Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe
Resource
win10v2004-20240611-en
General
-
Target
a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe
-
Size
163KB
-
MD5
bf2758d56770a553ad272626d4c04569
-
SHA1
af6d33556104583f9b86e17370c7a485a29e54c1
-
SHA256
a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579
-
SHA512
7a8de813ab471c59c7fa912f83ae11d3ced6ebb64e79d6f80ad0ce60d7216c9eb74cca2624f5c9df231ca379554d16291f61d059203fb1d7275cad3a46fed1b3
-
SSDEEP
3072:xmW9kz9Y9Gi2pTxHUbjlltOrWKDBr+yJb:xmmgYEtpTxa5LOf
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kgnnln32.exeMmahdggc.exeBlgpef32.exeFmbhok32.exeKfpgmdog.exeLinphc32.exeJbnhng32.exeNnennj32.exeEmieil32.exeGmpgio32.exeJfqahgpg.exeOqmmpd32.exeBkommo32.exeDkqbaecc.exeIedkbc32.exeKqqboncb.exeHobcak32.exeJnqphi32.exeBifgdk32.exeGpcmpijk.exeLaegiq32.exeNdkmpe32.exeAjhgmpfg.exeFekpnn32.exeJbdonb32.exeKincipnk.exeKkaiqk32.exeMbkmlh32.exeJokcgmee.exeKaceodek.exeCcahbp32.exeGdgcpi32.exeMggpgmof.exeDogefd32.exeGanpomec.exeOcgpappk.exeDfmdho32.exeEdkcojga.exeJnpinc32.exeBbokmqie.exeCdbdjhmp.exeEbjglbml.exeHpbiommg.exeJoaeeklp.exePefijfii.exeCojema32.exeHiknhbcg.exeIoaifhid.exeJbgkcb32.exeJmplcp32.exeJmjjea32.exeChbjffad.exeJnmlhchd.exeLpekon32.exeNdjfeo32.exeKcbakpdo.exeMijfnh32.exeAlegac32.exeEplkpgnh.exeIjeghgoh.exePkpagq32.exeBekkcljk.exeIkfmfi32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgnnln32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmahdggc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blgpef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmbhok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfpgmdog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Linphc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbnhng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnennj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emieil32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmpgio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfqahgpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oqmmpd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkommo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkqbaecc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iedkbc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kqqboncb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hobcak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnqphi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bifgdk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpcmpijk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laegiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndkmpe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajhgmpfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fekpnn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbdonb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kincipnk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkaiqk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbkmlh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jokcgmee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaceodek.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccahbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gdgcpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mggpgmof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogefd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ganpomec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocgpappk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfmdho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edkcojga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnpinc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbokmqie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdbdjhmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebjglbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpbiommg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iedkbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joaeeklp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pefijfii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cojema32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiknhbcg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioaifhid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbgkcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmplcp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmjjea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chbjffad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnmlhchd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpekon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndjfeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcbakpdo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mijfnh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alegac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eplkpgnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijeghgoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkpagq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bekkcljk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikfmfi32.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Gbijhg32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Gpmjak32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ghhofmql.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Gelppaof.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Goddhg32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ghmiam32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gaemjbcg.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hahjpbad.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hkpnhgge.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hiekid32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hobcak32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hellne32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hlfdkoin.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hcplhi32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ieqeidnl.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Idfbkq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ijeghgoh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ihdkao32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ikddbj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ijgdngmf.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/284-259-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Igkdgk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jfqahgpg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jmjjea32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jmmfkafa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jokcgmee.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/1876-302-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jkbcln32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jnqphi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jbnhng32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kaceodek.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kcbakpdo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kgnnln32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kcdnao32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kpkofpgq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kfegbj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kblhgk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kifpdelo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lpphap32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Loeebl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lbqabkql.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lpdbloof.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Llkbap32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ldfgebbe.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/2964-493-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lollckbk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mggpgmof.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mmahdggc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mkeimlfm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mmceigep.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Maoajf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mbpnanch.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mkgfckcj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mijfnh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mpdnkb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mgnfhlin.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mlkopcge.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Moiklogi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Miooigfo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mpigfa32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncgdbmmp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nhdlkdkg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nlphkb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncjqhmkm.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Gbijhg32.exe UPX \Windows\SysWOW64\Gpmjak32.exe UPX \Windows\SysWOW64\Ghhofmql.exe UPX \Windows\SysWOW64\Gelppaof.exe UPX \Windows\SysWOW64\Goddhg32.exe UPX \Windows\SysWOW64\Ghmiam32.exe UPX C:\Windows\SysWOW64\Gaemjbcg.exe UPX \Windows\SysWOW64\Hahjpbad.exe UPX \Windows\SysWOW64\Hkpnhgge.exe UPX \Windows\SysWOW64\Hiekid32.exe UPX \Windows\SysWOW64\Hobcak32.exe UPX \Windows\SysWOW64\Hellne32.exe UPX \Windows\SysWOW64\Hlfdkoin.exe UPX \Windows\SysWOW64\Hcplhi32.exe UPX \Windows\SysWOW64\Ieqeidnl.exe UPX \Windows\SysWOW64\Idfbkq32.exe UPX C:\Windows\SysWOW64\Ijeghgoh.exe UPX C:\Windows\SysWOW64\Ihdkao32.exe UPX C:\Windows\SysWOW64\Ikddbj32.exe UPX C:\Windows\SysWOW64\Ijgdngmf.exe UPX behavioral1/memory/284-259-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Igkdgk32.exe UPX C:\Windows\SysWOW64\Jfqahgpg.exe UPX C:\Windows\SysWOW64\Jmjjea32.exe UPX C:\Windows\SysWOW64\Jmmfkafa.exe UPX C:\Windows\SysWOW64\Jokcgmee.exe UPX behavioral1/memory/1876-302-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Jkbcln32.exe UPX C:\Windows\SysWOW64\Jnqphi32.exe UPX C:\Windows\SysWOW64\Jbnhng32.exe UPX C:\Windows\SysWOW64\Kaceodek.exe UPX C:\Windows\SysWOW64\Kcbakpdo.exe UPX C:\Windows\SysWOW64\Kgnnln32.exe UPX C:\Windows\SysWOW64\Kcdnao32.exe UPX C:\Windows\SysWOW64\Kpkofpgq.exe UPX C:\Windows\SysWOW64\Kfegbj32.exe UPX C:\Windows\SysWOW64\Kblhgk32.exe UPX C:\Windows\SysWOW64\Kifpdelo.exe UPX C:\Windows\SysWOW64\Lpphap32.exe UPX C:\Windows\SysWOW64\Loeebl32.exe UPX C:\Windows\SysWOW64\Lbqabkql.exe UPX C:\Windows\SysWOW64\Lpdbloof.exe UPX C:\Windows\SysWOW64\Llkbap32.exe UPX C:\Windows\SysWOW64\Ldfgebbe.exe UPX behavioral1/memory/2964-493-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Lollckbk.exe UPX C:\Windows\SysWOW64\Mggpgmof.exe UPX C:\Windows\SysWOW64\Mmahdggc.exe UPX C:\Windows\SysWOW64\Mkeimlfm.exe UPX C:\Windows\SysWOW64\Mmceigep.exe UPX C:\Windows\SysWOW64\Maoajf32.exe UPX C:\Windows\SysWOW64\Mbpnanch.exe UPX C:\Windows\SysWOW64\Mkgfckcj.exe UPX C:\Windows\SysWOW64\Mijfnh32.exe UPX C:\Windows\SysWOW64\Mpdnkb32.exe UPX C:\Windows\SysWOW64\Mgnfhlin.exe UPX C:\Windows\SysWOW64\Mlkopcge.exe UPX C:\Windows\SysWOW64\Moiklogi.exe UPX C:\Windows\SysWOW64\Miooigfo.exe UPX C:\Windows\SysWOW64\Mpigfa32.exe UPX C:\Windows\SysWOW64\Ncgdbmmp.exe UPX C:\Windows\SysWOW64\Nhdlkdkg.exe UPX C:\Windows\SysWOW64\Nlphkb32.exe UPX C:\Windows\SysWOW64\Ncjqhmkm.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Gbijhg32.exeGpmjak32.exeGhhofmql.exeGelppaof.exeGoddhg32.exeGhmiam32.exeGaemjbcg.exeHahjpbad.exeHkpnhgge.exeHiekid32.exeHobcak32.exeHellne32.exeHlfdkoin.exeHcplhi32.exeIeqeidnl.exeIdfbkq32.exeIhdkao32.exeIjeghgoh.exeIkddbj32.exeIjgdngmf.exeIgkdgk32.exeJfqahgpg.exeJmjjea32.exeJmmfkafa.exeJokcgmee.exeJkbcln32.exeJnqphi32.exeJbnhng32.exeKaceodek.exeKcbakpdo.exeKgnnln32.exeKcdnao32.exeKpkofpgq.exeKfegbj32.exeKblhgk32.exeKifpdelo.exeLpphap32.exeLoeebl32.exeLbqabkql.exeLpdbloof.exeLlkbap32.exeLdfgebbe.exeLollckbk.exeMggpgmof.exeMmahdggc.exeMkeimlfm.exeMmceigep.exeMaoajf32.exeMbpnanch.exeMkgfckcj.exeMijfnh32.exeMpdnkb32.exeMgnfhlin.exeMlkopcge.exeMoiklogi.exeMiooigfo.exeMpigfa32.exeNcgdbmmp.exeNhdlkdkg.exeNlphkb32.exeNcjqhmkm.exeNdkmpe32.exeNlbeqb32.exeNncahjgl.exepid process 2072 Gbijhg32.exe 2620 Gpmjak32.exe 2632 Ghhofmql.exe 2764 Gelppaof.exe 2392 Goddhg32.exe 3004 Ghmiam32.exe 2752 Gaemjbcg.exe 2824 Hahjpbad.exe 2652 Hkpnhgge.exe 1544 Hiekid32.exe 1856 Hobcak32.exe 2748 Hellne32.exe 932 Hlfdkoin.exe 1260 Hcplhi32.exe 2000 Ieqeidnl.exe 2492 Idfbkq32.exe 2984 Ihdkao32.exe 2044 Ijeghgoh.exe 1248 Ikddbj32.exe 284 Ijgdngmf.exe 952 Igkdgk32.exe 1288 Jfqahgpg.exe 3028 Jmjjea32.exe 1876 Jmmfkafa.exe 1000 Jokcgmee.exe 884 Jkbcln32.exe 1952 Jnqphi32.exe 2532 Jbnhng32.exe 2548 Kaceodek.exe 2400 Kcbakpdo.exe 2560 Kgnnln32.exe 2504 Kcdnao32.exe 2512 Kpkofpgq.exe 2224 Kfegbj32.exe 2800 Kblhgk32.exe 2976 Kifpdelo.exe 2140 Lpphap32.exe 892 Loeebl32.exe 808 Lbqabkql.exe 676 Lpdbloof.exe 864 Llkbap32.exe 2964 Ldfgebbe.exe 1748 Lollckbk.exe 1424 Mggpgmof.exe 988 Mmahdggc.exe 452 Mkeimlfm.exe 108 Mmceigep.exe 1480 Maoajf32.exe 2092 Mbpnanch.exe 1484 Mkgfckcj.exe 2176 Mijfnh32.exe 2848 Mpdnkb32.exe 1944 Mgnfhlin.exe 3036 Mlkopcge.exe 2604 Moiklogi.exe 2700 Miooigfo.exe 2208 Mpigfa32.exe 2556 Ncgdbmmp.exe 2944 Nhdlkdkg.exe 2760 Nlphkb32.exe 2812 Ncjqhmkm.exe 2452 Ndkmpe32.exe 2580 Nlbeqb32.exe 2328 Nncahjgl.exe -
Loads dropped DLL 64 IoCs
Processes:
a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exeGbijhg32.exeGpmjak32.exeGhhofmql.exeGelppaof.exeGoddhg32.exeGhmiam32.exeGaemjbcg.exeHahjpbad.exeHkpnhgge.exeHiekid32.exeHobcak32.exeHellne32.exeHlfdkoin.exeHcplhi32.exeIeqeidnl.exeIdfbkq32.exeIhdkao32.exeIjeghgoh.exeIkddbj32.exeIjgdngmf.exeIgkdgk32.exeJfqahgpg.exeJmjjea32.exeJmmfkafa.exeJokcgmee.exeJkbcln32.exeJoplbl32.exeJbnhng32.exeKaceodek.exeKcbakpdo.exeKgnnln32.exepid process 2172 a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe 2172 a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe 2072 Gbijhg32.exe 2072 Gbijhg32.exe 2620 Gpmjak32.exe 2620 Gpmjak32.exe 2632 Ghhofmql.exe 2632 Ghhofmql.exe 2764 Gelppaof.exe 2764 Gelppaof.exe 2392 Goddhg32.exe 2392 Goddhg32.exe 3004 Ghmiam32.exe 3004 Ghmiam32.exe 2752 Gaemjbcg.exe 2752 Gaemjbcg.exe 2824 Hahjpbad.exe 2824 Hahjpbad.exe 2652 Hkpnhgge.exe 2652 Hkpnhgge.exe 1544 Hiekid32.exe 1544 Hiekid32.exe 1856 Hobcak32.exe 1856 Hobcak32.exe 2748 Hellne32.exe 2748 Hellne32.exe 932 Hlfdkoin.exe 932 Hlfdkoin.exe 1260 Hcplhi32.exe 1260 Hcplhi32.exe 2000 Ieqeidnl.exe 2000 Ieqeidnl.exe 2492 Idfbkq32.exe 2492 Idfbkq32.exe 2984 Ihdkao32.exe 2984 Ihdkao32.exe 2044 Ijeghgoh.exe 2044 Ijeghgoh.exe 1248 Ikddbj32.exe 1248 Ikddbj32.exe 284 Ijgdngmf.exe 284 Ijgdngmf.exe 952 Igkdgk32.exe 952 Igkdgk32.exe 1288 Jfqahgpg.exe 1288 Jfqahgpg.exe 3028 Jmjjea32.exe 3028 Jmjjea32.exe 1876 Jmmfkafa.exe 1876 Jmmfkafa.exe 1000 Jokcgmee.exe 1000 Jokcgmee.exe 884 Jkbcln32.exe 884 Jkbcln32.exe 1564 Joplbl32.exe 1564 Joplbl32.exe 2532 Jbnhng32.exe 2532 Jbnhng32.exe 2548 Kaceodek.exe 2548 Kaceodek.exe 2400 Kcbakpdo.exe 2400 Kcbakpdo.exe 2560 Kgnnln32.exe 2560 Kgnnln32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Gfhladfn.exeGanpomec.exeMiooigfo.exeBbhela32.exeBehnnm32.exeEfaibbij.exeFiihdlpc.exeNkpegi32.exePclfkc32.exeNdjfeo32.exeNenobfak.exeFidoim32.exeMggpgmof.exeIlncom32.exeKfbcbd32.exeJbnhng32.exeAhgnke32.exeBioqclil.exeIoolqh32.exeLfpclh32.exeMkhofjoj.exeMkklljmg.exePikkiijf.exeChbjffad.exeGbomfe32.exeNceclqan.exeFlgeqgog.exeGfmemc32.exeEdkcojga.exeEgafleqm.exeKfpgmdog.exeIgkdgk32.exePpbfpd32.exeQfokbnip.exeEibbcm32.exeJkbcln32.exeIllgimph.exeDpeekh32.exeNpdjje32.exeDfmdho32.exeFhneehek.exeHomclekn.exeMieeibkn.exeNhiffc32.exeGpmjak32.exeNkgbbo32.exeKnklagmb.exeKaceodek.exeEojnkg32.exeGjfdhbld.exeHmbpmapf.exePiphee32.exeOqmmpd32.exeMbkmlh32.exeHellne32.exeBoqbfb32.exeKbbngf32.exeOhfeog32.exeCcahbp32.exeIfkacb32.exeLlkbap32.exedescription ioc process File created C:\Windows\SysWOW64\Mmjhjhkh.dll Gfhladfn.exe File created C:\Windows\SysWOW64\Iqapllgh.dll Ganpomec.exe File created C:\Windows\SysWOW64\Mpigfa32.exe Miooigfo.exe File created C:\Windows\SysWOW64\Bkommo32.exe Bbhela32.exe File created C:\Windows\SysWOW64\Fjhlioai.dll Behnnm32.exe File created C:\Windows\SysWOW64\Enhacojl.exe Efaibbij.exe File created C:\Windows\SysWOW64\Flgeqgog.exe Fiihdlpc.exe File opened for modification C:\Windows\SysWOW64\Naimccpo.exe Nkpegi32.exe File created C:\Windows\SysWOW64\Obmhdd32.dll Pclfkc32.exe File created C:\Windows\SysWOW64\Pjclpeak.dll Ndjfeo32.exe File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe Nenobfak.exe File opened for modification C:\Windows\SysWOW64\Fmpkjkma.exe Fidoim32.exe File created C:\Windows\SysWOW64\Mmahdggc.exe Mggpgmof.exe File created C:\Windows\SysWOW64\Ichllgfb.exe Ilncom32.exe File created C:\Windows\SysWOW64\Eeieql32.dll Kfbcbd32.exe File created C:\Windows\SysWOW64\Kaceodek.exe Jbnhng32.exe File created C:\Windows\SysWOW64\Ajejgp32.exe Ahgnke32.exe File created C:\Windows\SysWOW64\Bpiipf32.exe Bioqclil.exe File created C:\Windows\SysWOW64\Ieidmbcc.exe Ioolqh32.exe File created C:\Windows\SysWOW64\Aaebnq32.dll Lfpclh32.exe File created C:\Windows\SysWOW64\Pdlbongd.dll Mkhofjoj.exe File opened for modification C:\Windows\SysWOW64\Meppiblm.exe Mkklljmg.exe File created C:\Windows\SysWOW64\Pggbla32.exe Pclfkc32.exe File created C:\Windows\SysWOW64\Jdmqokqf.dll Pikkiijf.exe File opened for modification C:\Windows\SysWOW64\Cpnojioo.exe Chbjffad.exe File created C:\Windows\SysWOW64\Gjfdhbld.exe Gbomfe32.exe File opened for modification C:\Windows\SysWOW64\Oqideepg.exe Nceclqan.exe File opened for modification C:\Windows\SysWOW64\Fnfamcoj.exe Flgeqgog.exe File created C:\Windows\SysWOW64\Hnpcnhmk.dll Gfmemc32.exe File created C:\Windows\SysWOW64\Egjpkffe.exe Edkcojga.exe File created C:\Windows\SysWOW64\Jhgnia32.dll Egafleqm.exe File created C:\Windows\SysWOW64\Kincipnk.exe Kfpgmdog.exe File opened for modification C:\Windows\SysWOW64\Jfqahgpg.exe Igkdgk32.exe File opened for modification C:\Windows\SysWOW64\Pcnbablo.exe Ppbfpd32.exe File opened for modification C:\Windows\SysWOW64\Qjjgclai.exe Qfokbnip.exe File created C:\Windows\SysWOW64\Eqijej32.exe Eibbcm32.exe File created C:\Windows\SysWOW64\Jnqphi32.exe Jkbcln32.exe File opened for modification C:\Windows\SysWOW64\Icfofg32.exe Illgimph.exe File created C:\Windows\SysWOW64\Lhajpc32.dll Mkklljmg.exe File created C:\Windows\SysWOW64\Dogefd32.exe Dpeekh32.exe File created C:\Windows\SysWOW64\Ngnbgplj.exe Npdjje32.exe File created C:\Windows\SysWOW64\Mfacfkje.dll Dfmdho32.exe File opened for modification C:\Windows\SysWOW64\Fljafg32.exe Fhneehek.exe File opened for modification C:\Windows\SysWOW64\Hakphqja.exe Homclekn.exe File created C:\Windows\SysWOW64\Ombhbhel.dll Mieeibkn.exe File opened for modification C:\Windows\SysWOW64\Nkgbbo32.exe Nhiffc32.exe File created C:\Windows\SysWOW64\Ahpjhc32.dll Gpmjak32.exe File created C:\Windows\SysWOW64\Nnennj32.exe Nkgbbo32.exe File created C:\Windows\SysWOW64\Kfbcbd32.exe Knklagmb.exe File created C:\Windows\SysWOW64\Dglhipbb.dll Kaceodek.exe File opened for modification C:\Windows\SysWOW64\Egafleqm.exe Eojnkg32.exe File created C:\Windows\SysWOW64\Idgjaf32.dll Gjfdhbld.exe File created C:\Windows\SysWOW64\Hdlhjl32.exe Hmbpmapf.exe File opened for modification C:\Windows\SysWOW64\Pgbhabjp.exe Piphee32.exe File opened for modification C:\Windows\SysWOW64\Oclilp32.exe Oqmmpd32.exe File created C:\Windows\SysWOW64\Lmgefl32.dll Homclekn.exe File created C:\Windows\SysWOW64\Mffimglk.exe Mbkmlh32.exe File created C:\Windows\SysWOW64\Hlfdkoin.exe Hellne32.exe File created C:\Windows\SysWOW64\Bekkcljk.exe Boqbfb32.exe File created C:\Windows\SysWOW64\Kfmjgeaj.exe Kbbngf32.exe File created C:\Windows\SysWOW64\Chfpgj32.dll Ohfeog32.exe File created C:\Windows\SysWOW64\Pbkafj32.dll Ccahbp32.exe File created C:\Windows\SysWOW64\Qdkghm32.dll Ifkacb32.exe File created C:\Windows\SysWOW64\Cfnlkbne.dll Llkbap32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4468 4444 WerFault.exe Nlhgoqhh.exe -
Modifies registry class 64 IoCs
Processes:
Joplbl32.exeNpdjje32.exePnajilng.exeEcqqpgli.exeIeidmbcc.exeGoddhg32.exeIfkacb32.exeKcbakpdo.exeIedkbc32.exeMkgfckcj.exeBioqclil.exeEojnkg32.exeMkklljmg.exeNaimccpo.exeHahjpbad.exeGjfdhbld.exePklhlael.exeEnhacojl.exeDlgldibq.exeEmieil32.exeHedocp32.exeNmbknddp.exeNkgbbo32.exeNnennj32.exeNceclqan.exeDogefd32.exeFcefji32.exeHdildlie.exeLbiqfied.exeKcdnao32.exeCdbdjhmp.exeEndhhp32.exeFiihdlpc.exeHlngpjlj.exePkpagq32.exeHdlhjl32.exePikkiijf.exeGjakmc32.exeOfhick32.exeBlgpef32.exeHlqdei32.exeLjmlbfhi.exeNcjqhmkm.exeJnffgd32.exeJgagfi32.exeKqqboncb.exeNkbalifo.exePfoocjfd.exeIdfbkq32.exeEdkcojga.exeGanpomec.exeIhjnom32.exeLabkdack.exeHobcak32.exeDhpiojfb.exeFadminnn.exeJgfqaiod.exePciifc32.exeEnakbp32.exeEgafleqm.exeEibbcm32.exeGbaileio.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipnnggjm.dll" Joplbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npdjje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnajilng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecqqpgli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkmgjljo.dll" Ieidmbcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Goddhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qdkghm32.dll" Ifkacb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnplna32.dll" Kcbakpdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iedkbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbmnie32.dll" Mkgfckcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbiaej32.dll" Bioqclil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eojnkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkklljmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Naimccpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hahjpbad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idgjaf32.dll" Gjfdhbld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pklhlael.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkmkpl32.dll" Enhacojl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlgldibq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imehcohk.dll" Emieil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hedocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmbknddp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkgbbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iigpciig.dll" Nnennj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nceclqan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogefd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enhacojl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcefji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obojmk32.dll" Hdildlie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbiqfied.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcdnao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdbdjhmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Endhhp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fiihdlpc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlngpjlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbnnqb32.dll" Pkpagq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdlhjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pikkiijf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjakmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inkaippf.dll" Ofhick32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bneqdoee.dll" Blgpef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlqdei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ljmlbfhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncjqhmkm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnffgd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgagfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kqqboncb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcihoc32.dll" Nkbalifo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pfoocjfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idfbkq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edkcojga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iqapllgh.dll" Ganpomec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihjnom32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Labkdack.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hobcak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhpiojfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fadminnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhdffl32.dll" Jgfqaiod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pciifc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enakbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egafleqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eibbcm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbaileio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofhick32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exeGbijhg32.exeGpmjak32.exeGhhofmql.exeGelppaof.exeGoddhg32.exeGhmiam32.exeGaemjbcg.exeHahjpbad.exeHkpnhgge.exeHiekid32.exeHobcak32.exeHellne32.exeHlfdkoin.exeHcplhi32.exeIeqeidnl.exedescription pid process target process PID 2172 wrote to memory of 2072 2172 a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe Gbijhg32.exe PID 2172 wrote to memory of 2072 2172 a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe Gbijhg32.exe PID 2172 wrote to memory of 2072 2172 a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe Gbijhg32.exe PID 2172 wrote to memory of 2072 2172 a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe Gbijhg32.exe PID 2072 wrote to memory of 2620 2072 Gbijhg32.exe Gpmjak32.exe PID 2072 wrote to memory of 2620 2072 Gbijhg32.exe Gpmjak32.exe PID 2072 wrote to memory of 2620 2072 Gbijhg32.exe Gpmjak32.exe PID 2072 wrote to memory of 2620 2072 Gbijhg32.exe Gpmjak32.exe PID 2620 wrote to memory of 2632 2620 Gpmjak32.exe Ghhofmql.exe PID 2620 wrote to memory of 2632 2620 Gpmjak32.exe Ghhofmql.exe PID 2620 wrote to memory of 2632 2620 Gpmjak32.exe Ghhofmql.exe PID 2620 wrote to memory of 2632 2620 Gpmjak32.exe Ghhofmql.exe PID 2632 wrote to memory of 2764 2632 Ghhofmql.exe Gelppaof.exe PID 2632 wrote to memory of 2764 2632 Ghhofmql.exe Gelppaof.exe PID 2632 wrote to memory of 2764 2632 Ghhofmql.exe Gelppaof.exe PID 2632 wrote to memory of 2764 2632 Ghhofmql.exe Gelppaof.exe PID 2764 wrote to memory of 2392 2764 Gelppaof.exe Goddhg32.exe PID 2764 wrote to memory of 2392 2764 Gelppaof.exe Goddhg32.exe PID 2764 wrote to memory of 2392 2764 Gelppaof.exe Goddhg32.exe PID 2764 wrote to memory of 2392 2764 Gelppaof.exe Goddhg32.exe PID 2392 wrote to memory of 3004 2392 Goddhg32.exe Ghmiam32.exe PID 2392 wrote to memory of 3004 2392 Goddhg32.exe Ghmiam32.exe PID 2392 wrote to memory of 3004 2392 Goddhg32.exe Ghmiam32.exe PID 2392 wrote to memory of 3004 2392 Goddhg32.exe Ghmiam32.exe PID 3004 wrote to memory of 2752 3004 Ghmiam32.exe Gaemjbcg.exe PID 3004 wrote to memory of 2752 3004 Ghmiam32.exe Gaemjbcg.exe PID 3004 wrote to memory of 2752 3004 Ghmiam32.exe Gaemjbcg.exe PID 3004 wrote to memory of 2752 3004 Ghmiam32.exe Gaemjbcg.exe PID 2752 wrote to memory of 2824 2752 Gaemjbcg.exe Hahjpbad.exe PID 2752 wrote to memory of 2824 2752 Gaemjbcg.exe Hahjpbad.exe PID 2752 wrote to memory of 2824 2752 Gaemjbcg.exe Hahjpbad.exe PID 2752 wrote to memory of 2824 2752 Gaemjbcg.exe Hahjpbad.exe PID 2824 wrote to memory of 2652 2824 Hahjpbad.exe Hkpnhgge.exe PID 2824 wrote to memory of 2652 2824 Hahjpbad.exe Hkpnhgge.exe PID 2824 wrote to memory of 2652 2824 Hahjpbad.exe Hkpnhgge.exe PID 2824 wrote to memory of 2652 2824 Hahjpbad.exe Hkpnhgge.exe PID 2652 wrote to memory of 1544 2652 Hkpnhgge.exe Hiekid32.exe PID 2652 wrote to memory of 1544 2652 Hkpnhgge.exe Hiekid32.exe PID 2652 wrote to memory of 1544 2652 Hkpnhgge.exe Hiekid32.exe PID 2652 wrote to memory of 1544 2652 Hkpnhgge.exe Hiekid32.exe PID 1544 wrote to memory of 1856 1544 Hiekid32.exe Hobcak32.exe PID 1544 wrote to memory of 1856 1544 Hiekid32.exe Hobcak32.exe PID 1544 wrote to memory of 1856 1544 Hiekid32.exe Hobcak32.exe PID 1544 wrote to memory of 1856 1544 Hiekid32.exe Hobcak32.exe PID 1856 wrote to memory of 2748 1856 Hobcak32.exe Hellne32.exe PID 1856 wrote to memory of 2748 1856 Hobcak32.exe Hellne32.exe PID 1856 wrote to memory of 2748 1856 Hobcak32.exe Hellne32.exe PID 1856 wrote to memory of 2748 1856 Hobcak32.exe Hellne32.exe PID 2748 wrote to memory of 932 2748 Hellne32.exe Hlfdkoin.exe PID 2748 wrote to memory of 932 2748 Hellne32.exe Hlfdkoin.exe PID 2748 wrote to memory of 932 2748 Hellne32.exe Hlfdkoin.exe PID 2748 wrote to memory of 932 2748 Hellne32.exe Hlfdkoin.exe PID 932 wrote to memory of 1260 932 Hlfdkoin.exe Hcplhi32.exe PID 932 wrote to memory of 1260 932 Hlfdkoin.exe Hcplhi32.exe PID 932 wrote to memory of 1260 932 Hlfdkoin.exe Hcplhi32.exe PID 932 wrote to memory of 1260 932 Hlfdkoin.exe Hcplhi32.exe PID 1260 wrote to memory of 2000 1260 Hcplhi32.exe Ieqeidnl.exe PID 1260 wrote to memory of 2000 1260 Hcplhi32.exe Ieqeidnl.exe PID 1260 wrote to memory of 2000 1260 Hcplhi32.exe Ieqeidnl.exe PID 1260 wrote to memory of 2000 1260 Hcplhi32.exe Ieqeidnl.exe PID 2000 wrote to memory of 2492 2000 Ieqeidnl.exe Idfbkq32.exe PID 2000 wrote to memory of 2492 2000 Ieqeidnl.exe Idfbkq32.exe PID 2000 wrote to memory of 2492 2000 Ieqeidnl.exe Idfbkq32.exe PID 2000 wrote to memory of 2492 2000 Ieqeidnl.exe Idfbkq32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe"C:\Users\Admin\AppData\Local\Temp\a3f8e24c4efd58961cbabc87fdc535b5e6c9ea422a6dc6173bbebd8932ff2579.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gbijhg32.exeC:\Windows\system32\Gbijhg32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gpmjak32.exeC:\Windows\system32\Gpmjak32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ghhofmql.exeC:\Windows\system32\Ghhofmql.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Goddhg32.exeC:\Windows\system32\Goddhg32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ghmiam32.exeC:\Windows\system32\Ghmiam32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gaemjbcg.exeC:\Windows\system32\Gaemjbcg.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hahjpbad.exeC:\Windows\system32\Hahjpbad.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hkpnhgge.exeC:\Windows\system32\Hkpnhgge.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hiekid32.exeC:\Windows\system32\Hiekid32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hobcak32.exeC:\Windows\system32\Hobcak32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hlfdkoin.exeC:\Windows\system32\Hlfdkoin.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hcplhi32.exeC:\Windows\system32\Hcplhi32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ieqeidnl.exeC:\Windows\system32\Ieqeidnl.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Idfbkq32.exeC:\Windows\system32\Idfbkq32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Ihdkao32.exeC:\Windows\system32\Ihdkao32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ijeghgoh.exeC:\Windows\system32\Ijeghgoh.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ikddbj32.exeC:\Windows\system32\Ikddbj32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ijgdngmf.exeC:\Windows\system32\Ijgdngmf.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Igkdgk32.exeC:\Windows\system32\Igkdgk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jfqahgpg.exeC:\Windows\system32\Jfqahgpg.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jmjjea32.exeC:\Windows\system32\Jmjjea32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jmmfkafa.exeC:\Windows\system32\Jmmfkafa.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jokcgmee.exeC:\Windows\system32\Jokcgmee.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Jkbcln32.exeC:\Windows\system32\Jkbcln32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jnqphi32.exeC:\Windows\system32\Jnqphi32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Joplbl32.exeC:\Windows\system32\Joplbl32.exe29⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Jbnhng32.exeC:\Windows\system32\Jbnhng32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kaceodek.exeC:\Windows\system32\Kaceodek.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kcbakpdo.exeC:\Windows\system32\Kcbakpdo.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Kgnnln32.exeC:\Windows\system32\Kgnnln32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Kcdnao32.exeC:\Windows\system32\Kcdnao32.exe34⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kpkofpgq.exeC:\Windows\system32\Kpkofpgq.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kfegbj32.exeC:\Windows\system32\Kfegbj32.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kblhgk32.exeC:\Windows\system32\Kblhgk32.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kifpdelo.exeC:\Windows\system32\Kifpdelo.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lpphap32.exeC:\Windows\system32\Lpphap32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Loeebl32.exeC:\Windows\system32\Loeebl32.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lbqabkql.exeC:\Windows\system32\Lbqabkql.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lpdbloof.exeC:\Windows\system32\Lpdbloof.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Llkbap32.exeC:\Windows\system32\Llkbap32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ldfgebbe.exeC:\Windows\system32\Ldfgebbe.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lollckbk.exeC:\Windows\system32\Lollckbk.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mggpgmof.exeC:\Windows\system32\Mggpgmof.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mmahdggc.exeC:\Windows\system32\Mmahdggc.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mkeimlfm.exeC:\Windows\system32\Mkeimlfm.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mmceigep.exeC:\Windows\system32\Mmceigep.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Maoajf32.exeC:\Windows\system32\Maoajf32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mbpnanch.exeC:\Windows\system32\Mbpnanch.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mkgfckcj.exeC:\Windows\system32\Mkgfckcj.exe52⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mijfnh32.exeC:\Windows\system32\Mijfnh32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mpdnkb32.exeC:\Windows\system32\Mpdnkb32.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mgnfhlin.exeC:\Windows\system32\Mgnfhlin.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mlkopcge.exeC:\Windows\system32\Mlkopcge.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Moiklogi.exeC:\Windows\system32\Moiklogi.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Miooigfo.exeC:\Windows\system32\Miooigfo.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mpigfa32.exeC:\Windows\system32\Mpigfa32.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ncgdbmmp.exeC:\Windows\system32\Ncgdbmmp.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nhdlkdkg.exeC:\Windows\system32\Nhdlkdkg.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nlphkb32.exeC:\Windows\system32\Nlphkb32.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ncjqhmkm.exeC:\Windows\system32\Ncjqhmkm.exe63⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ndkmpe32.exeC:\Windows\system32\Ndkmpe32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nlbeqb32.exeC:\Windows\system32\Nlbeqb32.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nncahjgl.exeC:\Windows\system32\Nncahjgl.exe66⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nejiih32.exeC:\Windows\system32\Nejiih32.exe67⤵
-
C:\Windows\SysWOW64\Nhiffc32.exeC:\Windows\system32\Nhiffc32.exe68⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nkgbbo32.exeC:\Windows\system32\Nkgbbo32.exe69⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nnennj32.exeC:\Windows\system32\Nnennj32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Npdjje32.exeC:\Windows\system32\Npdjje32.exe71⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ngnbgplj.exeC:\Windows\system32\Ngnbgplj.exe72⤵
-
C:\Windows\SysWOW64\Nkiogn32.exeC:\Windows\system32\Nkiogn32.exe73⤵
-
C:\Windows\SysWOW64\Nacgdhlp.exeC:\Windows\system32\Nacgdhlp.exe74⤵
-
C:\Windows\SysWOW64\Nceclqan.exeC:\Windows\system32\Nceclqan.exe75⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Oqideepg.exeC:\Windows\system32\Oqideepg.exe76⤵
-
C:\Windows\SysWOW64\Ocgpappk.exeC:\Windows\system32\Ocgpappk.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ofelmloo.exeC:\Windows\system32\Ofelmloo.exe78⤵
-
C:\Windows\SysWOW64\Oonafa32.exeC:\Windows\system32\Oonafa32.exe79⤵
-
C:\Windows\SysWOW64\Ofhick32.exeC:\Windows\system32\Ofhick32.exe80⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ohfeog32.exeC:\Windows\system32\Ohfeog32.exe81⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Oqmmpd32.exeC:\Windows\system32\Oqmmpd32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Oclilp32.exeC:\Windows\system32\Oclilp32.exe83⤵
-
C:\Windows\SysWOW64\Ohibdf32.exeC:\Windows\system32\Ohibdf32.exe84⤵
-
C:\Windows\SysWOW64\Omdneebf.exeC:\Windows\system32\Omdneebf.exe85⤵
-
C:\Windows\SysWOW64\Oobjaqaj.exeC:\Windows\system32\Oobjaqaj.exe86⤵
-
C:\Windows\SysWOW64\Obafnlpn.exeC:\Windows\system32\Obafnlpn.exe87⤵
-
C:\Windows\SysWOW64\Oikojfgk.exeC:\Windows\system32\Oikojfgk.exe88⤵
-
C:\Windows\SysWOW64\Okikfagn.exeC:\Windows\system32\Okikfagn.exe89⤵
-
C:\Windows\SysWOW64\Onhgbmfb.exeC:\Windows\system32\Onhgbmfb.exe90⤵
-
C:\Windows\SysWOW64\Pfoocjfd.exeC:\Windows\system32\Pfoocjfd.exe91⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pimkpfeh.exeC:\Windows\system32\Pimkpfeh.exe92⤵
-
C:\Windows\SysWOW64\Pklhlael.exeC:\Windows\system32\Pklhlael.exe93⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pnjdhmdo.exeC:\Windows\system32\Pnjdhmdo.exe94⤵
-
C:\Windows\SysWOW64\Pqhpdhcc.exeC:\Windows\system32\Pqhpdhcc.exe95⤵
-
C:\Windows\SysWOW64\Piphee32.exeC:\Windows\system32\Piphee32.exe96⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pgbhabjp.exeC:\Windows\system32\Pgbhabjp.exe97⤵
-
C:\Windows\SysWOW64\Pjadmnic.exeC:\Windows\system32\Pjadmnic.exe98⤵
-
C:\Windows\SysWOW64\Pbhmnkjf.exeC:\Windows\system32\Pbhmnkjf.exe99⤵
-
C:\Windows\SysWOW64\Pefijfii.exeC:\Windows\system32\Pefijfii.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pciifc32.exeC:\Windows\system32\Pciifc32.exe101⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pkpagq32.exeC:\Windows\system32\Pkpagq32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Pamiog32.exeC:\Windows\system32\Pamiog32.exe103⤵
-
C:\Windows\SysWOW64\Pclfkc32.exeC:\Windows\system32\Pclfkc32.exe104⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pggbla32.exeC:\Windows\system32\Pggbla32.exe105⤵
-
C:\Windows\SysWOW64\Pnajilng.exeC:\Windows\system32\Pnajilng.exe106⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ppbfpd32.exeC:\Windows\system32\Ppbfpd32.exe107⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pcnbablo.exeC:\Windows\system32\Pcnbablo.exe108⤵
-
C:\Windows\SysWOW64\Pikkiijf.exeC:\Windows\system32\Pikkiijf.exe109⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pikkiijf.exeC:\Windows\system32\Pikkiijf.exe110⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qmfgjh32.exeC:\Windows\system32\Qmfgjh32.exe111⤵
-
C:\Windows\SysWOW64\Qpecfc32.exeC:\Windows\system32\Qpecfc32.exe112⤵
-
C:\Windows\SysWOW64\Qfokbnip.exeC:\Windows\system32\Qfokbnip.exe113⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qjjgclai.exeC:\Windows\system32\Qjjgclai.exe114⤵
-
C:\Windows\SysWOW64\Qpgpkcpp.exeC:\Windows\system32\Qpgpkcpp.exe115⤵
-
C:\Windows\SysWOW64\Qcbllb32.exeC:\Windows\system32\Qcbllb32.exe116⤵
-
C:\Windows\SysWOW64\Aipddi32.exeC:\Windows\system32\Aipddi32.exe117⤵
-
C:\Windows\SysWOW64\Apimacnn.exeC:\Windows\system32\Apimacnn.exe118⤵
-
C:\Windows\SysWOW64\Anlmmp32.exeC:\Windows\system32\Anlmmp32.exe119⤵
-
C:\Windows\SysWOW64\Afcenm32.exeC:\Windows\system32\Afcenm32.exe120⤵
-
C:\Windows\SysWOW64\Aplifb32.exeC:\Windows\system32\Aplifb32.exe121⤵
-
C:\Windows\SysWOW64\Abjebn32.exeC:\Windows\system32\Abjebn32.exe122⤵
-
C:\Windows\SysWOW64\Aidnohbk.exeC:\Windows\system32\Aidnohbk.exe123⤵
-
C:\Windows\SysWOW64\Ahgnke32.exeC:\Windows\system32\Ahgnke32.exe124⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ajejgp32.exeC:\Windows\system32\Ajejgp32.exe125⤵
-
C:\Windows\SysWOW64\Aekodi32.exeC:\Windows\system32\Aekodi32.exe126⤵
-
C:\Windows\SysWOW64\Alegac32.exeC:\Windows\system32\Alegac32.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ajhgmpfg.exeC:\Windows\system32\Ajhgmpfg.exe128⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Amfcikek.exeC:\Windows\system32\Amfcikek.exe129⤵
-
C:\Windows\SysWOW64\Adpkee32.exeC:\Windows\system32\Adpkee32.exe130⤵
-
C:\Windows\SysWOW64\Afohaa32.exeC:\Windows\system32\Afohaa32.exe131⤵
-
C:\Windows\SysWOW64\Aoepcn32.exeC:\Windows\system32\Aoepcn32.exe132⤵
-
C:\Windows\SysWOW64\Bpgljfbl.exeC:\Windows\system32\Bpgljfbl.exe133⤵
-
C:\Windows\SysWOW64\Bhndldcn.exeC:\Windows\system32\Bhndldcn.exe134⤵
-
C:\Windows\SysWOW64\Bioqclil.exeC:\Windows\system32\Bioqclil.exe135⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bpiipf32.exeC:\Windows\system32\Bpiipf32.exe136⤵
-
C:\Windows\SysWOW64\Bbhela32.exeC:\Windows\system32\Bbhela32.exe137⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bkommo32.exeC:\Windows\system32\Bkommo32.exe138⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bmmiij32.exeC:\Windows\system32\Bmmiij32.exe139⤵
-
C:\Windows\SysWOW64\Bdgafdfp.exeC:\Windows\system32\Bdgafdfp.exe140⤵
-
C:\Windows\SysWOW64\Bbjbaa32.exeC:\Windows\system32\Bbjbaa32.exe141⤵
-
C:\Windows\SysWOW64\Behnnm32.exeC:\Windows\system32\Behnnm32.exe142⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Blbfjg32.exeC:\Windows\system32\Blbfjg32.exe143⤵
-
C:\Windows\SysWOW64\Boqbfb32.exeC:\Windows\system32\Boqbfb32.exe144⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bekkcljk.exeC:\Windows\system32\Bekkcljk.exe145⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bifgdk32.exeC:\Windows\system32\Bifgdk32.exe146⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bbokmqie.exeC:\Windows\system32\Bbokmqie.exe147⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Baakhm32.exeC:\Windows\system32\Baakhm32.exe148⤵
-
C:\Windows\SysWOW64\Blgpef32.exeC:\Windows\system32\Blgpef32.exe149⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Ccahbp32.exeC:\Windows\system32\Ccahbp32.exe150⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cdbdjhmp.exeC:\Windows\system32\Cdbdjhmp.exe151⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Ceaadk32.exeC:\Windows\system32\Ceaadk32.exe152⤵
-
C:\Windows\SysWOW64\Ckoilb32.exeC:\Windows\system32\Ckoilb32.exe153⤵
-
C:\Windows\SysWOW64\Cojema32.exeC:\Windows\system32\Cojema32.exe154⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cpkbdiqb.exeC:\Windows\system32\Cpkbdiqb.exe155⤵
-
C:\Windows\SysWOW64\Chbjffad.exeC:\Windows\system32\Chbjffad.exe156⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cpnojioo.exeC:\Windows\system32\Cpnojioo.exe157⤵
-
C:\Windows\SysWOW64\Ckccgane.exeC:\Windows\system32\Ckccgane.exe158⤵
-
C:\Windows\SysWOW64\Cldooj32.exeC:\Windows\system32\Cldooj32.exe159⤵
-
C:\Windows\SysWOW64\Cdlgpgef.exeC:\Windows\system32\Cdlgpgef.exe160⤵
-
C:\Windows\SysWOW64\Dfmdho32.exeC:\Windows\system32\Dfmdho32.exe161⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dlgldibq.exeC:\Windows\system32\Dlgldibq.exe162⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dglpbbbg.exeC:\Windows\system32\Dglpbbbg.exe163⤵
-
C:\Windows\SysWOW64\Dfoqmo32.exeC:\Windows\system32\Dfoqmo32.exe164⤵
-
C:\Windows\SysWOW64\Dpeekh32.exeC:\Windows\system32\Dpeekh32.exe165⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dogefd32.exeC:\Windows\system32\Dogefd32.exe166⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Dhpiojfb.exeC:\Windows\system32\Dhpiojfb.exe167⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dojald32.exeC:\Windows\system32\Dojald32.exe168⤵
-
C:\Windows\SysWOW64\Dcenlceh.exeC:\Windows\system32\Dcenlceh.exe169⤵
-
C:\Windows\SysWOW64\Dfdjhndl.exeC:\Windows\system32\Dfdjhndl.exe170⤵
-
C:\Windows\SysWOW64\Dkqbaecc.exeC:\Windows\system32\Dkqbaecc.exe171⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dnoomqbg.exeC:\Windows\system32\Dnoomqbg.exe172⤵
-
C:\Windows\SysWOW64\Dggcffhg.exeC:\Windows\system32\Dggcffhg.exe173⤵
-
C:\Windows\SysWOW64\Enakbp32.exeC:\Windows\system32\Enakbp32.exe174⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Edkcojga.exeC:\Windows\system32\Edkcojga.exe175⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Egjpkffe.exeC:\Windows\system32\Egjpkffe.exe176⤵
-
C:\Windows\SysWOW64\Ejhlgaeh.exeC:\Windows\system32\Ejhlgaeh.exe177⤵
-
C:\Windows\SysWOW64\Endhhp32.exeC:\Windows\system32\Endhhp32.exe178⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ecqqpgli.exeC:\Windows\system32\Ecqqpgli.exe179⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ekhhadmk.exeC:\Windows\system32\Ekhhadmk.exe180⤵
-
C:\Windows\SysWOW64\Emieil32.exeC:\Windows\system32\Emieil32.exe181⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Eccmffjf.exeC:\Windows\system32\Eccmffjf.exe182⤵
-
C:\Windows\SysWOW64\Efaibbij.exeC:\Windows\system32\Efaibbij.exe183⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Enhacojl.exeC:\Windows\system32\Enhacojl.exe184⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eojnkg32.exeC:\Windows\system32\Eojnkg32.exe185⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Egafleqm.exeC:\Windows\system32\Egafleqm.exe186⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Eibbcm32.exeC:\Windows\system32\Eibbcm32.exe187⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Eqijej32.exeC:\Windows\system32\Eqijej32.exe188⤵
-
C:\Windows\SysWOW64\Eplkpgnh.exeC:\Windows\system32\Eplkpgnh.exe189⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ebjglbml.exeC:\Windows\system32\Ebjglbml.exe190⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fidoim32.exeC:\Windows\system32\Fidoim32.exe191⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fmpkjkma.exeC:\Windows\system32\Fmpkjkma.exe192⤵
-
C:\Windows\SysWOW64\Fbmcbbki.exeC:\Windows\system32\Fbmcbbki.exe193⤵
-
C:\Windows\SysWOW64\Fekpnn32.exeC:\Windows\system32\Fekpnn32.exe194⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fmbhok32.exeC:\Windows\system32\Fmbhok32.exe195⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Flehkhai.exeC:\Windows\system32\Flehkhai.exe196⤵
-
C:\Windows\SysWOW64\Fncdgcqm.exeC:\Windows\system32\Fncdgcqm.exe197⤵
-
C:\Windows\SysWOW64\Fiihdlpc.exeC:\Windows\system32\Fiihdlpc.exe198⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Flgeqgog.exeC:\Windows\system32\Flgeqgog.exe199⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fnfamcoj.exeC:\Windows\system32\Fnfamcoj.exe200⤵
-
C:\Windows\SysWOW64\Fadminnn.exeC:\Windows\system32\Fadminnn.exe201⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fepiimfg.exeC:\Windows\system32\Fepiimfg.exe202⤵
-
C:\Windows\SysWOW64\Fhneehek.exeC:\Windows\system32\Fhneehek.exe203⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fljafg32.exeC:\Windows\system32\Fljafg32.exe204⤵
-
C:\Windows\SysWOW64\Fnhnbb32.exeC:\Windows\system32\Fnhnbb32.exe205⤵
-
C:\Windows\SysWOW64\Fcefji32.exeC:\Windows\system32\Fcefji32.exe206⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fmmkcoap.exeC:\Windows\system32\Fmmkcoap.exe207⤵
-
C:\Windows\SysWOW64\Gdgcpi32.exeC:\Windows\system32\Gdgcpi32.exe208⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gjakmc32.exeC:\Windows\system32\Gjakmc32.exe209⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Gmpgio32.exeC:\Windows\system32\Gmpgio32.exe210⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gdjpeifj.exeC:\Windows\system32\Gdjpeifj.exe211⤵
-
C:\Windows\SysWOW64\Gfhladfn.exeC:\Windows\system32\Gfhladfn.exe212⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gmbdnn32.exeC:\Windows\system32\Gmbdnn32.exe213⤵
-
C:\Windows\SysWOW64\Ganpomec.exeC:\Windows\system32\Ganpomec.exe214⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Gbomfe32.exeC:\Windows\system32\Gbomfe32.exe215⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gjfdhbld.exeC:\Windows\system32\Gjfdhbld.exe216⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Gmdadnkh.exeC:\Windows\system32\Gmdadnkh.exe217⤵
-
C:\Windows\SysWOW64\Gpcmpijk.exeC:\Windows\system32\Gpcmpijk.exe218⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gbaileio.exeC:\Windows\system32\Gbaileio.exe219⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Gfmemc32.exeC:\Windows\system32\Gfmemc32.exe220⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gljnej32.exeC:\Windows\system32\Gljnej32.exe221⤵
-
C:\Windows\SysWOW64\Gohjaf32.exeC:\Windows\system32\Gohjaf32.exe222⤵
-
C:\Windows\SysWOW64\Gebbnpfp.exeC:\Windows\system32\Gebbnpfp.exe223⤵
-
C:\Windows\SysWOW64\Hlljjjnm.exeC:\Windows\system32\Hlljjjnm.exe224⤵
-
C:\Windows\SysWOW64\Hojgfemq.exeC:\Windows\system32\Hojgfemq.exe225⤵
-
C:\Windows\SysWOW64\Hbfbgd32.exeC:\Windows\system32\Hbfbgd32.exe226⤵
-
C:\Windows\SysWOW64\Hedocp32.exeC:\Windows\system32\Hedocp32.exe227⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hlngpjlj.exeC:\Windows\system32\Hlngpjlj.exe228⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Homclekn.exeC:\Windows\system32\Homclekn.exe229⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hakphqja.exeC:\Windows\system32\Hakphqja.exe230⤵
-
C:\Windows\SysWOW64\Hdildlie.exeC:\Windows\system32\Hdildlie.exe231⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hlqdei32.exeC:\Windows\system32\Hlqdei32.exe232⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hmbpmapf.exeC:\Windows\system32\Hmbpmapf.exe233⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hdlhjl32.exeC:\Windows\system32\Hdlhjl32.exe234⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hhgdkjol.exeC:\Windows\system32\Hhgdkjol.exe235⤵
-
C:\Windows\SysWOW64\Hgjefg32.exeC:\Windows\system32\Hgjefg32.exe236⤵
-
C:\Windows\SysWOW64\Hpbiommg.exeC:\Windows\system32\Hpbiommg.exe237⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hhjapjmi.exeC:\Windows\system32\Hhjapjmi.exe238⤵
-
C:\Windows\SysWOW64\Hiknhbcg.exeC:\Windows\system32\Hiknhbcg.exe239⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hmfjha32.exeC:\Windows\system32\Hmfjha32.exe240⤵
-
C:\Windows\SysWOW64\Hdqbekcm.exeC:\Windows\system32\Hdqbekcm.exe241⤵