows\SysWOW64\Pljcllqe.exe UPX C:\Windows\SysWOW64\Pcdkif32.exe UPX C:\Windows\SysWOW64\Mgmahg32.exe UPX C:\Windows\SysWOW64\Hapklimq.exe UPX C:\Windows\SysWOW64\Pincfpoo.exe UPX C:\Windows\SysWOW64\Pgbdodnh.exe UPX C:\Windows\SysWOW64\Plolgk32.exe UPX C:\Windows\SysWOW64\Pegqpacp.exe UPX C:\Windows\SysWOW64\Pkdihhag.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Dkadjn32.exeEndjaief.exeElldgehk.exeEqjmncna.exeFcjeon32.exeFmcjhdbc.exeFmegncpp.exeFfmkfifa.exeFofpoo32.exeFgadda32.exeGjbmelgm.exeGgfnopfg.exeGjfgqk32.exeGcokiaji.exeGildahhp.exeHfpdkl32.exeHnkion32.exeHpjeialg.exeHnpbjnpo.exeHapklimq.exeIpehmebh.exeImiigiab.exeIjmipn32.exeImnbbi32.exeIoakoq32.exeJhjphfgi.exeJbpdeogo.exeJkkija32.exeJhoice32.exeJagnlkjd.exeJgdfdbhk.exeJplkmgol.exeJpogbgmi.exeKfkpknkq.exeKlehgh32.exeKljabgnh.exeKkoncdcp.exeMgmahg32.exeNnkcpq32.exeNjbdea32.exeNpolmh32.exeNmcmgm32.exeNbpeoc32.exeNfnneb32.exeOpfbngfb.exeOeckfndj.exeObgkpb32.exeOeehln32.exeOhcdhi32.exeOmqlpp32.exeOhfqmi32.exeOopijc32.exeOpaebkmc.exeOgknoe32.exeOaqbln32.exePkifdd32.exePljcllqe.exePcdkif32.exePincfpoo.exePgbdodnh.exePlolgk32.exePegqpacp.exePkdihhag.exePejmfqan.exepid process 1212 Dkadjn32.exe 2588 Endjaief.exe 2712 Elldgehk.exe 2636 Eqjmncna.exe 2356 Fcjeon32.exe 2796 Fmcjhdbc.exe 1052 Fmegncpp.exe 1780 Ffmkfifa.exe 2424 Fofpoo32.exe 2784 Fgadda32.exe 1836 Gjbmelgm.exe 1968 Ggfnopfg.exe 2172 Gjfgqk32.exe 2972 Gcokiaji.exe 1992 Gildahhp.exe 772 Hfpdkl32.exe 600 Hnkion32.exe 2988 Hpjeialg.exe 2028 Hnpbjnpo.exe 1184 Hapklimq.exe 1852 Ipehmebh.exe 1656 Imiigiab.exe 1756 Ijmipn32.exe 2256 Imnbbi32.exe 2852 Ioakoq32.exe 2288 Jhjphfgi.exe 2808 Jbpdeogo.exe 2632 Jkkija32.exe 2500 Jhoice32.exe 1520 Jagnlkjd.exe 2560 Jgdfdbhk.exe 2408 Jplkmgol.exe 2268 Jpogbgmi.exe 576 Kfkpknkq.exe 2428 Klehgh32.exe 2696 Kljabgnh.exe 2692 Kkoncdcp.exe 1308 Mgmahg32.exe 1960 Nnkcpq32.exe 1704 Njbdea32.exe 2168 Npolmh32.exe 2236 Nmcmgm32.exe 820 Nbpeoc32.exe 1660 Nfnneb32.exe 2916 Opfbngfb.exe 988 Oeckfndj.exe 1072 Obgkpb32.exe 1892 Oeehln32.exe 968 Ohcdhi32.exe 2156 Omqlpp32.exe 1564 Ohfqmi32.exe 2840 Oopijc32.exe 2892 Opaebkmc.exe 2584 Ogknoe32.exe 2536 Oaqbln32.exe 2232 Pkifdd32.exe 2372 Pljcllqe.exe 2376 Pcdkif32.exe 2672 Pincfpoo.exe 1368 Pgbdodnh.exe 1996 Plolgk32.exe 2432 Pegqpacp.exe 2664 Pkdihhag.exe 2252 Pejmfqan.exe -
Loads dropped DLL 64 IoCs
Processes:
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exeDkadjn32.exeEndjaief.exeElldgehk.exeEqjmncna.exeFcjeon32.exeFmcjhdbc.exeFmegncpp.exeFfmkfifa.exeFofpoo32.exeFgadda32.exeGjbmelgm.exeGgfnopfg.exeGjfgqk32.exeGcokiaji.exeGildahhp.exeHfpdkl32.exeHnkion32.exeHpjeialg.exeHnpbjnpo.exeHapklimq.exeIpehmebh.exeImiigiab.exeIjmipn32.exeImnbbi32.exeIoakoq32.exeJhjphfgi.exeJbpdeogo.exeJkkija32.exeJhoice32.exeJagnlkjd.exeJgdfdbhk.exepid process 1952 c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe 1952 c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe 1212 Dkadjn32.exe 1212 Dkadjn32.exe 2588 Endjaief.exe 2588 Endjaief.exe 2712 Elldgehk.exe 2712 Elldgehk.exe 2636 Eqjmncna.exe 2636 Eqjmncna.exe 2356 Fcjeon32.exe 2356 Fcjeon32.exe 2796 Fmcjhdbc.exe 2796 Fmcjhdbc.exe 1052 Fmegncpp.exe 1052 Fmegncpp.exe 1780 Ffmkfifa.exe 1780 Ffmkfifa.exe 2424 Fofpoo32.exe 2424 Fofpoo32.exe 2784 Fgadda32.exe 2784 Fgadda32.exe 1836 Gjbmelgm.exe 1836 Gjbmelgm.exe 1968 Ggfnopfg.exe 1968 Ggfnopfg.exe 2172 Gjfgqk32.exe 2172 Gjfgqk32.exe 2972 Gcokiaji.exe 2972 Gcokiaji.exe 1992 Gildahhp.exe 1992 Gildahhp.exe 772 Hfpdkl32.exe 772 Hfpdkl32.exe 600 Hnkion32.exe 600 Hnkion32.exe 2988 Hpjeialg.exe 2988 Hpjeialg.exe 2028 Hnpbjnpo.exe 2028 Hnpbjnpo.exe 1184 Hapklimq.exe 1184 Hapklimq.exe 1852 Ipehmebh.exe 1852 Ipehmebh.exe 1656 Imiigiab.exe 1656 Imiigiab.exe 1756 Ijmipn32.exe 1756 Ijmipn32.exe 2256 Imnbbi32.exe 2256 Imnbbi32.exe 2852 Ioakoq32.exe 2852 Ioakoq32.exe 2288 Jhjphfgi.exe 2288 Jhjphfgi.exe 2808 Jbpdeogo.exe 2808 Jbpdeogo.exe 2632 Jkkija32.exe 2632 Jkkija32.exe 2500 Jhoice32.exe 2500 Jhoice32.exe 1520 Jagnlkjd.exe 1520 Jagnlkjd.exe 2560 Jgdfdbhk.exe 2560 Jgdfdbhk.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dlifadkk.exeElaeeb32.exeDgnminke.exeHplphd32.exeDhehfk32.exeIaddid32.exeOlpbaa32.exeCjljnn32.exeCcpeld32.exeLjcbcngi.exeLndqbk32.exeBefmfpbi.exeObhdcanc.exeQoqhncgp.exeHmgodc32.exeObgkpb32.exeCjlheehe.exePaocnkph.exePmfjmake.exeQaofgc32.exeBbbgod32.exeQcogbdkg.exeOpfbngfb.exeQnebjc32.exeIgbqdlea.exeEbdoocdk.exeBlnpddeo.exeMdoccg32.exeKimlqfeq.exeOpebpdad.exeBahelebm.exeBbfnchfb.exeGnaooi32.exeNnjicjbf.exeBplijcle.exeCdedde32.exeMejmmqpd.exeOodjjign.exeFfmkfifa.exeIpehmebh.exeJfhmehji.exeOfgbkacb.exePmqffonj.exeBkknac32.exePdjljpnc.exeDfphcj32.exeJfgebjnm.exeCoicfd32.exeEgcfdn32.exeAeenapck.exeFcjeon32.exeHcdgmimg.exeHqgddm32.exeIboghh32.exeKbenacdm.exeJmgfgham.exeCpiqmlfm.exeKilgoe32.exeIichjc32.exeEfljhq32.exeFqhclqnc.exeJpbalb32.exeKeioca32.exedescription ioc process File created C:\Windows\SysWOW64\Lhkbmo32.dll Dlifadkk.exe File created C:\Windows\SysWOW64\Enbogmnc.exe Elaeeb32.exe File opened for modification C:\Windows\SysWOW64\Dbdagg32.exe Dgnminke.exe File created C:\Windows\SysWOW64\Ejkohlcb.dll Hplphd32.exe File created C:\Windows\SysWOW64\Ddnfql32.exe Dhehfk32.exe File opened for modification C:\Windows\SysWOW64\Imkeneja.exe Iaddid32.exe File opened for modification C:\Windows\SysWOW64\Oehgjfhi.exe Olpbaa32.exe File created C:\Windows\SysWOW64\Hccadd32.dll Cjljnn32.exe File opened for modification C:\Windows\SysWOW64\Cogfqe32.exe Ccpeld32.exe File created C:\Windows\SysWOW64\Kjhhabcc.dll Ljcbcngi.exe File created C:\Windows\SysWOW64\Lijepc32.exe Lndqbk32.exe File created C:\Windows\SysWOW64\Bbjmpcab.exe Befmfpbi.exe File created C:\Windows\SysWOW64\Ogqhpm32.dll Obhdcanc.exe File opened for modification C:\Windows\SysWOW64\Qqbeel32.exe Qoqhncgp.exe File created C:\Windows\SysWOW64\Hhlcal32.exe Hmgodc32.exe File created C:\Windows\SysWOW64\Bgkenb32.dll Obgkpb32.exe File created C:\Windows\SysWOW64\Ijppackl.dll Cjlheehe.exe File opened for modification C:\Windows\SysWOW64\Qldhkc32.exe Paocnkph.exe File created C:\Windows\SysWOW64\Gipjkn32.dll Pmfjmake.exe File created C:\Windows\SysWOW64\Bidjckae.dll Qaofgc32.exe File created C:\Windows\SysWOW64\Bkklhjnk.exe Bbbgod32.exe File opened for modification C:\Windows\SysWOW64\Qlgkki32.exe Qcogbdkg.exe File created C:\Windows\SysWOW64\Oeckfndj.exe Opfbngfb.exe File created C:\Windows\SysWOW64\Gjmagfog.dll Qnebjc32.exe File created C:\Windows\SysWOW64\Eacmfp32.dll Igbqdlea.exe File created C:\Windows\SysWOW64\Elnoff32.dll Ebdoocdk.exe File created C:\Windows\SysWOW64\Bplijcle.exe Blnpddeo.exe File opened for modification C:\Windows\SysWOW64\Npechhgd.exe Mdoccg32.exe File opened for modification C:\Windows\SysWOW64\Knjdimdh.exe Kimlqfeq.exe File opened for modification C:\Windows\SysWOW64\Omjbihpn.exe Opebpdad.exe File opened for modification C:\Windows\SysWOW64\Bakaaepk.exe Bahelebm.exe File created C:\Windows\SysWOW64\Biqfpb32.exe Bbfnchfb.exe File created C:\Windows\SysWOW64\Ggkqmoma.exe Gnaooi32.exe File created C:\Windows\SysWOW64\Ngohbhce.dll Nnjicjbf.exe File created C:\Windows\SysWOW64\Nmmgbn32.dll Bplijcle.exe File opened for modification C:\Windows\SysWOW64\Cnnimkom.exe Cdedde32.exe File created C:\Windows\SysWOW64\Mkgeehnl.exe Mejmmqpd.exe File created C:\Windows\SysWOW64\Okkkoj32.exe Oodjjign.exe File created C:\Windows\SysWOW64\Fofpoo32.exe Ffmkfifa.exe File created C:\Windows\SysWOW64\Ocaeoe32.dll Ipehmebh.exe File created C:\Windows\SysWOW64\Jlaeab32.exe Jfhmehji.exe File created C:\Windows\SysWOW64\Oqlfhjch.exe Ofgbkacb.exe File created C:\Windows\SysWOW64\Aiffeloi.dll Pmqffonj.exe File opened for modification C:\Windows\SysWOW64\Boifga32.exe Bkknac32.exe File created C:\Windows\SysWOW64\Qigebglj.exe Pdjljpnc.exe File opened for modification C:\Windows\SysWOW64\Dphmloih.exe Dfphcj32.exe File created C:\Windows\SysWOW64\Bnllhjif.dll Jfgebjnm.exe File created C:\Windows\SysWOW64\Gafqbm32.dll Coicfd32.exe File created C:\Windows\SysWOW64\Gnngnk32.dll Egcfdn32.exe File created C:\Windows\SysWOW64\Anmbje32.exe Aeenapck.exe File created C:\Windows\SysWOW64\Fmcjhdbc.exe Fcjeon32.exe File opened for modification C:\Windows\SysWOW64\Hokhbj32.exe Hcdgmimg.exe File created C:\Windows\SysWOW64\Mmichb32.dll Hqgddm32.exe File opened for modification C:\Windows\SysWOW64\Ilhlan32.exe Iboghh32.exe File created C:\Windows\SysWOW64\Lolofd32.exe Kbenacdm.exe File opened for modification C:\Windows\SysWOW64\Jcandb32.exe Jmgfgham.exe File opened for modification C:\Windows\SysWOW64\Cmmagpef.exe Cpiqmlfm.exe File created C:\Windows\SysWOW64\Kaglcgdc.exe Kilgoe32.exe File created C:\Windows\SysWOW64\Ipmqgmcd.exe Iichjc32.exe File created C:\Windows\SysWOW64\Ehnfpifm.exe Efljhq32.exe File opened for modification C:\Windows\SysWOW64\Fmodaadg.exe Fqhclqnc.exe File opened for modification C:\Windows\SysWOW64\Oeckfndj.exe Opfbngfb.exe File created C:\Windows\SysWOW64\Olfcfe32.dll Jpbalb32.exe File created C:\Windows\SysWOW64\Pbkboega.dll Keioca32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1720 4292 WerFault.exe Ockdmn32.exe -
Modifies registry class 64 IoCs
Processes:
Nnoiio32.exeEopphehb.exeFeiaknmg.exeNpolmh32.exeDpfkeb32.exeLhfpdi32.exeObhdcanc.exeApppkekc.exeDfniee32.exeFgpock32.exeBfqpecma.exeJpbalb32.exeCaifjn32.exeJfaeme32.exeFnmmidhm.exeLiboodmk.exeMpoppadq.exeOmqlpp32.exeDbncjf32.exeJikeeh32.exeMdghaf32.exeOejcpf32.exeObmpgjbb.exeDgfmep32.exeImnbbi32.exeDeondj32.exeHgeelf32.exeObjmgd32.exeIojopp32.exePegqpacp.exeGqodqodl.exeQbobaf32.exeJqfhqe32.exeBbfgiabg.exeFdpgph32.exeDcjjkkji.exePjpmdd32.exeKhglkqfj.exeBbbgod32.exeBehilopf.exeOoidei32.exeKbkdpnil.exeAmglgn32.exeCbiiog32.exeAiknnf32.exeLadgkmlj.exeNgencpel.exeGoiongbc.exeBjngbihn.exeAmhcad32.exeGleqdb32.exeNebnigmp.exePcdkif32.exeAgpcihcf.exeEggndi32.exeGgkqmoma.exeJmhnkfpa.exeBqijljfd.exeKigndekn.exeBeogaenl.exeHplphd32.exeAdcdbl32.exeKhkbbc32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnoiio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eopphehb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Feiaknmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npolmh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpfkeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhfpdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obhdcanc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Boddiidc.dll" Apppkekc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfniee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgpock32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfqpecma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jpbalb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Caifjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfaeme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnmmidhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iljakp32.dll" Liboodmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnekggoo.dll" Mpoppadq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohniib32.dll" Omqlpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlmdnf32.dll" Dbncjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jikeeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdghaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bilfjg32.dll" Oejcpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obmpgjbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgfmep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mibnje32.dll" Imnbbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jpbalb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deondj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgeelf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Objmgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iojopp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pegqpacp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gqodqodl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qbobaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jqfhqe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbfgiabg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plcpehgf.dll" Fdpgph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Baboljno.dll" Dcjjkkji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcming32.dll" Pjpmdd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khglkqfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bknlaikf.dll" Bbbgod32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Behilopf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epfbllkc.dll" Ooidei32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbkdpnil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kljmfe32.dll" Amglgn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbiiog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aiknnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbmdoe32.dll" Ladgkmlj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngencpel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgojdj32.dll" Goiongbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjngbihn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amhcad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gleqdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nebnigmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcdkif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Agpcihcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eggndi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbnooiab.dll" Ggkqmoma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpgkadij.dll" Jmhnkfpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bqijljfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kigndekn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aeelon32.dll" Beogaenl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejkohlcb.dll" Hplphd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaddjiql.dll" Adcdbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khkbbc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exeDkadjn32.exeEndjaief.exeElldgehk.exeEqjmncna.exeFcjeon32.exeFmcjhdbc.exeFmegncpp.exeFfmkfifa.exeFofpoo32.exeFgadda32.exeGjbmelgm.exeGgfnopfg.exeGjfgqk32.exeGcokiaji.exeGildahhp.exedescription pid process target process PID 1952 wrote to memory of 1212 1952 c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe Dkadjn32.exe PID 1952 wrote to memory of 1212 1952 c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe Dkadjn32.exe PID 1952 wrote to memory of 1212 1952 c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe Dkadjn32.exe PID 1952 wrote to memory of 1212 1952 c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe Dkadjn32.exe PID 1212 wrote to memory of 2588 1212 Dkadjn32.exe Endjaief.exe PID 1212 wrote to memory of 2588 1212 Dkadjn32.exe Endjaief.exe PID 1212 wrote to memory of 2588 1212 Dkadjn32.exe Endjaief.exe PID 1212 wrote to memory of 2588 1212 Dkadjn32.exe Endjaief.exe PID 2588 wrote to memory of 2712 2588 Endjaief.exe Elldgehk.exe PID 2588 wrote to memory of 2712 2588 Endjaief.exe Elldgehk.exe PID 2588 wrote to memory of 2712 2588 Endjaief.exe Elldgehk.exe PID 2588 wrote to memory of 2712 2588 Endjaief.exe Elldgehk.exe PID 2712 wrote to memory of 2636 2712 Elldgehk.exe Eqjmncna.exe PID 2712 wrote to memory of 2636 2712 Elldgehk.exe Eqjmncna.exe PID 2712 wrote to memory of 2636 2712 Elldgehk.exe Eqjmncna.exe PID 2712 wrote to memory of 2636 2712 Elldgehk.exe Eqjmncna.exe PID 2636 wrote to memory of 2356 2636 Eqjmncna.exe Fcjeon32.exe PID 2636 wrote to memory of 2356 2636 Eqjmncna.exe Fcjeon32.exe PID 2636 wrote to memory of 2356 2636 Eqjmncna.exe Fcjeon32.exe PID 2636 wrote to memory of 2356 2636 Eqjmncna.exe Fcjeon32.exe PID 2356 wrote to memory of 2796 2356 Fcjeon32.exe Fmcjhdbc.exe PID 2356 wrote to memory of 2796 2356 Fcjeon32.exe Fmcjhdbc.exe PID 2356 wrote to memory of 2796 2356 Fcjeon32.exe Fmcjhdbc.exe PID 2356 wrote to memory of 2796 2356 Fcjeon32.exe Fmcjhdbc.exe PID 2796 wrote to memory of 1052 2796 Fmcjhdbc.exe Fmegncpp.exe PID 2796 wrote to memory of 1052 2796 Fmcjhdbc.exe Fmegncpp.exe PID 2796 wrote to memory of 1052 2796 Fmcjhdbc.exe Fmegncpp.exe PID 2796 wrote to memory of 1052 2796 Fmcjhdbc.exe Fmegncpp.exe PID 1052 wrote to memory of 1780 1052 Fmegncpp.exe Ffmkfifa.exe PID 1052 wrote to memory of 1780 1052 Fmegncpp.exe Ffmkfifa.exe PID 1052 wrote to memory of 1780 1052 Fmegncpp.exe Ffmkfifa.exe PID 1052 wrote to memory of 1780 1052 Fmegncpp.exe Ffmkfifa.exe PID 1780 wrote to memory of 2424 1780 Ffmkfifa.exe Fofpoo32.exe PID 1780 wrote to memory of 2424 1780 Ffmkfifa.exe Fofpoo32.exe PID 1780 wrote to memory of 2424 1780 Ffmkfifa.exe Fofpoo32.exe PID 1780 wrote to memory of 2424 1780 Ffmkfifa.exe Fofpoo32.exe PID 2424 wrote to memory of 2784 2424 Fofpoo32.exe Fgadda32.exe PID 2424 wrote to memory of 2784 2424 Fofpoo32.exe Fgadda32.exe PID 2424 wrote to memory of 2784 2424 Fofpoo32.exe Fgadda32.exe PID 2424 wrote to memory of 2784 2424 Fofpoo32.exe Fgadda32.exe PID 2784 wrote to memory of 1836 2784 Fgadda32.exe Gjbmelgm.exe PID 2784 wrote to memory of 1836 2784 Fgadda32.exe Gjbmelgm.exe PID 2784 wrote to memory of 1836 2784 Fgadda32.exe Gjbmelgm.exe PID 2784 wrote to memory of 1836 2784 Fgadda32.exe Gjbmelgm.exe PID 1836 wrote to memory of 1968 1836 Gjbmelgm.exe Ggfnopfg.exe PID 1836 wrote to memory of 1968 1836 Gjbmelgm.exe Ggfnopfg.exe PID 1836 wrote to memory of 1968 1836 Gjbmelgm.exe Ggfnopfg.exe PID 1836 wrote to memory of 1968 1836 Gjbmelgm.exe Ggfnopfg.exe PID 1968 wrote to memory of 2172 1968 Ggfnopfg.exe Gjfgqk32.exe PID 1968 wrote to memory of 2172 1968 Ggfnopfg.exe Gjfgqk32.exe PID 1968 wrote to memory of 2172 1968 Ggfnopfg.exe Gjfgqk32.exe PID 1968 wrote to memory of 2172 1968 Ggfnopfg.exe Gjfgqk32.exe PID 2172 wrote to memory of 2972 2172 Gjfgqk32.exe Gcokiaji.exe PID 2172 wrote to memory of 2972 2172 Gjfgqk32.exe Gcokiaji.exe PID 2172 wrote to memory of 2972 2172 Gjfgqk32.exe Gcokiaji.exe PID 2172 wrote to memory of 2972 2172 Gjfgqk32.exe Gcokiaji.exe PID 2972 wrote to memory of 1992 2972 Gcokiaji.exe Gildahhp.exe PID 2972 wrote to memory of 1992 2972 Gcokiaji.exe Gildahhp.exe PID 2972 wrote to memory of 1992 2972 Gcokiaji.exe Gildahhp.exe PID 2972 wrote to memory of 1992 2972 Gcokiaji.exe Gildahhp.exe PID 1992 wrote to memory of 772 1992 Gildahhp.exe Hfpdkl32.exe PID 1992 wrote to memory of 772 1992 Gildahhp.exe Hfpdkl32.exe PID 1992 wrote to memory of 772 1992 Gildahhp.exe Hfpdkl32.exe PID 1992 wrote to memory of 772 1992 Gildahhp.exe Hfpdkl32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe"C:\Users\Admin\AppData\Local\Temp\c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dkadjn32.exeC:\Windows\system32\Dkadjn32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Endjaief.exeC:\Windows\system32\Endjaief.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Elldgehk.exeC:\Windows\system32\Elldgehk.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Eqjmncna.exeC:\Windows\system32\Eqjmncna.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Fcjeon32.exeC:\Windows\system32\Fcjeon32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Fmcjhdbc.exeC:\Windows\system32\Fmcjhdbc.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Fmegncpp.exeC:\Windows\system32\Fmegncpp.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ffmkfifa.exeC:\Windows\system32\Ffmkfifa.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Fofpoo32.exeC:\Windows\system32\Fofpoo32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Fgadda32.exeC:\Windows\system32\Fgadda32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gjbmelgm.exeC:\Windows\system32\Gjbmelgm.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ggfnopfg.exeC:\Windows\system32\Ggfnopfg.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gjfgqk32.exeC:\Windows\system32\Gjfgqk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gcokiaji.exeC:\Windows\system32\Gcokiaji.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gildahhp.exeC:\Windows\system32\Gildahhp.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hfpdkl32.exeC:\Windows\system32\Hfpdkl32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Hnkion32.exeC:\Windows\system32\Hnkion32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Hpjeialg.exeC:\Windows\system32\Hpjeialg.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Hnpbjnpo.exeC:\Windows\system32\Hnpbjnpo.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Hapklimq.exeC:\Windows\system32\Hapklimq.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ipehmebh.exeC:\Windows\system32\Ipehmebh.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Imiigiab.exeC:\Windows\system32\Imiigiab.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ijmipn32.exeC:\Windows\system32\Ijmipn32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Imnbbi32.exeC:\Windows\system32\Imnbbi32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Ioakoq32.exeC:\Windows\system32\Ioakoq32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jhjphfgi.exeC:\Windows\system32\Jhjphfgi.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jbpdeogo.exeC:\Windows\system32\Jbpdeogo.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jkkija32.exeC:\Windows\system32\Jkkija32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jhoice32.exeC:\Windows\system32\Jhoice32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jagnlkjd.exeC:\Windows\system32\Jagnlkjd.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jgdfdbhk.exeC:\Windows\system32\Jgdfdbhk.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jplkmgol.exeC:\Windows\system32\Jplkmgol.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jpogbgmi.exeC:\Windows\system32\Jpogbgmi.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kfkpknkq.exeC:\Windows\system32\Kfkpknkq.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Klehgh32.exeC:\Windows\system32\Klehgh32.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kljabgnh.exeC:\Windows\system32\Kljabgnh.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kkoncdcp.exeC:\Windows\system32\Kkoncdcp.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mgmahg32.exeC:\Windows\system32\Mgmahg32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nnkcpq32.exeC:\Windows\system32\Nnkcpq32.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Njbdea32.exeC:\Windows\system32\Njbdea32.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Npolmh32.exeC:\Windows\system32\Npolmh32.exe42⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Nmcmgm32.exeC:\Windows\system32\Nmcmgm32.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nbpeoc32.exeC:\Windows\system32\Nbpeoc32.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nfnneb32.exeC:\Windows\system32\Nfnneb32.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Opfbngfb.exeC:\Windows\system32\Opfbngfb.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Oeckfndj.exeC:\Windows\system32\Oeckfndj.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Obgkpb32.exeC:\Windows\system32\Obgkpb32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Oeehln32.exeC:\Windows\system32\Oeehln32.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ohcdhi32.exeC:\Windows\system32\Ohcdhi32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Omqlpp32.exeC:\Windows\system32\Omqlpp32.exe51⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ohfqmi32.exeC:\Windows\system32\Ohfqmi32.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Oopijc32.exeC:\Windows\system32\Oopijc32.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Opaebkmc.exeC:\Windows\system32\Opaebkmc.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ogknoe32.exeC:\Windows\system32\Ogknoe32.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Oaqbln32.exeC:\Windows\system32\Oaqbln32.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pkifdd32.exeC:\Windows\system32\Pkifdd32.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pljcllqe.exeC:\Windows\system32\Pljcllqe.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pcdkif32.exeC:\Windows\system32\Pcdkif32.exe59⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pincfpoo.exeC:\Windows\system32\Pincfpoo.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pgbdodnh.exeC:\Windows\system32\Pgbdodnh.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Plolgk32.exeC:\Windows\system32\Plolgk32.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pegqpacp.exeC:\Windows\system32\Pegqpacp.exe63⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pkdihhag.exeC:\Windows\system32\Pkdihhag.exe64⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pejmfqan.exeC:\Windows\system32\Pejmfqan.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qkffng32.exeC:\Windows\system32\Qkffng32.exe66⤵
-
C:\Windows\SysWOW64\Qnebjc32.exeC:\Windows\system32\Qnebjc32.exe67⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qdojgmfe.exeC:\Windows\system32\Qdojgmfe.exe68⤵
-
C:\Windows\SysWOW64\Qackpado.exeC:\Windows\system32\Qackpado.exe69⤵
-
C:\Windows\SysWOW64\Agpcihcf.exeC:\Windows\system32\Agpcihcf.exe70⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Anjlebjc.exeC:\Windows\system32\Anjlebjc.exe71⤵
-
C:\Windows\SysWOW64\Adcdbl32.exeC:\Windows\system32\Adcdbl32.exe72⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Anlhkbhq.exeC:\Windows\system32\Anlhkbhq.exe73⤵
-
C:\Windows\SysWOW64\Afgmodel.exeC:\Windows\system32\Afgmodel.exe74⤵
-
C:\Windows\SysWOW64\Aopahjll.exeC:\Windows\system32\Aopahjll.exe75⤵
-
C:\Windows\SysWOW64\Aihfap32.exeC:\Windows\system32\Aihfap32.exe76⤵
-
C:\Windows\SysWOW64\Acnjnh32.exeC:\Windows\system32\Acnjnh32.exe77⤵
-
C:\Windows\SysWOW64\Amfognic.exeC:\Windows\system32\Amfognic.exe78⤵
-
C:\Windows\SysWOW64\Bbbgod32.exeC:\Windows\system32\Bbbgod32.exe79⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bkklhjnk.exeC:\Windows\system32\Bkklhjnk.exe80⤵
-
C:\Windows\SysWOW64\Bfqpecma.exeC:\Windows\system32\Bfqpecma.exe81⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bkmhnjlh.exeC:\Windows\system32\Bkmhnjlh.exe82⤵
-
C:\Windows\SysWOW64\Befmfpbi.exeC:\Windows\system32\Befmfpbi.exe83⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bbjmpcab.exeC:\Windows\system32\Bbjmpcab.exe84⤵
-
C:\Windows\SysWOW64\Behilopf.exeC:\Windows\system32\Behilopf.exe85⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bjebdfnn.exeC:\Windows\system32\Bjebdfnn.exe86⤵
-
C:\Windows\SysWOW64\Bcmfmlen.exeC:\Windows\system32\Bcmfmlen.exe87⤵
-
C:\Windows\SysWOW64\Cmfkfa32.exeC:\Windows\system32\Cmfkfa32.exe88⤵
-
C:\Windows\SysWOW64\Cjjkpe32.exeC:\Windows\system32\Cjjkpe32.exe89⤵
-
C:\Windows\SysWOW64\Cpfdhl32.exeC:\Windows\system32\Cpfdhl32.exe90⤵
-
C:\Windows\SysWOW64\Cjlheehe.exeC:\Windows\system32\Cjlheehe.exe91⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cpiqmlfm.exeC:\Windows\system32\Cpiqmlfm.exe92⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cmmagpef.exeC:\Windows\system32\Cmmagpef.exe93⤵
-
C:\Windows\SysWOW64\Cbiiog32.exeC:\Windows\system32\Cbiiog32.exe94⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Chfbgn32.exeC:\Windows\system32\Chfbgn32.exe95⤵
-
C:\Windows\SysWOW64\Copjdhib.exeC:\Windows\system32\Copjdhib.exe96⤵
-
C:\Windows\SysWOW64\Dejbqb32.exeC:\Windows\system32\Dejbqb32.exe97⤵
-
C:\Windows\SysWOW64\Dbncjf32.exeC:\Windows\system32\Dbncjf32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Dhkkbmnp.exeC:\Windows\system32\Dhkkbmnp.exe99⤵
-
C:\Windows\SysWOW64\Doecog32.exeC:\Windows\system32\Doecog32.exe100⤵
-
C:\Windows\SysWOW64\Deollamj.exeC:\Windows\system32\Deollamj.exe101⤵
-
C:\Windows\SysWOW64\Dfphcj32.exeC:\Windows\system32\Dfphcj32.exe102⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dphmloih.exeC:\Windows\system32\Dphmloih.exe103⤵
-
C:\Windows\SysWOW64\Diaaeepi.exeC:\Windows\system32\Diaaeepi.exe104⤵
-
C:\Windows\SysWOW64\Dbifnj32.exeC:\Windows\system32\Dbifnj32.exe105⤵
-
C:\Windows\SysWOW64\Dmojkc32.exeC:\Windows\system32\Dmojkc32.exe106⤵
-
C:\Windows\SysWOW64\Eggndi32.exeC:\Windows\system32\Eggndi32.exe107⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Egikjh32.exeC:\Windows\system32\Egikjh32.exe108⤵
-
C:\Windows\SysWOW64\Eacljf32.exeC:\Windows\system32\Eacljf32.exe109⤵
-
C:\Windows\SysWOW64\Ecbhdi32.exeC:\Windows\system32\Ecbhdi32.exe110⤵
-
C:\Windows\SysWOW64\Eddeladm.exeC:\Windows\system32\Eddeladm.exe111⤵
-
C:\Windows\SysWOW64\Eaheeecg.exeC:\Windows\system32\Eaheeecg.exe112⤵
-
C:\Windows\SysWOW64\Fnofjfhk.exeC:\Windows\system32\Fnofjfhk.exe113⤵
-
C:\Windows\SysWOW64\Gnaooi32.exeC:\Windows\system32\Gnaooi32.exe114⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ggkqmoma.exeC:\Windows\system32\Ggkqmoma.exe115⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hqfaldbo.exeC:\Windows\system32\Hqfaldbo.exe116⤵
-
C:\Windows\SysWOW64\Hnjbeh32.exeC:\Windows\system32\Hnjbeh32.exe117⤵
-
C:\Windows\SysWOW64\Hcgjmo32.exeC:\Windows\system32\Hcgjmo32.exe118⤵
-
C:\Windows\SysWOW64\Hjacjifm.exeC:\Windows\system32\Hjacjifm.exe119⤵
-
C:\Windows\SysWOW64\Hjcppidk.exeC:\Windows\system32\Hjcppidk.exe120⤵
-
C:\Windows\SysWOW64\Hldlga32.exeC:\Windows\system32\Hldlga32.exe121⤵
-
C:\Windows\SysWOW64\Hemqpf32.exeC:\Windows\system32\Hemqpf32.exe122⤵
-
C:\Windows\SysWOW64\Hmdhad32.exeC:\Windows\system32\Hmdhad32.exe123⤵
-
C:\Windows\SysWOW64\Hneeilgj.exeC:\Windows\system32\Hneeilgj.exe124⤵
-
C:\Windows\SysWOW64\Inhanl32.exeC:\Windows\system32\Inhanl32.exe125⤵
-
C:\Windows\SysWOW64\Ibcnojnp.exeC:\Windows\system32\Ibcnojnp.exe126⤵
-
C:\Windows\SysWOW64\Injndk32.exeC:\Windows\system32\Injndk32.exe127⤵
-
C:\Windows\SysWOW64\Ijqoilii.exeC:\Windows\system32\Ijqoilii.exe128⤵
-
C:\Windows\SysWOW64\Iakgefqe.exeC:\Windows\system32\Iakgefqe.exe129⤵
-
C:\Windows\SysWOW64\Ihdpbq32.exeC:\Windows\system32\Ihdpbq32.exe130⤵
-
C:\Windows\SysWOW64\Idkpganf.exeC:\Windows\system32\Idkpganf.exe131⤵
-
C:\Windows\SysWOW64\Jpbalb32.exeC:\Windows\system32\Jpbalb32.exe132⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jikeeh32.exeC:\Windows\system32\Jikeeh32.exe133⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Jmhnkfpa.exeC:\Windows\system32\Jmhnkfpa.exe134⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jbefcm32.exeC:\Windows\system32\Jbefcm32.exe135⤵
-
C:\Windows\SysWOW64\Jbhcim32.exeC:\Windows\system32\Jbhcim32.exe136⤵
-
C:\Windows\SysWOW64\Jialfgcc.exeC:\Windows\system32\Jialfgcc.exe137⤵
-
C:\Windows\SysWOW64\Jampjian.exeC:\Windows\system32\Jampjian.exe138⤵
-
C:\Windows\SysWOW64\Kekiphge.exeC:\Windows\system32\Kekiphge.exe139⤵
-
C:\Windows\SysWOW64\Kpdjaecc.exeC:\Windows\system32\Kpdjaecc.exe140⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Khkbbc32.exeC:\Windows\system32\Khkbbc32.exe141⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kpgffe32.exeC:\Windows\system32\Kpgffe32.exe142⤵
-
C:\Windows\SysWOW64\Kjokokha.exeC:\Windows\system32\Kjokokha.exe143⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kcgphp32.exeC:\Windows\system32\Kcgphp32.exe144⤵
-
C:\Windows\SysWOW64\Lonpma32.exeC:\Windows\system32\Lonpma32.exe145⤵
-
C:\Windows\SysWOW64\Lpnmgdli.exeC:\Windows\system32\Lpnmgdli.exe146⤵
-
C:\Windows\SysWOW64\Lhiakf32.exeC:\Windows\system32\Lhiakf32.exe147⤵
-
C:\Windows\SysWOW64\Lcofio32.exeC:\Windows\system32\Lcofio32.exe148⤵
-
C:\Windows\SysWOW64\Llgjaeoj.exeC:\Windows\system32\Llgjaeoj.exe149⤵
-
C:\Windows\SysWOW64\Lgqkbb32.exeC:\Windows\system32\Lgqkbb32.exe150⤵
-
C:\Windows\SysWOW64\Lgchgb32.exeC:\Windows\system32\Lgchgb32.exe151⤵
-
C:\Windows\SysWOW64\Mjaddn32.exeC:\Windows\system32\Mjaddn32.exe152⤵
-
C:\Windows\SysWOW64\Mdghaf32.exeC:\Windows\system32\Mdghaf32.exe153⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mmbmeifk.exeC:\Windows\system32\Mmbmeifk.exe154⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mjfnomde.exeC:\Windows\system32\Mjfnomde.exe155⤵
-
C:\Windows\SysWOW64\Mfmndn32.exeC:\Windows\system32\Mfmndn32.exe156⤵
-
C:\Windows\SysWOW64\Mbcoio32.exeC:\Windows\system32\Mbcoio32.exe157⤵
-
C:\Windows\SysWOW64\Mmicfh32.exeC:\Windows\system32\Mmicfh32.exe158⤵
-
C:\Windows\SysWOW64\Nmkplgnq.exeC:\Windows\system32\Nmkplgnq.exe159⤵
-
C:\Windows\SysWOW64\Nbhhdnlh.exeC:\Windows\system32\Nbhhdnlh.exe160⤵
-
C:\Windows\SysWOW64\Nnoiio32.exeC:\Windows\system32\Nnoiio32.exe161⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Njfjnpgp.exeC:\Windows\system32\Njfjnpgp.exe162⤵
-
C:\Windows\SysWOW64\Ncnngfna.exeC:\Windows\system32\Ncnngfna.exe163⤵
-
C:\Windows\SysWOW64\Nmfbpk32.exeC:\Windows\system32\Nmfbpk32.exe164⤵
-
C:\Windows\SysWOW64\Nfoghakb.exeC:\Windows\system32\Nfoghakb.exe165⤵
-
C:\Windows\SysWOW64\Ohncbdbd.exeC:\Windows\system32\Ohncbdbd.exe166⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Obhdcanc.exeC:\Windows\system32\Obhdcanc.exe167⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ompefj32.exeC:\Windows\system32\Ompefj32.exe168⤵
-
C:\Windows\SysWOW64\Oekjjl32.exeC:\Windows\system32\Oekjjl32.exe169⤵
-
C:\Windows\SysWOW64\Opqoge32.exeC:\Windows\system32\Opqoge32.exe170⤵
-
C:\Windows\SysWOW64\Pbagipfi.exeC:\Windows\system32\Pbagipfi.exe171⤵
-
C:\Windows\SysWOW64\Pcljmdmj.exeC:\Windows\system32\Pcljmdmj.exe172⤵
-
C:\Windows\SysWOW64\Pleofj32.exeC:\Windows\system32\Pleofj32.exe173⤵
-
C:\Windows\SysWOW64\Qcogbdkg.exeC:\Windows\system32\Qcogbdkg.exe174⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qlgkki32.exeC:\Windows\system32\Qlgkki32.exe175⤵
-
C:\Windows\SysWOW64\Apedah32.exeC:\Windows\system32\Apedah32.exe176⤵
-
C:\Windows\SysWOW64\Agolnbok.exeC:\Windows\system32\Agolnbok.exe177⤵
-
C:\Windows\SysWOW64\Acfmcc32.exeC:\Windows\system32\Acfmcc32.exe178⤵
-
C:\Windows\SysWOW64\Adifpk32.exeC:\Windows\system32\Adifpk32.exe179⤵
-
C:\Windows\SysWOW64\Adlcfjgh.exeC:\Windows\system32\Adlcfjgh.exe180⤵
-
C:\Windows\SysWOW64\Abpcooea.exeC:\Windows\system32\Abpcooea.exe181⤵
-
C:\Windows\SysWOW64\Bbbpenco.exeC:\Windows\system32\Bbbpenco.exe182⤵
-
C:\Windows\SysWOW64\Bceibfgj.exeC:\Windows\system32\Bceibfgj.exe183⤵
-
C:\Windows\SysWOW64\Bqijljfd.exeC:\Windows\system32\Bqijljfd.exe184⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bffbdadk.exeC:\Windows\system32\Bffbdadk.exe185⤵
-
C:\Windows\SysWOW64\Bfioia32.exeC:\Windows\system32\Bfioia32.exe186⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Coacbfii.exeC:\Windows\system32\Coacbfii.exe187⤵
-
C:\Windows\SysWOW64\Ciihklpj.exeC:\Windows\system32\Ciihklpj.exe188⤵
-
C:\Windows\SysWOW64\Cnfqccna.exeC:\Windows\system32\Cnfqccna.exe189⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ckjamgmk.exeC:\Windows\system32\Ckjamgmk.exe190⤵
-
C:\Windows\SysWOW64\Cbdiia32.exeC:\Windows\system32\Cbdiia32.exe191⤵
-
C:\Windows\SysWOW64\Ckmnbg32.exeC:\Windows\system32\Ckmnbg32.exe192⤵
-
C:\Windows\SysWOW64\Caifjn32.exeC:\Windows\system32\Caifjn32.exe193⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Calcpm32.exeC:\Windows\system32\Calcpm32.exe194⤵
-
C:\Windows\SysWOW64\Dfkhndca.exeC:\Windows\system32\Dfkhndca.exe195⤵
-
C:\Windows\SysWOW64\Dmepkn32.exeC:\Windows\system32\Dmepkn32.exe196⤵
-
C:\Windows\SysWOW64\Dcohghbk.exeC:\Windows\system32\Dcohghbk.exe197⤵
-
C:\Windows\SysWOW64\Dmgmpnhl.exeC:\Windows\system32\Dmgmpnhl.exe198⤵
-
C:\Windows\SysWOW64\Ddaemh32.exeC:\Windows\system32\Ddaemh32.exe199⤵
-
C:\Windows\SysWOW64\Debadpeg.exeC:\Windows\system32\Debadpeg.exe200⤵
-
C:\Windows\SysWOW64\Dlljaj32.exeC:\Windows\system32\Dlljaj32.exe201⤵
-
C:\Windows\SysWOW64\Dokfme32.exeC:\Windows\system32\Dokfme32.exe202⤵
-
C:\Windows\SysWOW64\Dipjkn32.exeC:\Windows\system32\Dipjkn32.exe203⤵
-
C:\Windows\SysWOW64\Dpjbgh32.exeC:\Windows\system32\Dpjbgh32.exe204⤵
-
C:\Windows\SysWOW64\Eakooqih.exeC:\Windows\system32\Eakooqih.exe205⤵
-
C:\Windows\SysWOW64\Eopphehb.exeC:\Windows\system32\Eopphehb.exe206⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eeiheo32.exeC:\Windows\system32\Eeiheo32.exe207⤵
-
C:\Windows\SysWOW64\Ehhdaj32.exeC:\Windows\system32\Ehhdaj32.exe208⤵
-
C:\Windows\SysWOW64\Emdmjamj.exeC:\Windows\system32\Emdmjamj.exe209⤵
-
C:\Windows\SysWOW64\Edoefl32.exeC:\Windows\system32\Edoefl32.exe210⤵
-
C:\Windows\SysWOW64\Emgioakg.exeC:\Windows\system32\Emgioakg.exe211⤵
-
C:\Windows\SysWOW64\Egonhf32.exeC:\Windows\system32\Egonhf32.exe212⤵
-
C:\Windows\SysWOW64\Emifeqid.exeC:\Windows\system32\Emifeqid.exe213⤵
-
C:\Windows\SysWOW64\Fmlbjq32.exeC:\Windows\system32\Fmlbjq32.exe214⤵
-
C:\Windows\SysWOW64\Fpjofl32.exeC:\Windows\system32\Fpjofl32.exe215⤵
-
C:\Windows\SysWOW64\Fgfdie32.exeC:\Windows\system32\Fgfdie32.exe216⤵
-
C:\Windows\SysWOW64\Fhgppnan.exeC:\Windows\system32\Fhgppnan.exe217⤵
-
C:\Windows\SysWOW64\Fkhibino.exeC:\Windows\system32\Fkhibino.exe218⤵
-
C:\Windows\SysWOW64\Fennoa32.exeC:\Windows\system32\Fennoa32.exe219⤵
-
C:\Windows\SysWOW64\Fepjea32.exeC:\Windows\system32\Fepjea32.exe220⤵
-
C:\Windows\SysWOW64\Goiongbc.exeC:\Windows\system32\Goiongbc.exe221⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Gpjkeoha.exeC:\Windows\system32\Gpjkeoha.exe222⤵
-
C:\Windows\SysWOW64\Gkoobhhg.exeC:\Windows\system32\Gkoobhhg.exe223⤵
-
C:\Windows\SysWOW64\Gckdgjeb.exeC:\Windows\system32\Gckdgjeb.exe224⤵
-
C:\Windows\SysWOW64\Gqodqodl.exeC:\Windows\system32\Gqodqodl.exe225⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Gjgiidkl.exeC:\Windows\system32\Gjgiidkl.exe226⤵
-
C:\Windows\SysWOW64\Ggkibhjf.exeC:\Windows\system32\Ggkibhjf.exe227⤵
-
C:\Windows\SysWOW64\Gqcnln32.exeC:\Windows\system32\Gqcnln32.exe228⤵
-
C:\Windows\SysWOW64\Hfpfdeon.exeC:\Windows\system32\Hfpfdeon.exe229⤵
-
C:\Windows\SysWOW64\Hinbppna.exeC:\Windows\system32\Hinbppna.exe230⤵
-
C:\Windows\SysWOW64\Hcdgmimg.exeC:\Windows\system32\Hcdgmimg.exe231⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hokhbj32.exeC:\Windows\system32\Hokhbj32.exe232⤵
-
C:\Windows\SysWOW64\Hegpjaac.exeC:\Windows\system32\Hegpjaac.exe233⤵
-
C:\Windows\SysWOW64\Hgkfal32.exeC:\Windows\system32\Hgkfal32.exe234⤵
-
C:\Windows\SysWOW64\Ieofkp32.exeC:\Windows\system32\Ieofkp32.exe235⤵
-
C:\Windows\SysWOW64\Iphgln32.exeC:\Windows\system32\Iphgln32.exe236⤵
-
C:\Windows\SysWOW64\Iiqldc32.exeC:\Windows\system32\Iiqldc32.exe237⤵
-
C:\Windows\SysWOW64\Iichjc32.exeC:\Windows\system32\Iichjc32.exe238⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ipmqgmcd.exeC:\Windows\system32\Ipmqgmcd.exe239⤵
-
C:\Windows\SysWOW64\Ilcalnii.exeC:\Windows\system32\Ilcalnii.exe240⤵
-
C:\Windows\SysWOW64\Jelfdc32.exeC:\Windows\system32\Jelfdc32.exe241⤵