Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe
Resource
win10v2004-20240508-en
General
-
Target
9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe
-
Size
163KB
-
MD5
580baae777aa29e699701e4fe8fff955
-
SHA1
4004d366cecf6a450198fc68f934b0e33d663e29
-
SHA256
9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e
-
SHA512
d01800bd14a35183c03a19d1c77d8741e41cc5648532137a5ae5eea1f3a8f8fb64f4b198c7bec0a75675b020de85160151ae11cb93c229e86ef8203d51d23d08
-
SSDEEP
3072:tCPp+GksSiNLAgGgNGfltOrWKDBr+yJb:MPpZSxWMfLOf
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Chokikeb.exeDhocqigp.exePkfblfab.exeBhaebcen.exeBdmpcdfm.exeHbpgbo32.exeAgoabn32.exeQbgqio32.exeNcfdie32.exePqbdjfln.exeDmjocp32.exeAbkjdnoa.exeGdqgmmjb.exeJlnnmb32.exeKebbafoj.exeLdoaklml.exeIcnpmp32.exeOpakbi32.exeDekhneap.exeDocmgjhp.exeGfngap32.exeGcfqfc32.exeHmfkoh32.exeOjoign32.exeOlmeci32.exeDopigd32.exePcjapi32.exePkhoae32.exeBbgipldd.exeGkhbdg32.exeOnhhamgg.exeBagflcje.exePabkdmpi.exeEdbklofb.exeIpnjab32.exeLfhdlh32.exeMnebeogl.exeAhhblemi.exe9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exeGofkje32.exeHimldi32.exeAnogiicl.exeBlfdia32.exeDddojq32.exeMgimcebb.exeNljofl32.exeQmmnjfnl.exePkjlge32.exeAndgoobc.exeEchknh32.exeEapedd32.exeEhimanbq.exeCbcilkjg.exePqpnombl.exeGbdgfa32.exeCmiflbel.exeHflcbngh.exeMgkjhe32.exeLmgfda32.exePghieg32.exePbbgnpgl.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chokikeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkfblfab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhaebcen.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdmpcdfm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbpgbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agoabn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qbgqio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncfdie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqbdjfln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abkjdnoa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdqgmmjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jlnnmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kebbafoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldoaklml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icnpmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kebbafoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opakbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dekhneap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Docmgjhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfngap32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcfqfc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmfkoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojoign32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olmeci32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcjapi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkhoae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbgipldd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkhbdg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onhhamgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bagflcje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pabkdmpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edbklofb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipnjab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfhdlh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnebeogl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahhblemi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chokikeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gofkje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Himldi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anogiicl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blfdia32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddojq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgimcebb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nljofl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmmnjfnl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkjlge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Andgoobc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Echknh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eapedd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehimanbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbcilkjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqpnombl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dekhneap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbdgfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmiflbel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hflcbngh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgkjhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmgfda32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pghieg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbbgnpgl.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Ncgkcl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Njacpf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nbhkac32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncihikcg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nkqpjidj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncldnkae.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nggqoj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Njfmke32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ogjmdigk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ondeac32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oqbamo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Okhfjh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Onfbfc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Occkojkm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Onholckc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oqgkhnjf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ogaceh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ojopad32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oqihnn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ocgdji32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4112-160-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Obidhaog.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pcjapi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pjdilcla.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pqnaim32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pghieg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pnbbbabh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pqpnombl.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2788-215-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pgjfkg32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/436-228-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pkfblfab.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pndohaqe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pabkdmpi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pcagphom.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/5056-295-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4160-301-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qjpiha32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2572-310-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4928-358-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1720-370-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2440-376-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Abngjnmo.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2532-382-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2232-410-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dekhneap.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Deoaid32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2076-634-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4448-633-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dafbne32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eefhjc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ekcpbj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fkmchi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fckajehi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gfngap32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ghaliknf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gcimkc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hmcojh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hflcbngh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hbgmcnhf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Immapg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ickchq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ieolehop.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jlkagbej.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Ncgkcl32.exe UPX C:\Windows\SysWOW64\Njacpf32.exe UPX behavioral2/memory/3112-21-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Nbhkac32.exe UPX behavioral2/memory/1248-29-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ncihikcg.exe UPX C:\Windows\SysWOW64\Nkqpjidj.exe UPX C:\Windows\SysWOW64\Ncldnkae.exe UPX C:\Windows\SysWOW64\Nggqoj32.exe UPX C:\Windows\SysWOW64\Njfmke32.exe UPX C:\Windows\SysWOW64\Ogjmdigk.exe UPX C:\Windows\SysWOW64\Ondeac32.exe UPX C:\Windows\SysWOW64\Oqbamo32.exe UPX C:\Windows\SysWOW64\Okhfjh32.exe UPX C:\Windows\SysWOW64\Onfbfc32.exe UPX C:\Windows\SysWOW64\Occkojkm.exe UPX C:\Windows\SysWOW64\Onholckc.exe UPX C:\Windows\SysWOW64\Oqgkhnjf.exe UPX C:\Windows\SysWOW64\Ogaceh32.exe UPX C:\Windows\SysWOW64\Ojopad32.exe UPX C:\Windows\SysWOW64\Oqihnn32.exe UPX C:\Windows\SysWOW64\Ocgdji32.exe UPX behavioral2/memory/4112-160-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Obidhaog.exe UPX C:\Windows\SysWOW64\Pcjapi32.exe UPX C:\Windows\SysWOW64\Pjdilcla.exe UPX C:\Windows\SysWOW64\Pqnaim32.exe UPX C:\Windows\SysWOW64\Pghieg32.exe UPX C:\Windows\SysWOW64\Pnbbbabh.exe UPX C:\Windows\SysWOW64\Pqpnombl.exe UPX C:\Windows\SysWOW64\Pgjfkg32.exe UPX C:\Windows\SysWOW64\Pkfblfab.exe UPX C:\Windows\SysWOW64\Pndohaqe.exe UPX C:\Windows\SysWOW64\Pabkdmpi.exe UPX C:\Windows\SysWOW64\Pcagphom.exe UPX behavioral2/memory/5056-295-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4160-301-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Qjpiha32.exe UPX behavioral2/memory/2572-310-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4928-358-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1720-370-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2440-376-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Abngjnmo.exe UPX behavioral2/memory/2532-382-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2232-410-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1248-559-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5072-560-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1000-566-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Dekhneap.exe UPX C:\Windows\SysWOW64\Deoaid32.exe UPX behavioral2/memory/2076-634-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4448-633-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Dafbne32.exe UPX C:\Windows\SysWOW64\Eefhjc32.exe UPX C:\Windows\SysWOW64\Ekcpbj32.exe UPX C:\Windows\SysWOW64\Fkmchi32.exe UPX C:\Windows\SysWOW64\Fckajehi.exe UPX C:\Windows\SysWOW64\Gfngap32.exe UPX C:\Windows\SysWOW64\Ghaliknf.exe UPX C:\Windows\SysWOW64\Gcimkc32.exe UPX C:\Windows\SysWOW64\Hmcojh32.exe UPX C:\Windows\SysWOW64\Hflcbngh.exe UPX C:\Windows\SysWOW64\Hbgmcnhf.exe UPX C:\Windows\SysWOW64\Immapg32.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Ncgkcl32.exeNjacpf32.exeNbhkac32.exeNcihikcg.exeNkqpjidj.exeNcldnkae.exeNggqoj32.exeNjfmke32.exeOgjmdigk.exeOndeac32.exeOqbamo32.exeOkhfjh32.exeOnfbfc32.exeOcckojkm.exeOnholckc.exeOqgkhnjf.exeOgaceh32.exeOjopad32.exeOqihnn32.exeOcgdji32.exeObidhaog.exePcjapi32.exePjdilcla.exePqnaim32.exePghieg32.exePnbbbabh.exePqpnombl.exePgjfkg32.exePkfblfab.exePndohaqe.exePabkdmpi.exePcagphom.exePkhoae32.exePbbgnpgl.exePcccfh32.exePkjlge32.exePjmlbbdg.exePnihcq32.exeQecppkdm.exeQgallfcq.exeQjpiha32.exeQbgqio32.exeQajadlja.exeQchmagie.exeQjbena32.exeQnnanphk.exeAcjjfggb.exeAlabgd32.exeAnpncp32.exeAbkjdnoa.exeAanjpk32.exeAhhblemi.exeAjfoiqll.exeAbngjnmo.exeAhkobekf.exeAjiknpjj.exeAndgoobc.exeAacckjaf.exeAeopki32.exeAlhhhcal.exeAngddopp.exeAbbpem32.exeAealah32.exeAhoimd32.exepid process 736 Ncgkcl32.exe 3112 Njacpf32.exe 1248 Nbhkac32.exe 1000 Ncihikcg.exe 1852 Nkqpjidj.exe 3984 Ncldnkae.exe 2724 Nggqoj32.exe 2316 Njfmke32.exe 4956 Ogjmdigk.exe 3372 Ondeac32.exe 3064 Oqbamo32.exe 3852 Okhfjh32.exe 4536 Onfbfc32.exe 4448 Occkojkm.exe 4904 Onholckc.exe 3692 Oqgkhnjf.exe 1816 Ogaceh32.exe 4856 Ojopad32.exe 388 Oqihnn32.exe 4112 Ocgdji32.exe 3460 Obidhaog.exe 3696 Pcjapi32.exe 2516 Pjdilcla.exe 3552 Pqnaim32.exe 2796 Pghieg32.exe 4308 Pnbbbabh.exe 2788 Pqpnombl.exe 436 Pgjfkg32.exe 3956 Pkfblfab.exe 4332 Pndohaqe.exe 2340 Pabkdmpi.exe 4616 Pcagphom.exe 4348 Pkhoae32.exe 4044 Pbbgnpgl.exe 3744 Pcccfh32.exe 1552 Pkjlge32.exe 1276 Pjmlbbdg.exe 4092 Pnihcq32.exe 5056 Qecppkdm.exe 4160 Qgallfcq.exe 2572 Qjpiha32.exe 3860 Qbgqio32.exe 3184 Qajadlja.exe 4296 Qchmagie.exe 532 Qjbena32.exe 4996 Qnnanphk.exe 5088 Acjjfggb.exe 4516 Alabgd32.exe 4928 Anpncp32.exe 3736 Abkjdnoa.exe 1544 Aanjpk32.exe 1720 Ahhblemi.exe 2440 Ajfoiqll.exe 2532 Abngjnmo.exe 4484 Ahkobekf.exe 1620 Ajiknpjj.exe 2460 Andgoobc.exe 2312 Aacckjaf.exe 2232 Aeopki32.exe 4840 Alhhhcal.exe 4920 Angddopp.exe 2960 Abbpem32.exe 1412 Aealah32.exe 4032 Ahoimd32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Opdghh32.exeAnfmjhmd.exeAhhblemi.exeAjneip32.exeFckajehi.exeLdoaklml.exeFkmchi32.exeFlnlhk32.exeKdeoemeg.exePcppfaka.exeJfcbjk32.exeJianff32.exeMnebeogl.exeCagobalc.exePcjapi32.exeCeaehfjj.exeDeagdn32.exeDocmgjhp.exeEofbch32.exePqbdjfln.exeNcldnkae.exeQecppkdm.exeBhkhibmc.exeNlmllkja.exeOlkhmi32.exeDknpmdfc.exeEcoangbg.exeEdpnfo32.exeFfkjlp32.exeAealah32.exeEoaihhlp.exeIfjodl32.exeKpbmco32.exeQcgffqei.exeOqihnn32.exePkfblfab.exeAndgoobc.exeNgmgne32.exeAanjpk32.exeLmppcbjd.exeDafbne32.exeEleiam32.exeFhcpgmjf.exeLffhfh32.exeOnhhamgg.exeOndeac32.exeOjopad32.exeCeoibflm.exeBclhhnca.exeOnfbfc32.exeCeehho32.exeDfnjafap.exeBopgjmhe.exeGohhpe32.exeGcimkc32.exePcncpbmd.exePgjfkg32.exeDbaemi32.exeLboeaifi.exedescription ioc process File created C:\Windows\SysWOW64\Onhhamgg.exe Opdghh32.exe File created C:\Windows\SysWOW64\Ooojbbid.dll Anfmjhmd.exe File created C:\Windows\SysWOW64\Ajfoiqll.exe Ahhblemi.exe File opened for modification C:\Windows\SysWOW64\Becifhfj.exe Ajneip32.exe File created C:\Windows\SysWOW64\Oijgnaaa.dll Fckajehi.exe File created C:\Windows\SysWOW64\Jcjpfk32.dll Ldoaklml.exe File created C:\Windows\SysWOW64\Gcmdhh32.dll Fkmchi32.exe File opened for modification C:\Windows\SysWOW64\Fchddejl.exe Flnlhk32.exe File created C:\Windows\SysWOW64\Gnbinq32.dll Kdeoemeg.exe File opened for modification C:\Windows\SysWOW64\Pfolbmje.exe Pcppfaka.exe File created C:\Windows\SysWOW64\Jianff32.exe Jfcbjk32.exe File created C:\Windows\SysWOW64\Jlpkba32.exe Jianff32.exe File created C:\Windows\SysWOW64\Ndokbi32.exe Mnebeogl.exe File opened for modification C:\Windows\SysWOW64\Jlpkba32.exe Jianff32.exe File created C:\Windows\SysWOW64\Jekpanpa.dll Cagobalc.exe File created C:\Windows\SysWOW64\Iemkcl32.dll Pcjapi32.exe File opened for modification C:\Windows\SysWOW64\Clkndpag.exe Ceaehfjj.exe File created C:\Windows\SysWOW64\Elkadb32.dll Deagdn32.exe File created C:\Windows\SysWOW64\Dhkapp32.exe Docmgjhp.exe File created C:\Windows\SysWOW64\Fhpili32.dll Eofbch32.exe File opened for modification C:\Windows\SysWOW64\Pcppfaka.exe Pqbdjfln.exe File created C:\Windows\SysWOW64\Addjcmqn.dll Ncldnkae.exe File opened for modification C:\Windows\SysWOW64\Qgallfcq.exe Qecppkdm.exe File created C:\Windows\SysWOW64\Eicplccq.dll Bhkhibmc.exe File opened for modification C:\Windows\SysWOW64\Kefkme32.exe Kdeoemeg.exe File opened for modification C:\Windows\SysWOW64\Nphhmj32.exe Nlmllkja.exe File created C:\Windows\SysWOW64\Odapnf32.exe Olkhmi32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Edpnfo32.exe Ecoangbg.exe File created C:\Windows\SysWOW64\Ekjfcipa.exe Edpnfo32.exe File opened for modification C:\Windows\SysWOW64\Fhjfhl32.exe Ffkjlp32.exe File opened for modification C:\Windows\SysWOW64\Ahoimd32.exe Aealah32.exe File created C:\Windows\SysWOW64\Odmkog32.dll Eoaihhlp.exe File created C:\Windows\SysWOW64\Adopjh32.dll Ifjodl32.exe File created C:\Windows\SysWOW64\Aoohalad.dll Kpbmco32.exe File created C:\Windows\SysWOW64\Qffbbldm.exe Qcgffqei.exe File created C:\Windows\SysWOW64\Ocgdji32.exe Oqihnn32.exe File created C:\Windows\SysWOW64\Pndohaqe.exe Pkfblfab.exe File created C:\Windows\SysWOW64\Fcjkaiib.dll Andgoobc.exe File opened for modification C:\Windows\SysWOW64\Nepgjaeg.exe Ngmgne32.exe File opened for modification C:\Windows\SysWOW64\Ahhblemi.exe Aanjpk32.exe File opened for modification C:\Windows\SysWOW64\Ajfoiqll.exe Ahhblemi.exe File created C:\Windows\SysWOW64\Cojlbcgp.dll Lmppcbjd.exe File created C:\Windows\SysWOW64\Ckafhlkg.dll Dafbne32.exe File created C:\Windows\SysWOW64\Eocenh32.exe Eleiam32.exe File opened for modification C:\Windows\SysWOW64\Flnlhk32.exe Fhcpgmjf.exe File created C:\Windows\SysWOW64\Gebgohck.dll Lffhfh32.exe File created C:\Windows\SysWOW64\Hiclgb32.dll Onhhamgg.exe File created C:\Windows\SysWOW64\Oqbamo32.exe Ondeac32.exe File created C:\Windows\SysWOW64\Dalchnkg.dll Ojopad32.exe File opened for modification C:\Windows\SysWOW64\Cklaknjd.exe Ceoibflm.exe File opened for modification C:\Windows\SysWOW64\Bnbmefbg.exe Bclhhnca.exe File opened for modification C:\Windows\SysWOW64\Occkojkm.exe Onfbfc32.exe File created C:\Windows\SysWOW64\Jgilhm32.dll Ceehho32.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dfnjafap.exe File opened for modification C:\Windows\SysWOW64\Bdmpcdfm.exe Bopgjmhe.exe File opened for modification C:\Windows\SysWOW64\Gbgdlq32.exe Gohhpe32.exe File opened for modification C:\Windows\SysWOW64\Hiefcj32.exe Gcimkc32.exe File created C:\Windows\SysWOW64\Pflplnlg.exe Pcncpbmd.exe File created C:\Windows\SysWOW64\Fklfdo32.dll Ondeac32.exe File created C:\Windows\SysWOW64\Pkfblfab.exe Pgjfkg32.exe File opened for modification C:\Windows\SysWOW64\Deoaid32.exe Dbaemi32.exe File created C:\Windows\SysWOW64\Mjddiqoc.dll Jfcbjk32.exe File opened for modification C:\Windows\SysWOW64\Lenamdem.exe Lboeaifi.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8424 9104 WerFault.exe Dmllipeg.exe -
Modifies registry class 64 IoCs
Processes:
Bopgjmhe.exeCklaknjd.exeEcjhcg32.exeBagflcje.exeDdmaok32.exeOqihnn32.exeCegdnopg.exeDhocqigp.exeNbhkac32.exeAbbpem32.exeMmbfpp32.exeFchddejl.exeGbdgfa32.exePcppfaka.exeMlopkm32.exeOgjmdigk.exeOcgdji32.exePcccfh32.exeGohhpe32.exeJlpkba32.exeKmfmmcbo.exe9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exeAbkjdnoa.exeAeopki32.exeIihkpg32.exeKfmepi32.exePkhoae32.exeDekhneap.exeLebkhc32.exeDdakjkqi.exeQajadlja.exeQnnanphk.exeJeaikh32.exeLmppcbjd.exeMchhggno.exeAngddopp.exeAealah32.exeAhoimd32.exeOneklm32.exeBeeoaapl.exeDfnjafap.exeAglemn32.exeLmgfda32.exeMdjagjco.exeOgpmjb32.exePcijeb32.exeIeolehop.exeJbjcolha.exeNfjjppmm.exePfolbmje.exeOnholckc.exePqnaim32.exeMgagbf32.exeOlkhmi32.exePfaigm32.exeAcjclpcf.exeAjiknpjj.exeBecifhfj.exeEoaihhlp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dajbcgdm.dll" Bopgjmhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gohibf32.dll" Cklaknjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecjhcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bagflcje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddmaok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oqihnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cegdnopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkckjila.dll" Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlgcki32.dll" Abbpem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmbfpp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fchddejl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbdgfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcppfaka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhmkaf32.dll" Mlopkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogjmdigk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocgdji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcccfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbkdpj32.dll" Gohhpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jlpkba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmfmmcbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abkjdnoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aeopki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihoofe32.dll" Iihkpg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfmepi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogjmdigk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pkhoae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dekhneap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gohhpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ingbah32.dll" Lebkhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Panjjlqo.dll" Qajadlja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Filmeaek.dll" Qnnanphk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcbifaej.dll" Jeaikh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cojlbcgp.dll" Lmppcbjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eonefj32.dll" Mchhggno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Angddopp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aealah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahoimd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oneklm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Beeoaapl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aglemn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkmjgool.dll" Cegdnopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aeopki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmppcbjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmgfda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdjagjco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogpmjb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcijeb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ieolehop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbjcolha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjbbkg32.dll" Nfjjppmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pfolbmje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmfgdeof.dll" Onholckc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pqnaim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgagbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naekcf32.dll" Olkhmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjpabk32.dll" Pfaigm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghekgcil.dll" Acjclpcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnnobj32.dll" Ajiknpjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oepgml32.dll" Becifhfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eoaihhlp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exeNcgkcl32.exeNjacpf32.exeNbhkac32.exeNcihikcg.exeNkqpjidj.exeNcldnkae.exeNggqoj32.exeNjfmke32.exeOgjmdigk.exeOndeac32.exeOqbamo32.exeOkhfjh32.exeOnfbfc32.exeOcckojkm.exeOnholckc.exeOqgkhnjf.exeOgaceh32.exeOjopad32.exeOqihnn32.exeOcgdji32.exeObidhaog.exedescription pid process target process PID 4388 wrote to memory of 736 4388 9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe Ncgkcl32.exe PID 4388 wrote to memory of 736 4388 9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe Ncgkcl32.exe PID 4388 wrote to memory of 736 4388 9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe Ncgkcl32.exe PID 736 wrote to memory of 3112 736 Ncgkcl32.exe Njacpf32.exe PID 736 wrote to memory of 3112 736 Ncgkcl32.exe Njacpf32.exe PID 736 wrote to memory of 3112 736 Ncgkcl32.exe Njacpf32.exe PID 3112 wrote to memory of 1248 3112 Njacpf32.exe Nbhkac32.exe PID 3112 wrote to memory of 1248 3112 Njacpf32.exe Nbhkac32.exe PID 3112 wrote to memory of 1248 3112 Njacpf32.exe Nbhkac32.exe PID 1248 wrote to memory of 1000 1248 Nbhkac32.exe Ncihikcg.exe PID 1248 wrote to memory of 1000 1248 Nbhkac32.exe Ncihikcg.exe PID 1248 wrote to memory of 1000 1248 Nbhkac32.exe Ncihikcg.exe PID 1000 wrote to memory of 1852 1000 Ncihikcg.exe Nkqpjidj.exe PID 1000 wrote to memory of 1852 1000 Ncihikcg.exe Nkqpjidj.exe PID 1000 wrote to memory of 1852 1000 Ncihikcg.exe Nkqpjidj.exe PID 1852 wrote to memory of 3984 1852 Nkqpjidj.exe Ncldnkae.exe PID 1852 wrote to memory of 3984 1852 Nkqpjidj.exe Ncldnkae.exe PID 1852 wrote to memory of 3984 1852 Nkqpjidj.exe Ncldnkae.exe PID 3984 wrote to memory of 2724 3984 Ncldnkae.exe Nggqoj32.exe PID 3984 wrote to memory of 2724 3984 Ncldnkae.exe Nggqoj32.exe PID 3984 wrote to memory of 2724 3984 Ncldnkae.exe Nggqoj32.exe PID 2724 wrote to memory of 2316 2724 Nggqoj32.exe Njfmke32.exe PID 2724 wrote to memory of 2316 2724 Nggqoj32.exe Njfmke32.exe PID 2724 wrote to memory of 2316 2724 Nggqoj32.exe Njfmke32.exe PID 2316 wrote to memory of 4956 2316 Njfmke32.exe Ogjmdigk.exe PID 2316 wrote to memory of 4956 2316 Njfmke32.exe Ogjmdigk.exe PID 2316 wrote to memory of 4956 2316 Njfmke32.exe Ogjmdigk.exe PID 4956 wrote to memory of 3372 4956 Ogjmdigk.exe Ondeac32.exe PID 4956 wrote to memory of 3372 4956 Ogjmdigk.exe Ondeac32.exe PID 4956 wrote to memory of 3372 4956 Ogjmdigk.exe Ondeac32.exe PID 3372 wrote to memory of 3064 3372 Ondeac32.exe Oqbamo32.exe PID 3372 wrote to memory of 3064 3372 Ondeac32.exe Oqbamo32.exe PID 3372 wrote to memory of 3064 3372 Ondeac32.exe Oqbamo32.exe PID 3064 wrote to memory of 3852 3064 Oqbamo32.exe Okhfjh32.exe PID 3064 wrote to memory of 3852 3064 Oqbamo32.exe Okhfjh32.exe PID 3064 wrote to memory of 3852 3064 Oqbamo32.exe Okhfjh32.exe PID 3852 wrote to memory of 4536 3852 Okhfjh32.exe Onfbfc32.exe PID 3852 wrote to memory of 4536 3852 Okhfjh32.exe Onfbfc32.exe PID 3852 wrote to memory of 4536 3852 Okhfjh32.exe Onfbfc32.exe PID 4536 wrote to memory of 4448 4536 Onfbfc32.exe Occkojkm.exe PID 4536 wrote to memory of 4448 4536 Onfbfc32.exe Occkojkm.exe PID 4536 wrote to memory of 4448 4536 Onfbfc32.exe Occkojkm.exe PID 4448 wrote to memory of 4904 4448 Occkojkm.exe Onholckc.exe PID 4448 wrote to memory of 4904 4448 Occkojkm.exe Onholckc.exe PID 4448 wrote to memory of 4904 4448 Occkojkm.exe Onholckc.exe PID 4904 wrote to memory of 3692 4904 Onholckc.exe Oqgkhnjf.exe PID 4904 wrote to memory of 3692 4904 Onholckc.exe Oqgkhnjf.exe PID 4904 wrote to memory of 3692 4904 Onholckc.exe Oqgkhnjf.exe PID 3692 wrote to memory of 1816 3692 Oqgkhnjf.exe Ogaceh32.exe PID 3692 wrote to memory of 1816 3692 Oqgkhnjf.exe Ogaceh32.exe PID 3692 wrote to memory of 1816 3692 Oqgkhnjf.exe Ogaceh32.exe PID 1816 wrote to memory of 4856 1816 Ogaceh32.exe Ojopad32.exe PID 1816 wrote to memory of 4856 1816 Ogaceh32.exe Ojopad32.exe PID 1816 wrote to memory of 4856 1816 Ogaceh32.exe Ojopad32.exe PID 4856 wrote to memory of 388 4856 Ojopad32.exe Oqihnn32.exe PID 4856 wrote to memory of 388 4856 Ojopad32.exe Oqihnn32.exe PID 4856 wrote to memory of 388 4856 Ojopad32.exe Oqihnn32.exe PID 388 wrote to memory of 4112 388 Oqihnn32.exe Ocgdji32.exe PID 388 wrote to memory of 4112 388 Oqihnn32.exe Ocgdji32.exe PID 388 wrote to memory of 4112 388 Oqihnn32.exe Ocgdji32.exe PID 4112 wrote to memory of 3460 4112 Ocgdji32.exe Obidhaog.exe PID 4112 wrote to memory of 3460 4112 Ocgdji32.exe Obidhaog.exe PID 4112 wrote to memory of 3460 4112 Ocgdji32.exe Obidhaog.exe PID 3460 wrote to memory of 3696 3460 Obidhaog.exe Pcjapi32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe"C:\Users\Admin\AppData\Local\Temp\9d3d9d40c90b409573e1c65457947fd42ec4945fa1c3589553d1189cf53f533e.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Njacpf32.exeC:\Windows\system32\Njacpf32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Nggqoj32.exeC:\Windows\system32\Nggqoj32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Njfmke32.exeC:\Windows\system32\Njfmke32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ogjmdigk.exeC:\Windows\system32\Ogjmdigk.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ondeac32.exeC:\Windows\system32\Ondeac32.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oqbamo32.exeC:\Windows\system32\Oqbamo32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Okhfjh32.exeC:\Windows\system32\Okhfjh32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Onfbfc32.exeC:\Windows\system32\Onfbfc32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Occkojkm.exeC:\Windows\system32\Occkojkm.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Onholckc.exeC:\Windows\system32\Onholckc.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oqgkhnjf.exeC:\Windows\system32\Oqgkhnjf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ogaceh32.exeC:\Windows\system32\Ogaceh32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ojopad32.exeC:\Windows\system32\Ojopad32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oqihnn32.exeC:\Windows\system32\Oqihnn32.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ocgdji32.exeC:\Windows\system32\Ocgdji32.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Obidhaog.exeC:\Windows\system32\Obidhaog.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pcjapi32.exeC:\Windows\system32\Pcjapi32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pjdilcla.exeC:\Windows\system32\Pjdilcla.exe24⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pqnaim32.exeC:\Windows\system32\Pqnaim32.exe25⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pghieg32.exeC:\Windows\system32\Pghieg32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pnbbbabh.exeC:\Windows\system32\Pnbbbabh.exe27⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pqpnombl.exeC:\Windows\system32\Pqpnombl.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pgjfkg32.exeC:\Windows\system32\Pgjfkg32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pkfblfab.exeC:\Windows\system32\Pkfblfab.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pndohaqe.exeC:\Windows\system32\Pndohaqe.exe31⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pabkdmpi.exeC:\Windows\system32\Pabkdmpi.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pcagphom.exeC:\Windows\system32\Pcagphom.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pkhoae32.exeC:\Windows\system32\Pkhoae32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pbbgnpgl.exeC:\Windows\system32\Pbbgnpgl.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pcccfh32.exeC:\Windows\system32\Pcccfh32.exe36⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pkjlge32.exeC:\Windows\system32\Pkjlge32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pjmlbbdg.exeC:\Windows\system32\Pjmlbbdg.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pnihcq32.exeC:\Windows\system32\Pnihcq32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qecppkdm.exeC:\Windows\system32\Qecppkdm.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qgallfcq.exeC:\Windows\system32\Qgallfcq.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qjpiha32.exeC:\Windows\system32\Qjpiha32.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qbgqio32.exeC:\Windows\system32\Qbgqio32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qajadlja.exeC:\Windows\system32\Qajadlja.exe44⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Qchmagie.exeC:\Windows\system32\Qchmagie.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qjbena32.exeC:\Windows\system32\Qjbena32.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qnnanphk.exeC:\Windows\system32\Qnnanphk.exe47⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Acjjfggb.exeC:\Windows\system32\Acjjfggb.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Alabgd32.exeC:\Windows\system32\Alabgd32.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Anpncp32.exeC:\Windows\system32\Anpncp32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Abkjdnoa.exeC:\Windows\system32\Abkjdnoa.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Aanjpk32.exeC:\Windows\system32\Aanjpk32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ahhblemi.exeC:\Windows\system32\Ahhblemi.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ajfoiqll.exeC:\Windows\system32\Ajfoiqll.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Abngjnmo.exeC:\Windows\system32\Abngjnmo.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ahkobekf.exeC:\Windows\system32\Ahkobekf.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ajiknpjj.exeC:\Windows\system32\Ajiknpjj.exe57⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Andgoobc.exeC:\Windows\system32\Andgoobc.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Aacckjaf.exeC:\Windows\system32\Aacckjaf.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Aeopki32.exeC:\Windows\system32\Aeopki32.exe60⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Alhhhcal.exeC:\Windows\system32\Alhhhcal.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Angddopp.exeC:\Windows\system32\Angddopp.exe62⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Abbpem32.exeC:\Windows\system32\Abbpem32.exe63⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Aealah32.exeC:\Windows\system32\Aealah32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ahoimd32.exeC:\Windows\system32\Ahoimd32.exe65⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ajneip32.exeC:\Windows\system32\Ajneip32.exe66⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Becifhfj.exeC:\Windows\system32\Becifhfj.exe67⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bhaebcen.exeC:\Windows\system32\Bhaebcen.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bjpaooda.exeC:\Windows\system32\Bjpaooda.exe69⤵
-
C:\Windows\SysWOW64\Bbgipldd.exeC:\Windows\system32\Bbgipldd.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bdhfhe32.exeC:\Windows\system32\Bdhfhe32.exe71⤵
-
C:\Windows\SysWOW64\Bnnjen32.exeC:\Windows\system32\Bnnjen32.exe72⤵
-
C:\Windows\SysWOW64\Bdkcmdhp.exeC:\Windows\system32\Bdkcmdhp.exe73⤵
-
C:\Windows\SysWOW64\Bopgjmhe.exeC:\Windows\system32\Bopgjmhe.exe74⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bdmpcdfm.exeC:\Windows\system32\Bdmpcdfm.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bjghpn32.exeC:\Windows\system32\Bjghpn32.exe76⤵
-
C:\Windows\SysWOW64\Bhkhibmc.exeC:\Windows\system32\Bhkhibmc.exe77⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Blfdia32.exeC:\Windows\system32\Blfdia32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cbqlfkmi.exeC:\Windows\system32\Cbqlfkmi.exe79⤵
-
C:\Windows\SysWOW64\Ceoibflm.exeC:\Windows\system32\Ceoibflm.exe80⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cklaknjd.exeC:\Windows\system32\Cklaknjd.exe81⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cbcilkjg.exeC:\Windows\system32\Cbcilkjg.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ceaehfjj.exeC:\Windows\system32\Ceaehfjj.exe83⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Clkndpag.exeC:\Windows\system32\Clkndpag.exe84⤵
-
C:\Windows\SysWOW64\Cahfmgoo.exeC:\Windows\system32\Cahfmgoo.exe85⤵
-
C:\Windows\SysWOW64\Clnjjpod.exeC:\Windows\system32\Clnjjpod.exe86⤵
-
C:\Windows\SysWOW64\Colffknh.exeC:\Windows\system32\Colffknh.exe87⤵
-
C:\Windows\SysWOW64\Chdkoa32.exeC:\Windows\system32\Chdkoa32.exe88⤵
-
C:\Windows\SysWOW64\Ckcgkldl.exeC:\Windows\system32\Ckcgkldl.exe89⤵
-
C:\Windows\SysWOW64\Cbjoljdo.exeC:\Windows\system32\Cbjoljdo.exe90⤵
-
C:\Windows\SysWOW64\Clbceo32.exeC:\Windows\system32\Clbceo32.exe91⤵
-
C:\Windows\SysWOW64\Dekhneap.exeC:\Windows\system32\Dekhneap.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Docmgjhp.exeC:\Windows\system32\Docmgjhp.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dhkapp32.exeC:\Windows\system32\Dhkapp32.exe94⤵
-
C:\Windows\SysWOW64\Dbaemi32.exeC:\Windows\system32\Dbaemi32.exe95⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Deoaid32.exeC:\Windows\system32\Deoaid32.exe96⤵
-
C:\Windows\SysWOW64\Dccbbhld.exeC:\Windows\system32\Dccbbhld.exe97⤵
-
C:\Windows\SysWOW64\Dafbne32.exeC:\Windows\system32\Dafbne32.exe98⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dddojq32.exeC:\Windows\system32\Dddojq32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dhpjkojk.exeC:\Windows\system32\Dhpjkojk.exe100⤵
-
C:\Windows\SysWOW64\Dkoggkjo.exeC:\Windows\system32\Dkoggkjo.exe101⤵
-
C:\Windows\SysWOW64\Dceohhja.exeC:\Windows\system32\Dceohhja.exe102⤵
-
C:\Windows\SysWOW64\Ddgkpp32.exeC:\Windows\system32\Ddgkpp32.exe103⤵
-
C:\Windows\SysWOW64\Dlncan32.exeC:\Windows\system32\Dlncan32.exe104⤵
-
C:\Windows\SysWOW64\Eolpmi32.exeC:\Windows\system32\Eolpmi32.exe105⤵
-
C:\Windows\SysWOW64\Echknh32.exeC:\Windows\system32\Echknh32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe107⤵
-
C:\Windows\SysWOW64\Ehedfo32.exeC:\Windows\system32\Ehedfo32.exe108⤵
-
C:\Windows\SysWOW64\Ekcpbj32.exeC:\Windows\system32\Ekcpbj32.exe109⤵
-
C:\Windows\SysWOW64\Ecjhcg32.exeC:\Windows\system32\Ecjhcg32.exe110⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ehgqln32.exeC:\Windows\system32\Ehgqln32.exe111⤵
-
C:\Windows\SysWOW64\Ekemhj32.exeC:\Windows\system32\Ekemhj32.exe112⤵
-
C:\Windows\SysWOW64\Eoaihhlp.exeC:\Windows\system32\Eoaihhlp.exe113⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Eapedd32.exeC:\Windows\system32\Eapedd32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ehimanbq.exeC:\Windows\system32\Ehimanbq.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Eleiam32.exeC:\Windows\system32\Eleiam32.exe116⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eocenh32.exeC:\Windows\system32\Eocenh32.exe117⤵
-
C:\Windows\SysWOW64\Ecoangbg.exeC:\Windows\system32\Ecoangbg.exe118⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Edpnfo32.exeC:\Windows\system32\Edpnfo32.exe119⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ekjfcipa.exeC:\Windows\system32\Ekjfcipa.exe120⤵
-
C:\Windows\SysWOW64\Eofbch32.exeC:\Windows\system32\Eofbch32.exe121⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eadopc32.exeC:\Windows\system32\Eadopc32.exe122⤵
-
C:\Windows\SysWOW64\Edbklofb.exeC:\Windows\system32\Edbklofb.exe123⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fkmchi32.exeC:\Windows\system32\Fkmchi32.exe124⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fhqcam32.exeC:\Windows\system32\Fhqcam32.exe125⤵
-
C:\Windows\SysWOW64\Fllpbldb.exeC:\Windows\system32\Fllpbldb.exe126⤵
-
C:\Windows\SysWOW64\Fojlngce.exeC:\Windows\system32\Fojlngce.exe127⤵
-
C:\Windows\SysWOW64\Ffddka32.exeC:\Windows\system32\Ffddka32.exe128⤵
-
C:\Windows\SysWOW64\Fhcpgmjf.exeC:\Windows\system32\Fhcpgmjf.exe129⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Flnlhk32.exeC:\Windows\system32\Flnlhk32.exe130⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fchddejl.exeC:\Windows\system32\Fchddejl.exe131⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fdialn32.exeC:\Windows\system32\Fdialn32.exe132⤵
-
C:\Windows\SysWOW64\Flqimk32.exeC:\Windows\system32\Flqimk32.exe133⤵
-
C:\Windows\SysWOW64\Fckajehi.exeC:\Windows\system32\Fckajehi.exe134⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fhgjblfq.exeC:\Windows\system32\Fhgjblfq.exe135⤵
-
C:\Windows\SysWOW64\Flceckoj.exeC:\Windows\system32\Flceckoj.exe136⤵
-
C:\Windows\SysWOW64\Fcmnpe32.exeC:\Windows\system32\Fcmnpe32.exe137⤵
-
C:\Windows\SysWOW64\Ffkjlp32.exeC:\Windows\system32\Ffkjlp32.exe138⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fhjfhl32.exeC:\Windows\system32\Fhjfhl32.exe139⤵
-
C:\Windows\SysWOW64\Gkhbdg32.exeC:\Windows\system32\Gkhbdg32.exe140⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gfngap32.exeC:\Windows\system32\Gfngap32.exe141⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gdqgmmjb.exeC:\Windows\system32\Gdqgmmjb.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Glhonj32.exeC:\Windows\system32\Glhonj32.exe143⤵
-
C:\Windows\SysWOW64\Gofkje32.exeC:\Windows\system32\Gofkje32.exe144⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gbdgfa32.exeC:\Windows\system32\Gbdgfa32.exe145⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Gdcdbl32.exeC:\Windows\system32\Gdcdbl32.exe146⤵
-
C:\Windows\SysWOW64\Gmjlcj32.exeC:\Windows\system32\Gmjlcj32.exe147⤵
-
C:\Windows\SysWOW64\Gohhpe32.exeC:\Windows\system32\Gohhpe32.exe148⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Gbgdlq32.exeC:\Windows\system32\Gbgdlq32.exe149⤵
-
C:\Windows\SysWOW64\Ghaliknf.exeC:\Windows\system32\Ghaliknf.exe150⤵
-
C:\Windows\SysWOW64\Gcfqfc32.exeC:\Windows\system32\Gcfqfc32.exe151⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gmoeoidl.exeC:\Windows\system32\Gmoeoidl.exe152⤵
-
C:\Windows\SysWOW64\Gcimkc32.exeC:\Windows\system32\Gcimkc32.exe153⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hiefcj32.exeC:\Windows\system32\Hiefcj32.exe154⤵
-
C:\Windows\SysWOW64\Hopnqdan.exeC:\Windows\system32\Hopnqdan.exe155⤵
-
C:\Windows\SysWOW64\Hbnjmp32.exeC:\Windows\system32\Hbnjmp32.exe156⤵
-
C:\Windows\SysWOW64\Hihbijhn.exeC:\Windows\system32\Hihbijhn.exe157⤵
-
C:\Windows\SysWOW64\Hmcojh32.exeC:\Windows\system32\Hmcojh32.exe158⤵
-
C:\Windows\SysWOW64\Hbpgbo32.exeC:\Windows\system32\Hbpgbo32.exe159⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hflcbngh.exeC:\Windows\system32\Hflcbngh.exe160⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hmfkoh32.exeC:\Windows\system32\Hmfkoh32.exe161⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hcpclbfa.exeC:\Windows\system32\Hcpclbfa.exe162⤵
-
C:\Windows\SysWOW64\Hfnphn32.exeC:\Windows\system32\Hfnphn32.exe163⤵
-
C:\Windows\SysWOW64\Himldi32.exeC:\Windows\system32\Himldi32.exe164⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hkkhqd32.exeC:\Windows\system32\Hkkhqd32.exe165⤵
-
C:\Windows\SysWOW64\Hfqlnm32.exeC:\Windows\system32\Hfqlnm32.exe166⤵
-
C:\Windows\SysWOW64\Hmjdjgjo.exeC:\Windows\system32\Hmjdjgjo.exe167⤵
-
C:\Windows\SysWOW64\Hkmefd32.exeC:\Windows\system32\Hkmefd32.exe168⤵
-
C:\Windows\SysWOW64\Hbgmcnhf.exeC:\Windows\system32\Hbgmcnhf.exe169⤵
-
C:\Windows\SysWOW64\Iefioj32.exeC:\Windows\system32\Iefioj32.exe170⤵
-
C:\Windows\SysWOW64\Immapg32.exeC:\Windows\system32\Immapg32.exe171⤵
-
C:\Windows\SysWOW64\Ipknlb32.exeC:\Windows\system32\Ipknlb32.exe172⤵
-
C:\Windows\SysWOW64\Iehfdi32.exeC:\Windows\system32\Iehfdi32.exe173⤵
-
C:\Windows\SysWOW64\Imoneg32.exeC:\Windows\system32\Imoneg32.exe174⤵
-
C:\Windows\SysWOW64\Ipnjab32.exeC:\Windows\system32\Ipnjab32.exe175⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Iblfnn32.exeC:\Windows\system32\Iblfnn32.exe176⤵
-
C:\Windows\SysWOW64\Iifokh32.exeC:\Windows\system32\Iifokh32.exe177⤵
-
C:\Windows\SysWOW64\Ildkgc32.exeC:\Windows\system32\Ildkgc32.exe178⤵
-
C:\Windows\SysWOW64\Ickchq32.exeC:\Windows\system32\Ickchq32.exe179⤵
-
C:\Windows\SysWOW64\Ifjodl32.exeC:\Windows\system32\Ifjodl32.exe180⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Iihkpg32.exeC:\Windows\system32\Iihkpg32.exe181⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ilghlc32.exeC:\Windows\system32\Ilghlc32.exe182⤵
-
C:\Windows\SysWOW64\Icnpmp32.exeC:\Windows\system32\Icnpmp32.exe183⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ieolehop.exeC:\Windows\system32\Ieolehop.exe184⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ipdqba32.exeC:\Windows\system32\Ipdqba32.exe185⤵
-
C:\Windows\SysWOW64\Jeaikh32.exeC:\Windows\system32\Jeaikh32.exe186⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jlkagbej.exeC:\Windows\system32\Jlkagbej.exe187⤵
-
C:\Windows\SysWOW64\Jbeidl32.exeC:\Windows\system32\Jbeidl32.exe188⤵
-
C:\Windows\SysWOW64\Jedeph32.exeC:\Windows\system32\Jedeph32.exe189⤵
-
C:\Windows\SysWOW64\Jlnnmb32.exeC:\Windows\system32\Jlnnmb32.exe190⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jfcbjk32.exeC:\Windows\system32\Jfcbjk32.exe191⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jianff32.exeC:\Windows\system32\Jianff32.exe192⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jlpkba32.exeC:\Windows\system32\Jlpkba32.exe193⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jbjcolha.exeC:\Windows\system32\Jbjcolha.exe194⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jehokgge.exeC:\Windows\system32\Jehokgge.exe195⤵
-
C:\Windows\SysWOW64\Jlbgha32.exeC:\Windows\system32\Jlbgha32.exe196⤵
-
C:\Windows\SysWOW64\Jpnchp32.exeC:\Windows\system32\Jpnchp32.exe197⤵
-
C:\Windows\SysWOW64\Jfhlejnh.exeC:\Windows\system32\Jfhlejnh.exe198⤵
-
C:\Windows\SysWOW64\Jmbdbd32.exeC:\Windows\system32\Jmbdbd32.exe199⤵
-
C:\Windows\SysWOW64\Jpppnp32.exeC:\Windows\system32\Jpppnp32.exe200⤵
-
C:\Windows\SysWOW64\Kboljk32.exeC:\Windows\system32\Kboljk32.exe201⤵
-
C:\Windows\SysWOW64\Kemhff32.exeC:\Windows\system32\Kemhff32.exe202⤵
-
C:\Windows\SysWOW64\Kpbmco32.exeC:\Windows\system32\Kpbmco32.exe203⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kfmepi32.exeC:\Windows\system32\Kfmepi32.exe204⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kmfmmcbo.exeC:\Windows\system32\Kmfmmcbo.exe205⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kbceejpf.exeC:\Windows\system32\Kbceejpf.exe206⤵
-
C:\Windows\SysWOW64\Kebbafoj.exeC:\Windows\system32\Kebbafoj.exe207⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kpgfooop.exeC:\Windows\system32\Kpgfooop.exe208⤵
-
C:\Windows\SysWOW64\Kbfbkj32.exeC:\Windows\system32\Kbfbkj32.exe209⤵
-
C:\Windows\SysWOW64\Kdeoemeg.exeC:\Windows\system32\Kdeoemeg.exe210⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kefkme32.exeC:\Windows\system32\Kefkme32.exe211⤵
-
C:\Windows\SysWOW64\Kmncnb32.exeC:\Windows\system32\Kmncnb32.exe212⤵
-
C:\Windows\SysWOW64\Lffhfh32.exeC:\Windows\system32\Lffhfh32.exe213⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lmppcbjd.exeC:\Windows\system32\Lmppcbjd.exe214⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lfhdlh32.exeC:\Windows\system32\Lfhdlh32.exe215⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Llemdo32.exeC:\Windows\system32\Llemdo32.exe216⤵
-
C:\Windows\SysWOW64\Lboeaifi.exeC:\Windows\system32\Lboeaifi.exe217⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lenamdem.exeC:\Windows\system32\Lenamdem.exe218⤵
-
C:\Windows\SysWOW64\Lmdina32.exeC:\Windows\system32\Lmdina32.exe219⤵
-
C:\Windows\SysWOW64\Ldoaklml.exeC:\Windows\system32\Ldoaklml.exe220⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Likjcbkc.exeC:\Windows\system32\Likjcbkc.exe221⤵
-
C:\Windows\SysWOW64\Lmgfda32.exeC:\Windows\system32\Lmgfda32.exe222⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Lpebpm32.exeC:\Windows\system32\Lpebpm32.exe223⤵
-
C:\Windows\SysWOW64\Ldanqkki.exeC:\Windows\system32\Ldanqkki.exe224⤵
-
C:\Windows\SysWOW64\Lgokmgjm.exeC:\Windows\system32\Lgokmgjm.exe225⤵
-
C:\Windows\SysWOW64\Lebkhc32.exeC:\Windows\system32\Lebkhc32.exe226⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lllcen32.exeC:\Windows\system32\Lllcen32.exe227⤵
-
C:\Windows\SysWOW64\Mdckfk32.exeC:\Windows\system32\Mdckfk32.exe228⤵
-
C:\Windows\SysWOW64\Mgagbf32.exeC:\Windows\system32\Mgagbf32.exe229⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mipcob32.exeC:\Windows\system32\Mipcob32.exe230⤵
-
C:\Windows\SysWOW64\Mlopkm32.exeC:\Windows\system32\Mlopkm32.exe231⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mchhggno.exeC:\Windows\system32\Mchhggno.exe232⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mmnldp32.exeC:\Windows\system32\Mmnldp32.exe233⤵
-
C:\Windows\SysWOW64\Mdhdajea.exeC:\Windows\system32\Mdhdajea.exe234⤵
-
C:\Windows\SysWOW64\Mckemg32.exeC:\Windows\system32\Mckemg32.exe235⤵
-
C:\Windows\SysWOW64\Miemjaci.exeC:\Windows\system32\Miemjaci.exe236⤵
-
C:\Windows\SysWOW64\Mdjagjco.exeC:\Windows\system32\Mdjagjco.exe237⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mgimcebb.exeC:\Windows\system32\Mgimcebb.exe238⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mmbfpp32.exeC:\Windows\system32\Mmbfpp32.exe239⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mpablkhc.exeC:\Windows\system32\Mpablkhc.exe240⤵
-
C:\Windows\SysWOW64\Mgkjhe32.exeC:\Windows\system32\Mgkjhe32.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup