Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe
Resource
win10v2004-20240611-en
General
-
Target
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe
-
Size
163KB
-
MD5
053ff9fdd0d1d063d496a33eca89b8ca
-
SHA1
b9bf169836c3c93fe60ed67c285badd47f2554ca
-
SHA256
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377
-
SHA512
f42c02d06493fcfd77aa94a6c6f0406802b64dbe720caae52a51233c5b539b25557f681137041f6fba3d8be721c1e93bab6dbf3794998824b8deefd4896816a3
-
SSDEEP
1536:P0URnrXXSZEo828X6YZ5AH8ilProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:BRri1DYZ+HzltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Lcblan32.exeGojhafnb.exeCbdgqimc.exeIbmgpoia.exeOhojmjep.exeOkpcoe32.exeKnkgpi32.exeNlqmmd32.exeDkkbkp32.exeNoacef32.exeLqhfhigj.exeCgkocj32.exeKmfpmc32.exeKhiccj32.exeMjcoqdoc.exeBehilopf.exeQeppdo32.exeMkdffoij.exeHddmjk32.exeOemegc32.exeCpmjhk32.exeDoecog32.exeLcofio32.exeEgajnfoe.exeMjpkqonj.exeOaiibg32.exeCpfaocal.exeKcijeg32.exeJepmgj32.exeLohjnf32.exeMkqqnq32.exeJedcpi32.exeKnfndjdp.exeAeoijidl.exeBpbmqe32.exeAkhfoldn.exeBccjdnbi.exeKbcdbp32.exeNhlddkmc.exeDiphbfdi.exeCgcnghpl.exeJieaofmp.exeJpgmpk32.exeIjaaae32.exeKoaqcn32.exeKpkpadnl.exeLnjcomcf.exeHgflflqg.exeJbpfnh32.exeHgeelf32.exeJajcdjca.exeJbjpom32.exeKcmcoblm.exePjcmap32.exeCmhglq32.exeGbohehoj.exePkcbnanl.exeOnbgmg32.exePafbadcm.exeKhoebi32.exeLjfapjbi.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcblan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gojhafnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbdgqimc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibmgpoia.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohojmjep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Okpcoe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knkgpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlqmmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkbkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noacef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqhfhigj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgkocj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmfpmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khiccj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjcoqdoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Behilopf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qeppdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkdffoij.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hddmjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oemegc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpmjhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doecog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcofio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egajnfoe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjpkqonj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaiibg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpfaocal.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcijeg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jepmgj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lohjnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkqqnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jedcpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knfndjdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aeoijidl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpbmqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akhfoldn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bccjdnbi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcofio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbcdbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhlddkmc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Diphbfdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgcnghpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jieaofmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpgmpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijaaae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koaqcn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpkpadnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnjcomcf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgflflqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbpfnh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgeelf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jajcdjca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbjpom32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmfpmc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbdgqimc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcmcoblm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjcmap32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmhglq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbohehoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkcbnanl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onbgmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pafbadcm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khoebi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljfapjbi.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Oaiibg32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Onbgmg32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ogkkfmml.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pdaheq32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pqhijbog.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pomfkndo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pmccjbaf.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pndpajgd.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Aecaidjl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Anlfbi32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Afiglkle.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Afkdakjb.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Bfpnmj32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Bhdgjb32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Baohhgnf.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Cpfaocal.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cmjbhh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cicpch32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dldhdc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dngabk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dkkbkp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dpjgifpa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dciceaoe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Egiiapci.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Elfaifaq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eoigpa32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ebgclm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fgfhjcgg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fafcdh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gjngmmnp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gldmoepi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Glgjednf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ghmkjedk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Heakcjcd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hdiejfej.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hmaick32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Helngnie.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ilicig32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iimcclni.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iecdhm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iefamlak.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Inafbooe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Idknoi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Idmkdh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jnfomn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jgncfcaa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jpfhoi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jhamckel.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jajala32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jcjnfdbp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jhffnk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kncofa32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Khiccj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Knekla32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kgnpeg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kbcdbp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kgpmjf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kqiaclhj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kjaelaok.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kcijeg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lifbmn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ljfogake.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lkgkoiqc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lcncpfaf.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Oaiibg32.exe UPX \Windows\SysWOW64\Onbgmg32.exe UPX \Windows\SysWOW64\Ogkkfmml.exe UPX \Windows\SysWOW64\Pdaheq32.exe UPX \Windows\SysWOW64\Pqhijbog.exe UPX \Windows\SysWOW64\Pomfkndo.exe UPX C:\Windows\SysWOW64\Pmccjbaf.exe UPX \Windows\SysWOW64\Pndpajgd.exe UPX \Windows\SysWOW64\Aecaidjl.exe UPX C:\Windows\SysWOW64\Anlfbi32.exe UPX \Windows\SysWOW64\Afiglkle.exe UPX \Windows\SysWOW64\Afkdakjb.exe UPX \Windows\SysWOW64\Bfpnmj32.exe UPX \Windows\SysWOW64\Bhdgjb32.exe UPX \Windows\SysWOW64\Baohhgnf.exe UPX \Windows\SysWOW64\Cpfaocal.exe UPX C:\Windows\SysWOW64\Cmjbhh32.exe UPX C:\Windows\SysWOW64\Cicpch32.exe UPX C:\Windows\SysWOW64\Dldhdc32.exe UPX C:\Windows\SysWOW64\Dngabk32.exe UPX C:\Windows\SysWOW64\Dkkbkp32.exe UPX C:\Windows\SysWOW64\Dpjgifpa.exe UPX C:\Windows\SysWOW64\Dciceaoe.exe UPX C:\Windows\SysWOW64\Egiiapci.exe UPX C:\Windows\SysWOW64\Elfaifaq.exe UPX C:\Windows\SysWOW64\Eoigpa32.exe UPX C:\Windows\SysWOW64\Ebgclm32.exe UPX C:\Windows\SysWOW64\Fgfhjcgg.exe UPX C:\Windows\SysWOW64\Fafcdh32.exe UPX C:\Windows\SysWOW64\Gjngmmnp.exe UPX C:\Windows\SysWOW64\Gldmoepi.exe UPX C:\Windows\SysWOW64\Glgjednf.exe UPX C:\Windows\SysWOW64\Ghmkjedk.exe UPX C:\Windows\SysWOW64\Heakcjcd.exe UPX C:\Windows\SysWOW64\Hdiejfej.exe UPX C:\Windows\SysWOW64\Hmaick32.exe UPX C:\Windows\SysWOW64\Helngnie.exe UPX C:\Windows\SysWOW64\Ilicig32.exe UPX C:\Windows\SysWOW64\Iimcclni.exe UPX C:\Windows\SysWOW64\Iecdhm32.exe UPX C:\Windows\SysWOW64\Iefamlak.exe UPX C:\Windows\SysWOW64\Inafbooe.exe UPX C:\Windows\SysWOW64\Idknoi32.exe UPX C:\Windows\SysWOW64\Idmkdh32.exe UPX C:\Windows\SysWOW64\Jnfomn32.exe UPX C:\Windows\SysWOW64\Jgncfcaa.exe UPX C:\Windows\SysWOW64\Jpfhoi32.exe UPX C:\Windows\SysWOW64\Jhamckel.exe UPX C:\Windows\SysWOW64\Jajala32.exe UPX C:\Windows\SysWOW64\Jcjnfdbp.exe UPX C:\Windows\SysWOW64\Jhffnk32.exe UPX C:\Windows\SysWOW64\Kncofa32.exe UPX C:\Windows\SysWOW64\Khiccj32.exe UPX C:\Windows\SysWOW64\Knekla32.exe UPX C:\Windows\SysWOW64\Kgnpeg32.exe UPX C:\Windows\SysWOW64\Kbcdbp32.exe UPX C:\Windows\SysWOW64\Kgpmjf32.exe UPX C:\Windows\SysWOW64\Kqiaclhj.exe UPX C:\Windows\SysWOW64\Kjaelaok.exe UPX C:\Windows\SysWOW64\Kcijeg32.exe UPX C:\Windows\SysWOW64\Lifbmn32.exe UPX C:\Windows\SysWOW64\Ljfogake.exe UPX C:\Windows\SysWOW64\Lkgkoiqc.exe UPX C:\Windows\SysWOW64\Lcncpfaf.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Oaiibg32.exeOnbgmg32.exeOgkkfmml.exePdaheq32.exePqhijbog.exePomfkndo.exePmccjbaf.exePndpajgd.exeAecaidjl.exeAnlfbi32.exeAfiglkle.exeAfkdakjb.exeBfpnmj32.exeBhdgjb32.exeBaohhgnf.exeCpfaocal.exeCmjbhh32.exeCicpch32.exeDldhdc32.exeDngabk32.exeDkkbkp32.exeDpjgifpa.exeDciceaoe.exeEgiiapci.exeElfaifaq.exeEoigpa32.exeEbgclm32.exeFgfhjcgg.exeFafcdh32.exeGjngmmnp.exeGldmoepi.exeGlgjednf.exeGhmkjedk.exeHeakcjcd.exeHdiejfej.exeHmaick32.exeHelngnie.exeIlicig32.exeIimcclni.exeIecdhm32.exeIefamlak.exeInafbooe.exeIdknoi32.exeIdmkdh32.exeJnfomn32.exeJgncfcaa.exeJpfhoi32.exeJhamckel.exeJajala32.exeJcjnfdbp.exeJhffnk32.exeKncofa32.exeKhiccj32.exeKnekla32.exeKgnpeg32.exeKbcdbp32.exeKgpmjf32.exeKqiaclhj.exeKjaelaok.exeKcijeg32.exeLifbmn32.exeLjfogake.exeLkgkoiqc.exeLcncpfaf.exepid process 2980 Oaiibg32.exe 2576 Onbgmg32.exe 2660 Ogkkfmml.exe 2504 Pdaheq32.exe 2720 Pqhijbog.exe 2512 Pomfkndo.exe 1996 Pmccjbaf.exe 944 Pndpajgd.exe 2568 Aecaidjl.exe 1464 Anlfbi32.exe 1516 Afiglkle.exe 2416 Afkdakjb.exe 1820 Bfpnmj32.exe 1636 Bhdgjb32.exe 1868 Baohhgnf.exe 3028 Cpfaocal.exe 388 Cmjbhh32.exe 2364 Cicpch32.exe 1920 Dldhdc32.exe 1564 Dngabk32.exe 648 Dkkbkp32.exe 1060 Dpjgifpa.exe 1284 Dciceaoe.exe 2428 Egiiapci.exe 1000 Elfaifaq.exe 2948 Eoigpa32.exe 1584 Ebgclm32.exe 2084 Fgfhjcgg.exe 2336 Fafcdh32.exe 2612 Gjngmmnp.exe 2712 Gldmoepi.exe 2520 Glgjednf.exe 2532 Ghmkjedk.exe 2912 Heakcjcd.exe 1932 Hdiejfej.exe 2648 Hmaick32.exe 1316 Helngnie.exe 1984 Ilicig32.exe 2140 Iimcclni.exe 2408 Iecdhm32.exe 1644 Iefamlak.exe 1144 Inafbooe.exe 1660 Idknoi32.exe 2680 Idmkdh32.exe 2992 Jnfomn32.exe 824 Jgncfcaa.exe 2844 Jpfhoi32.exe 1172 Jhamckel.exe 1728 Jajala32.exe 1656 Jcjnfdbp.exe 1684 Jhffnk32.exe 1084 Kncofa32.exe 1240 Khiccj32.exe 1892 Knekla32.exe 3000 Kgnpeg32.exe 2444 Kbcdbp32.exe 2600 Kgpmjf32.exe 2776 Kqiaclhj.exe 2472 Kjaelaok.exe 1680 Kcijeg32.exe 2528 Lifbmn32.exe 2764 Ljfogake.exe 1544 Lkgkoiqc.exe 1520 Lcncpfaf.exe -
Loads dropped DLL 64 IoCs
Processes:
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exeOaiibg32.exeOnbgmg32.exeOgkkfmml.exePdaheq32.exePqhijbog.exePomfkndo.exePmccjbaf.exePndpajgd.exeAecaidjl.exeAnlfbi32.exeAfiglkle.exeAfkdakjb.exeBfpnmj32.exeBhdgjb32.exeBaohhgnf.exeCpfaocal.exeCmjbhh32.exeCicpch32.exeDldhdc32.exeDngabk32.exeDkkbkp32.exeDpjgifpa.exeDciceaoe.exeEgiiapci.exeElfaifaq.exeEoigpa32.exeEbgclm32.exeFgfhjcgg.exeFafcdh32.exeGjngmmnp.exeGldmoepi.exepid process 1704 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe 1704 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe 2980 Oaiibg32.exe 2980 Oaiibg32.exe 2576 Onbgmg32.exe 2576 Onbgmg32.exe 2660 Ogkkfmml.exe 2660 Ogkkfmml.exe 2504 Pdaheq32.exe 2504 Pdaheq32.exe 2720 Pqhijbog.exe 2720 Pqhijbog.exe 2512 Pomfkndo.exe 2512 Pomfkndo.exe 1996 Pmccjbaf.exe 1996 Pmccjbaf.exe 944 Pndpajgd.exe 944 Pndpajgd.exe 2568 Aecaidjl.exe 2568 Aecaidjl.exe 1464 Anlfbi32.exe 1464 Anlfbi32.exe 1516 Afiglkle.exe 1516 Afiglkle.exe 2416 Afkdakjb.exe 2416 Afkdakjb.exe 1820 Bfpnmj32.exe 1820 Bfpnmj32.exe 1636 Bhdgjb32.exe 1636 Bhdgjb32.exe 1868 Baohhgnf.exe 1868 Baohhgnf.exe 3028 Cpfaocal.exe 3028 Cpfaocal.exe 388 Cmjbhh32.exe 388 Cmjbhh32.exe 2364 Cicpch32.exe 2364 Cicpch32.exe 1920 Dldhdc32.exe 1920 Dldhdc32.exe 1564 Dngabk32.exe 1564 Dngabk32.exe 648 Dkkbkp32.exe 648 Dkkbkp32.exe 1060 Dpjgifpa.exe 1060 Dpjgifpa.exe 1284 Dciceaoe.exe 1284 Dciceaoe.exe 2428 Egiiapci.exe 2428 Egiiapci.exe 1000 Elfaifaq.exe 1000 Elfaifaq.exe 2948 Eoigpa32.exe 2948 Eoigpa32.exe 1584 Ebgclm32.exe 1584 Ebgclm32.exe 2084 Fgfhjcgg.exe 2084 Fgfhjcgg.exe 2336 Fafcdh32.exe 2336 Fafcdh32.exe 2612 Gjngmmnp.exe 2612 Gjngmmnp.exe 2712 Gldmoepi.exe 2712 Gldmoepi.exe -
Drops file in System32 directory 64 IoCs
Processes:
Bjkhdacm.exeDhckfkbh.exeIlcoce32.exePjleclph.exeDgiaefgg.exeJnagmc32.exePndpajgd.exeGbohehoj.exeKnfndjdp.exeEhpcehcj.exeKoaqcn32.exeLgqkbb32.exeOffmipej.exeFodebh32.exeDkkbkp32.exeIimcclni.exeGnbejb32.exeNhlddkmc.exeOlophhjd.exeLgpiij32.exeEpeoaffo.exeLedibnco.exeOlebgfao.exeCfeepelg.exeEogmcjef.exeHmkeke32.exeAohdmdoh.exeLgingm32.exeHjfnnajl.exeAbpjjeim.exeIgebkiof.exeKgnpeg32.exeIfoqjo32.exeEobchk32.exeFmkilb32.exeEnfgfh32.exeKcmcoblm.exeGcjmmdbf.exeDgbeiiqe.exeKgclio32.exeMjjdacik.exeBecpap32.exeOpnbbe32.exeGdhdkn32.exePqhijbog.exeInafbooe.exeGgapbcne.exeEibgpnjk.exeKnekla32.exeDkadjn32.exeJhamckel.exeJmfcop32.exeFnflke32.exeCcmpce32.exeKpfplo32.exeKkjpggkn.exeDgoopkgh.exeFajbke32.exeLcadghnk.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Bjmeiq32.exe Bjkhdacm.exe File created C:\Windows\SysWOW64\Eibgpnjk.exe Dhckfkbh.exe File created C:\Windows\SysWOW64\Ibmgpoia.exe Ilcoce32.exe File opened for modification C:\Windows\SysWOW64\Plmbkd32.exe Pjleclph.exe File opened for modification C:\Windows\SysWOW64\Dppigchi.exe Dgiaefgg.exe File created C:\Windows\SysWOW64\Bcbonpco.dll Jnagmc32.exe File opened for modification C:\Windows\SysWOW64\Aecaidjl.exe Pndpajgd.exe File created C:\Windows\SysWOW64\Gdmdacnn.exe Gbohehoj.exe File created C:\Windows\SysWOW64\Kkjnnn32.exe Knfndjdp.exe File created C:\Windows\SysWOW64\Ifemminl.dll Ehpcehcj.exe File created C:\Windows\SysWOW64\Kekiphge.exe Koaqcn32.exe File created C:\Windows\SysWOW64\Lnjcomcf.exe Lgqkbb32.exe File created C:\Windows\SysWOW64\Dafqii32.dll Offmipej.exe File created C:\Windows\SysWOW64\Oejncika.dll Fodebh32.exe File opened for modification C:\Windows\SysWOW64\Dpjgifpa.exe Dkkbkp32.exe File opened for modification C:\Windows\SysWOW64\Iecdhm32.exe Iimcclni.exe File created C:\Windows\SysWOW64\Ggkibhjf.exe Gnbejb32.exe File created C:\Windows\SysWOW64\Nmhmlbkk.exe Nhlddkmc.exe File created C:\Windows\SysWOW64\Ibejjo32.dll Olophhjd.exe File created C:\Windows\SysWOW64\Jbhfdd32.dll Iimcclni.exe File opened for modification C:\Windows\SysWOW64\Ledibnco.exe Lgpiij32.exe File created C:\Windows\SysWOW64\Blghgj32.dll Epeoaffo.exe File created C:\Windows\SysWOW64\Lnlnlc32.exe Ledibnco.exe File created C:\Windows\SysWOW64\Oabkom32.exe Olebgfao.exe File opened for modification C:\Windows\SysWOW64\Cpmjhk32.exe Cfeepelg.exe File created C:\Windows\SysWOW64\Mngnjmjh.dll Eogmcjef.exe File opened for modification C:\Windows\SysWOW64\Hfcjdkpg.exe Hmkeke32.exe File created C:\Windows\SysWOW64\Khoqme32.dll Aohdmdoh.exe File opened for modification C:\Windows\SysWOW64\Lncfcgeb.exe Lgingm32.exe File created C:\Windows\SysWOW64\Ifmocb32.exe Hjfnnajl.exe File opened for modification C:\Windows\SysWOW64\Amfognic.exe Abpjjeim.exe File created C:\Windows\SysWOW64\Ncehag32.dll Abpjjeim.exe File created C:\Windows\SysWOW64\Fbbngc32.dll Igebkiof.exe File created C:\Windows\SysWOW64\Kbcdbp32.exe Kgnpeg32.exe File created C:\Windows\SysWOW64\Ghmekc32.dll Ifoqjo32.exe File opened for modification C:\Windows\SysWOW64\Ehkhaqpk.exe Eobchk32.exe File created C:\Windows\SysWOW64\Gfcnegnk.exe Fmkilb32.exe File opened for modification C:\Windows\SysWOW64\Elldgehk.exe Enfgfh32.exe File created C:\Windows\SysWOW64\Qdckaqog.dll Kcmcoblm.exe File opened for modification C:\Windows\SysWOW64\Gkebafoa.exe Gcjmmdbf.exe File created C:\Windows\SysWOW64\Pblmdj32.dll Gcjmmdbf.exe File created C:\Windows\SysWOW64\Mmhadf32.dll Dgbeiiqe.exe File created C:\Windows\SysWOW64\Kpkpadnl.exe Kgclio32.exe File created C:\Windows\SysWOW64\Mdbiji32.exe Mjjdacik.exe File opened for modification C:\Windows\SysWOW64\Bbgqjdce.exe Becpap32.exe File opened for modification C:\Windows\SysWOW64\Olebgfao.exe Opnbbe32.exe File created C:\Windows\SysWOW64\Glchpp32.exe Gdhdkn32.exe File created C:\Windows\SysWOW64\Pomfkndo.exe Pqhijbog.exe File opened for modification C:\Windows\SysWOW64\Idknoi32.exe Inafbooe.exe File opened for modification C:\Windows\SysWOW64\Ehpcehcj.exe Epeoaffo.exe File created C:\Windows\SysWOW64\Goldfelp.exe Ggapbcne.exe File created C:\Windows\SysWOW64\Jclpkjad.dll Eibgpnjk.exe File opened for modification C:\Windows\SysWOW64\Opnbbe32.exe Offmipej.exe File created C:\Windows\SysWOW64\Kgnpeg32.exe Knekla32.exe File created C:\Windows\SysWOW64\Pjgacnjm.dll Dkadjn32.exe File created C:\Windows\SysWOW64\Bmcfln32.dll Jhamckel.exe File created C:\Windows\SysWOW64\Mebgijei.dll Jmfcop32.exe File created C:\Windows\SysWOW64\Ffaaoh32.exe Fnflke32.exe File created C:\Windows\SysWOW64\Hmdeje32.dll Ccmpce32.exe File opened for modification C:\Windows\SysWOW64\Kindeddf.exe Kpfplo32.exe File opened for modification C:\Windows\SysWOW64\Khnapkjg.exe Kkjpggkn.exe File created C:\Windows\SysWOW64\Obmgfhhe.dll Dgoopkgh.exe File created C:\Windows\SysWOW64\Fhdjgoha.exe Fajbke32.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Lcadghnk.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2704 2640 WerFault.exe Lepaccmo.exe -
Modifies registry class 64 IoCs
Processes:
Lomgjb32.exeBiaign32.exeMclcijfd.exeHmglajcd.exePkacpihj.exeCbepdhgc.exeFhdjgoha.exeLhknaf32.exeLcblan32.exeLlmmpcfe.exeLgqkbb32.exeFmlbjq32.exeJmfcop32.exeMblbnj32.exeEhpcehcj.exeHhkopj32.exeFdkklp32.exeIfmocb32.exeMngjeamd.exeKgnpeg32.exeKqiaclhj.exePpddpd32.exeCpfaocal.exeHcdgmimg.exeHmaick32.exeOkpcoe32.exePjcmap32.exePljlbf32.exeJlhhndno.exeKbdmeoob.exeLdjbkb32.exeFgdgcfmb.exeHdiejfej.exeEamilh32.exeElldgehk.exeNpolmh32.exeDcbnpgkh.exeDfhdnn32.exeDlgjldnm.exeOjeobm32.exeKlehgh32.exeOhhmcinf.exeFoolgh32.exeNnleiipc.exeOnbgmg32.exeBdcifi32.exeGdhdkn32.exeIebldo32.exeDdpobo32.exeLbcbjlmb.exeLnjcomcf.exeOjomdoof.exeHaqnea32.exeBaohhgnf.exeCfehhn32.exeKhnapkjg.exeEnfgfh32.exePjleclph.exeBjmeiq32.exeDhckfkbh.exeFijbco32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lomgjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biaign32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mclcijfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmglajcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkldcj32.dll" Pkacpihj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijppackl.dll" Cbepdhgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhdjgoha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhknaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcblan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdceqkca.dll" Llmmpcfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojcqog32.dll" Lgqkbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmlbjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mebgijei.dll" Jmfcop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mblbnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifemminl.dll" Ehpcehcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhkopj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkacpihj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdkklp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifmocb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mngjeamd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Coicmk32.dll" Kgnpeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kqiaclhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppddpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckpfcfnm.dll" Cpfaocal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcdgmimg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmaick32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okpcoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjcmap32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pljlbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlhhndno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbdmeoob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egjnpn32.dll" Ldjbkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkolai32.dll" Fgdgcfmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdiejfej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eamilh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Elldgehk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npolmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnokbe32.dll" Dcbnpgkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abgacn32.dll" Dfhdnn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlgjldnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojeobm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Klehgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pphcfh32.dll" Ohhmcinf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enoopc32.dll" Foolgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbnclf32.dll" Jlhhndno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnleiipc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njlcmaba.dll" Lomgjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onbgmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdcifi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gdhdkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkaobghp.dll" Iebldo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddpobo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ollopmbl.dll" Lbcbjlmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cljoegei.dll" Lnjcomcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pghaaidm.dll" Ojomdoof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Haqnea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dqcngnae.dll" Baohhgnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Finlmjmi.dll" Cfehhn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khnapkjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eacpijip.dll" Enfgfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjleclph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjmeiq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhckfkbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fijbco32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exeOaiibg32.exeOnbgmg32.exeOgkkfmml.exePdaheq32.exePqhijbog.exePomfkndo.exePmccjbaf.exePndpajgd.exeAecaidjl.exeAnlfbi32.exeAfiglkle.exeAfkdakjb.exeBfpnmj32.exeBhdgjb32.exeBaohhgnf.exedescription pid process target process PID 1704 wrote to memory of 2980 1704 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe Oaiibg32.exe PID 1704 wrote to memory of 2980 1704 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe Oaiibg32.exe PID 1704 wrote to memory of 2980 1704 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe Oaiibg32.exe PID 1704 wrote to memory of 2980 1704 22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe Oaiibg32.exe PID 2980 wrote to memory of 2576 2980 Oaiibg32.exe Onbgmg32.exe PID 2980 wrote to memory of 2576 2980 Oaiibg32.exe Onbgmg32.exe PID 2980 wrote to memory of 2576 2980 Oaiibg32.exe Onbgmg32.exe PID 2980 wrote to memory of 2576 2980 Oaiibg32.exe Onbgmg32.exe PID 2576 wrote to memory of 2660 2576 Onbgmg32.exe Ogkkfmml.exe PID 2576 wrote to memory of 2660 2576 Onbgmg32.exe Ogkkfmml.exe PID 2576 wrote to memory of 2660 2576 Onbgmg32.exe Ogkkfmml.exe PID 2576 wrote to memory of 2660 2576 Onbgmg32.exe Ogkkfmml.exe PID 2660 wrote to memory of 2504 2660 Ogkkfmml.exe Pdaheq32.exe PID 2660 wrote to memory of 2504 2660 Ogkkfmml.exe Pdaheq32.exe PID 2660 wrote to memory of 2504 2660 Ogkkfmml.exe Pdaheq32.exe PID 2660 wrote to memory of 2504 2660 Ogkkfmml.exe Pdaheq32.exe PID 2504 wrote to memory of 2720 2504 Pdaheq32.exe Pqhijbog.exe PID 2504 wrote to memory of 2720 2504 Pdaheq32.exe Pqhijbog.exe PID 2504 wrote to memory of 2720 2504 Pdaheq32.exe Pqhijbog.exe PID 2504 wrote to memory of 2720 2504 Pdaheq32.exe Pqhijbog.exe PID 2720 wrote to memory of 2512 2720 Pqhijbog.exe Pomfkndo.exe PID 2720 wrote to memory of 2512 2720 Pqhijbog.exe Pomfkndo.exe PID 2720 wrote to memory of 2512 2720 Pqhijbog.exe Pomfkndo.exe PID 2720 wrote to memory of 2512 2720 Pqhijbog.exe Pomfkndo.exe PID 2512 wrote to memory of 1996 2512 Pomfkndo.exe Pmccjbaf.exe PID 2512 wrote to memory of 1996 2512 Pomfkndo.exe Pmccjbaf.exe PID 2512 wrote to memory of 1996 2512 Pomfkndo.exe Pmccjbaf.exe PID 2512 wrote to memory of 1996 2512 Pomfkndo.exe Pmccjbaf.exe PID 1996 wrote to memory of 944 1996 Pmccjbaf.exe Pndpajgd.exe PID 1996 wrote to memory of 944 1996 Pmccjbaf.exe Pndpajgd.exe PID 1996 wrote to memory of 944 1996 Pmccjbaf.exe Pndpajgd.exe PID 1996 wrote to memory of 944 1996 Pmccjbaf.exe Pndpajgd.exe PID 944 wrote to memory of 2568 944 Pndpajgd.exe Aecaidjl.exe PID 944 wrote to memory of 2568 944 Pndpajgd.exe Aecaidjl.exe PID 944 wrote to memory of 2568 944 Pndpajgd.exe Aecaidjl.exe PID 944 wrote to memory of 2568 944 Pndpajgd.exe Aecaidjl.exe PID 2568 wrote to memory of 1464 2568 Aecaidjl.exe Anlfbi32.exe PID 2568 wrote to memory of 1464 2568 Aecaidjl.exe Anlfbi32.exe PID 2568 wrote to memory of 1464 2568 Aecaidjl.exe Anlfbi32.exe PID 2568 wrote to memory of 1464 2568 Aecaidjl.exe Anlfbi32.exe PID 1464 wrote to memory of 1516 1464 Anlfbi32.exe Afiglkle.exe PID 1464 wrote to memory of 1516 1464 Anlfbi32.exe Afiglkle.exe PID 1464 wrote to memory of 1516 1464 Anlfbi32.exe Afiglkle.exe PID 1464 wrote to memory of 1516 1464 Anlfbi32.exe Afiglkle.exe PID 1516 wrote to memory of 2416 1516 Afiglkle.exe Afkdakjb.exe PID 1516 wrote to memory of 2416 1516 Afiglkle.exe Afkdakjb.exe PID 1516 wrote to memory of 2416 1516 Afiglkle.exe Afkdakjb.exe PID 1516 wrote to memory of 2416 1516 Afiglkle.exe Afkdakjb.exe PID 2416 wrote to memory of 1820 2416 Afkdakjb.exe Bfpnmj32.exe PID 2416 wrote to memory of 1820 2416 Afkdakjb.exe Bfpnmj32.exe PID 2416 wrote to memory of 1820 2416 Afkdakjb.exe Bfpnmj32.exe PID 2416 wrote to memory of 1820 2416 Afkdakjb.exe Bfpnmj32.exe PID 1820 wrote to memory of 1636 1820 Bfpnmj32.exe Bhdgjb32.exe PID 1820 wrote to memory of 1636 1820 Bfpnmj32.exe Bhdgjb32.exe PID 1820 wrote to memory of 1636 1820 Bfpnmj32.exe Bhdgjb32.exe PID 1820 wrote to memory of 1636 1820 Bfpnmj32.exe Bhdgjb32.exe PID 1636 wrote to memory of 1868 1636 Bhdgjb32.exe Baohhgnf.exe PID 1636 wrote to memory of 1868 1636 Bhdgjb32.exe Baohhgnf.exe PID 1636 wrote to memory of 1868 1636 Bhdgjb32.exe Baohhgnf.exe PID 1636 wrote to memory of 1868 1636 Bhdgjb32.exe Baohhgnf.exe PID 1868 wrote to memory of 3028 1868 Baohhgnf.exe Cpfaocal.exe PID 1868 wrote to memory of 3028 1868 Baohhgnf.exe Cpfaocal.exe PID 1868 wrote to memory of 3028 1868 Baohhgnf.exe Cpfaocal.exe PID 1868 wrote to memory of 3028 1868 Baohhgnf.exe Cpfaocal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe"C:\Users\Admin\AppData\Local\Temp\22bf006e47899384916bca7ff03f3b4f07380471c60e3bf52345138a8aacc377.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oaiibg32.exeC:\Windows\system32\Oaiibg32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Onbgmg32.exeC:\Windows\system32\Onbgmg32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ogkkfmml.exeC:\Windows\system32\Ogkkfmml.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pdaheq32.exeC:\Windows\system32\Pdaheq32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pqhijbog.exeC:\Windows\system32\Pqhijbog.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pomfkndo.exeC:\Windows\system32\Pomfkndo.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pmccjbaf.exeC:\Windows\system32\Pmccjbaf.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pndpajgd.exeC:\Windows\system32\Pndpajgd.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Aecaidjl.exeC:\Windows\system32\Aecaidjl.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Anlfbi32.exeC:\Windows\system32\Anlfbi32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Afiglkle.exeC:\Windows\system32\Afiglkle.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Afkdakjb.exeC:\Windows\system32\Afkdakjb.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bfpnmj32.exeC:\Windows\system32\Bfpnmj32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bhdgjb32.exeC:\Windows\system32\Bhdgjb32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Baohhgnf.exeC:\Windows\system32\Baohhgnf.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cpfaocal.exeC:\Windows\system32\Cpfaocal.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Cmjbhh32.exeC:\Windows\system32\Cmjbhh32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Cicpch32.exeC:\Windows\system32\Cicpch32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dldhdc32.exeC:\Windows\system32\Dldhdc32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dngabk32.exeC:\Windows\system32\Dngabk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dkkbkp32.exeC:\Windows\system32\Dkkbkp32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dpjgifpa.exeC:\Windows\system32\Dpjgifpa.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dciceaoe.exeC:\Windows\system32\Dciceaoe.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Egiiapci.exeC:\Windows\system32\Egiiapci.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Elfaifaq.exeC:\Windows\system32\Elfaifaq.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Eoigpa32.exeC:\Windows\system32\Eoigpa32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ebgclm32.exeC:\Windows\system32\Ebgclm32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fgfhjcgg.exeC:\Windows\system32\Fgfhjcgg.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fafcdh32.exeC:\Windows\system32\Fafcdh32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gjngmmnp.exeC:\Windows\system32\Gjngmmnp.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gldmoepi.exeC:\Windows\system32\Gldmoepi.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Glgjednf.exeC:\Windows\system32\Glgjednf.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ghmkjedk.exeC:\Windows\system32\Ghmkjedk.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Heakcjcd.exeC:\Windows\system32\Heakcjcd.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hdiejfej.exeC:\Windows\system32\Hdiejfej.exe36⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Hmaick32.exeC:\Windows\system32\Hmaick32.exe37⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Helngnie.exeC:\Windows\system32\Helngnie.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ilicig32.exeC:\Windows\system32\Ilicig32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iimcclni.exeC:\Windows\system32\Iimcclni.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Iecdhm32.exeC:\Windows\system32\Iecdhm32.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iefamlak.exeC:\Windows\system32\Iefamlak.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Inafbooe.exeC:\Windows\system32\Inafbooe.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Idknoi32.exeC:\Windows\system32\Idknoi32.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Idmkdh32.exeC:\Windows\system32\Idmkdh32.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jnfomn32.exeC:\Windows\system32\Jnfomn32.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jgncfcaa.exeC:\Windows\system32\Jgncfcaa.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jpfhoi32.exeC:\Windows\system32\Jpfhoi32.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jhamckel.exeC:\Windows\system32\Jhamckel.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jajala32.exeC:\Windows\system32\Jajala32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jcjnfdbp.exeC:\Windows\system32\Jcjnfdbp.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jhffnk32.exeC:\Windows\system32\Jhffnk32.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kncofa32.exeC:\Windows\system32\Kncofa32.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Khiccj32.exeC:\Windows\system32\Khiccj32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Knekla32.exeC:\Windows\system32\Knekla32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kgnpeg32.exeC:\Windows\system32\Kgnpeg32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kbcdbp32.exeC:\Windows\system32\Kbcdbp32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kgpmjf32.exeC:\Windows\system32\Kgpmjf32.exe58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kqiaclhj.exeC:\Windows\system32\Kqiaclhj.exe59⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kjaelaok.exeC:\Windows\system32\Kjaelaok.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kcijeg32.exeC:\Windows\system32\Kcijeg32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lifbmn32.exeC:\Windows\system32\Lifbmn32.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ljfogake.exeC:\Windows\system32\Ljfogake.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lkgkoiqc.exeC:\Windows\system32\Lkgkoiqc.exe64⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lcncpfaf.exeC:\Windows\system32\Lcncpfaf.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Liklhmom.exeC:\Windows\system32\Liklhmom.exe66⤵
-
C:\Windows\SysWOW64\Lfolaang.exeC:\Windows\system32\Lfolaang.exe67⤵
-
C:\Windows\SysWOW64\Lgpiij32.exeC:\Windows\system32\Lgpiij32.exe68⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ledibnco.exeC:\Windows\system32\Ledibnco.exe69⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lnlnlc32.exeC:\Windows\system32\Lnlnlc32.exe70⤵
-
C:\Windows\SysWOW64\Meffhnal.exeC:\Windows\system32\Meffhnal.exe71⤵
-
C:\Windows\SysWOW64\Mjcoqdoc.exeC:\Windows\system32\Mjcoqdoc.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mclcijfd.exeC:\Windows\system32\Mclcijfd.exe73⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mnaggcej.exeC:\Windows\system32\Mnaggcej.exe74⤵
-
C:\Windows\SysWOW64\Mjhhld32.exeC:\Windows\system32\Mjhhld32.exe75⤵
-
C:\Windows\SysWOW64\Mmfdhojb.exeC:\Windows\system32\Mmfdhojb.exe76⤵
-
C:\Windows\SysWOW64\Mjjdacik.exeC:\Windows\system32\Mjjdacik.exe77⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mdbiji32.exeC:\Windows\system32\Mdbiji32.exe78⤵
-
C:\Windows\SysWOW64\Medeaaej.exeC:\Windows\system32\Medeaaej.exe79⤵
-
C:\Windows\SysWOW64\Npijoj32.exeC:\Windows\system32\Npijoj32.exe80⤵
-
C:\Windows\SysWOW64\Nhdocl32.exeC:\Windows\system32\Nhdocl32.exe81⤵
-
C:\Windows\SysWOW64\Nbjcqe32.exeC:\Windows\system32\Nbjcqe32.exe82⤵
-
C:\Windows\SysWOW64\Nlbgikia.exeC:\Windows\system32\Nlbgikia.exe83⤵
-
C:\Windows\SysWOW64\Noacef32.exeC:\Windows\system32\Noacef32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nkhdkgnj.exeC:\Windows\system32\Nkhdkgnj.exe85⤵
-
C:\Windows\SysWOW64\Nhlddkmc.exeC:\Windows\system32\Nhlddkmc.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nmhmlbkk.exeC:\Windows\system32\Nmhmlbkk.exe87⤵
-
C:\Windows\SysWOW64\Odbeilbg.exeC:\Windows\system32\Odbeilbg.exe88⤵
-
C:\Windows\SysWOW64\Oaffbqaa.exeC:\Windows\system32\Oaffbqaa.exe89⤵
-
C:\Windows\SysWOW64\Oemegc32.exeC:\Windows\system32\Oemegc32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ohkaco32.exeC:\Windows\system32\Ohkaco32.exe91⤵
-
C:\Windows\SysWOW64\Padeldeo.exeC:\Windows\system32\Padeldeo.exe92⤵
-
C:\Windows\SysWOW64\Pafbadcm.exeC:\Windows\system32\Pafbadcm.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Phpjnnki.exeC:\Windows\system32\Phpjnnki.exe94⤵
-
C:\Windows\SysWOW64\Pkofjijm.exeC:\Windows\system32\Pkofjijm.exe95⤵
-
C:\Windows\SysWOW64\Pqkobqhd.exeC:\Windows\system32\Pqkobqhd.exe96⤵
-
C:\Windows\SysWOW64\Phbgcnig.exeC:\Windows\system32\Phbgcnig.exe97⤵
-
C:\Windows\SysWOW64\Pkacpihj.exeC:\Windows\system32\Pkacpihj.exe98⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pakllc32.exeC:\Windows\system32\Pakllc32.exe99⤵
-
C:\Windows\SysWOW64\Pggdejno.exeC:\Windows\system32\Pggdejno.exe100⤵
-
C:\Windows\SysWOW64\Pkcpei32.exeC:\Windows\system32\Pkcpei32.exe101⤵
-
C:\Windows\SysWOW64\Pdldnomh.exeC:\Windows\system32\Pdldnomh.exe102⤵
-
C:\Windows\SysWOW64\Qndigd32.exeC:\Windows\system32\Qndigd32.exe103⤵
-
C:\Windows\SysWOW64\Qqbecp32.exeC:\Windows\system32\Qqbecp32.exe104⤵
-
C:\Windows\SysWOW64\Qglmpi32.exeC:\Windows\system32\Qglmpi32.exe105⤵
-
C:\Windows\SysWOW64\Qogbdl32.exeC:\Windows\system32\Qogbdl32.exe106⤵
-
C:\Windows\SysWOW64\Akncimmh.exeC:\Windows\system32\Akncimmh.exe107⤵
-
C:\Windows\SysWOW64\Anolkh32.exeC:\Windows\system32\Anolkh32.exe108⤵
-
C:\Windows\SysWOW64\Akcldl32.exeC:\Windows\system32\Akcldl32.exe109⤵
-
C:\Windows\SysWOW64\Aababceh.exeC:\Windows\system32\Aababceh.exe110⤵
-
C:\Windows\SysWOW64\Akhfoldn.exeC:\Windows\system32\Akhfoldn.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bccjdnbi.exeC:\Windows\system32\Bccjdnbi.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bfccei32.exeC:\Windows\system32\Bfccei32.exe113⤵
-
C:\Windows\SysWOW64\Bpnddn32.exeC:\Windows\system32\Bpnddn32.exe114⤵
-
C:\Windows\SysWOW64\Bleeioil.exeC:\Windows\system32\Bleeioil.exe115⤵
-
C:\Windows\SysWOW64\Chlfnp32.exeC:\Windows\system32\Chlfnp32.exe116⤵
-
C:\Windows\SysWOW64\Cepfgdnj.exeC:\Windows\system32\Cepfgdnj.exe117⤵
-
C:\Windows\SysWOW64\Cbdgqimc.exeC:\Windows\system32\Cbdgqimc.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cpnaca32.exeC:\Windows\system32\Cpnaca32.exe119⤵
-
C:\Windows\SysWOW64\Dlgnmb32.exeC:\Windows\system32\Dlgnmb32.exe120⤵
-
C:\Windows\SysWOW64\Dgoopkgh.exeC:\Windows\system32\Dgoopkgh.exe121⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Diphbfdi.exeC:\Windows\system32\Diphbfdi.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dkadjn32.exeC:\Windows\system32\Dkadjn32.exe123⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eamilh32.exeC:\Windows\system32\Eamilh32.exe124⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Enfgfh32.exeC:\Windows\system32\Enfgfh32.exe125⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Elldgehk.exeC:\Windows\system32\Elldgehk.exe126⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ecfldoph.exeC:\Windows\system32\Ecfldoph.exe127⤵
-
C:\Windows\SysWOW64\Eolmip32.exeC:\Windows\system32\Eolmip32.exe128⤵
-
C:\Windows\SysWOW64\Foojop32.exeC:\Windows\system32\Foojop32.exe129⤵
-
C:\Windows\SysWOW64\Fjdnlhco.exeC:\Windows\system32\Fjdnlhco.exe130⤵
-
C:\Windows\SysWOW64\Fdnolfon.exeC:\Windows\system32\Fdnolfon.exe131⤵
-
C:\Windows\SysWOW64\Filgbdfd.exeC:\Windows\system32\Filgbdfd.exe132⤵
-
C:\Windows\SysWOW64\Fnipkkdl.exeC:\Windows\system32\Fnipkkdl.exe133⤵
-
C:\Windows\SysWOW64\Gbfiaj32.exeC:\Windows\system32\Gbfiaj32.exe134⤵
-
C:\Windows\SysWOW64\Gkomjo32.exeC:\Windows\system32\Gkomjo32.exe135⤵
-
C:\Windows\SysWOW64\Gmbfggdo.exeC:\Windows\system32\Gmbfggdo.exe136⤵
-
C:\Windows\SysWOW64\Gjfgqk32.exeC:\Windows\system32\Gjfgqk32.exe137⤵
-
C:\Windows\SysWOW64\Gbaken32.exeC:\Windows\system32\Gbaken32.exe138⤵
-
C:\Windows\SysWOW64\Gmgpbf32.exeC:\Windows\system32\Gmgpbf32.exe139⤵
-
C:\Windows\SysWOW64\Hebdfind.exeC:\Windows\system32\Hebdfind.exe140⤵
-
C:\Windows\SysWOW64\Hmglajcd.exeC:\Windows\system32\Hmglajcd.exe141⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ifoqjo32.exeC:\Windows\system32\Ifoqjo32.exe142⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Idcacc32.exeC:\Windows\system32\Idcacc32.exe143⤵
-
C:\Windows\SysWOW64\Imleli32.exeC:\Windows\system32\Imleli32.exe144⤵
-
C:\Windows\SysWOW64\Iegjqk32.exeC:\Windows\system32\Iegjqk32.exe145⤵
-
C:\Windows\SysWOW64\Ibkkjp32.exeC:\Windows\system32\Ibkkjp32.exe146⤵
-
C:\Windows\SysWOW64\Ilcoce32.exeC:\Windows\system32\Ilcoce32.exe147⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ibmgpoia.exeC:\Windows\system32\Ibmgpoia.exe148⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jlelhe32.exeC:\Windows\system32\Jlelhe32.exe149⤵
-
C:\Windows\SysWOW64\Jlhhndno.exeC:\Windows\system32\Jlhhndno.exe150⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jepmgj32.exeC:\Windows\system32\Jepmgj32.exe151⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jnkakl32.exeC:\Windows\system32\Jnkakl32.exe152⤵
-
C:\Windows\SysWOW64\Jkpbdq32.exeC:\Windows\system32\Jkpbdq32.exe153⤵
-
C:\Windows\SysWOW64\Jdhgnf32.exeC:\Windows\system32\Jdhgnf32.exe154⤵
-
C:\Windows\SysWOW64\Jkbojpna.exeC:\Windows\system32\Jkbojpna.exe155⤵
-
C:\Windows\SysWOW64\Kcmcoblm.exeC:\Windows\system32\Kcmcoblm.exe156⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Klehgh32.exeC:\Windows\system32\Klehgh32.exe157⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kjihalag.exeC:\Windows\system32\Kjihalag.exe158⤵
-
C:\Windows\SysWOW64\Kbdmeoob.exeC:\Windows\system32\Kbdmeoob.exe159⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Khoebi32.exeC:\Windows\system32\Khoebi32.exe160⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kbgjkn32.exeC:\Windows\system32\Kbgjkn32.exe161⤵
-
C:\Windows\SysWOW64\Knnkpobc.exeC:\Windows\system32\Knnkpobc.exe162⤵
-
C:\Windows\SysWOW64\Lomgjb32.exeC:\Windows\system32\Lomgjb32.exe163⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lhelbh32.exeC:\Windows\system32\Lhelbh32.exe164⤵
-
C:\Windows\SysWOW64\Lbnpkmfg.exeC:\Windows\system32\Lbnpkmfg.exe165⤵
-
C:\Windows\SysWOW64\Lneaqn32.exeC:\Windows\system32\Lneaqn32.exe166⤵
-
C:\Windows\SysWOW64\Lfpeeqig.exeC:\Windows\system32\Lfpeeqig.exe167⤵
-
C:\Windows\SysWOW64\Lohjnf32.exeC:\Windows\system32\Lohjnf32.exe168⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Lqhfhigj.exeC:\Windows\system32\Lqhfhigj.exe169⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mjpkqonj.exeC:\Windows\system32\Mjpkqonj.exe170⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mpmcielb.exeC:\Windows\system32\Mpmcielb.exe171⤵
-
C:\Windows\SysWOW64\Mnbpjb32.exeC:\Windows\system32\Mnbpjb32.exe172⤵
-
C:\Windows\SysWOW64\Mihdgkpp.exeC:\Windows\system32\Mihdgkpp.exe173⤵
-
C:\Windows\SysWOW64\Mbpipp32.exeC:\Windows\system32\Mbpipp32.exe174⤵
-
C:\Windows\SysWOW64\Mngjeamd.exeC:\Windows\system32\Mngjeamd.exe175⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mhonngce.exeC:\Windows\system32\Mhonngce.exe176⤵
-
C:\Windows\SysWOW64\Necogkbo.exeC:\Windows\system32\Necogkbo.exe177⤵
-
C:\Windows\SysWOW64\Nnkcpq32.exeC:\Windows\system32\Nnkcpq32.exe178⤵
-
C:\Windows\SysWOW64\Nhdhif32.exeC:\Windows\system32\Nhdhif32.exe179⤵
-
C:\Windows\SysWOW64\Npolmh32.exeC:\Windows\system32\Npolmh32.exe180⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nigafnck.exeC:\Windows\system32\Nigafnck.exe181⤵
-
C:\Windows\SysWOW64\Nfkapb32.exeC:\Windows\system32\Nfkapb32.exe182⤵
-
C:\Windows\SysWOW64\Nmejllia.exeC:\Windows\system32\Nmejllia.exe183⤵
-
C:\Windows\SysWOW64\Ohojmjep.exeC:\Windows\system32\Ohojmjep.exe184⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Oeckfndj.exeC:\Windows\system32\Oeckfndj.exe185⤵
-
C:\Windows\SysWOW64\Okpcoe32.exeC:\Windows\system32\Okpcoe32.exe186⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Olophhjd.exeC:\Windows\system32\Olophhjd.exe187⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Omqlpp32.exeC:\Windows\system32\Omqlpp32.exe188⤵
-
C:\Windows\SysWOW64\Odjdmjgo.exeC:\Windows\system32\Odjdmjgo.exe189⤵
-
C:\Windows\SysWOW64\Oanefo32.exeC:\Windows\system32\Oanefo32.exe190⤵
-
C:\Windows\SysWOW64\Ohhmcinf.exeC:\Windows\system32\Ohhmcinf.exe191⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ppcbgkka.exeC:\Windows\system32\Ppcbgkka.exe192⤵
-
C:\Windows\SysWOW64\Pljcllqe.exeC:\Windows\system32\Pljcllqe.exe193⤵
-
C:\Windows\SysWOW64\Pincfpoo.exeC:\Windows\system32\Pincfpoo.exe194⤵
-
C:\Windows\SysWOW64\Poklngnf.exeC:\Windows\system32\Poklngnf.exe195⤵
-
C:\Windows\SysWOW64\Plolgk32.exeC:\Windows\system32\Plolgk32.exe196⤵
-
C:\Windows\SysWOW64\Pjcmap32.exeC:\Windows\system32\Pjcmap32.exe197⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Pkdihhag.exeC:\Windows\system32\Pkdihhag.exe198⤵
-
C:\Windows\SysWOW64\Popeif32.exeC:\Windows\system32\Popeif32.exe199⤵
-
C:\Windows\SysWOW64\Qdojgmfe.exeC:\Windows\system32\Qdojgmfe.exe200⤵
-
C:\Windows\SysWOW64\Aknlofim.exeC:\Windows\system32\Aknlofim.exe201⤵
-
C:\Windows\SysWOW64\Aciqcifh.exeC:\Windows\system32\Aciqcifh.exe202⤵
-
C:\Windows\SysWOW64\Anneqafn.exeC:\Windows\system32\Anneqafn.exe203⤵
-
C:\Windows\SysWOW64\Ajeeeblb.exeC:\Windows\system32\Ajeeeblb.exe204⤵
-
C:\Windows\SysWOW64\Abpjjeim.exeC:\Windows\system32\Abpjjeim.exe205⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Amfognic.exeC:\Windows\system32\Amfognic.exe206⤵
-
C:\Windows\SysWOW64\Bcpgdhpp.exeC:\Windows\system32\Bcpgdhpp.exe207⤵
-
C:\Windows\SysWOW64\Bkklhjnk.exeC:\Windows\system32\Bkklhjnk.exe208⤵
-
C:\Windows\SysWOW64\Becpap32.exeC:\Windows\system32\Becpap32.exe209⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bbgqjdce.exeC:\Windows\system32\Bbgqjdce.exe210⤵
-
C:\Windows\SysWOW64\Biaign32.exeC:\Windows\system32\Biaign32.exe211⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Behilopf.exeC:\Windows\system32\Behilopf.exe212⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bjebdfnn.exeC:\Windows\system32\Bjebdfnn.exe213⤵
-
C:\Windows\SysWOW64\Bgibnj32.exeC:\Windows\system32\Bgibnj32.exe214⤵
-
C:\Windows\SysWOW64\Cnckjddd.exeC:\Windows\system32\Cnckjddd.exe215⤵
-
C:\Windows\SysWOW64\Cgkocj32.exeC:\Windows\system32\Cgkocj32.exe216⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cmhglq32.exeC:\Windows\system32\Cmhglq32.exe217⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cbepdhgc.exeC:\Windows\system32\Cbepdhgc.exe218⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cpiqmlfm.exeC:\Windows\system32\Cpiqmlfm.exe219⤵
-
C:\Windows\SysWOW64\Cpkmcldj.exeC:\Windows\system32\Cpkmcldj.exe220⤵
-
C:\Windows\SysWOW64\Cfeepelg.exeC:\Windows\system32\Cfeepelg.exe221⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cpmjhk32.exeC:\Windows\system32\Cpmjhk32.exe222⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Daofpchf.exeC:\Windows\system32\Daofpchf.exe223⤵
-
C:\Windows\SysWOW64\Dobgihgp.exeC:\Windows\system32\Dobgihgp.exe224⤵
-
C:\Windows\SysWOW64\Ddpobo32.exeC:\Windows\system32\Ddpobo32.exe225⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dlfgcl32.exeC:\Windows\system32\Dlfgcl32.exe226⤵
-
C:\Windows\SysWOW64\Doecog32.exeC:\Windows\system32\Doecog32.exe227⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dklddhka.exeC:\Windows\system32\Dklddhka.exe228⤵
-
C:\Windows\SysWOW64\Dgbeiiqe.exeC:\Windows\system32\Dgbeiiqe.exe229⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dmmmfc32.exeC:\Windows\system32\Dmmmfc32.exe230⤵
-
C:\Windows\SysWOW64\Dkqnoh32.exeC:\Windows\system32\Dkqnoh32.exe231⤵
-
C:\Windows\SysWOW64\Eejopecj.exeC:\Windows\system32\Eejopecj.exe232⤵
-
C:\Windows\SysWOW64\Eobchk32.exeC:\Windows\system32\Eobchk32.exe233⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ehkhaqpk.exeC:\Windows\system32\Ehkhaqpk.exe234⤵
-
C:\Windows\SysWOW64\Ecploipa.exeC:\Windows\system32\Ecploipa.exe235⤵
-
C:\Windows\SysWOW64\Eogmcjef.exeC:\Windows\system32\Eogmcjef.exe236⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eeaepd32.exeC:\Windows\system32\Eeaepd32.exe237⤵
-
C:\Windows\SysWOW64\Enlidg32.exeC:\Windows\system32\Enlidg32.exe238⤵
-
C:\Windows\SysWOW64\Fgdnnl32.exeC:\Windows\system32\Fgdnnl32.exe239⤵
-
C:\Windows\SysWOW64\Fajbke32.exeC:\Windows\system32\Fajbke32.exe240⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fhdjgoha.exeC:\Windows\system32\Fhdjgoha.exe241⤵
- Modifies registry class