Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe
Resource
win10v2004-20240226-en
General
-
Target
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe
-
Size
163KB
-
MD5
d4bbd02e0e2f4c7b24b5aeb0a50e3a47
-
SHA1
9dcc3ac21681b2933a747d8bb8aecacb0e2bf933
-
SHA256
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660
-
SHA512
a32c66496176f4a09feb5798b15861e724a2307543260c6ec63a9151732d0bfa1b934513ad72027ca93add65148def9cb2e417ea64f6216db96f48321c714a64
-
SSDEEP
1536:PE3YO7Uf7/Y5IRUJFG8NlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:M317eDsIROGyltOrWKDBr+yJb
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Gbnccfpb.exeAaaoij32.exeHdlhjl32.exeLibicbma.exeGfefiemq.exeKjnfniii.exeHmfjha32.exeJgnamk32.exeNpdjje32.exeBmmiij32.exeKgnnln32.exeKaklpcoc.exeNcjqhmkm.exeNhkbkc32.exeEccmffjf.exeAjecmj32.exeIdhopq32.exeJqdipqbp.exeMoiklogi.exeMlcbenjb.exeOhendqhd.exeJbgkcb32.exeAbhimnma.exeCeodnl32.exeLlcefjgf.exeOaiibg32.exeCpceidcn.exeIgdogl32.exeMlkopcge.exeNhiffc32.exeIpjoplgo.exeKmjojo32.exeQkkmqnck.exeIlknfn32.exeKngfih32.exeOklkmnbp.exeBdeeqehb.exeCgejac32.exeFmmkcoap.exeOhcaoajg.exePfdabino.exeNkbhgojk.exeNgnbgplj.exeBbokmqie.exeJfknbe32.exeMabgcd32.exeNgdifkpi.exeNpccpo32.exeNhllob32.exeBpgljfbl.exePqemdbaj.exeAjgpbj32.exeGpmjak32.exeIcbimi32.exeBhkdeggl.exeKbidgeci.exeOgkkfmml.exePmjqcc32.exeNenobfak.exeJfghif32.exeKemejc32.exeLojomkdn.exeNehmdhja.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbnccfpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaaoij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdlhjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Libicbma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfefiemq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjnfniii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmfjha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgnamk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npdjje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmmiij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgnnln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaklpcoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncjqhmkm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhkbkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eccmffjf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajecmj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idhopq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jqdipqbp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moiklogi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlcbenjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohendqhd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbgkcb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abhimnma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceodnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llcefjgf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaiibg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpceidcn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igdogl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlkopcge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhiffc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipjoplgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmjojo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkkmqnck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilknfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kngfih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oklkmnbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdeeqehb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgejac32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmmkcoap.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohcaoajg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfdabino.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkbhgojk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngnbgplj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbokmqie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfknbe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mabgcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngdifkpi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npccpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhllob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngnbgplj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpgljfbl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqemdbaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajgpbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpmjak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhkdeggl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbidgeci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogkkfmml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmjqcc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nenobfak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfghif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kemejc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lojomkdn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nehmdhja.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Dbehoa32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgaqgh32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ddeaalpg.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Dfgmhd32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Dqlafm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgfjbgmh.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Emcbkn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eflgccbp.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ekholjqg.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ebbgid32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Emhlfmgj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ebedndfa.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Egamfkdh.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Epieghdk.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ebgacddo.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ennaieib.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fckjalhj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Flabbihl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ffkcbgek.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fnbkddem.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fhkpmjln.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Filldb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fbdqmghm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fjlhneio.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fddmgjpo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fbgmbg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fiaeoang.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gpknlk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gfefiemq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gpmjak32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gbkgnfbd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gkgkbipp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gbnccfpb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Glfhll32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gacpdbej.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ggpimica.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gogangdc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gaemjbcg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hknach32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hahjpbad.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hicodd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hnojdcfi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hpmgqnfl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hiekid32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hellne32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hjhhocjj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hlfdkoin.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Henidd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hhmepp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hkkalk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Icbimi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ieqeidnl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ilknfn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Inljnfkg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ifcbodli.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Igdogl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iokfhi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iqmcpahh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Idhopq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ijeghgoh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Inqcif32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Idklfpon.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Igihbknb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ijgdngmf.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Dbehoa32.exe UPX C:\Windows\SysWOW64\Dgaqgh32.exe UPX \Windows\SysWOW64\Ddeaalpg.exe UPX \Windows\SysWOW64\Dfgmhd32.exe UPX \Windows\SysWOW64\Dqlafm32.exe UPX C:\Windows\SysWOW64\Dgfjbgmh.exe UPX \Windows\SysWOW64\Emcbkn32.exe UPX C:\Windows\SysWOW64\Eflgccbp.exe UPX \Windows\SysWOW64\Ekholjqg.exe UPX \Windows\SysWOW64\Ebbgid32.exe UPX C:\Windows\SysWOW64\Emhlfmgj.exe UPX C:\Windows\SysWOW64\Ebedndfa.exe UPX \Windows\SysWOW64\Egamfkdh.exe UPX \Windows\SysWOW64\Epieghdk.exe UPX \Windows\SysWOW64\Ebgacddo.exe UPX \Windows\SysWOW64\Ennaieib.exe UPX C:\Windows\SysWOW64\Fckjalhj.exe UPX C:\Windows\SysWOW64\Flabbihl.exe UPX C:\Windows\SysWOW64\Ffkcbgek.exe UPX C:\Windows\SysWOW64\Fnbkddem.exe UPX C:\Windows\SysWOW64\Fhkpmjln.exe UPX C:\Windows\SysWOW64\Filldb32.exe UPX C:\Windows\SysWOW64\Fbdqmghm.exe UPX C:\Windows\SysWOW64\Fjlhneio.exe UPX C:\Windows\SysWOW64\Fddmgjpo.exe UPX C:\Windows\SysWOW64\Fbgmbg32.exe UPX C:\Windows\SysWOW64\Fiaeoang.exe UPX C:\Windows\SysWOW64\Gpknlk32.exe UPX C:\Windows\SysWOW64\Gfefiemq.exe UPX C:\Windows\SysWOW64\Gpmjak32.exe UPX C:\Windows\SysWOW64\Gbkgnfbd.exe UPX C:\Windows\SysWOW64\Gkgkbipp.exe UPX C:\Windows\SysWOW64\Gbnccfpb.exe UPX C:\Windows\SysWOW64\Glfhll32.exe UPX C:\Windows\SysWOW64\Gacpdbej.exe UPX C:\Windows\SysWOW64\Ggpimica.exe UPX C:\Windows\SysWOW64\Gogangdc.exe UPX C:\Windows\SysWOW64\Gaemjbcg.exe UPX C:\Windows\SysWOW64\Hknach32.exe UPX C:\Windows\SysWOW64\Hahjpbad.exe UPX C:\Windows\SysWOW64\Hicodd32.exe UPX C:\Windows\SysWOW64\Hnojdcfi.exe UPX C:\Windows\SysWOW64\Hpmgqnfl.exe UPX C:\Windows\SysWOW64\Hiekid32.exe UPX C:\Windows\SysWOW64\Hellne32.exe UPX behavioral1/memory/1508-519-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Hjhhocjj.exe UPX C:\Windows\SysWOW64\Hlfdkoin.exe UPX C:\Windows\SysWOW64\Henidd32.exe UPX C:\Windows\SysWOW64\Hhmepp32.exe UPX C:\Windows\SysWOW64\Hkkalk32.exe UPX C:\Windows\SysWOW64\Icbimi32.exe UPX C:\Windows\SysWOW64\Ieqeidnl.exe UPX C:\Windows\SysWOW64\Ilknfn32.exe UPX C:\Windows\SysWOW64\Inljnfkg.exe UPX C:\Windows\SysWOW64\Ifcbodli.exe UPX C:\Windows\SysWOW64\Igdogl32.exe UPX C:\Windows\SysWOW64\Iokfhi32.exe UPX C:\Windows\SysWOW64\Iqmcpahh.exe UPX C:\Windows\SysWOW64\Idhopq32.exe UPX C:\Windows\SysWOW64\Ijeghgoh.exe UPX C:\Windows\SysWOW64\Inqcif32.exe UPX C:\Windows\SysWOW64\Idklfpon.exe UPX C:\Windows\SysWOW64\Igihbknb.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Dbehoa32.exeDgaqgh32.exeDdeaalpg.exeDfgmhd32.exeDqlafm32.exeDgfjbgmh.exeEmcbkn32.exeEflgccbp.exeEkholjqg.exeEbbgid32.exeEmhlfmgj.exeEbedndfa.exeEgamfkdh.exeEpieghdk.exeEbgacddo.exeEnnaieib.exeFckjalhj.exeFlabbihl.exeFfkcbgek.exeFnbkddem.exeFhkpmjln.exeFilldb32.exeFbdqmghm.exeFjlhneio.exeFddmgjpo.exeFbgmbg32.exeFiaeoang.exeGpknlk32.exeGfefiemq.exeGpmjak32.exeGbkgnfbd.exeGkgkbipp.exeGbnccfpb.exeGlfhll32.exeGacpdbej.exeGgpimica.exeGogangdc.exeGaemjbcg.exeHknach32.exeHahjpbad.exeHicodd32.exeHnojdcfi.exeHpmgqnfl.exeHiekid32.exeHellne32.exeHjhhocjj.exeHlfdkoin.exeHenidd32.exeHhmepp32.exeHkkalk32.exeIcbimi32.exeIeqeidnl.exeIlknfn32.exeInljnfkg.exeIfcbodli.exeIgdogl32.exeIokfhi32.exeIqmcpahh.exeIdhopq32.exeIjeghgoh.exeInqcif32.exeIdklfpon.exeIgihbknb.exeIjgdngmf.exepid process 1592 Dbehoa32.exe 1156 Dgaqgh32.exe 2752 Ddeaalpg.exe 2760 Dfgmhd32.exe 2876 Dqlafm32.exe 2532 Dgfjbgmh.exe 3016 Emcbkn32.exe 2776 Eflgccbp.exe 2880 Ekholjqg.exe 1040 Ebbgid32.exe 2412 Emhlfmgj.exe 1944 Ebedndfa.exe 1060 Egamfkdh.exe 812 Epieghdk.exe 1560 Ebgacddo.exe 2212 Ennaieib.exe 712 Fckjalhj.exe 572 Flabbihl.exe 856 Ffkcbgek.exe 2036 Fnbkddem.exe 1820 Fhkpmjln.exe 1376 Filldb32.exe 1020 Fbdqmghm.exe 2512 Fjlhneio.exe 2616 Fddmgjpo.exe 1432 Fbgmbg32.exe 3068 Fiaeoang.exe 2428 Gpknlk32.exe 2744 Gfefiemq.exe 2756 Gpmjak32.exe 2568 Gbkgnfbd.exe 2576 Gkgkbipp.exe 2612 Gbnccfpb.exe 2096 Glfhll32.exe 2884 Gacpdbej.exe 2864 Ggpimica.exe 2980 Gogangdc.exe 1052 Gaemjbcg.exe 1028 Hknach32.exe 1792 Hahjpbad.exe 2084 Hicodd32.exe 2636 Hnojdcfi.exe 2228 Hpmgqnfl.exe 484 Hiekid32.exe 1508 Hellne32.exe 1868 Hjhhocjj.exe 848 Hlfdkoin.exe 2320 Henidd32.exe 2016 Hhmepp32.exe 844 Hkkalk32.exe 2376 Icbimi32.exe 2260 Ieqeidnl.exe 1756 Ilknfn32.exe 2644 Inljnfkg.exe 2284 Ifcbodli.exe 2792 Igdogl32.exe 2540 Iokfhi32.exe 2544 Iqmcpahh.exe 3008 Idhopq32.exe 2332 Ijeghgoh.exe 2832 Inqcif32.exe 1964 Idklfpon.exe 1712 Igihbknb.exe 1968 Ijgdngmf.exe -
Loads dropped DLL 64 IoCs
Processes:
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exeDbehoa32.exeDgaqgh32.exeDdeaalpg.exeDfgmhd32.exeDqlafm32.exeDgfjbgmh.exeEmcbkn32.exeEflgccbp.exeEkholjqg.exeEbbgid32.exeEmhlfmgj.exeEbedndfa.exeEgamfkdh.exeEpieghdk.exeEbgacddo.exeEnnaieib.exeFckjalhj.exeFlabbihl.exeFfkcbgek.exeFnbkddem.exeFhkpmjln.exeFilldb32.exeFbdqmghm.exeFjlhneio.exeFddmgjpo.exeFbgmbg32.exeFiaeoang.exeGpknlk32.exeGfefiemq.exeGpmjak32.exeGbkgnfbd.exepid process 2960 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe 2960 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe 1592 Dbehoa32.exe 1592 Dbehoa32.exe 1156 Dgaqgh32.exe 1156 Dgaqgh32.exe 2752 Ddeaalpg.exe 2752 Ddeaalpg.exe 2760 Dfgmhd32.exe 2760 Dfgmhd32.exe 2876 Dqlafm32.exe 2876 Dqlafm32.exe 2532 Dgfjbgmh.exe 2532 Dgfjbgmh.exe 3016 Emcbkn32.exe 3016 Emcbkn32.exe 2776 Eflgccbp.exe 2776 Eflgccbp.exe 2880 Ekholjqg.exe 2880 Ekholjqg.exe 1040 Ebbgid32.exe 1040 Ebbgid32.exe 2412 Emhlfmgj.exe 2412 Emhlfmgj.exe 1944 Ebedndfa.exe 1944 Ebedndfa.exe 1060 Egamfkdh.exe 1060 Egamfkdh.exe 812 Epieghdk.exe 812 Epieghdk.exe 1560 Ebgacddo.exe 1560 Ebgacddo.exe 2212 Ennaieib.exe 2212 Ennaieib.exe 712 Fckjalhj.exe 712 Fckjalhj.exe 572 Flabbihl.exe 572 Flabbihl.exe 856 Ffkcbgek.exe 856 Ffkcbgek.exe 2036 Fnbkddem.exe 2036 Fnbkddem.exe 1820 Fhkpmjln.exe 1820 Fhkpmjln.exe 1376 Filldb32.exe 1376 Filldb32.exe 1020 Fbdqmghm.exe 1020 Fbdqmghm.exe 2512 Fjlhneio.exe 2512 Fjlhneio.exe 2616 Fddmgjpo.exe 2616 Fddmgjpo.exe 1432 Fbgmbg32.exe 1432 Fbgmbg32.exe 3068 Fiaeoang.exe 3068 Fiaeoang.exe 2428 Gpknlk32.exe 2428 Gpknlk32.exe 2744 Gfefiemq.exe 2744 Gfefiemq.exe 2756 Gpmjak32.exe 2756 Gpmjak32.exe 2568 Gbkgnfbd.exe 2568 Gbkgnfbd.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dbehoa32.exeGacpdbej.exeAidnohbk.exeFjlhneio.exeOonafa32.exeFadminnn.exeGmbdnn32.exeIgakgfpn.exeJnpinc32.exeAfgkfl32.exeBlgpef32.exeHgjefg32.exeKqqboncb.exeFhkpmjln.exeIqmcpahh.exeEnhacojl.exeOomjlk32.exeDgjclbdi.exeKegqdqbl.exeOdoloalf.exeMkmhaj32.exeAgfgqo32.exeEfcfga32.exeAfnagk32.exeDfgmhd32.exeLpbefoai.exeOnhgbmfb.exeAnojbobe.exeBbhela32.exeDfdjhndl.exeGpmjak32.exeNialog32.exeOmfkke32.exeAekodi32.exePjpnbg32.exeDdigjkid.exeGbnccfpb.exeHicodd32.exeLajhofao.exeDhnmij32.exeGedbdlbb.exeInqcif32.exeOnmdoioa.exeGnmgmbhb.exeHapicp32.exeKfgdhjmk.exeNlbeqb32.exeBjdplm32.exeMlibjc32.exeGbcfadgl.exeHeihnoph.exeOdhfob32.exeOhhkjp32.exeQeaedd32.exeJnemdecl.exeBbjbaa32.exeBghjhp32.exeDccagcgk.exeIchllgfb.exeKeednado.exeLmolnh32.exePjcabmga.exeFmbhok32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Dgaqgh32.exe Dbehoa32.exe File created C:\Windows\SysWOW64\Ggpimica.exe Gacpdbej.exe File created C:\Windows\SysWOW64\Jjifqd32.dll Aidnohbk.exe File created C:\Windows\SysWOW64\Fddmgjpo.exe Fjlhneio.exe File created C:\Windows\SysWOW64\Ocimgp32.exe Oonafa32.exe File created C:\Windows\SysWOW64\Fhneehek.exe Fadminnn.exe File opened for modification C:\Windows\SysWOW64\Gpqpjj32.exe Gmbdnn32.exe File created C:\Windows\SysWOW64\Mpjmjp32.dll Igakgfpn.exe File opened for modification C:\Windows\SysWOW64\Jmbiipml.exe Jnpinc32.exe File opened for modification C:\Windows\SysWOW64\Ajbggjfq.exe Afgkfl32.exe File created C:\Windows\SysWOW64\Eekkdc32.dll Blgpef32.exe File opened for modification C:\Windows\SysWOW64\Hoamgd32.exe Hgjefg32.exe File opened for modification C:\Windows\SysWOW64\Kocbkk32.exe Kqqboncb.exe File created C:\Windows\SysWOW64\Filldb32.exe Fhkpmjln.exe File created C:\Windows\SysWOW64\Jepgqikf.dll Iqmcpahh.exe File opened for modification C:\Windows\SysWOW64\Eojnkg32.exe Enhacojl.exe File opened for modification C:\Windows\SysWOW64\Oalfhf32.exe Oomjlk32.exe File created C:\Windows\SysWOW64\Djhphncm.exe Dgjclbdi.exe File opened for modification C:\Windows\SysWOW64\Kicmdo32.exe Kegqdqbl.exe File created C:\Windows\SysWOW64\Oepbgcpb.dll Odoloalf.exe File created C:\Windows\SysWOW64\Mmldme32.exe Mkmhaj32.exe File opened for modification C:\Windows\SysWOW64\Ajecmj32.exe Agfgqo32.exe File opened for modification C:\Windows\SysWOW64\Eibbcm32.exe Efcfga32.exe File opened for modification C:\Windows\SysWOW64\Aeqabgoj.exe Afnagk32.exe File created C:\Windows\SysWOW64\Dqlafm32.exe Dfgmhd32.exe File created C:\Windows\SysWOW64\Lijjoe32.exe Lpbefoai.exe File opened for modification C:\Windows\SysWOW64\Obcccl32.exe Onhgbmfb.exe File created C:\Windows\SysWOW64\Bmfmjjgm.dll Anojbobe.exe File opened for modification C:\Windows\SysWOW64\Bkommo32.exe Bbhela32.exe File created C:\Windows\SysWOW64\Dhbfdjdp.exe Dfdjhndl.exe File opened for modification C:\Windows\SysWOW64\Gbkgnfbd.exe Gpmjak32.exe File created C:\Windows\SysWOW64\Onmddnil.dll Nialog32.exe File created C:\Windows\SysWOW64\Onhgbmfb.exe Omfkke32.exe File created C:\Windows\SysWOW64\Igdaoinc.dll Aekodi32.exe File created C:\Windows\SysWOW64\Adagkoae.dll Pjpnbg32.exe File created C:\Windows\SysWOW64\Mhofcjea.dll Ddigjkid.exe File created C:\Windows\SysWOW64\Glfhll32.exe Gbnccfpb.exe File created C:\Windows\SysWOW64\Hnojdcfi.exe Hicodd32.exe File opened for modification C:\Windows\SysWOW64\Ldidkbpb.exe Lajhofao.exe File created C:\Windows\SysWOW64\Efhhaddp.dll Dhnmij32.exe File created C:\Windows\SysWOW64\Hhmkol32.dll Gedbdlbb.exe File created C:\Windows\SysWOW64\Idklfpon.exe Inqcif32.exe File created C:\Windows\SysWOW64\Oonafa32.exe Onmdoioa.exe File created C:\Windows\SysWOW64\Gmpgio32.exe Gnmgmbhb.exe File created C:\Windows\SysWOW64\Hpbiommg.exe Hapicp32.exe File created C:\Windows\SysWOW64\Kfimidmd.dll Kfgdhjmk.exe File created C:\Windows\SysWOW64\Noqamn32.exe Nlbeqb32.exe File created C:\Windows\SysWOW64\Opacnnhp.dll Bjdplm32.exe File created C:\Windows\SysWOW64\Lkoacn32.dll Mlibjc32.exe File created C:\Windows\SysWOW64\Cehkbgdf.dll Gbcfadgl.exe File opened for modification C:\Windows\SysWOW64\Hdlhjl32.exe Heihnoph.exe File opened for modification C:\Windows\SysWOW64\Ohcaoajg.exe Odhfob32.exe File created C:\Windows\SysWOW64\Ogkkfmml.exe Ohhkjp32.exe File opened for modification C:\Windows\SysWOW64\Qiladcdh.exe Qeaedd32.exe File created C:\Windows\SysWOW64\Ljdjcj32.dll Jnemdecl.exe File created C:\Windows\SysWOW64\Bplpldoa.dll Bbjbaa32.exe File created C:\Windows\SysWOW64\Bifgdk32.exe Bghjhp32.exe File opened for modification C:\Windows\SysWOW64\Dfamcogo.exe Dccagcgk.exe File created C:\Windows\SysWOW64\Gccdbl32.dll Ichllgfb.exe File opened for modification C:\Windows\SysWOW64\Kgcpjmcb.exe Keednado.exe File opened for modification C:\Windows\SysWOW64\Dqlafm32.exe Dfgmhd32.exe File created C:\Windows\SysWOW64\Lajhofao.exe Lmolnh32.exe File created C:\Windows\SysWOW64\Pmanoifd.exe Pjcabmga.exe File opened for modification C:\Windows\SysWOW64\Flehkhai.exe Fmbhok32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6588 6596 WerFault.exe Cacacg32.exe -
Modifies registry class 64 IoCs
Processes:
Pkndaa32.exeJgagfi32.exeCjdfmo32.exeLfdmggnm.exebf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exeIgihbknb.exeKneicieh.exeLdfgebbe.exeCpkbdiqb.exeEdkcojga.exeKeednado.exeAcfaeq32.exeIeqeidnl.exeAmhpnkch.exeQmfgjh32.exeJcmafj32.exeEbbgid32.exeEnnaieib.exeOcimgp32.exeAipddi32.exeCdlgpgef.exeGohjaf32.exeNlekia32.exeNhdlkdkg.exeDfamcogo.exeDhbfdjdp.exeMdpjlajk.exeOomjlk32.exeLmcijcbe.exeLmgocb32.exePjldghjm.exeHahjpbad.exeMmfbogcn.exeCkccgane.exeHpgfki32.exeGkgkbipp.exeHnojdcfi.exeFmpkjkma.exeHbhomd32.exeJqilooij.exeDgaqgh32.exeJifdebic.exeMkgfckcj.exeBidjnkdg.exeIccbqh32.exeIlcmjl32.exeNaimccpo.exeGacpdbej.exePjhknm32.exeHapicp32.exeAaloddnn.exeMabgcd32.exeOdhfob32.exeOkanklik.exeCkiigmcd.exeJcdbbloa.exeFbamma32.exeOdoloalf.exeFilldb32.exeGpmjak32.exeJiakjb32.exeCoelaaoi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kolpjf32.dll" Pkndaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgagfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjdfmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbelde32.dll" Lfdmggnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Igihbknb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kneicieh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acjobj32.dll" Ldfgebbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmnlfg32.dll" Cpkbdiqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edkcojga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Keednado.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfdmggnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acfaeq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdpfph32.dll" Ieqeidnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amhpnkch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qmfgjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hebpjd32.dll" Jcmafj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebbgid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jiiegafd.dll" Ennaieib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocimgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bllbijej.dll" Aipddi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qbgpffch.dll" Cdlgpgef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkdjlion.dll" Gohjaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlekia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngogde32.dll" Nhdlkdkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfamcogo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckgkkllh.dll" Dhbfdjdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdpjlajk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oomjlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aagancdj.dll" Lmcijcbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmgocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjldghjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hahjpbad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmfbogcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckccgane.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdghad32.dll" Hpgfki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pabfdklg.dll" Gkgkbipp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gohjaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnojdcfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmpkjkma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbhomd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jqilooij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lefmambf.dll" Dgaqgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jifdebic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkgfckcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjhlioai.dll" Bidjnkdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iodahd32.dll" Iccbqh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilcmjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Naimccpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njgcpp32.dll" Gacpdbej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjhknm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hapicp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aaloddnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mabgcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odhfob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okanklik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckiigmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcdbbloa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoladf32.dll" Fbamma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odoloalf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clphjpmh.dll" Filldb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qahefm32.dll" Gpmjak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jiakjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Coelaaoi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exeDbehoa32.exeDgaqgh32.exeDdeaalpg.exeDfgmhd32.exeDqlafm32.exeDgfjbgmh.exeEmcbkn32.exeEflgccbp.exeEkholjqg.exeEbbgid32.exeEmhlfmgj.exeEbedndfa.exeEgamfkdh.exeEpieghdk.exeEbgacddo.exedescription pid process target process PID 2960 wrote to memory of 1592 2960 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe Dbehoa32.exe PID 2960 wrote to memory of 1592 2960 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe Dbehoa32.exe PID 2960 wrote to memory of 1592 2960 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe Dbehoa32.exe PID 2960 wrote to memory of 1592 2960 bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe Dbehoa32.exe PID 1592 wrote to memory of 1156 1592 Dbehoa32.exe Dgaqgh32.exe PID 1592 wrote to memory of 1156 1592 Dbehoa32.exe Dgaqgh32.exe PID 1592 wrote to memory of 1156 1592 Dbehoa32.exe Dgaqgh32.exe PID 1592 wrote to memory of 1156 1592 Dbehoa32.exe Dgaqgh32.exe PID 1156 wrote to memory of 2752 1156 Dgaqgh32.exe Ddeaalpg.exe PID 1156 wrote to memory of 2752 1156 Dgaqgh32.exe Ddeaalpg.exe PID 1156 wrote to memory of 2752 1156 Dgaqgh32.exe Ddeaalpg.exe PID 1156 wrote to memory of 2752 1156 Dgaqgh32.exe Ddeaalpg.exe PID 2752 wrote to memory of 2760 2752 Ddeaalpg.exe Dfgmhd32.exe PID 2752 wrote to memory of 2760 2752 Ddeaalpg.exe Dfgmhd32.exe PID 2752 wrote to memory of 2760 2752 Ddeaalpg.exe Dfgmhd32.exe PID 2752 wrote to memory of 2760 2752 Ddeaalpg.exe Dfgmhd32.exe PID 2760 wrote to memory of 2876 2760 Dfgmhd32.exe Dqlafm32.exe PID 2760 wrote to memory of 2876 2760 Dfgmhd32.exe Dqlafm32.exe PID 2760 wrote to memory of 2876 2760 Dfgmhd32.exe Dqlafm32.exe PID 2760 wrote to memory of 2876 2760 Dfgmhd32.exe Dqlafm32.exe PID 2876 wrote to memory of 2532 2876 Dqlafm32.exe Dgfjbgmh.exe PID 2876 wrote to memory of 2532 2876 Dqlafm32.exe Dgfjbgmh.exe PID 2876 wrote to memory of 2532 2876 Dqlafm32.exe Dgfjbgmh.exe PID 2876 wrote to memory of 2532 2876 Dqlafm32.exe Dgfjbgmh.exe PID 2532 wrote to memory of 3016 2532 Dgfjbgmh.exe Emcbkn32.exe PID 2532 wrote to memory of 3016 2532 Dgfjbgmh.exe Emcbkn32.exe PID 2532 wrote to memory of 3016 2532 Dgfjbgmh.exe Emcbkn32.exe PID 2532 wrote to memory of 3016 2532 Dgfjbgmh.exe Emcbkn32.exe PID 3016 wrote to memory of 2776 3016 Emcbkn32.exe Eflgccbp.exe PID 3016 wrote to memory of 2776 3016 Emcbkn32.exe Eflgccbp.exe PID 3016 wrote to memory of 2776 3016 Emcbkn32.exe Eflgccbp.exe PID 3016 wrote to memory of 2776 3016 Emcbkn32.exe Eflgccbp.exe PID 2776 wrote to memory of 2880 2776 Eflgccbp.exe Ekholjqg.exe PID 2776 wrote to memory of 2880 2776 Eflgccbp.exe Ekholjqg.exe PID 2776 wrote to memory of 2880 2776 Eflgccbp.exe Ekholjqg.exe PID 2776 wrote to memory of 2880 2776 Eflgccbp.exe Ekholjqg.exe PID 2880 wrote to memory of 1040 2880 Ekholjqg.exe Ebbgid32.exe PID 2880 wrote to memory of 1040 2880 Ekholjqg.exe Ebbgid32.exe PID 2880 wrote to memory of 1040 2880 Ekholjqg.exe Ebbgid32.exe PID 2880 wrote to memory of 1040 2880 Ekholjqg.exe Ebbgid32.exe PID 1040 wrote to memory of 2412 1040 Ebbgid32.exe Emhlfmgj.exe PID 1040 wrote to memory of 2412 1040 Ebbgid32.exe Emhlfmgj.exe PID 1040 wrote to memory of 2412 1040 Ebbgid32.exe Emhlfmgj.exe PID 1040 wrote to memory of 2412 1040 Ebbgid32.exe Emhlfmgj.exe PID 2412 wrote to memory of 1944 2412 Emhlfmgj.exe Ebedndfa.exe PID 2412 wrote to memory of 1944 2412 Emhlfmgj.exe Ebedndfa.exe PID 2412 wrote to memory of 1944 2412 Emhlfmgj.exe Ebedndfa.exe PID 2412 wrote to memory of 1944 2412 Emhlfmgj.exe Ebedndfa.exe PID 1944 wrote to memory of 1060 1944 Ebedndfa.exe Egamfkdh.exe PID 1944 wrote to memory of 1060 1944 Ebedndfa.exe Egamfkdh.exe PID 1944 wrote to memory of 1060 1944 Ebedndfa.exe Egamfkdh.exe PID 1944 wrote to memory of 1060 1944 Ebedndfa.exe Egamfkdh.exe PID 1060 wrote to memory of 812 1060 Egamfkdh.exe Epieghdk.exe PID 1060 wrote to memory of 812 1060 Egamfkdh.exe Epieghdk.exe PID 1060 wrote to memory of 812 1060 Egamfkdh.exe Epieghdk.exe PID 1060 wrote to memory of 812 1060 Egamfkdh.exe Epieghdk.exe PID 812 wrote to memory of 1560 812 Epieghdk.exe Ebgacddo.exe PID 812 wrote to memory of 1560 812 Epieghdk.exe Ebgacddo.exe PID 812 wrote to memory of 1560 812 Epieghdk.exe Ebgacddo.exe PID 812 wrote to memory of 1560 812 Epieghdk.exe Ebgacddo.exe PID 1560 wrote to memory of 2212 1560 Ebgacddo.exe Ennaieib.exe PID 1560 wrote to memory of 2212 1560 Ebgacddo.exe Ennaieib.exe PID 1560 wrote to memory of 2212 1560 Ebgacddo.exe Ennaieib.exe PID 1560 wrote to memory of 2212 1560 Ebgacddo.exe Ennaieib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe"C:\Users\Admin\AppData\Local\Temp\bf1c5069af653108fc2413bde9a4b25dff4ea445c7f641984c6fc5322430f660.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dbehoa32.exeC:\Windows\system32\Dbehoa32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dgaqgh32.exeC:\Windows\system32\Dgaqgh32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ddeaalpg.exeC:\Windows\system32\Ddeaalpg.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dfgmhd32.exeC:\Windows\system32\Dfgmhd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dqlafm32.exeC:\Windows\system32\Dqlafm32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Emcbkn32.exeC:\Windows\system32\Emcbkn32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Eflgccbp.exeC:\Windows\system32\Eflgccbp.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ekholjqg.exeC:\Windows\system32\Ekholjqg.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ebbgid32.exeC:\Windows\system32\Ebbgid32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Emhlfmgj.exeC:\Windows\system32\Emhlfmgj.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ebedndfa.exeC:\Windows\system32\Ebedndfa.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Egamfkdh.exeC:\Windows\system32\Egamfkdh.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Epieghdk.exeC:\Windows\system32\Epieghdk.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ebgacddo.exeC:\Windows\system32\Ebgacddo.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Fckjalhj.exeC:\Windows\system32\Fckjalhj.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Flabbihl.exeC:\Windows\system32\Flabbihl.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ffkcbgek.exeC:\Windows\system32\Ffkcbgek.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fnbkddem.exeC:\Windows\system32\Fnbkddem.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fhkpmjln.exeC:\Windows\system32\Fhkpmjln.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Filldb32.exeC:\Windows\system32\Filldb32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Fbdqmghm.exeC:\Windows\system32\Fbdqmghm.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fjlhneio.exeC:\Windows\system32\Fjlhneio.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fddmgjpo.exeC:\Windows\system32\Fddmgjpo.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fbgmbg32.exeC:\Windows\system32\Fbgmbg32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gpknlk32.exeC:\Windows\system32\Gpknlk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gfefiemq.exeC:\Windows\system32\Gfefiemq.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gpmjak32.exeC:\Windows\system32\Gpmjak32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Gbkgnfbd.exeC:\Windows\system32\Gbkgnfbd.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gkgkbipp.exeC:\Windows\system32\Gkgkbipp.exe33⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Gbnccfpb.exeC:\Windows\system32\Gbnccfpb.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Glfhll32.exeC:\Windows\system32\Glfhll32.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gacpdbej.exeC:\Windows\system32\Gacpdbej.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ggpimica.exeC:\Windows\system32\Ggpimica.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gogangdc.exeC:\Windows\system32\Gogangdc.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gaemjbcg.exeC:\Windows\system32\Gaemjbcg.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hknach32.exeC:\Windows\system32\Hknach32.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hahjpbad.exeC:\Windows\system32\Hahjpbad.exe41⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Hicodd32.exeC:\Windows\system32\Hicodd32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hnojdcfi.exeC:\Windows\system32\Hnojdcfi.exe43⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Hpmgqnfl.exeC:\Windows\system32\Hpmgqnfl.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hiekid32.exeC:\Windows\system32\Hiekid32.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hjhhocjj.exeC:\Windows\system32\Hjhhocjj.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hlfdkoin.exeC:\Windows\system32\Hlfdkoin.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Henidd32.exeC:\Windows\system32\Henidd32.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hhmepp32.exeC:\Windows\system32\Hhmepp32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hkkalk32.exeC:\Windows\system32\Hkkalk32.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Icbimi32.exeC:\Windows\system32\Icbimi32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ieqeidnl.exeC:\Windows\system32\Ieqeidnl.exe53⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ilknfn32.exeC:\Windows\system32\Ilknfn32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Inljnfkg.exeC:\Windows\system32\Inljnfkg.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ifcbodli.exeC:\Windows\system32\Ifcbodli.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Igdogl32.exeC:\Windows\system32\Igdogl32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iokfhi32.exeC:\Windows\system32\Iokfhi32.exe58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iqmcpahh.exeC:\Windows\system32\Iqmcpahh.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Idhopq32.exeC:\Windows\system32\Idhopq32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ijeghgoh.exeC:\Windows\system32\Ijeghgoh.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Inqcif32.exeC:\Windows\system32\Inqcif32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Idklfpon.exeC:\Windows\system32\Idklfpon.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Igihbknb.exeC:\Windows\system32\Igihbknb.exe64⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ijgdngmf.exeC:\Windows\system32\Ijgdngmf.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Incpoe32.exeC:\Windows\system32\Incpoe32.exe66⤵
-
C:\Windows\SysWOW64\Icpigm32.exeC:\Windows\system32\Icpigm32.exe67⤵
-
C:\Windows\SysWOW64\Igkdgk32.exeC:\Windows\system32\Igkdgk32.exe68⤵
-
C:\Windows\SysWOW64\Jnemdecl.exeC:\Windows\system32\Jnemdecl.exe69⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jqdipqbp.exeC:\Windows\system32\Jqdipqbp.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jofiln32.exeC:\Windows\system32\Jofiln32.exe71⤵
-
C:\Windows\SysWOW64\Jgnamk32.exeC:\Windows\system32\Jgnamk32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jjlnif32.exeC:\Windows\system32\Jjlnif32.exe73⤵
-
C:\Windows\SysWOW64\Jmjjea32.exeC:\Windows\system32\Jmjjea32.exe74⤵
-
C:\Windows\SysWOW64\Jcdbbloa.exeC:\Windows\system32\Jcdbbloa.exe75⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jbgbni32.exeC:\Windows\system32\Jbgbni32.exe76⤵
-
C:\Windows\SysWOW64\Jiakjb32.exeC:\Windows\system32\Jiakjb32.exe77⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jkpgfn32.exeC:\Windows\system32\Jkpgfn32.exe78⤵
-
C:\Windows\SysWOW64\Jfekcg32.exeC:\Windows\system32\Jfekcg32.exe79⤵
-
C:\Windows\SysWOW64\Jicgpb32.exeC:\Windows\system32\Jicgpb32.exe80⤵
-
C:\Windows\SysWOW64\Jonplmcb.exeC:\Windows\system32\Jonplmcb.exe81⤵
-
C:\Windows\SysWOW64\Jnqphi32.exeC:\Windows\system32\Jnqphi32.exe82⤵
-
C:\Windows\SysWOW64\Jfghif32.exeC:\Windows\system32\Jfghif32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jifdebic.exeC:\Windows\system32\Jifdebic.exe84⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Joplbl32.exeC:\Windows\system32\Joplbl32.exe85⤵
-
C:\Windows\SysWOW64\Jbnhng32.exeC:\Windows\system32\Jbnhng32.exe86⤵
-
C:\Windows\SysWOW64\Kemejc32.exeC:\Windows\system32\Kemejc32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kihqkagp.exeC:\Windows\system32\Kihqkagp.exe88⤵
-
C:\Windows\SysWOW64\Kjjmbj32.exeC:\Windows\system32\Kjjmbj32.exe89⤵
-
C:\Windows\SysWOW64\Kneicieh.exeC:\Windows\system32\Kneicieh.exe90⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Keoapb32.exeC:\Windows\system32\Keoapb32.exe91⤵
-
C:\Windows\SysWOW64\Kgnnln32.exeC:\Windows\system32\Kgnnln32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kngfih32.exeC:\Windows\system32\Kngfih32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kafbec32.exeC:\Windows\system32\Kafbec32.exe94⤵
-
C:\Windows\SysWOW64\Keanebkb.exeC:\Windows\system32\Keanebkb.exe95⤵
-
C:\Windows\SysWOW64\Kgpjanje.exeC:\Windows\system32\Kgpjanje.exe96⤵
-
C:\Windows\SysWOW64\Kjnfniii.exeC:\Windows\system32\Kjnfniii.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kahojc32.exeC:\Windows\system32\Kahojc32.exe98⤵
-
C:\Windows\SysWOW64\Kgbggnhc.exeC:\Windows\system32\Kgbggnhc.exe99⤵
-
C:\Windows\SysWOW64\Kiccofna.exeC:\Windows\system32\Kiccofna.exe100⤵
-
C:\Windows\SysWOW64\Kaklpcoc.exeC:\Windows\system32\Kaklpcoc.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kcihlong.exeC:\Windows\system32\Kcihlong.exe102⤵
-
C:\Windows\SysWOW64\Kfgdhjmk.exeC:\Windows\system32\Kfgdhjmk.exe103⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kifpdelo.exeC:\Windows\system32\Kifpdelo.exe104⤵
-
C:\Windows\SysWOW64\Lldlqakb.exeC:\Windows\system32\Lldlqakb.exe105⤵
-
C:\Windows\SysWOW64\Lckdanld.exeC:\Windows\system32\Lckdanld.exe106⤵
-
C:\Windows\SysWOW64\Lfjqnjkh.exeC:\Windows\system32\Lfjqnjkh.exe107⤵
-
C:\Windows\SysWOW64\Lmcijcbe.exeC:\Windows\system32\Lmcijcbe.exe108⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lpbefoai.exeC:\Windows\system32\Lpbefoai.exe109⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lijjoe32.exeC:\Windows\system32\Lijjoe32.exe110⤵
-
C:\Windows\SysWOW64\Lhmjkaoc.exeC:\Windows\system32\Lhmjkaoc.exe111⤵
-
C:\Windows\SysWOW64\Lpdbloof.exeC:\Windows\system32\Lpdbloof.exe112⤵
-
C:\Windows\SysWOW64\Lbcnhjnj.exeC:\Windows\system32\Lbcnhjnj.exe113⤵
-
C:\Windows\SysWOW64\Leajdfnm.exeC:\Windows\system32\Leajdfnm.exe114⤵
-
C:\Windows\SysWOW64\Limfed32.exeC:\Windows\system32\Limfed32.exe115⤵
-
C:\Windows\SysWOW64\Llkbap32.exeC:\Windows\system32\Llkbap32.exe116⤵
-
C:\Windows\SysWOW64\Lojomkdn.exeC:\Windows\system32\Lojomkdn.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Lahkigca.exeC:\Windows\system32\Lahkigca.exe118⤵
-
C:\Windows\SysWOW64\Ldfgebbe.exeC:\Windows\system32\Ldfgebbe.exe119⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Llnofpcg.exeC:\Windows\system32\Llnofpcg.exe120⤵
-
C:\Windows\SysWOW64\Lkppbl32.exeC:\Windows\system32\Lkppbl32.exe121⤵
-
C:\Windows\SysWOW64\Lmolnh32.exeC:\Windows\system32\Lmolnh32.exe122⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lajhofao.exeC:\Windows\system32\Lajhofao.exe123⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ldidkbpb.exeC:\Windows\system32\Ldidkbpb.exe124⤵
-
C:\Windows\SysWOW64\Mggpgmof.exeC:\Windows\system32\Mggpgmof.exe125⤵
-
C:\Windows\SysWOW64\Monhhk32.exeC:\Windows\system32\Monhhk32.exe126⤵
-
C:\Windows\SysWOW64\Mmahdggc.exeC:\Windows\system32\Mmahdggc.exe127⤵
-
C:\Windows\SysWOW64\Mdkqqa32.exeC:\Windows\system32\Mdkqqa32.exe128⤵
-
C:\Windows\SysWOW64\Mhgmapfi.exeC:\Windows\system32\Mhgmapfi.exe129⤵
-
C:\Windows\SysWOW64\Mkeimlfm.exeC:\Windows\system32\Mkeimlfm.exe130⤵
-
C:\Windows\SysWOW64\Mmceigep.exeC:\Windows\system32\Mmceigep.exe131⤵
-
C:\Windows\SysWOW64\Mpbaebdd.exeC:\Windows\system32\Mpbaebdd.exe132⤵
-
C:\Windows\SysWOW64\Mbpnanch.exeC:\Windows\system32\Mbpnanch.exe133⤵
-
C:\Windows\SysWOW64\Mkgfckcj.exeC:\Windows\system32\Mkgfckcj.exe134⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mmfbogcn.exeC:\Windows\system32\Mmfbogcn.exe135⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mlibjc32.exeC:\Windows\system32\Mlibjc32.exe136⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mdpjlajk.exeC:\Windows\system32\Mdpjlajk.exe137⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mgnfhlin.exeC:\Windows\system32\Mgnfhlin.exe138⤵
-
C:\Windows\SysWOW64\Mimbdhhb.exeC:\Windows\system32\Mimbdhhb.exe139⤵
-
C:\Windows\SysWOW64\Mlkopcge.exeC:\Windows\system32\Mlkopcge.exe140⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Moiklogi.exeC:\Windows\system32\Moiklogi.exe141⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mgqcmlgl.exeC:\Windows\system32\Mgqcmlgl.exe142⤵
-
C:\Windows\SysWOW64\Miooigfo.exeC:\Windows\system32\Miooigfo.exe143⤵
-
C:\Windows\SysWOW64\Mlmlecec.exeC:\Windows\system32\Mlmlecec.exe144⤵
-
C:\Windows\SysWOW64\Nolhan32.exeC:\Windows\system32\Nolhan32.exe145⤵
-
C:\Windows\SysWOW64\Najdnj32.exeC:\Windows\system32\Najdnj32.exe146⤵
-
C:\Windows\SysWOW64\Nialog32.exeC:\Windows\system32\Nialog32.exe147⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nhdlkdkg.exeC:\Windows\system32\Nhdlkdkg.exe148⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nkbhgojk.exeC:\Windows\system32\Nkbhgojk.exe149⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ncjqhmkm.exeC:\Windows\system32\Ncjqhmkm.exe150⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nehmdhja.exeC:\Windows\system32\Nehmdhja.exe151⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nhfipcid.exeC:\Windows\system32\Nhfipcid.exe152⤵
-
C:\Windows\SysWOW64\Nlbeqb32.exeC:\Windows\system32\Nlbeqb32.exe153⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Noqamn32.exeC:\Windows\system32\Noqamn32.exe154⤵
-
C:\Windows\SysWOW64\Naoniipe.exeC:\Windows\system32\Naoniipe.exe155⤵
-
C:\Windows\SysWOW64\Ndmjedoi.exeC:\Windows\system32\Ndmjedoi.exe156⤵
-
C:\Windows\SysWOW64\Nhiffc32.exeC:\Windows\system32\Nhiffc32.exe157⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nkgbbo32.exeC:\Windows\system32\Nkgbbo32.exe158⤵
-
C:\Windows\SysWOW64\Nnennj32.exeC:\Windows\system32\Nnennj32.exe159⤵
-
C:\Windows\SysWOW64\Npdjje32.exeC:\Windows\system32\Npdjje32.exe160⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nhkbkc32.exeC:\Windows\system32\Nhkbkc32.exe161⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ngnbgplj.exeC:\Windows\system32\Ngnbgplj.exe162⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Njlockkm.exeC:\Windows\system32\Njlockkm.exe163⤵
-
C:\Windows\SysWOW64\Nacgdhlp.exeC:\Windows\system32\Nacgdhlp.exe164⤵
-
C:\Windows\SysWOW64\Ndbcpd32.exeC:\Windows\system32\Ndbcpd32.exe165⤵
-
C:\Windows\SysWOW64\Nceclqan.exeC:\Windows\system32\Nceclqan.exe166⤵
-
C:\Windows\SysWOW64\Oklkmnbp.exeC:\Windows\system32\Oklkmnbp.exe167⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Onjgiiad.exeC:\Windows\system32\Onjgiiad.exe168⤵
-
C:\Windows\SysWOW64\Olmhdf32.exeC:\Windows\system32\Olmhdf32.exe169⤵
-
C:\Windows\SysWOW64\Oqideepg.exeC:\Windows\system32\Oqideepg.exe170⤵
-
C:\Windows\SysWOW64\Ogblbo32.exeC:\Windows\system32\Ogblbo32.exe171⤵
-
C:\Windows\SysWOW64\Ojahnj32.exeC:\Windows\system32\Ojahnj32.exe172⤵
-
C:\Windows\SysWOW64\Onmdoioa.exeC:\Windows\system32\Onmdoioa.exe173⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Oonafa32.exeC:\Windows\system32\Oonafa32.exe174⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ocimgp32.exeC:\Windows\system32\Ocimgp32.exe175⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ofhick32.exeC:\Windows\system32\Ofhick32.exe176⤵
-
C:\Windows\SysWOW64\Ohfeog32.exeC:\Windows\system32\Ohfeog32.exe177⤵
-
C:\Windows\SysWOW64\Oqmmpd32.exeC:\Windows\system32\Oqmmpd32.exe178⤵
-
C:\Windows\SysWOW64\Oclilp32.exeC:\Windows\system32\Oclilp32.exe179⤵
-
C:\Windows\SysWOW64\Obojhlbq.exeC:\Windows\system32\Obojhlbq.exe180⤵
-
C:\Windows\SysWOW64\Ojfaijcc.exeC:\Windows\system32\Ojfaijcc.exe181⤵
-
C:\Windows\SysWOW64\Omdneebf.exeC:\Windows\system32\Omdneebf.exe182⤵
-
C:\Windows\SysWOW64\Oobjaqaj.exeC:\Windows\system32\Oobjaqaj.exe183⤵
-
C:\Windows\SysWOW64\Obafnlpn.exeC:\Windows\system32\Obafnlpn.exe184⤵
-
C:\Windows\SysWOW64\Ofmbnkhg.exeC:\Windows\system32\Ofmbnkhg.exe185⤵
-
C:\Windows\SysWOW64\Odobjg32.exeC:\Windows\system32\Odobjg32.exe186⤵
-
C:\Windows\SysWOW64\Omfkke32.exeC:\Windows\system32\Omfkke32.exe187⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Onhgbmfb.exeC:\Windows\system32\Onhgbmfb.exe188⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Obcccl32.exeC:\Windows\system32\Obcccl32.exe189⤵
-
C:\Windows\SysWOW64\Pdaoog32.exeC:\Windows\system32\Pdaoog32.exe190⤵
-
C:\Windows\SysWOW64\Pgplkb32.exeC:\Windows\system32\Pgplkb32.exe191⤵
-
C:\Windows\SysWOW64\Pogclp32.exeC:\Windows\system32\Pogclp32.exe192⤵
-
C:\Windows\SysWOW64\Pbfpik32.exeC:\Windows\system32\Pbfpik32.exe193⤵
-
C:\Windows\SysWOW64\Pqhpdhcc.exeC:\Windows\system32\Pqhpdhcc.exe194⤵
-
C:\Windows\SysWOW64\Piphee32.exeC:\Windows\system32\Piphee32.exe195⤵
-
C:\Windows\SysWOW64\Pkndaa32.exeC:\Windows\system32\Pkndaa32.exe196⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pnlqnl32.exeC:\Windows\system32\Pnlqnl32.exe197⤵
-
C:\Windows\SysWOW64\Pqkmjh32.exeC:\Windows\system32\Pqkmjh32.exe198⤵
-
C:\Windows\SysWOW64\Pefijfii.exeC:\Windows\system32\Pefijfii.exe199⤵
-
C:\Windows\SysWOW64\Pgeefbhm.exeC:\Windows\system32\Pgeefbhm.exe200⤵
-
C:\Windows\SysWOW64\Pjcabmga.exeC:\Windows\system32\Pjcabmga.exe201⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pmanoifd.exeC:\Windows\system32\Pmanoifd.exe202⤵
-
C:\Windows\SysWOW64\Pamiog32.exeC:\Windows\system32\Pamiog32.exe203⤵
-
C:\Windows\SysWOW64\Pclfkc32.exeC:\Windows\system32\Pclfkc32.exe204⤵
-
C:\Windows\SysWOW64\Pfjbgnme.exeC:\Windows\system32\Pfjbgnme.exe205⤵
-
C:\Windows\SysWOW64\Pnajilng.exeC:\Windows\system32\Pnajilng.exe206⤵
-
C:\Windows\SysWOW64\Pmdjdh32.exeC:\Windows\system32\Pmdjdh32.exe207⤵
-
C:\Windows\SysWOW64\Pcnbablo.exeC:\Windows\system32\Pcnbablo.exe208⤵
-
C:\Windows\SysWOW64\Pgioaa32.exeC:\Windows\system32\Pgioaa32.exe209⤵
-
C:\Windows\SysWOW64\Pjhknm32.exeC:\Windows\system32\Pjhknm32.exe210⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Qmfgjh32.exeC:\Windows\system32\Qmfgjh32.exe211⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Qpecfc32.exeC:\Windows\system32\Qpecfc32.exe212⤵
-
C:\Windows\SysWOW64\Qcpofbjl.exeC:\Windows\system32\Qcpofbjl.exe213⤵
-
C:\Windows\SysWOW64\Qjjgclai.exeC:\Windows\system32\Qjjgclai.exe214⤵
-
C:\Windows\SysWOW64\Qimhoi32.exeC:\Windows\system32\Qimhoi32.exe215⤵
-
C:\Windows\SysWOW64\Qlkdkd32.exeC:\Windows\system32\Qlkdkd32.exe216⤵
-
C:\Windows\SysWOW64\Qcbllb32.exeC:\Windows\system32\Qcbllb32.exe217⤵
-
C:\Windows\SysWOW64\Qfahhm32.exeC:\Windows\system32\Qfahhm32.exe218⤵
-
C:\Windows\SysWOW64\Aipddi32.exeC:\Windows\system32\Aipddi32.exe219⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Alnqqd32.exeC:\Windows\system32\Alnqqd32.exe220⤵
-
C:\Windows\SysWOW64\Anlmmp32.exeC:\Windows\system32\Anlmmp32.exe221⤵
-
C:\Windows\SysWOW64\Abhimnma.exeC:\Windows\system32\Abhimnma.exe222⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Aefeijle.exeC:\Windows\system32\Aefeijle.exe223⤵
-
C:\Windows\SysWOW64\Aibajhdn.exeC:\Windows\system32\Aibajhdn.exe224⤵
-
C:\Windows\SysWOW64\Alpmfdcb.exeC:\Windows\system32\Alpmfdcb.exe225⤵
-
C:\Windows\SysWOW64\Anojbobe.exeC:\Windows\system32\Anojbobe.exe226⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Aamfnkai.exeC:\Windows\system32\Aamfnkai.exe227⤵
-
C:\Windows\SysWOW64\Aidnohbk.exeC:\Windows\system32\Aidnohbk.exe228⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Albjlcao.exeC:\Windows\system32\Albjlcao.exe229⤵
-
C:\Windows\SysWOW64\Anafhopc.exeC:\Windows\system32\Anafhopc.exe230⤵
-
C:\Windows\SysWOW64\Abmbhn32.exeC:\Windows\system32\Abmbhn32.exe231⤵
-
C:\Windows\SysWOW64\Aekodi32.exeC:\Windows\system32\Aekodi32.exe232⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ahikqd32.exeC:\Windows\system32\Ahikqd32.exe233⤵
-
C:\Windows\SysWOW64\Ajhgmpfg.exeC:\Windows\system32\Ajhgmpfg.exe234⤵
-
C:\Windows\SysWOW64\Anccmo32.exeC:\Windows\system32\Anccmo32.exe235⤵
-
C:\Windows\SysWOW64\Aaaoij32.exeC:\Windows\system32\Aaaoij32.exe236⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Adpkee32.exeC:\Windows\system32\Adpkee32.exe237⤵
-
C:\Windows\SysWOW64\Afohaa32.exeC:\Windows\system32\Afohaa32.exe238⤵
-
C:\Windows\SysWOW64\Ajjcbpdd.exeC:\Windows\system32\Ajjcbpdd.exe239⤵
-
C:\Windows\SysWOW64\Amhpnkch.exeC:\Windows\system32\Amhpnkch.exe240⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bpgljfbl.exeC:\Windows\system32\Bpgljfbl.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup