Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe
Resource
win10v2004-20240508-en
General
-
Target
b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe
-
Size
163KB
-
MD5
f7362d6df73c2c1db4a1e25e8dafd8a3
-
SHA1
d160b1aa07b06045bffecd86ad495a41fd407706
-
SHA256
b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557
-
SHA512
13e377a4bac7b5a45ecce34871ce94dbdd74de75c63e8f7b7b8bd12d7ef07018a0fe6e3be9b975eafd0112d658dbaafb0822e1a77326dc7ab474791c45c008d3
-
SSDEEP
1536:PRZZV4Oz6bdI543vDOW4ImlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:pPVbz625277jmltOrWKDBr+yJb
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kgpjanje.exeNdmjedoi.exeObojhlbq.exeEbjglbml.exeGejcjbah.exeKgbggnhc.exeFjaonpnn.exeOfpfnqjp.exeDkhcmgnl.exeElmigj32.exeEajaoq32.exeMpdnkb32.exeNpfgpe32.exeEojnkg32.exePeiljl32.exeCdlnkmha.exeMdpjlajk.exeMlkopcge.exeNnhkcj32.exeBhkdeggl.exeOngnonkb.exeFejgko32.exeMpigfa32.exeIaeiieeb.exeNglfapnl.exeOcnfbo32.exePpbfpd32.exeBalijo32.exeOlpdjf32.exeObafnlpn.exeLdidkbpb.exeNgfcca32.exeEilpeooq.exeEmhlfmgj.exeJejhecaj.exeDhpiojfb.exeDkqbaecc.exeQbbfopeg.exeDbpodagk.exeIkpjgkjq.exePeiepfgg.exeHjhhocjj.exeNhdlkdkg.exeCcahbp32.exeb91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exeNjdpomfe.exeEbinic32.exeFaagpp32.exePedleg32.exeEiaiqn32.exeInljnfkg.exeAalmklfi.exeJoplbl32.exeCppkph32.exeCcngld32.exeFaokjpfd.exeHkpnhgge.exeJbnhng32.exePdaoog32.exeOndajnme.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgpjanje.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndmjedoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obojhlbq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebjglbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gejcjbah.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgbggnhc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjaonpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofpfnqjp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkhcmgnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elmigj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eajaoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpdnkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npfgpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eojnkg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Peiljl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdlnkmha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdpjlajk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlkopcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnhkcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhkdeggl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ongnonkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fejgko32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpigfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iaeiieeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nglfapnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocnfbo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppbfpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Balijo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Olpdjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obafnlpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldidkbpb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpdnkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngfcca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eilpeooq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emhlfmgj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jejhecaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhpiojfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkqbaecc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qbbfopeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbpodagk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikpjgkjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peiepfgg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjhhocjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhdlkdkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccahbp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njdpomfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebinic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Faagpp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pedleg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ongnonkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peiljl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eiaiqn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inljnfkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aalmklfi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joplbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cppkph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppbfpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccngld32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faokjpfd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbnhng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdaoog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ondajnme.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Lganiohl.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Lpjbad32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Libgjj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lplogdmj.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Meigpkka.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Mhgclfje.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Mcmhiojk.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Migpeiag.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Mochnppo.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Menakj32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Mlgigdoh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mnieom32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Mhnjle32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mohbip32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Mdejaf32.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/2392-203-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Naikkk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ngfcca32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Njdpomfe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncmdhb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nfkpdn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nqqdag32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nocemcbj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nfmmin32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nlgefh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nfpjomgd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nmjblg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nbfjdn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ohqbqhde.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Onmkio32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ofdcjm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Odgcfijj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ogfpbeim.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Okchhc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ojficpfn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Obnqem32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ogjimd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ondajnme.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oqcnfjli.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ofpfnqjp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ongnonkb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pphjgfqq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pipopl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Paggai32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pfdpip32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pmnhfjmg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ppmdbe32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pbkpna32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Peiljl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pmqdkj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ppoqge32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pbmmcq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pfiidobe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pigeqkai.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Plfamfpm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pndniaop.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pabjem32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qhmbagfa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qjknnbed.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qbbfopeg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qaefjm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qhooggdn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qljkhe32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qagcpljo.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Lganiohl.exe UPX \Windows\SysWOW64\Lpjbad32.exe UPX \Windows\SysWOW64\Libgjj32.exe UPX C:\Windows\SysWOW64\Lplogdmj.exe UPX \Windows\SysWOW64\Meigpkka.exe UPX \Windows\SysWOW64\Mhgclfje.exe UPX \Windows\SysWOW64\Mcmhiojk.exe UPX \Windows\SysWOW64\Migpeiag.exe UPX \Windows\SysWOW64\Mochnppo.exe UPX \Windows\SysWOW64\Menakj32.exe UPX \Windows\SysWOW64\Mlgigdoh.exe UPX C:\Windows\SysWOW64\Mnieom32.exe UPX \Windows\SysWOW64\Mhnjle32.exe UPX C:\Windows\SysWOW64\Mohbip32.exe UPX \Windows\SysWOW64\Mdejaf32.exe UPX behavioral1/memory/2392-203-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Naikkk32.exe UPX C:\Windows\SysWOW64\Ngfcca32.exe UPX C:\Windows\SysWOW64\Njdpomfe.exe UPX C:\Windows\SysWOW64\Ncmdhb32.exe UPX C:\Windows\SysWOW64\Nfkpdn32.exe UPX C:\Windows\SysWOW64\Nqqdag32.exe UPX C:\Windows\SysWOW64\Nocemcbj.exe UPX C:\Windows\SysWOW64\Nfmmin32.exe UPX C:\Windows\SysWOW64\Nlgefh32.exe UPX C:\Windows\SysWOW64\Nfpjomgd.exe UPX C:\Windows\SysWOW64\Nmjblg32.exe UPX C:\Windows\SysWOW64\Nbfjdn32.exe UPX C:\Windows\SysWOW64\Ohqbqhde.exe UPX C:\Windows\SysWOW64\Onmkio32.exe UPX C:\Windows\SysWOW64\Ofdcjm32.exe UPX C:\Windows\SysWOW64\Odgcfijj.exe UPX C:\Windows\SysWOW64\Ogfpbeim.exe UPX C:\Windows\SysWOW64\Okchhc32.exe UPX C:\Windows\SysWOW64\Ojficpfn.exe UPX C:\Windows\SysWOW64\Obnqem32.exe UPX C:\Windows\SysWOW64\Ogjimd32.exe UPX C:\Windows\SysWOW64\Ondajnme.exe UPX C:\Windows\SysWOW64\Oqcnfjli.exe UPX C:\Windows\SysWOW64\Ofpfnqjp.exe UPX C:\Windows\SysWOW64\Ongnonkb.exe UPX C:\Windows\SysWOW64\Pphjgfqq.exe UPX C:\Windows\SysWOW64\Pipopl32.exe UPX C:\Windows\SysWOW64\Paggai32.exe UPX C:\Windows\SysWOW64\Pfdpip32.exe UPX C:\Windows\SysWOW64\Pmnhfjmg.exe UPX C:\Windows\SysWOW64\Ppmdbe32.exe UPX C:\Windows\SysWOW64\Pbkpna32.exe UPX C:\Windows\SysWOW64\Peiljl32.exe UPX C:\Windows\SysWOW64\Pmqdkj32.exe UPX C:\Windows\SysWOW64\Ppoqge32.exe UPX C:\Windows\SysWOW64\Pbmmcq32.exe UPX C:\Windows\SysWOW64\Pfiidobe.exe UPX C:\Windows\SysWOW64\Pigeqkai.exe UPX C:\Windows\SysWOW64\Plfamfpm.exe UPX C:\Windows\SysWOW64\Pndniaop.exe UPX C:\Windows\SysWOW64\Pabjem32.exe UPX C:\Windows\SysWOW64\Qhmbagfa.exe UPX C:\Windows\SysWOW64\Qjknnbed.exe UPX C:\Windows\SysWOW64\Qbbfopeg.exe UPX C:\Windows\SysWOW64\Qaefjm32.exe UPX C:\Windows\SysWOW64\Qhooggdn.exe UPX C:\Windows\SysWOW64\Qljkhe32.exe UPX C:\Windows\SysWOW64\Qagcpljo.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Lganiohl.exeLpjbad32.exeLibgjj32.exeLplogdmj.exeMeigpkka.exeMhgclfje.exeMcmhiojk.exeMigpeiag.exeMochnppo.exeMenakj32.exeMlgigdoh.exeMnieom32.exeMhnjle32.exeMohbip32.exeMdejaf32.exeNaikkk32.exeNgfcca32.exeNjdpomfe.exeNcmdhb32.exeNfkpdn32.exeNqqdag32.exeNocemcbj.exeNfmmin32.exeNlgefh32.exeNfpjomgd.exeNmjblg32.exeNbfjdn32.exeOhqbqhde.exeOnmkio32.exeOfdcjm32.exeOdgcfijj.exeOgfpbeim.exeOkchhc32.exeOjficpfn.exeObnqem32.exeOgjimd32.exeOndajnme.exeOqcnfjli.exeOfpfnqjp.exeOngnonkb.exePphjgfqq.exePipopl32.exePaggai32.exePfdpip32.exePmnhfjmg.exePpmdbe32.exePbkpna32.exePeiljl32.exePeiljl32.exePmqdkj32.exePpoqge32.exePbmmcq32.exePfiidobe.exePigeqkai.exePlfamfpm.exePndniaop.exePabjem32.exeQhmbagfa.exeQjknnbed.exeQbbfopeg.exeQaefjm32.exeQhooggdn.exeQljkhe32.exeQagcpljo.exepid process 2044 Lganiohl.exe 2648 Lpjbad32.exe 2420 Libgjj32.exe 2436 Lplogdmj.exe 2412 Meigpkka.exe 2908 Mhgclfje.exe 2688 Mcmhiojk.exe 2760 Migpeiag.exe 2936 Mochnppo.exe 1928 Menakj32.exe 1748 Mlgigdoh.exe 2480 Mnieom32.exe 1556 Mhnjle32.exe 2228 Mohbip32.exe 2392 Mdejaf32.exe 668 Naikkk32.exe 2592 Ngfcca32.exe 1720 Njdpomfe.exe 1980 Ncmdhb32.exe 2940 Nfkpdn32.exe 1300 Nqqdag32.exe 952 Nocemcbj.exe 1532 Nfmmin32.exe 2220 Nlgefh32.exe 1972 Nfpjomgd.exe 2992 Nmjblg32.exe 2640 Nbfjdn32.exe 2544 Ohqbqhde.exe 2724 Onmkio32.exe 2372 Ofdcjm32.exe 2456 Odgcfijj.exe 1936 Ogfpbeim.exe 2788 Okchhc32.exe 332 Ojficpfn.exe 1904 Obnqem32.exe 380 Ogjimd32.exe 2664 Ondajnme.exe 1540 Oqcnfjli.exe 2196 Ofpfnqjp.exe 1984 Ongnonkb.exe 2852 Pphjgfqq.exe 588 Pipopl32.exe 560 Paggai32.exe 604 Pfdpip32.exe 3040 Pmnhfjmg.exe 2116 Ppmdbe32.exe 1784 Pbkpna32.exe 1008 Peiljl32.exe 684 Peiljl32.exe 2008 Pmqdkj32.exe 2736 Ppoqge32.exe 2620 Pbmmcq32.exe 2016 Pfiidobe.exe 2756 Pigeqkai.exe 2460 Plfamfpm.exe 1932 Pndniaop.exe 2476 Pabjem32.exe 2296 Qhmbagfa.exe 2928 Qjknnbed.exe 2300 Qbbfopeg.exe 1224 Qaefjm32.exe 2696 Qhooggdn.exe 2004 Qljkhe32.exe 2012 Qagcpljo.exe -
Loads dropped DLL 64 IoCs
Processes:
b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exeLganiohl.exeLpjbad32.exeLibgjj32.exeLplogdmj.exeMeigpkka.exeMhgclfje.exeMcmhiojk.exeMigpeiag.exeMochnppo.exeMenakj32.exeMlgigdoh.exeMnieom32.exeMhnjle32.exeMohbip32.exeMdejaf32.exeNaikkk32.exeNgfcca32.exeNjdpomfe.exeNcmdhb32.exeNfkpdn32.exeNqqdag32.exeNocemcbj.exeNfmmin32.exeNlgefh32.exeNfpjomgd.exeNmjblg32.exeNbfjdn32.exeOhqbqhde.exeOnmkio32.exeOfdcjm32.exeOdgcfijj.exepid process 2972 b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe 2972 b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe 2044 Lganiohl.exe 2044 Lganiohl.exe 2648 Lpjbad32.exe 2648 Lpjbad32.exe 2420 Libgjj32.exe 2420 Libgjj32.exe 2436 Lplogdmj.exe 2436 Lplogdmj.exe 2412 Meigpkka.exe 2412 Meigpkka.exe 2908 Mhgclfje.exe 2908 Mhgclfje.exe 2688 Mcmhiojk.exe 2688 Mcmhiojk.exe 2760 Migpeiag.exe 2760 Migpeiag.exe 2936 Mochnppo.exe 2936 Mochnppo.exe 1928 Menakj32.exe 1928 Menakj32.exe 1748 Mlgigdoh.exe 1748 Mlgigdoh.exe 2480 Mnieom32.exe 2480 Mnieom32.exe 1556 Mhnjle32.exe 1556 Mhnjle32.exe 2228 Mohbip32.exe 2228 Mohbip32.exe 2392 Mdejaf32.exe 2392 Mdejaf32.exe 668 Naikkk32.exe 668 Naikkk32.exe 2592 Ngfcca32.exe 2592 Ngfcca32.exe 1720 Njdpomfe.exe 1720 Njdpomfe.exe 1980 Ncmdhb32.exe 1980 Ncmdhb32.exe 2940 Nfkpdn32.exe 2940 Nfkpdn32.exe 1300 Nqqdag32.exe 1300 Nqqdag32.exe 952 Nocemcbj.exe 952 Nocemcbj.exe 1532 Nfmmin32.exe 1532 Nfmmin32.exe 2220 Nlgefh32.exe 2220 Nlgefh32.exe 1972 Nfpjomgd.exe 1972 Nfpjomgd.exe 2992 Nmjblg32.exe 2992 Nmjblg32.exe 2640 Nbfjdn32.exe 2640 Nbfjdn32.exe 2544 Ohqbqhde.exe 2544 Ohqbqhde.exe 2724 Onmkio32.exe 2724 Onmkio32.exe 2372 Ofdcjm32.exe 2372 Ofdcjm32.exe 2456 Odgcfijj.exe 2456 Odgcfijj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Gkihhhnm.exeCnaocmmi.exeOfdcjm32.exeMcbjgn32.exeNglfapnl.exeBbhela32.exeCkjpacfp.exeEqbddk32.exeHlakpp32.exeJkpgfn32.exeJbnhng32.exeMpigfa32.exeNajdnj32.exeCphlljge.exeGpmjak32.exeHhmepp32.exeNolhan32.exeLibgjj32.exeLganiohl.exeAfiecb32.exeEpfhbign.exeCahail32.exeQfahhm32.exeAmhpnkch.exeDnoomqbg.exeOgjimd32.exeBghabf32.exeKgbggnhc.exePgioaa32.exeMpdnkb32.exeNdbcpd32.exeQljkhe32.exeDhjgal32.exePqhpdhcc.exeAaobdjof.exeDhpiojfb.exeEgoife32.exeEfcfga32.exeEmhlfmgj.exeFfbicfoc.exeKfbkmk32.exeChcqpmep.exeCobbhfhg.exeNoqamn32.exeCckace32.exeDgodbh32.exeNehmdhja.exeNhdlkdkg.exeMohbip32.exeOcnfbo32.exeBkommo32.exeCcngld32.exeCjpqdp32.exeJjlnif32.exeCgejac32.exeQedhdjnh.exeNfkpdn32.exeAplpai32.exeBopicc32.exeLldlqakb.exeDfgmhd32.exedescription ioc process File created C:\Windows\SysWOW64\Gacpdbej.exe Gkihhhnm.exe File created C:\Windows\SysWOW64\Cldooj32.exe Cnaocmmi.exe File opened for modification C:\Windows\SysWOW64\Odgcfijj.exe Ofdcjm32.exe File created C:\Windows\SysWOW64\Meagci32.exe Mcbjgn32.exe File created C:\Windows\SysWOW64\Fljdpbcc.dll Nglfapnl.exe File created C:\Windows\SysWOW64\Chboohof.dll Bbhela32.exe File created C:\Windows\SysWOW64\Bneqdoee.dll Ckjpacfp.exe File created C:\Windows\SysWOW64\Ecqqpgli.exe Eqbddk32.exe File created C:\Windows\SysWOW64\Hpmgqnfl.exe Hlakpp32.exe File opened for modification C:\Windows\SysWOW64\Jokcgmee.exe Jkpgfn32.exe File created C:\Windows\SysWOW64\Kaaijdgn.exe Jbnhng32.exe File created C:\Windows\SysWOW64\Jbkpmm32.dll Mpigfa32.exe File created C:\Windows\SysWOW64\Gjlegpjp.dll Najdnj32.exe File opened for modification C:\Windows\SysWOW64\Ccfhhffh.exe Cphlljge.exe File opened for modification C:\Windows\SysWOW64\Gbkgnfbd.exe Gpmjak32.exe File opened for modification C:\Windows\SysWOW64\Hkkalk32.exe Hhmepp32.exe File opened for modification C:\Windows\SysWOW64\Najdnj32.exe Nolhan32.exe File opened for modification C:\Windows\SysWOW64\Lplogdmj.exe Libgjj32.exe File created C:\Windows\SysWOW64\Jqckbobk.dll Lganiohl.exe File created C:\Windows\SysWOW64\Iklefg32.dll Afiecb32.exe File created C:\Windows\SysWOW64\Enihne32.exe Epfhbign.exe File opened for modification C:\Windows\SysWOW64\Cdgneh32.exe Cahail32.exe File opened for modification C:\Windows\SysWOW64\Qedhdjnh.exe Qfahhm32.exe File opened for modification C:\Windows\SysWOW64\Aadloj32.exe Amhpnkch.exe File opened for modification C:\Windows\SysWOW64\Dbkknojp.exe Dnoomqbg.exe File created C:\Windows\SysWOW64\Ondajnme.exe Ogjimd32.exe File created C:\Windows\SysWOW64\Bopicc32.exe Bghabf32.exe File created C:\Windows\SysWOW64\Kfegbj32.exe Kgbggnhc.exe File opened for modification C:\Windows\SysWOW64\Pflomnkb.exe Pgioaa32.exe File created C:\Windows\SysWOW64\Mdpjlajk.exe Mpdnkb32.exe File created C:\Windows\SysWOW64\Ocindg32.dll Ndbcpd32.exe File created C:\Windows\SysWOW64\Qagcpljo.exe Qljkhe32.exe File created C:\Windows\SysWOW64\Ljpghahi.dll Dhjgal32.exe File created C:\Windows\SysWOW64\Kaplbi32.dll Pqhpdhcc.exe File opened for modification C:\Windows\SysWOW64\Aekodi32.exe Aaobdjof.exe File created C:\Windows\SysWOW64\Egqdeaqb.dll Dhpiojfb.exe File opened for modification C:\Windows\SysWOW64\Efaibbij.exe Egoife32.exe File created C:\Windows\SysWOW64\Jhgnia32.dll Efcfga32.exe File created C:\Windows\SysWOW64\Epfhbign.exe Emhlfmgj.exe File opened for modification C:\Windows\SysWOW64\Enihne32.exe Epfhbign.exe File created C:\Windows\SysWOW64\Cmbmkg32.dll Ffbicfoc.exe File created C:\Windows\SysWOW64\Akodpalp.dll Kfbkmk32.exe File created C:\Windows\SysWOW64\Pdmaibnf.dll Chcqpmep.exe File created C:\Windows\SysWOW64\Niifne32.dll Cobbhfhg.exe File created C:\Windows\SysWOW64\Hbgodfkh.dll Noqamn32.exe File opened for modification C:\Windows\SysWOW64\Cbnbobin.exe Cckace32.exe File created C:\Windows\SysWOW64\Dnilobkm.exe Dgodbh32.exe File created C:\Windows\SysWOW64\Nlbeqb32.exe Nehmdhja.exe File created C:\Windows\SysWOW64\Cbnbobin.exe Cckace32.exe File opened for modification C:\Windows\SysWOW64\Nkbhgojk.exe Nhdlkdkg.exe File opened for modification C:\Windows\SysWOW64\Mdejaf32.exe Mohbip32.exe File created C:\Windows\SysWOW64\Nchnel32.dll Ocnfbo32.exe File opened for modification C:\Windows\SysWOW64\Bmmiij32.exe Bkommo32.exe File opened for modification C:\Windows\SysWOW64\Dgjclbdi.exe Ccngld32.exe File created C:\Windows\SysWOW64\Gbhfilfi.dll Cjpqdp32.exe File created C:\Windows\SysWOW64\Jmjjea32.exe Jjlnif32.exe File created C:\Windows\SysWOW64\Gjhfbach.dll Cgejac32.exe File created C:\Windows\SysWOW64\Dknekeef.exe Dhpiojfb.exe File opened for modification C:\Windows\SysWOW64\Alnqqd32.exe Qedhdjnh.exe File opened for modification C:\Windows\SysWOW64\Nqqdag32.exe Nfkpdn32.exe File opened for modification C:\Windows\SysWOW64\Adhlaggp.exe Aplpai32.exe File created C:\Windows\SysWOW64\Bnbjopoi.exe Bopicc32.exe File opened for modification C:\Windows\SysWOW64\Lckdanld.exe Lldlqakb.exe File created C:\Windows\SysWOW64\Djbiicon.exe Dfgmhd32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6752 6728 WerFault.exe Fkckeh32.exe -
Modifies registry class 64 IoCs
Processes:
Gelppaof.exeGhhofmql.exeKmopod32.exeOlpdjf32.exeAekodi32.exeDfgmhd32.exeFlabbihl.exePeiepfgg.exeAjhgmpfg.exeEpfhbign.exeDkmmhf32.exeMenakj32.exeNcjqhmkm.exeLhbcfa32.exeEjgcdb32.exeEbinic32.exeLfjqnjkh.exeBopicc32.exePeiljl32.exeKaaijdgn.exePfdpip32.exeCljcelan.exeFfkcbgek.exeFfpmnf32.exeMiooigfo.exeNoqamn32.exePklhlael.exeLganiohl.exeBocolb32.exeKjljhjkl.exeNnhkcj32.exeDlgldibq.exeEmhlfmgj.exeJejhecaj.exeOkgnab32.exeOmfkke32.exeEccmffjf.exePlfamfpm.exeDbpodagk.exeDnneja32.exeGegfdb32.exeBbjbaa32.exeNaikkk32.exeKpmlkp32.exeOngnonkb.exeClaifkkf.exeLckdanld.exeMeagci32.exePaggai32.exeDhnmij32.exeHjhhocjj.exePbmmcq32.exeBnpmipql.exeBdeeqehb.exePipopl32.exeMppepcfg.exeDjbiicon.exeHobcak32.exeNgnbgplj.exePflomnkb.exeEbgacddo.exeMhnjle32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gelppaof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghhofmql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmopod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olpdjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aekodi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfgmhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flabbihl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Peiepfgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajhgmpfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Epfhbign.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkmmhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Menakj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncjqhmkm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhbcfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejgcdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebinic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lfjqnjkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mocaac32.dll" Bopicc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Peiljl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdnaeh32.dll" Kaaijdgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pfdpip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iiciogbn.dll" Cljcelan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ongbcmlc.dll" Ffkcbgek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aloeodfi.dll" Ffpmnf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Miooigfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Noqamn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pklhlael.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lganiohl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bocolb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhlhkl32.dll" Kjljhjkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnhkcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlgldibq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emhlfmgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jejhecaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okgnab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Omfkke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eccmffjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pndaof32.dll" Plfamfpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipdljffa.dll" Dbpodagk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfpjfeia.dll" Dnneja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gegfdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbjbaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Naikkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpmlkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ongnonkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Claifkkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lckdanld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Meagci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffpncj32.dll" Eccmffjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Paggai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efhhaddp.dll" Dhnmij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oiogaqdb.dll" Hjhhocjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbmmcq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnpmipql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igmdobgi.dll" Bdeeqehb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eccmffjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmnhkk32.dll" Pipopl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mppepcfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djbiicon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hobcak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oceaboqg.dll" Ngnbgplj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pflomnkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebgacddo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omocdp32.dll" Mhnjle32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exeLganiohl.exeLpjbad32.exeLibgjj32.exeLplogdmj.exeMeigpkka.exeMhgclfje.exeMcmhiojk.exeMigpeiag.exeMochnppo.exeMenakj32.exeMlgigdoh.exeMnieom32.exeMhnjle32.exeMohbip32.exeMdejaf32.exedescription pid process target process PID 2972 wrote to memory of 2044 2972 b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe Lganiohl.exe PID 2972 wrote to memory of 2044 2972 b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe Lganiohl.exe PID 2972 wrote to memory of 2044 2972 b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe Lganiohl.exe PID 2972 wrote to memory of 2044 2972 b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe Lganiohl.exe PID 2044 wrote to memory of 2648 2044 Lganiohl.exe Lpjbad32.exe PID 2044 wrote to memory of 2648 2044 Lganiohl.exe Lpjbad32.exe PID 2044 wrote to memory of 2648 2044 Lganiohl.exe Lpjbad32.exe PID 2044 wrote to memory of 2648 2044 Lganiohl.exe Lpjbad32.exe PID 2648 wrote to memory of 2420 2648 Lpjbad32.exe Libgjj32.exe PID 2648 wrote to memory of 2420 2648 Lpjbad32.exe Libgjj32.exe PID 2648 wrote to memory of 2420 2648 Lpjbad32.exe Libgjj32.exe PID 2648 wrote to memory of 2420 2648 Lpjbad32.exe Libgjj32.exe PID 2420 wrote to memory of 2436 2420 Libgjj32.exe Lplogdmj.exe PID 2420 wrote to memory of 2436 2420 Libgjj32.exe Lplogdmj.exe PID 2420 wrote to memory of 2436 2420 Libgjj32.exe Lplogdmj.exe PID 2420 wrote to memory of 2436 2420 Libgjj32.exe Lplogdmj.exe PID 2436 wrote to memory of 2412 2436 Lplogdmj.exe Meigpkka.exe PID 2436 wrote to memory of 2412 2436 Lplogdmj.exe Meigpkka.exe PID 2436 wrote to memory of 2412 2436 Lplogdmj.exe Meigpkka.exe PID 2436 wrote to memory of 2412 2436 Lplogdmj.exe Meigpkka.exe PID 2412 wrote to memory of 2908 2412 Meigpkka.exe Mhgclfje.exe PID 2412 wrote to memory of 2908 2412 Meigpkka.exe Mhgclfje.exe PID 2412 wrote to memory of 2908 2412 Meigpkka.exe Mhgclfje.exe PID 2412 wrote to memory of 2908 2412 Meigpkka.exe Mhgclfje.exe PID 2908 wrote to memory of 2688 2908 Mhgclfje.exe Mcmhiojk.exe PID 2908 wrote to memory of 2688 2908 Mhgclfje.exe Mcmhiojk.exe PID 2908 wrote to memory of 2688 2908 Mhgclfje.exe Mcmhiojk.exe PID 2908 wrote to memory of 2688 2908 Mhgclfje.exe Mcmhiojk.exe PID 2688 wrote to memory of 2760 2688 Mcmhiojk.exe Migpeiag.exe PID 2688 wrote to memory of 2760 2688 Mcmhiojk.exe Migpeiag.exe PID 2688 wrote to memory of 2760 2688 Mcmhiojk.exe Migpeiag.exe PID 2688 wrote to memory of 2760 2688 Mcmhiojk.exe Migpeiag.exe PID 2760 wrote to memory of 2936 2760 Migpeiag.exe Mochnppo.exe PID 2760 wrote to memory of 2936 2760 Migpeiag.exe Mochnppo.exe PID 2760 wrote to memory of 2936 2760 Migpeiag.exe Mochnppo.exe PID 2760 wrote to memory of 2936 2760 Migpeiag.exe Mochnppo.exe PID 2936 wrote to memory of 1928 2936 Mochnppo.exe Menakj32.exe PID 2936 wrote to memory of 1928 2936 Mochnppo.exe Menakj32.exe PID 2936 wrote to memory of 1928 2936 Mochnppo.exe Menakj32.exe PID 2936 wrote to memory of 1928 2936 Mochnppo.exe Menakj32.exe PID 1928 wrote to memory of 1748 1928 Menakj32.exe Mlgigdoh.exe PID 1928 wrote to memory of 1748 1928 Menakj32.exe Mlgigdoh.exe PID 1928 wrote to memory of 1748 1928 Menakj32.exe Mlgigdoh.exe PID 1928 wrote to memory of 1748 1928 Menakj32.exe Mlgigdoh.exe PID 1748 wrote to memory of 2480 1748 Mlgigdoh.exe Mnieom32.exe PID 1748 wrote to memory of 2480 1748 Mlgigdoh.exe Mnieom32.exe PID 1748 wrote to memory of 2480 1748 Mlgigdoh.exe Mnieom32.exe PID 1748 wrote to memory of 2480 1748 Mlgigdoh.exe Mnieom32.exe PID 2480 wrote to memory of 1556 2480 Mnieom32.exe Mhnjle32.exe PID 2480 wrote to memory of 1556 2480 Mnieom32.exe Mhnjle32.exe PID 2480 wrote to memory of 1556 2480 Mnieom32.exe Mhnjle32.exe PID 2480 wrote to memory of 1556 2480 Mnieom32.exe Mhnjle32.exe PID 1556 wrote to memory of 2228 1556 Mhnjle32.exe Mohbip32.exe PID 1556 wrote to memory of 2228 1556 Mhnjle32.exe Mohbip32.exe PID 1556 wrote to memory of 2228 1556 Mhnjle32.exe Mohbip32.exe PID 1556 wrote to memory of 2228 1556 Mhnjle32.exe Mohbip32.exe PID 2228 wrote to memory of 2392 2228 Mohbip32.exe Mdejaf32.exe PID 2228 wrote to memory of 2392 2228 Mohbip32.exe Mdejaf32.exe PID 2228 wrote to memory of 2392 2228 Mohbip32.exe Mdejaf32.exe PID 2228 wrote to memory of 2392 2228 Mohbip32.exe Mdejaf32.exe PID 2392 wrote to memory of 668 2392 Mdejaf32.exe Naikkk32.exe PID 2392 wrote to memory of 668 2392 Mdejaf32.exe Naikkk32.exe PID 2392 wrote to memory of 668 2392 Mdejaf32.exe Naikkk32.exe PID 2392 wrote to memory of 668 2392 Mdejaf32.exe Naikkk32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe"C:\Users\Admin\AppData\Local\Temp\b91fec1f73b46d2b747f206707dd0301deeaf06a2a06087b3c0bc4737f8f4557.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lganiohl.exeC:\Windows\system32\Lganiohl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lpjbad32.exeC:\Windows\system32\Lpjbad32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Libgjj32.exeC:\Windows\system32\Libgjj32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lplogdmj.exeC:\Windows\system32\Lplogdmj.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Meigpkka.exeC:\Windows\system32\Meigpkka.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mhgclfje.exeC:\Windows\system32\Mhgclfje.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mcmhiojk.exeC:\Windows\system32\Mcmhiojk.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Migpeiag.exeC:\Windows\system32\Migpeiag.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mochnppo.exeC:\Windows\system32\Mochnppo.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Menakj32.exeC:\Windows\system32\Menakj32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mlgigdoh.exeC:\Windows\system32\Mlgigdoh.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mnieom32.exeC:\Windows\system32\Mnieom32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mhnjle32.exeC:\Windows\system32\Mhnjle32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mohbip32.exeC:\Windows\system32\Mohbip32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mdejaf32.exeC:\Windows\system32\Mdejaf32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Naikkk32.exeC:\Windows\system32\Naikkk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Ngfcca32.exeC:\Windows\system32\Ngfcca32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Njdpomfe.exeC:\Windows\system32\Njdpomfe.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ncmdhb32.exeC:\Windows\system32\Ncmdhb32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Nfkpdn32.exeC:\Windows\system32\Nfkpdn32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nqqdag32.exeC:\Windows\system32\Nqqdag32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Nocemcbj.exeC:\Windows\system32\Nocemcbj.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Nfmmin32.exeC:\Windows\system32\Nfmmin32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Nlgefh32.exeC:\Windows\system32\Nlgefh32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Nfpjomgd.exeC:\Windows\system32\Nfpjomgd.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Nmjblg32.exeC:\Windows\system32\Nmjblg32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Nbfjdn32.exeC:\Windows\system32\Nbfjdn32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ohqbqhde.exeC:\Windows\system32\Ohqbqhde.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Onmkio32.exeC:\Windows\system32\Onmkio32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ofdcjm32.exeC:\Windows\system32\Ofdcjm32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Odgcfijj.exeC:\Windows\system32\Odgcfijj.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ogfpbeim.exeC:\Windows\system32\Ogfpbeim.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Okchhc32.exeC:\Windows\system32\Okchhc32.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ojficpfn.exeC:\Windows\system32\Ojficpfn.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Obnqem32.exeC:\Windows\system32\Obnqem32.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ogjimd32.exeC:\Windows\system32\Ogjimd32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ondajnme.exeC:\Windows\system32\Ondajnme.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Oqcnfjli.exeC:\Windows\system32\Oqcnfjli.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ofpfnqjp.exeC:\Windows\system32\Ofpfnqjp.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ongnonkb.exeC:\Windows\system32\Ongnonkb.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pphjgfqq.exeC:\Windows\system32\Pphjgfqq.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pipopl32.exeC:\Windows\system32\Pipopl32.exe43⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Paggai32.exeC:\Windows\system32\Paggai32.exe44⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pfdpip32.exeC:\Windows\system32\Pfdpip32.exe45⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pmnhfjmg.exeC:\Windows\system32\Pmnhfjmg.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ppmdbe32.exeC:\Windows\system32\Ppmdbe32.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pbkpna32.exeC:\Windows\system32\Pbkpna32.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Peiljl32.exeC:\Windows\system32\Peiljl32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Peiljl32.exeC:\Windows\system32\Peiljl32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pmqdkj32.exeC:\Windows\system32\Pmqdkj32.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ppoqge32.exeC:\Windows\system32\Ppoqge32.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pbmmcq32.exeC:\Windows\system32\Pbmmcq32.exe53⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pfiidobe.exeC:\Windows\system32\Pfiidobe.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pigeqkai.exeC:\Windows\system32\Pigeqkai.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Plfamfpm.exeC:\Windows\system32\Plfamfpm.exe56⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pndniaop.exeC:\Windows\system32\Pndniaop.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pabjem32.exeC:\Windows\system32\Pabjem32.exe58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qhmbagfa.exeC:\Windows\system32\Qhmbagfa.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qjknnbed.exeC:\Windows\system32\Qjknnbed.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qbbfopeg.exeC:\Windows\system32\Qbbfopeg.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qaefjm32.exeC:\Windows\system32\Qaefjm32.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qhooggdn.exeC:\Windows\system32\Qhooggdn.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qljkhe32.exeC:\Windows\system32\Qljkhe32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qagcpljo.exeC:\Windows\system32\Qagcpljo.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qecoqk32.exeC:\Windows\system32\Qecoqk32.exe66⤵
-
C:\Windows\SysWOW64\Afdlhchf.exeC:\Windows\system32\Afdlhchf.exe67⤵
-
C:\Windows\SysWOW64\Ajphib32.exeC:\Windows\system32\Ajphib32.exe68⤵
-
C:\Windows\SysWOW64\Ankdiqih.exeC:\Windows\system32\Ankdiqih.exe69⤵
-
C:\Windows\SysWOW64\Amndem32.exeC:\Windows\system32\Amndem32.exe70⤵
-
C:\Windows\SysWOW64\Aplpai32.exeC:\Windows\system32\Aplpai32.exe71⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Adhlaggp.exeC:\Windows\system32\Adhlaggp.exe72⤵
-
C:\Windows\SysWOW64\Ajbdna32.exeC:\Windows\system32\Ajbdna32.exe73⤵
-
C:\Windows\SysWOW64\Aiedjneg.exeC:\Windows\system32\Aiedjneg.exe74⤵
-
C:\Windows\SysWOW64\Aalmklfi.exeC:\Windows\system32\Aalmklfi.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Adjigg32.exeC:\Windows\system32\Adjigg32.exe76⤵
-
C:\Windows\SysWOW64\Afiecb32.exeC:\Windows\system32\Afiecb32.exe77⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ajdadamj.exeC:\Windows\system32\Ajdadamj.exe78⤵
-
C:\Windows\SysWOW64\Alenki32.exeC:\Windows\system32\Alenki32.exe79⤵
-
C:\Windows\SysWOW64\Apajlhka.exeC:\Windows\system32\Apajlhka.exe80⤵
-
C:\Windows\SysWOW64\Abpfhcje.exeC:\Windows\system32\Abpfhcje.exe81⤵
-
C:\Windows\SysWOW64\Afkbib32.exeC:\Windows\system32\Afkbib32.exe82⤵
-
C:\Windows\SysWOW64\Amejeljk.exeC:\Windows\system32\Amejeljk.exe83⤵
-
C:\Windows\SysWOW64\Alhjai32.exeC:\Windows\system32\Alhjai32.exe84⤵
-
C:\Windows\SysWOW64\Abbbnchb.exeC:\Windows\system32\Abbbnchb.exe85⤵
-
C:\Windows\SysWOW64\Afmonbqk.exeC:\Windows\system32\Afmonbqk.exe86⤵
-
C:\Windows\SysWOW64\Ailkjmpo.exeC:\Windows\system32\Ailkjmpo.exe87⤵
-
C:\Windows\SysWOW64\Ahokfj32.exeC:\Windows\system32\Ahokfj32.exe88⤵
-
C:\Windows\SysWOW64\Boiccdnf.exeC:\Windows\system32\Boiccdnf.exe89⤵
-
C:\Windows\SysWOW64\Bbdocc32.exeC:\Windows\system32\Bbdocc32.exe90⤵
-
C:\Windows\SysWOW64\Bingpmnl.exeC:\Windows\system32\Bingpmnl.exe91⤵
-
C:\Windows\SysWOW64\Bhahlj32.exeC:\Windows\system32\Bhahlj32.exe92⤵
-
C:\Windows\SysWOW64\Blmdlhmp.exeC:\Windows\system32\Blmdlhmp.exe93⤵
-
C:\Windows\SysWOW64\Bokphdld.exeC:\Windows\system32\Bokphdld.exe94⤵
-
C:\Windows\SysWOW64\Beehencq.exeC:\Windows\system32\Beehencq.exe95⤵
-
C:\Windows\SysWOW64\Bdhhqk32.exeC:\Windows\system32\Bdhhqk32.exe96⤵
-
C:\Windows\SysWOW64\Bloqah32.exeC:\Windows\system32\Bloqah32.exe97⤵
-
C:\Windows\SysWOW64\Bkaqmeah.exeC:\Windows\system32\Bkaqmeah.exe98⤵
-
C:\Windows\SysWOW64\Bnpmipql.exeC:\Windows\system32\Bnpmipql.exe99⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Balijo32.exeC:\Windows\system32\Balijo32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bhfagipa.exeC:\Windows\system32\Bhfagipa.exe101⤵
-
C:\Windows\SysWOW64\Bghabf32.exeC:\Windows\system32\Bghabf32.exe102⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bopicc32.exeC:\Windows\system32\Bopicc32.exe103⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bnbjopoi.exeC:\Windows\system32\Bnbjopoi.exe104⤵
-
C:\Windows\SysWOW64\Bpafkknm.exeC:\Windows\system32\Bpafkknm.exe105⤵
-
C:\Windows\SysWOW64\Bjijdadm.exeC:\Windows\system32\Bjijdadm.exe106⤵
-
C:\Windows\SysWOW64\Bnefdp32.exeC:\Windows\system32\Bnefdp32.exe107⤵
-
C:\Windows\SysWOW64\Bcaomf32.exeC:\Windows\system32\Bcaomf32.exe108⤵
-
C:\Windows\SysWOW64\Ckignd32.exeC:\Windows\system32\Ckignd32.exe109⤵
-
C:\Windows\SysWOW64\Cljcelan.exeC:\Windows\system32\Cljcelan.exe110⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cdakgibq.exeC:\Windows\system32\Cdakgibq.exe111⤵
-
C:\Windows\SysWOW64\Cgpgce32.exeC:\Windows\system32\Cgpgce32.exe112⤵
-
C:\Windows\SysWOW64\Cfbhnaho.exeC:\Windows\system32\Cfbhnaho.exe113⤵
-
C:\Windows\SysWOW64\Cllpkl32.exeC:\Windows\system32\Cllpkl32.exe114⤵
-
C:\Windows\SysWOW64\Cphlljge.exeC:\Windows\system32\Cphlljge.exe115⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ccfhhffh.exeC:\Windows\system32\Ccfhhffh.exe116⤵
-
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe117⤵
-
C:\Windows\SysWOW64\Cjpqdp32.exeC:\Windows\system32\Cjpqdp32.exe118⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Chcqpmep.exeC:\Windows\system32\Chcqpmep.exe119⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cpjiajeb.exeC:\Windows\system32\Cpjiajeb.exe120⤵
-
C:\Windows\SysWOW64\Cciemedf.exeC:\Windows\system32\Cciemedf.exe121⤵
-
C:\Windows\SysWOW64\Cfgaiaci.exeC:\Windows\system32\Cfgaiaci.exe122⤵
-
C:\Windows\SysWOW64\Chemfl32.exeC:\Windows\system32\Chemfl32.exe123⤵
-
C:\Windows\SysWOW64\Claifkkf.exeC:\Windows\system32\Claifkkf.exe124⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cckace32.exeC:\Windows\system32\Cckace32.exe125⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cbnbobin.exeC:\Windows\system32\Cbnbobin.exe126⤵
-
C:\Windows\SysWOW64\Cdlnkmha.exeC:\Windows\system32\Cdlnkmha.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Chhjkl32.exeC:\Windows\system32\Chhjkl32.exe128⤵
-
C:\Windows\SysWOW64\Ckffgg32.exeC:\Windows\system32\Ckffgg32.exe129⤵
-
C:\Windows\SysWOW64\Cobbhfhg.exeC:\Windows\system32\Cobbhfhg.exe130⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dbpodagk.exeC:\Windows\system32\Dbpodagk.exe131⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe132⤵
-
C:\Windows\SysWOW64\Dhjgal32.exeC:\Windows\system32\Dhjgal32.exe133⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dkhcmgnl.exeC:\Windows\system32\Dkhcmgnl.exe134⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dngoibmo.exeC:\Windows\system32\Dngoibmo.exe135⤵
-
C:\Windows\SysWOW64\Dbbkja32.exeC:\Windows\system32\Dbbkja32.exe136⤵
-
C:\Windows\SysWOW64\Dbbkja32.exeC:\Windows\system32\Dbbkja32.exe137⤵
-
C:\Windows\SysWOW64\Dhmcfkme.exeC:\Windows\system32\Dhmcfkme.exe138⤵
-
C:\Windows\SysWOW64\Dgodbh32.exeC:\Windows\system32\Dgodbh32.exe139⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dnilobkm.exeC:\Windows\system32\Dnilobkm.exe140⤵
-
C:\Windows\SysWOW64\Dcfdgiid.exeC:\Windows\system32\Dcfdgiid.exe141⤵
-
C:\Windows\SysWOW64\Dkmmhf32.exeC:\Windows\system32\Dkmmhf32.exe142⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Djpmccqq.exeC:\Windows\system32\Djpmccqq.exe143⤵
-
C:\Windows\SysWOW64\Dmoipopd.exeC:\Windows\system32\Dmoipopd.exe144⤵
-
C:\Windows\SysWOW64\Dqjepm32.exeC:\Windows\system32\Dqjepm32.exe145⤵
-
C:\Windows\SysWOW64\Dchali32.exeC:\Windows\system32\Dchali32.exe146⤵
-
C:\Windows\SysWOW64\Dfgmhd32.exeC:\Windows\system32\Dfgmhd32.exe147⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Djbiicon.exeC:\Windows\system32\Djbiicon.exe148⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dnneja32.exeC:\Windows\system32\Dnneja32.exe149⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dqlafm32.exeC:\Windows\system32\Dqlafm32.exe150⤵
-
C:\Windows\SysWOW64\Doobajme.exeC:\Windows\system32\Doobajme.exe151⤵
-
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe152⤵
-
C:\Windows\SysWOW64\Djefobmk.exeC:\Windows\system32\Djefobmk.exe153⤵
-
C:\Windows\SysWOW64\Eqonkmdh.exeC:\Windows\system32\Eqonkmdh.exe154⤵
-
C:\Windows\SysWOW64\Epaogi32.exeC:\Windows\system32\Epaogi32.exe155⤵
-
C:\Windows\SysWOW64\Ecmkghcl.exeC:\Windows\system32\Ecmkghcl.exe156⤵
-
C:\Windows\SysWOW64\Eflgccbp.exeC:\Windows\system32\Eflgccbp.exe157⤵
-
C:\Windows\SysWOW64\Ejgcdb32.exeC:\Windows\system32\Ejgcdb32.exe158⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eijcpoac.exeC:\Windows\system32\Eijcpoac.exe159⤵
-
C:\Windows\SysWOW64\Ekholjqg.exeC:\Windows\system32\Ekholjqg.exe160⤵
-
C:\Windows\SysWOW64\Ecpgmhai.exeC:\Windows\system32\Ecpgmhai.exe161⤵
-
C:\Windows\SysWOW64\Ebbgid32.exeC:\Windows\system32\Ebbgid32.exe162⤵
-
C:\Windows\SysWOW64\Efncicpm.exeC:\Windows\system32\Efncicpm.exe163⤵
-
C:\Windows\SysWOW64\Eilpeooq.exeC:\Windows\system32\Eilpeooq.exe164⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Emhlfmgj.exeC:\Windows\system32\Emhlfmgj.exe165⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Epfhbign.exeC:\Windows\system32\Epfhbign.exe166⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Enihne32.exeC:\Windows\system32\Enihne32.exe167⤵
-
C:\Windows\SysWOW64\Efppoc32.exeC:\Windows\system32\Efppoc32.exe168⤵
-
C:\Windows\SysWOW64\Eiomkn32.exeC:\Windows\system32\Eiomkn32.exe169⤵
-
C:\Windows\SysWOW64\Elmigj32.exeC:\Windows\system32\Elmigj32.exe170⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Epieghdk.exeC:\Windows\system32\Epieghdk.exe171⤵
-
C:\Windows\SysWOW64\Ebgacddo.exeC:\Windows\system32\Ebgacddo.exe172⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eajaoq32.exeC:\Windows\system32\Eajaoq32.exe173⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Eiaiqn32.exeC:\Windows\system32\Eiaiqn32.exe174⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Egdilkbf.exeC:\Windows\system32\Egdilkbf.exe175⤵
-
C:\Windows\SysWOW64\Ejbfhfaj.exeC:\Windows\system32\Ejbfhfaj.exe176⤵
-
C:\Windows\SysWOW64\Ebinic32.exeC:\Windows\system32\Ebinic32.exe177⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Fehjeo32.exeC:\Windows\system32\Fehjeo32.exe178⤵
-
C:\Windows\SysWOW64\Fckjalhj.exeC:\Windows\system32\Fckjalhj.exe179⤵
-
C:\Windows\SysWOW64\Flabbihl.exeC:\Windows\system32\Flabbihl.exe180⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fnpnndgp.exeC:\Windows\system32\Fnpnndgp.exe181⤵
-
C:\Windows\SysWOW64\Faokjpfd.exeC:\Windows\system32\Faokjpfd.exe182⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fejgko32.exeC:\Windows\system32\Fejgko32.exe183⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fhhcgj32.exeC:\Windows\system32\Fhhcgj32.exe184⤵
-
C:\Windows\SysWOW64\Ffkcbgek.exeC:\Windows\system32\Ffkcbgek.exe185⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fmekoalh.exeC:\Windows\system32\Fmekoalh.exe186⤵
-
C:\Windows\SysWOW64\Faagpp32.exeC:\Windows\system32\Faagpp32.exe187⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fdoclk32.exeC:\Windows\system32\Fdoclk32.exe188⤵
-
C:\Windows\SysWOW64\Ffnphf32.exeC:\Windows\system32\Ffnphf32.exe189⤵
-
C:\Windows\SysWOW64\Fjilieka.exeC:\Windows\system32\Fjilieka.exe190⤵
-
C:\Windows\SysWOW64\Fmhheqje.exeC:\Windows\system32\Fmhheqje.exe191⤵
-
C:\Windows\SysWOW64\Fpfdalii.exeC:\Windows\system32\Fpfdalii.exe192⤵
-
C:\Windows\SysWOW64\Fdapak32.exeC:\Windows\system32\Fdapak32.exe193⤵
-
C:\Windows\SysWOW64\Ffpmnf32.exeC:\Windows\system32\Ffpmnf32.exe194⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fjlhneio.exeC:\Windows\system32\Fjlhneio.exe195⤵
-
C:\Windows\SysWOW64\Fmjejphb.exeC:\Windows\system32\Fmjejphb.exe196⤵
-
C:\Windows\SysWOW64\Flmefm32.exeC:\Windows\system32\Flmefm32.exe197⤵
-
C:\Windows\SysWOW64\Fddmgjpo.exeC:\Windows\system32\Fddmgjpo.exe198⤵
-
C:\Windows\SysWOW64\Ffbicfoc.exeC:\Windows\system32\Ffbicfoc.exe199⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe200⤵
-
C:\Windows\SysWOW64\Fmlapp32.exeC:\Windows\system32\Fmlapp32.exe201⤵
-
C:\Windows\SysWOW64\Gpknlk32.exeC:\Windows\system32\Gpknlk32.exe202⤵
-
C:\Windows\SysWOW64\Gonnhhln.exeC:\Windows\system32\Gonnhhln.exe203⤵
-
C:\Windows\SysWOW64\Gfefiemq.exeC:\Windows\system32\Gfefiemq.exe204⤵
-
C:\Windows\SysWOW64\Gegfdb32.exeC:\Windows\system32\Gegfdb32.exe205⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Glaoalkh.exeC:\Windows\system32\Glaoalkh.exe206⤵
-
C:\Windows\SysWOW64\Gpmjak32.exeC:\Windows\system32\Gpmjak32.exe207⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gbkgnfbd.exeC:\Windows\system32\Gbkgnfbd.exe208⤵
-
C:\Windows\SysWOW64\Gejcjbah.exeC:\Windows\system32\Gejcjbah.exe209⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ghhofmql.exeC:\Windows\system32\Ghhofmql.exe210⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Gldkfl32.exeC:\Windows\system32\Gldkfl32.exe211⤵
-
C:\Windows\SysWOW64\Gkgkbipp.exeC:\Windows\system32\Gkgkbipp.exe212⤵
-
C:\Windows\SysWOW64\Gbnccfpb.exeC:\Windows\system32\Gbnccfpb.exe213⤵
-
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe214⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Gdopkn32.exeC:\Windows\system32\Gdopkn32.exe215⤵
-
C:\Windows\SysWOW64\Gkihhhnm.exeC:\Windows\system32\Gkihhhnm.exe216⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gacpdbej.exeC:\Windows\system32\Gacpdbej.exe217⤵
-
C:\Windows\SysWOW64\Gdamqndn.exeC:\Windows\system32\Gdamqndn.exe218⤵
-
C:\Windows\SysWOW64\Ghmiam32.exeC:\Windows\system32\Ghmiam32.exe219⤵
-
C:\Windows\SysWOW64\Gkkemh32.exeC:\Windows\system32\Gkkemh32.exe220⤵
-
C:\Windows\SysWOW64\Gogangdc.exeC:\Windows\system32\Gogangdc.exe221⤵
-
C:\Windows\SysWOW64\Gaemjbcg.exeC:\Windows\system32\Gaemjbcg.exe222⤵
-
C:\Windows\SysWOW64\Gphmeo32.exeC:\Windows\system32\Gphmeo32.exe223⤵
-
C:\Windows\SysWOW64\Ghoegl32.exeC:\Windows\system32\Ghoegl32.exe224⤵
-
C:\Windows\SysWOW64\Hgbebiao.exeC:\Windows\system32\Hgbebiao.exe225⤵
-
C:\Windows\SysWOW64\Hiqbndpb.exeC:\Windows\system32\Hiqbndpb.exe226⤵
-
C:\Windows\SysWOW64\Hmlnoc32.exeC:\Windows\system32\Hmlnoc32.exe227⤵
-
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe228⤵
-
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe229⤵
-
C:\Windows\SysWOW64\Hgdbhi32.exeC:\Windows\system32\Hgdbhi32.exe230⤵
-
C:\Windows\SysWOW64\Hkpnhgge.exeC:\Windows\system32\Hkpnhgge.exe231⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hlakpp32.exeC:\Windows\system32\Hlakpp32.exe232⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hpmgqnfl.exeC:\Windows\system32\Hpmgqnfl.exe233⤵
-
C:\Windows\SysWOW64\Hckcmjep.exeC:\Windows\system32\Hckcmjep.exe234⤵
-
C:\Windows\SysWOW64\Hggomh32.exeC:\Windows\system32\Hggomh32.exe235⤵
-
C:\Windows\SysWOW64\Hiekid32.exeC:\Windows\system32\Hiekid32.exe236⤵
-
C:\Windows\SysWOW64\Hnagjbdf.exeC:\Windows\system32\Hnagjbdf.exe237⤵
-
C:\Windows\SysWOW64\Hpocfncj.exeC:\Windows\system32\Hpocfncj.exe238⤵
-
C:\Windows\SysWOW64\Hobcak32.exeC:\Windows\system32\Hobcak32.exe239⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe240⤵
-
C:\Windows\SysWOW64\Hjhhocjj.exeC:\Windows\system32\Hjhhocjj.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class