Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 21:20
Static task
static1
Behavioral task
behavioral1
Sample
5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe
Resource
win10v2004-20240508-en
General
-
Target
5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe
-
Size
163KB
-
MD5
157a5f4b3d774f6747d837a89ae523fa
-
SHA1
8ae4c9f97d5596e57b00f7cdc2e8fc83fea41cea
-
SHA256
5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb
-
SHA512
3bf7df5938ad2d678fa0d7ff0a86ebb4c3b56d4d107c2a176c722993f5e2449cb50bb4872ac14eaf6202398981240057f573d6c220716056db89c0e1444440fa
-
SSDEEP
1536:PJxxDnxAJ/Tj/yssm6KbKNZR9lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:NDA/Tj/DIKqR9ltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Eqgnokip.exePcfcmd32.exeGelppaof.exeBmmiij32.exeDbfabp32.exeEgoife32.exeBokphdld.exeGddifnbk.exeBiicik32.exeOnhgbmfb.exeAmfcikek.exeBmmiij32.exeAhchbf32.exeNajdnj32.exeNncahjgl.exeDfgmhd32.exeNondgn32.exeOmbapedi.exePnajilng.exeQjjgclai.exeBdeeqehb.exeGmjaic32.exeLafndg32.exeLlkbap32.exeEchfaf32.exeAnccmo32.exeGicbeald.exeGlfhll32.exeKifpdelo.exeJkbcln32.exeOqideepg.exeAfcenm32.exeAadloj32.exeBdjefj32.exeCkignd32.exeJiakjb32.exeAemkjiem.exeBmkmdk32.exeDdeaalpg.exeEalnephf.exeOfjfhk32.exeIhdkao32.exeNdmjedoi.exeNceclqan.exeQfahhm32.exeDflkdp32.exeFjgoce32.exeFbdqmghm.exeJqfffqpm.exeAfmonbqk.exeCndbcc32.exeHacmcfge.exeHjhhocjj.exeCjbmjplb.exeJehkodcm.exePnlqnl32.exeLdidkbpb.exePkpagq32.exeCghggc32.exeAigaon32.exeHlfdkoin.exeJqdipqbp.exeIdklfpon.exeKblhgk32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqgnokip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcfcmd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gelppaof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmmiij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbfabp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egoife32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bokphdld.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gddifnbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Biicik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onhgbmfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amfcikek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmmiij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahchbf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Najdnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nncahjgl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfgmhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nondgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ombapedi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnajilng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjjgclai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdeeqehb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmjaic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lafndg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llkbap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Echfaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anccmo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gicbeald.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glfhll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kifpdelo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkbcln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oqideepg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afcenm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aadloj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdjefj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckignd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jiakjb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aemkjiem.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmkmdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddeaalpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ealnephf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofjfhk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihdkao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndmjedoi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nceclqan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfahhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dflkdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjgoce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbdqmghm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jqfffqpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afmonbqk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cndbcc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hacmcfge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjhhocjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjbmjplb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jehkodcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnlqnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldidkbpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkpagq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cghggc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aigaon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlfdkoin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jqdipqbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idklfpon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kblhgk32.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Pjmodopf.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pcfcmd32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pmnhfjmg.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pchpbded.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Piehkkcl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ppoqge32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pigeqkai.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ppamme32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Pabjem32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qlhnbf32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Qaefjm32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Qhooggdn.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Qnigda32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Qecoqk32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ajphib32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ahchbf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Affhncfc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aalmklfi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ajdadamj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aigaon32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Afkbib32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aiinen32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Alhjai32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aoffmd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Afmonbqk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aljgfioc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bebkpn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Blmdlhmp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bokphdld.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bhcdaibd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Balijo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bdjefj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bkdmcdoe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bpafkknm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bjijdadm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bnefdp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bpcbqk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bcaomf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ckignd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdakgibq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ccdlbf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cfbhnaho.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cnippoha.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ccfhhffh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chcqpmep.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cfeddafl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cgbdhd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Clomqk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Comimg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cbkeib32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cfgaiaci.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cjbmjplb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chemfl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Claifkkf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cfinoq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdlnkmha.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cckace32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Clcflkic.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ckffgg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cndbcc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dflkdp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ddokpmfo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dhjgal32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dodonf32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Pjmodopf.exe UPX \Windows\SysWOW64\Pcfcmd32.exe UPX \Windows\SysWOW64\Pmnhfjmg.exe UPX \Windows\SysWOW64\Pchpbded.exe UPX \Windows\SysWOW64\Piehkkcl.exe UPX C:\Windows\SysWOW64\Ppoqge32.exe UPX \Windows\SysWOW64\Pigeqkai.exe UPX \Windows\SysWOW64\Ppamme32.exe UPX \Windows\SysWOW64\Pabjem32.exe UPX C:\Windows\SysWOW64\Qlhnbf32.exe UPX \Windows\SysWOW64\Qaefjm32.exe UPX \Windows\SysWOW64\Qhooggdn.exe UPX \Windows\SysWOW64\Qnigda32.exe UPX \Windows\SysWOW64\Qecoqk32.exe UPX \Windows\SysWOW64\Ajphib32.exe UPX \Windows\SysWOW64\Ahchbf32.exe UPX C:\Windows\SysWOW64\Affhncfc.exe UPX C:\Windows\SysWOW64\Aalmklfi.exe UPX C:\Windows\SysWOW64\Ajdadamj.exe UPX C:\Windows\SysWOW64\Aigaon32.exe UPX C:\Windows\SysWOW64\Afkbib32.exe UPX C:\Windows\SysWOW64\Aiinen32.exe UPX C:\Windows\SysWOW64\Alhjai32.exe UPX C:\Windows\SysWOW64\Aoffmd32.exe UPX C:\Windows\SysWOW64\Afmonbqk.exe UPX C:\Windows\SysWOW64\Aljgfioc.exe UPX C:\Windows\SysWOW64\Bebkpn32.exe UPX C:\Windows\SysWOW64\Blmdlhmp.exe UPX C:\Windows\SysWOW64\Bokphdld.exe UPX C:\Windows\SysWOW64\Bhcdaibd.exe UPX C:\Windows\SysWOW64\Balijo32.exe UPX C:\Windows\SysWOW64\Bdjefj32.exe UPX C:\Windows\SysWOW64\Bkdmcdoe.exe UPX C:\Windows\SysWOW64\Bpafkknm.exe UPX C:\Windows\SysWOW64\Bjijdadm.exe UPX C:\Windows\SysWOW64\Bnefdp32.exe UPX C:\Windows\SysWOW64\Bpcbqk32.exe UPX C:\Windows\SysWOW64\Bcaomf32.exe UPX C:\Windows\SysWOW64\Ckignd32.exe UPX C:\Windows\SysWOW64\Cdakgibq.exe UPX C:\Windows\SysWOW64\Ccdlbf32.exe UPX C:\Windows\SysWOW64\Cfbhnaho.exe UPX C:\Windows\SysWOW64\Cnippoha.exe UPX C:\Windows\SysWOW64\Ccfhhffh.exe UPX C:\Windows\SysWOW64\Chcqpmep.exe UPX C:\Windows\SysWOW64\Cfeddafl.exe UPX C:\Windows\SysWOW64\Cgbdhd32.exe UPX C:\Windows\SysWOW64\Clomqk32.exe UPX C:\Windows\SysWOW64\Comimg32.exe UPX C:\Windows\SysWOW64\Cbkeib32.exe UPX C:\Windows\SysWOW64\Cfgaiaci.exe UPX C:\Windows\SysWOW64\Cjbmjplb.exe UPX C:\Windows\SysWOW64\Chemfl32.exe UPX C:\Windows\SysWOW64\Claifkkf.exe UPX C:\Windows\SysWOW64\Cfinoq32.exe UPX C:\Windows\SysWOW64\Cdlnkmha.exe UPX C:\Windows\SysWOW64\Cckace32.exe UPX C:\Windows\SysWOW64\Clcflkic.exe UPX C:\Windows\SysWOW64\Ckffgg32.exe UPX C:\Windows\SysWOW64\Cndbcc32.exe UPX C:\Windows\SysWOW64\Dflkdp32.exe UPX C:\Windows\SysWOW64\Ddokpmfo.exe UPX C:\Windows\SysWOW64\Dhjgal32.exe UPX C:\Windows\SysWOW64\Dodonf32.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Pjmodopf.exePcfcmd32.exePmnhfjmg.exePchpbded.exePiehkkcl.exePpoqge32.exePigeqkai.exePpamme32.exePabjem32.exeQlhnbf32.exeQaefjm32.exeQhooggdn.exeQnigda32.exeQecoqk32.exeAjphib32.exeAhchbf32.exeAffhncfc.exeAalmklfi.exeAjdadamj.exeAigaon32.exeAfkbib32.exeAiinen32.exeAlhjai32.exeAoffmd32.exeAfmonbqk.exeAljgfioc.exeBebkpn32.exeBlmdlhmp.exeBokphdld.exeBhcdaibd.exeBalijo32.exeBdjefj32.exeBkdmcdoe.exeBpafkknm.exeBjijdadm.exeBnefdp32.exeBpcbqk32.exeBcaomf32.exeCkignd32.exeCdakgibq.exeCcdlbf32.exeCfbhnaho.exeCnippoha.exeCcfhhffh.exeCgbdhd32.exeCfeddafl.exeChcqpmep.exeClomqk32.exeComimg32.exeCbkeib32.exeCfgaiaci.exeCjbmjplb.exeChemfl32.exeClaifkkf.exeCckace32.exeCfinoq32.exeCdlnkmha.exeClcflkic.exeCkffgg32.exeCndbcc32.exeDflkdp32.exeDdokpmfo.exeDhjgal32.exeDodonf32.exepid process 2708 Pjmodopf.exe 2908 Pcfcmd32.exe 2536 Pmnhfjmg.exe 2588 Pchpbded.exe 2704 Piehkkcl.exe 2488 Ppoqge32.exe 2552 Pigeqkai.exe 1896 Ppamme32.exe 952 Pabjem32.exe 2004 Qlhnbf32.exe 1648 Qaefjm32.exe 2408 Qhooggdn.exe 1672 Qnigda32.exe 2984 Qecoqk32.exe 2256 Ajphib32.exe 2140 Ahchbf32.exe 960 Affhncfc.exe 1800 Aalmklfi.exe 448 Ajdadamj.exe 2340 Aigaon32.exe 2252 Afkbib32.exe 1160 Aiinen32.exe 1816 Alhjai32.exe 3040 Aoffmd32.exe 1744 Afmonbqk.exe 1700 Aljgfioc.exe 2156 Bebkpn32.exe 2572 Blmdlhmp.exe 2808 Bokphdld.exe 2696 Bhcdaibd.exe 768 Balijo32.exe 2496 Bdjefj32.exe 3068 Bkdmcdoe.exe 1992 Bpafkknm.exe 1204 Bjijdadm.exe 948 Bnefdp32.exe 852 Bpcbqk32.exe 1276 Bcaomf32.exe 1756 Ckignd32.exe 2764 Cdakgibq.exe 1696 Ccdlbf32.exe 668 Cfbhnaho.exe 400 Cnippoha.exe 2864 Ccfhhffh.exe 2396 Cgbdhd32.exe 880 Cfeddafl.exe 1544 Chcqpmep.exe 2312 Clomqk32.exe 3056 Comimg32.exe 1224 Cbkeib32.exe 2856 Cfgaiaci.exe 2384 Cjbmjplb.exe 2640 Chemfl32.exe 2228 Claifkkf.exe 2692 Cckace32.exe 2336 Cfinoq32.exe 1192 Cdlnkmha.exe 2904 Clcflkic.exe 1904 Ckffgg32.exe 2192 Cndbcc32.exe 1284 Dflkdp32.exe 1536 Ddokpmfo.exe 2720 Dhjgal32.exe 1872 Dodonf32.exe -
Loads dropped DLL 64 IoCs
Processes:
5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exePjmodopf.exePcfcmd32.exePmnhfjmg.exePchpbded.exePiehkkcl.exePpoqge32.exePigeqkai.exePpamme32.exePabjem32.exeQlhnbf32.exeQaefjm32.exeQhooggdn.exeQnigda32.exeQecoqk32.exeAjphib32.exeAhchbf32.exeAffhncfc.exeAalmklfi.exeAjdadamj.exeAigaon32.exeAfkbib32.exeAiinen32.exeAlhjai32.exeAoffmd32.exeAfmonbqk.exeAljgfioc.exeBebkpn32.exeBlmdlhmp.exeBokphdld.exeBhcdaibd.exeBalijo32.exepid process 2960 5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe 2960 5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe 2708 Pjmodopf.exe 2708 Pjmodopf.exe 2908 Pcfcmd32.exe 2908 Pcfcmd32.exe 2536 Pmnhfjmg.exe 2536 Pmnhfjmg.exe 2588 Pchpbded.exe 2588 Pchpbded.exe 2704 Piehkkcl.exe 2704 Piehkkcl.exe 2488 Ppoqge32.exe 2488 Ppoqge32.exe 2552 Pigeqkai.exe 2552 Pigeqkai.exe 1896 Ppamme32.exe 1896 Ppamme32.exe 952 Pabjem32.exe 952 Pabjem32.exe 2004 Qlhnbf32.exe 2004 Qlhnbf32.exe 1648 Qaefjm32.exe 1648 Qaefjm32.exe 2408 Qhooggdn.exe 2408 Qhooggdn.exe 1672 Qnigda32.exe 1672 Qnigda32.exe 2984 Qecoqk32.exe 2984 Qecoqk32.exe 2256 Ajphib32.exe 2256 Ajphib32.exe 2140 Ahchbf32.exe 2140 Ahchbf32.exe 960 Affhncfc.exe 960 Affhncfc.exe 1800 Aalmklfi.exe 1800 Aalmklfi.exe 448 Ajdadamj.exe 448 Ajdadamj.exe 2340 Aigaon32.exe 2340 Aigaon32.exe 2252 Afkbib32.exe 2252 Afkbib32.exe 1160 Aiinen32.exe 1160 Aiinen32.exe 1816 Alhjai32.exe 1816 Alhjai32.exe 3040 Aoffmd32.exe 3040 Aoffmd32.exe 1744 Afmonbqk.exe 1744 Afmonbqk.exe 1700 Aljgfioc.exe 1700 Aljgfioc.exe 2156 Bebkpn32.exe 2156 Bebkpn32.exe 2572 Blmdlhmp.exe 2572 Blmdlhmp.exe 2808 Bokphdld.exe 2808 Bokphdld.exe 2696 Bhcdaibd.exe 2696 Bhcdaibd.exe 768 Balijo32.exe 768 Balijo32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fckjalhj.exeLajhofao.exeBjlqhoba.exeDmafennb.exeCckace32.exeEcpgmhai.exeHkkalk32.exeMaoajf32.exeCcfhhffh.exeDjefobmk.exeFjgoce32.exeKbqecg32.exeNjlockkm.exeOlpdjf32.exeOnhgbmfb.exeBhndldcn.exeCdlnkmha.exeInqcif32.exePqhpdhcc.exePgioaa32.exeDfdjhndl.exeEkklaj32.exeHacmcfge.exeIaeiieeb.exeIjeghgoh.exeJofiln32.exeKaaijdgn.exeKemejc32.exeKjqccigf.exeBokphdld.exeQjjgclai.exeQcbllb32.exeCafecmlj.exeLpbefoai.exeGmjaic32.exeHiqbndpb.exeIhankokm.exeInngcfid.exeDjnpnc32.exeDbehoa32.exeFbdqmghm.exeFlmefm32.exeKkgmgmfd.exeLbeknj32.exeOnjgiiad.exeQnigda32.exeDjhphncm.exePnlqnl32.exeLecgje32.exeMppepcfg.exePpbfpd32.exePflomnkb.exeQcpofbjl.exeBkommo32.exeEiomkn32.exeFmlapp32.exeImfqjbli.exeKpkofpgq.exeKiccofna.exeMgimmm32.exeOopnlacm.exeOkikfagn.exeDmoipopd.exedescription ioc process File created C:\Windows\SysWOW64\Flabbihl.exe Fckjalhj.exe File created C:\Windows\SysWOW64\Ijqnib32.dll Lajhofao.exe File created C:\Windows\SysWOW64\Bmkmdk32.exe Bjlqhoba.exe File created C:\Windows\SysWOW64\Doobajme.exe Dmafennb.exe File opened for modification C:\Windows\SysWOW64\Cfinoq32.exe Cckace32.exe File opened for modification C:\Windows\SysWOW64\Ebbgid32.exe Ecpgmhai.exe File opened for modification C:\Windows\SysWOW64\Hogmmjfo.exe Hkkalk32.exe File opened for modification C:\Windows\SysWOW64\Mdmmfa32.exe Maoajf32.exe File created C:\Windows\SysWOW64\Cgbdhd32.exe Ccfhhffh.exe File opened for modification C:\Windows\SysWOW64\Emcbkn32.exe Djefobmk.exe File created C:\Windows\SysWOW64\Ongbcmlc.dll Fjgoce32.exe File opened for modification C:\Windows\SysWOW64\Keoapb32.exe Kbqecg32.exe File created C:\Windows\SysWOW64\Lfnbefhd.dll Njlockkm.exe File created C:\Windows\SysWOW64\Inlepd32.dll Olpdjf32.exe File opened for modification C:\Windows\SysWOW64\Pdaoog32.exe Onhgbmfb.exe File created C:\Windows\SysWOW64\Bjlqhoba.exe Bhndldcn.exe File created C:\Windows\SysWOW64\Clcflkic.exe Cdlnkmha.exe File created C:\Windows\SysWOW64\Iqopea32.exe Inqcif32.exe File created C:\Windows\SysWOW64\Pedleg32.exe Pqhpdhcc.exe File opened for modification C:\Windows\SysWOW64\Pflomnkb.exe Pgioaa32.exe File created C:\Windows\SysWOW64\Ddgjdk32.exe Dfdjhndl.exe File opened for modification C:\Windows\SysWOW64\Enihne32.exe Ekklaj32.exe File created C:\Windows\SysWOW64\Mhfkbo32.dll Hacmcfge.exe File created C:\Windows\SysWOW64\Pqiqnfej.dll Iaeiieeb.exe File created C:\Windows\SysWOW64\Inqcif32.exe Ijeghgoh.exe File opened for modification C:\Windows\SysWOW64\Jgnamk32.exe Jofiln32.exe File opened for modification C:\Windows\SysWOW64\Kemejc32.exe Kaaijdgn.exe File opened for modification C:\Windows\SysWOW64\Kgkafo32.exe Kemejc32.exe File created C:\Windows\SysWOW64\Nhlhki32.dll Kjqccigf.exe File created C:\Windows\SysWOW64\Lkebie32.dll Bokphdld.exe File opened for modification C:\Windows\SysWOW64\Qimhoi32.exe Qjjgclai.exe File opened for modification C:\Windows\SysWOW64\Qbelgood.exe Qcbllb32.exe File created C:\Windows\SysWOW64\Cddaphkn.exe Cafecmlj.exe File created C:\Windows\SysWOW64\Loeebl32.exe Lpbefoai.exe File created C:\Windows\SysWOW64\Pfabenjd.dll Gmjaic32.exe File created C:\Windows\SysWOW64\Ncolgf32.dll Hiqbndpb.exe File opened for modification C:\Windows\SysWOW64\Igdogl32.exe Ihankokm.exe File created C:\Windows\SysWOW64\Jobnme32.dll Inngcfid.exe File created C:\Windows\SysWOW64\Dbehoa32.exe Djnpnc32.exe File created C:\Windows\SysWOW64\Dqhhknjp.exe Dbehoa32.exe File opened for modification C:\Windows\SysWOW64\Flmefm32.exe Fbdqmghm.exe File opened for modification C:\Windows\SysWOW64\Ffbicfoc.exe Flmefm32.exe File created C:\Windows\SysWOW64\Igdogl32.exe Ihankokm.exe File created C:\Windows\SysWOW64\Cqljpedj.dll Kkgmgmfd.exe File created C:\Windows\SysWOW64\Lecgje32.exe Lbeknj32.exe File created C:\Windows\SysWOW64\Nmlnnp32.dll Onjgiiad.exe File created C:\Windows\SysWOW64\Qecoqk32.exe Qnigda32.exe File created C:\Windows\SysWOW64\Dlgldibq.exe Djhphncm.exe File created C:\Windows\SysWOW64\Pqkmjh32.exe Pnlqnl32.exe File opened for modification C:\Windows\SysWOW64\Ldfgebbe.exe Lecgje32.exe File opened for modification C:\Windows\SysWOW64\Mhgmapfi.exe Mppepcfg.exe File created C:\Windows\SysWOW64\Pgioaa32.exe Ppbfpd32.exe File opened for modification C:\Windows\SysWOW64\Pikkiijf.exe Pflomnkb.exe File opened for modification C:\Windows\SysWOW64\Qfokbnip.exe Qcpofbjl.exe File created C:\Windows\SysWOW64\Fnnkng32.dll Bkommo32.exe File opened for modification C:\Windows\SysWOW64\Egamfkdh.exe Eiomkn32.exe File opened for modification C:\Windows\SysWOW64\Gpknlk32.exe Fmlapp32.exe File created C:\Windows\SysWOW64\Iqalka32.exe Imfqjbli.exe File created C:\Windows\SysWOW64\Kpkofpgq.exe Kpkofpgq.exe File opened for modification C:\Windows\SysWOW64\Kmopod32.exe Kiccofna.exe File opened for modification C:\Windows\SysWOW64\Mkeimlfm.exe Mgimmm32.exe File opened for modification C:\Windows\SysWOW64\Oclilp32.exe Oopnlacm.exe File opened for modification C:\Windows\SysWOW64\Onhgbmfb.exe Okikfagn.exe File opened for modification C:\Windows\SysWOW64\Ddeaalpg.exe Dmoipopd.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6036 5980 WerFault.exe Fkckeh32.exe -
Modifies registry class 64 IoCs
Processes:
Dgaqgh32.exePjenhm32.exePmnhfjmg.exeEcpgmhai.exePgioaa32.exeAekodi32.exeObafnlpn.exePdaoog32.exeAjphib32.exeBokphdld.exeDgfjbgmh.exeEgamfkdh.exeMeagci32.exeNdpfkdmf.exeCdikkg32.exeEnfenplo.exeBiicik32.exeEjobhppq.exeEmcbkn32.exeJbllihbf.exeKbqecg32.exeMpigfa32.exeNacgdhlp.exeOkikfagn.exe5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exeBalijo32.exeLhmjkaoc.exeOcgpappk.exePclfkc32.exeAemkjiem.exeHmlnoc32.exeIfcbodli.exeOfjfhk32.exeAoepcn32.exeBmkmdk32.exeBmmiij32.exeBlbfjg32.exeCdakgibq.exeCfeddafl.exeIaeiieeb.exeNkiogn32.exeNpfgpe32.exeOlpdjf32.exeQmfgjh32.exeAbhimnma.exePabjem32.exeCckace32.exeDjefobmk.exeHogmmjfo.exePnjdhmdo.exePjcabmga.exeAehboi32.exeCohigamf.exeEqpgol32.exePnajilng.exeAnojbobe.exeAfkbib32.exeChemfl32.exeIokfhi32.exeKkijmm32.exeKcdnao32.exeLollckbk.exeDoehqead.exeDhdcji32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epgnljad.dll" Dgaqgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjenhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajenen32.dll" Pmnhfjmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecpgmhai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecfhengk.dll" Pgioaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aekodi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Obafnlpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpkeqmgm.dll" Pdaoog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajphib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bokphdld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppmcfdad.dll" Dgfjbgmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpdhmlbj.dll" Egamfkdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Meagci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndpfkdmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdikkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aphdelhp.dll" Enfenplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffdiejho.dll" Biicik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejobhppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfeoofge.dll" Emcbkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbllihbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbqecg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpigfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcoich32.dll" Nacgdhlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okikfagn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Balijo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhmjkaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocgpappk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pclfkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aemkjiem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Codpklfq.dll" Hmlnoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifcbodli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofjfhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncdbcl32.dll" Aoepcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmkmdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apmmjh32.dll" Bmmiij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blbfjg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdakgibq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbhfilfi.dll" Cfeddafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqiqnfej.dll" Iaeiieeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkiogn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npfgpe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olpdjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idnhde32.dll" Qmfgjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abhimnma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pabjem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cckace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmqgncdn.dll" Djefobmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmibbifn.dll" Hogmmjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pnjdhmdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjcabmga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aehboi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfgnhbba.dll" Cohigamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geemiobo.dll" Eqpgol32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnajilng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifjeknjd.dll" Anojbobe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afkbib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oockje32.dll" Chemfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ongdpbkl.dll" Iokfhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkijmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcdnao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bqdgkecq.dll" Lollckbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcfidhng.dll" Doehqead.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhdcji32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exePjmodopf.exePcfcmd32.exePmnhfjmg.exePchpbded.exePiehkkcl.exePpoqge32.exePigeqkai.exePpamme32.exePabjem32.exeQlhnbf32.exeQaefjm32.exeQhooggdn.exeQnigda32.exeQecoqk32.exeAjphib32.exedescription pid process target process PID 2960 wrote to memory of 2708 2960 5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe Pjmodopf.exe PID 2960 wrote to memory of 2708 2960 5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe Pjmodopf.exe PID 2960 wrote to memory of 2708 2960 5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe Pjmodopf.exe PID 2960 wrote to memory of 2708 2960 5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe Pjmodopf.exe PID 2708 wrote to memory of 2908 2708 Pjmodopf.exe Pcfcmd32.exe PID 2708 wrote to memory of 2908 2708 Pjmodopf.exe Pcfcmd32.exe PID 2708 wrote to memory of 2908 2708 Pjmodopf.exe Pcfcmd32.exe PID 2708 wrote to memory of 2908 2708 Pjmodopf.exe Pcfcmd32.exe PID 2908 wrote to memory of 2536 2908 Pcfcmd32.exe Pmnhfjmg.exe PID 2908 wrote to memory of 2536 2908 Pcfcmd32.exe Pmnhfjmg.exe PID 2908 wrote to memory of 2536 2908 Pcfcmd32.exe Pmnhfjmg.exe PID 2908 wrote to memory of 2536 2908 Pcfcmd32.exe Pmnhfjmg.exe PID 2536 wrote to memory of 2588 2536 Pmnhfjmg.exe Pchpbded.exe PID 2536 wrote to memory of 2588 2536 Pmnhfjmg.exe Pchpbded.exe PID 2536 wrote to memory of 2588 2536 Pmnhfjmg.exe Pchpbded.exe PID 2536 wrote to memory of 2588 2536 Pmnhfjmg.exe Pchpbded.exe PID 2588 wrote to memory of 2704 2588 Pchpbded.exe Piehkkcl.exe PID 2588 wrote to memory of 2704 2588 Pchpbded.exe Piehkkcl.exe PID 2588 wrote to memory of 2704 2588 Pchpbded.exe Piehkkcl.exe PID 2588 wrote to memory of 2704 2588 Pchpbded.exe Piehkkcl.exe PID 2704 wrote to memory of 2488 2704 Piehkkcl.exe Ppoqge32.exe PID 2704 wrote to memory of 2488 2704 Piehkkcl.exe Ppoqge32.exe PID 2704 wrote to memory of 2488 2704 Piehkkcl.exe Ppoqge32.exe PID 2704 wrote to memory of 2488 2704 Piehkkcl.exe Ppoqge32.exe PID 2488 wrote to memory of 2552 2488 Ppoqge32.exe Pigeqkai.exe PID 2488 wrote to memory of 2552 2488 Ppoqge32.exe Pigeqkai.exe PID 2488 wrote to memory of 2552 2488 Ppoqge32.exe Pigeqkai.exe PID 2488 wrote to memory of 2552 2488 Ppoqge32.exe Pigeqkai.exe PID 2552 wrote to memory of 1896 2552 Pigeqkai.exe Ppamme32.exe PID 2552 wrote to memory of 1896 2552 Pigeqkai.exe Ppamme32.exe PID 2552 wrote to memory of 1896 2552 Pigeqkai.exe Ppamme32.exe PID 2552 wrote to memory of 1896 2552 Pigeqkai.exe Ppamme32.exe PID 1896 wrote to memory of 952 1896 Ppamme32.exe Pabjem32.exe PID 1896 wrote to memory of 952 1896 Ppamme32.exe Pabjem32.exe PID 1896 wrote to memory of 952 1896 Ppamme32.exe Pabjem32.exe PID 1896 wrote to memory of 952 1896 Ppamme32.exe Pabjem32.exe PID 952 wrote to memory of 2004 952 Pabjem32.exe Qlhnbf32.exe PID 952 wrote to memory of 2004 952 Pabjem32.exe Qlhnbf32.exe PID 952 wrote to memory of 2004 952 Pabjem32.exe Qlhnbf32.exe PID 952 wrote to memory of 2004 952 Pabjem32.exe Qlhnbf32.exe PID 2004 wrote to memory of 1648 2004 Qlhnbf32.exe Qaefjm32.exe PID 2004 wrote to memory of 1648 2004 Qlhnbf32.exe Qaefjm32.exe PID 2004 wrote to memory of 1648 2004 Qlhnbf32.exe Qaefjm32.exe PID 2004 wrote to memory of 1648 2004 Qlhnbf32.exe Qaefjm32.exe PID 1648 wrote to memory of 2408 1648 Qaefjm32.exe Qhooggdn.exe PID 1648 wrote to memory of 2408 1648 Qaefjm32.exe Qhooggdn.exe PID 1648 wrote to memory of 2408 1648 Qaefjm32.exe Qhooggdn.exe PID 1648 wrote to memory of 2408 1648 Qaefjm32.exe Qhooggdn.exe PID 2408 wrote to memory of 1672 2408 Qhooggdn.exe Qnigda32.exe PID 2408 wrote to memory of 1672 2408 Qhooggdn.exe Qnigda32.exe PID 2408 wrote to memory of 1672 2408 Qhooggdn.exe Qnigda32.exe PID 2408 wrote to memory of 1672 2408 Qhooggdn.exe Qnigda32.exe PID 1672 wrote to memory of 2984 1672 Qnigda32.exe Qecoqk32.exe PID 1672 wrote to memory of 2984 1672 Qnigda32.exe Qecoqk32.exe PID 1672 wrote to memory of 2984 1672 Qnigda32.exe Qecoqk32.exe PID 1672 wrote to memory of 2984 1672 Qnigda32.exe Qecoqk32.exe PID 2984 wrote to memory of 2256 2984 Qecoqk32.exe Ajphib32.exe PID 2984 wrote to memory of 2256 2984 Qecoqk32.exe Ajphib32.exe PID 2984 wrote to memory of 2256 2984 Qecoqk32.exe Ajphib32.exe PID 2984 wrote to memory of 2256 2984 Qecoqk32.exe Ajphib32.exe PID 2256 wrote to memory of 2140 2256 Ajphib32.exe Ahchbf32.exe PID 2256 wrote to memory of 2140 2256 Ajphib32.exe Ahchbf32.exe PID 2256 wrote to memory of 2140 2256 Ajphib32.exe Ahchbf32.exe PID 2256 wrote to memory of 2140 2256 Ajphib32.exe Ahchbf32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe"C:\Users\Admin\AppData\Local\Temp\5247273a6fe2cc888bbc5770f70c16a15299cd8383458223efcc1b91e006cadb.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pjmodopf.exeC:\Windows\system32\Pjmodopf.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pcfcmd32.exeC:\Windows\system32\Pcfcmd32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pmnhfjmg.exeC:\Windows\system32\Pmnhfjmg.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pchpbded.exeC:\Windows\system32\Pchpbded.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Piehkkcl.exeC:\Windows\system32\Piehkkcl.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ppoqge32.exeC:\Windows\system32\Ppoqge32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pigeqkai.exeC:\Windows\system32\Pigeqkai.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ppamme32.exeC:\Windows\system32\Ppamme32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pabjem32.exeC:\Windows\system32\Pabjem32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qlhnbf32.exeC:\Windows\system32\Qlhnbf32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qaefjm32.exeC:\Windows\system32\Qaefjm32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qhooggdn.exeC:\Windows\system32\Qhooggdn.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qnigda32.exeC:\Windows\system32\Qnigda32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qecoqk32.exeC:\Windows\system32\Qecoqk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ajphib32.exeC:\Windows\system32\Ajphib32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ahchbf32.exeC:\Windows\system32\Ahchbf32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Affhncfc.exeC:\Windows\system32\Affhncfc.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Aalmklfi.exeC:\Windows\system32\Aalmklfi.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ajdadamj.exeC:\Windows\system32\Ajdadamj.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Aigaon32.exeC:\Windows\system32\Aigaon32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Afkbib32.exeC:\Windows\system32\Afkbib32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Aiinen32.exeC:\Windows\system32\Aiinen32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Alhjai32.exeC:\Windows\system32\Alhjai32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Aoffmd32.exeC:\Windows\system32\Aoffmd32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Afmonbqk.exeC:\Windows\system32\Afmonbqk.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Aljgfioc.exeC:\Windows\system32\Aljgfioc.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Bebkpn32.exeC:\Windows\system32\Bebkpn32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Blmdlhmp.exeC:\Windows\system32\Blmdlhmp.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Bokphdld.exeC:\Windows\system32\Bokphdld.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bhcdaibd.exeC:\Windows\system32\Bhcdaibd.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Balijo32.exeC:\Windows\system32\Balijo32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Bdjefj32.exeC:\Windows\system32\Bdjefj32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bkdmcdoe.exeC:\Windows\system32\Bkdmcdoe.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bpafkknm.exeC:\Windows\system32\Bpafkknm.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bjijdadm.exeC:\Windows\system32\Bjijdadm.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bnefdp32.exeC:\Windows\system32\Bnefdp32.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bpcbqk32.exeC:\Windows\system32\Bpcbqk32.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bcaomf32.exeC:\Windows\system32\Bcaomf32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ckignd32.exeC:\Windows\system32\Ckignd32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cdakgibq.exeC:\Windows\system32\Cdakgibq.exe41⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ccdlbf32.exeC:\Windows\system32\Ccdlbf32.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cfbhnaho.exeC:\Windows\system32\Cfbhnaho.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cnippoha.exeC:\Windows\system32\Cnippoha.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ccfhhffh.exeC:\Windows\system32\Ccfhhffh.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cfeddafl.exeC:\Windows\system32\Cfeddafl.exe47⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Chcqpmep.exeC:\Windows\system32\Chcqpmep.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Clomqk32.exeC:\Windows\system32\Clomqk32.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Comimg32.exeC:\Windows\system32\Comimg32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cbkeib32.exeC:\Windows\system32\Cbkeib32.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cfgaiaci.exeC:\Windows\system32\Cfgaiaci.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cjbmjplb.exeC:\Windows\system32\Cjbmjplb.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Chemfl32.exeC:\Windows\system32\Chemfl32.exe54⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Claifkkf.exeC:\Windows\system32\Claifkkf.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cckace32.exeC:\Windows\system32\Cckace32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Cfinoq32.exeC:\Windows\system32\Cfinoq32.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cdlnkmha.exeC:\Windows\system32\Cdlnkmha.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Clcflkic.exeC:\Windows\system32\Clcflkic.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ckffgg32.exeC:\Windows\system32\Ckffgg32.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cndbcc32.exeC:\Windows\system32\Cndbcc32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dflkdp32.exeC:\Windows\system32\Dflkdp32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dhjgal32.exeC:\Windows\system32\Dhjgal32.exe64⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dodonf32.exeC:\Windows\system32\Dodonf32.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dbbkja32.exeC:\Windows\system32\Dbbkja32.exe66⤵
-
C:\Windows\SysWOW64\Dqelenlc.exeC:\Windows\system32\Dqelenlc.exe67⤵
-
C:\Windows\SysWOW64\Dhmcfkme.exeC:\Windows\system32\Dhmcfkme.exe68⤵
-
C:\Windows\SysWOW64\Dkkpbgli.exeC:\Windows\system32\Dkkpbgli.exe69⤵
-
C:\Windows\SysWOW64\Djnpnc32.exeC:\Windows\system32\Djnpnc32.exe70⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dbehoa32.exeC:\Windows\system32\Dbehoa32.exe71⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dqhhknjp.exeC:\Windows\system32\Dqhhknjp.exe72⤵
-
C:\Windows\SysWOW64\Dgaqgh32.exeC:\Windows\system32\Dgaqgh32.exe73⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dkmmhf32.exeC:\Windows\system32\Dkmmhf32.exe74⤵
-
C:\Windows\SysWOW64\Dnlidb32.exeC:\Windows\system32\Dnlidb32.exe75⤵
-
C:\Windows\SysWOW64\Dmoipopd.exeC:\Windows\system32\Dmoipopd.exe76⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ddeaalpg.exeC:\Windows\system32\Ddeaalpg.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dchali32.exeC:\Windows\system32\Dchali32.exe78⤵
-
C:\Windows\SysWOW64\Dfgmhd32.exeC:\Windows\system32\Dfgmhd32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dnneja32.exeC:\Windows\system32\Dnneja32.exe80⤵
-
C:\Windows\SysWOW64\Dmafennb.exeC:\Windows\system32\Dmafennb.exe81⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Doobajme.exeC:\Windows\system32\Doobajme.exe82⤵
-
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe83⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Djefobmk.exeC:\Windows\system32\Djefobmk.exe84⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Emcbkn32.exeC:\Windows\system32\Emcbkn32.exe85⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eqonkmdh.exeC:\Windows\system32\Eqonkmdh.exe86⤵
-
C:\Windows\SysWOW64\Ecmkghcl.exeC:\Windows\system32\Ecmkghcl.exe87⤵
-
C:\Windows\SysWOW64\Ecmkghcl.exeC:\Windows\system32\Ecmkghcl.exe88⤵
-
C:\Windows\SysWOW64\Eflgccbp.exeC:\Windows\system32\Eflgccbp.exe89⤵
-
C:\Windows\SysWOW64\Epdkli32.exeC:\Windows\system32\Epdkli32.exe90⤵
-
C:\Windows\SysWOW64\Ecpgmhai.exeC:\Windows\system32\Ecpgmhai.exe91⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ebbgid32.exeC:\Windows\system32\Ebbgid32.exe92⤵
-
C:\Windows\SysWOW64\Efncicpm.exeC:\Windows\system32\Efncicpm.exe93⤵
-
C:\Windows\SysWOW64\Eeqdep32.exeC:\Windows\system32\Eeqdep32.exe94⤵
-
C:\Windows\SysWOW64\Emhlfmgj.exeC:\Windows\system32\Emhlfmgj.exe95⤵
-
C:\Windows\SysWOW64\Ekklaj32.exeC:\Windows\system32\Ekklaj32.exe96⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Enihne32.exeC:\Windows\system32\Enihne32.exe97⤵
-
C:\Windows\SysWOW64\Ebedndfa.exeC:\Windows\system32\Ebedndfa.exe98⤵
-
C:\Windows\SysWOW64\Eiomkn32.exeC:\Windows\system32\Eiomkn32.exe99⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Egamfkdh.exeC:\Windows\system32\Egamfkdh.exe100⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Epieghdk.exeC:\Windows\system32\Epieghdk.exe101⤵
-
C:\Windows\SysWOW64\Ebgacddo.exeC:\Windows\system32\Ebgacddo.exe102⤵
-
C:\Windows\SysWOW64\Eajaoq32.exeC:\Windows\system32\Eajaoq32.exe103⤵
-
C:\Windows\SysWOW64\Eeempocb.exeC:\Windows\system32\Eeempocb.exe104⤵
-
C:\Windows\SysWOW64\Eiaiqn32.exeC:\Windows\system32\Eiaiqn32.exe105⤵
-
C:\Windows\SysWOW64\Egdilkbf.exeC:\Windows\system32\Egdilkbf.exe106⤵
-
C:\Windows\SysWOW64\Eloemi32.exeC:\Windows\system32\Eloemi32.exe107⤵
-
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe108⤵
-
C:\Windows\SysWOW64\Ealnephf.exeC:\Windows\system32\Ealnephf.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fckjalhj.exeC:\Windows\system32\Fckjalhj.exe110⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Flabbihl.exeC:\Windows\system32\Flabbihl.exe111⤵
-
C:\Windows\SysWOW64\Fmcoja32.exeC:\Windows\system32\Fmcoja32.exe112⤵
-
C:\Windows\SysWOW64\Faokjpfd.exeC:\Windows\system32\Faokjpfd.exe113⤵
-
C:\Windows\SysWOW64\Fcmgfkeg.exeC:\Windows\system32\Fcmgfkeg.exe114⤵
-
C:\Windows\SysWOW64\Fjgoce32.exeC:\Windows\system32\Fjgoce32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fmekoalh.exeC:\Windows\system32\Fmekoalh.exe116⤵
-
C:\Windows\SysWOW64\Fpdhklkl.exeC:\Windows\system32\Fpdhklkl.exe117⤵
-
C:\Windows\SysWOW64\Fjilieka.exeC:\Windows\system32\Fjilieka.exe118⤵
-
C:\Windows\SysWOW64\Fmhheqje.exeC:\Windows\system32\Fmhheqje.exe119⤵
-
C:\Windows\SysWOW64\Fpfdalii.exeC:\Windows\system32\Fpfdalii.exe120⤵
-
C:\Windows\SysWOW64\Fbdqmghm.exeC:\Windows\system32\Fbdqmghm.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Flmefm32.exeC:\Windows\system32\Flmefm32.exe122⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ffbicfoc.exeC:\Windows\system32\Ffbicfoc.exe123⤵
-
C:\Windows\SysWOW64\Fmlapp32.exeC:\Windows\system32\Fmlapp32.exe124⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gpknlk32.exeC:\Windows\system32\Gpknlk32.exe125⤵
-
C:\Windows\SysWOW64\Gfefiemq.exeC:\Windows\system32\Gfefiemq.exe126⤵
-
C:\Windows\SysWOW64\Gicbeald.exeC:\Windows\system32\Gicbeald.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gbkgnfbd.exeC:\Windows\system32\Gbkgnfbd.exe128⤵
-
C:\Windows\SysWOW64\Gieojq32.exeC:\Windows\system32\Gieojq32.exe129⤵
-
C:\Windows\SysWOW64\Gldkfl32.exeC:\Windows\system32\Gldkfl32.exe130⤵
-
C:\Windows\SysWOW64\Gkgkbipp.exeC:\Windows\system32\Gkgkbipp.exe131⤵
-
C:\Windows\SysWOW64\Gaqcoc32.exeC:\Windows\system32\Gaqcoc32.exe132⤵
-
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe133⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ghkllmoi.exeC:\Windows\system32\Ghkllmoi.exe134⤵
-
C:\Windows\SysWOW64\Glfhll32.exeC:\Windows\system32\Glfhll32.exe135⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Goddhg32.exeC:\Windows\system32\Goddhg32.exe136⤵
-
C:\Windows\SysWOW64\Geolea32.exeC:\Windows\system32\Geolea32.exe137⤵
-
C:\Windows\SysWOW64\Ghmiam32.exeC:\Windows\system32\Ghmiam32.exe138⤵
-
C:\Windows\SysWOW64\Ggpimica.exeC:\Windows\system32\Ggpimica.exe139⤵
-
C:\Windows\SysWOW64\Gogangdc.exeC:\Windows\system32\Gogangdc.exe140⤵
-
C:\Windows\SysWOW64\Gmjaic32.exeC:\Windows\system32\Gmjaic32.exe141⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gddifnbk.exeC:\Windows\system32\Gddifnbk.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gddifnbk.exeC:\Windows\system32\Gddifnbk.exe143⤵
-
C:\Windows\SysWOW64\Hgbebiao.exeC:\Windows\system32\Hgbebiao.exe144⤵
-
C:\Windows\SysWOW64\Hknach32.exeC:\Windows\system32\Hknach32.exe145⤵
-
C:\Windows\SysWOW64\Hiqbndpb.exeC:\Windows\system32\Hiqbndpb.exe146⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hmlnoc32.exeC:\Windows\system32\Hmlnoc32.exe147⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe148⤵
-
C:\Windows\SysWOW64\Hdfflm32.exeC:\Windows\system32\Hdfflm32.exe149⤵
-
C:\Windows\SysWOW64\Hgdbhi32.exeC:\Windows\system32\Hgdbhi32.exe150⤵
-
C:\Windows\SysWOW64\Hkpnhgge.exeC:\Windows\system32\Hkpnhgge.exe151⤵
-
C:\Windows\SysWOW64\Hnojdcfi.exeC:\Windows\system32\Hnojdcfi.exe152⤵
-
C:\Windows\SysWOW64\Hlakpp32.exeC:\Windows\system32\Hlakpp32.exe153⤵
-
C:\Windows\SysWOW64\Hdhbam32.exeC:\Windows\system32\Hdhbam32.exe154⤵
-
C:\Windows\SysWOW64\Hckcmjep.exeC:\Windows\system32\Hckcmjep.exe155⤵
-
C:\Windows\SysWOW64\Hejoiedd.exeC:\Windows\system32\Hejoiedd.exe156⤵
-
C:\Windows\SysWOW64\Hnagjbdf.exeC:\Windows\system32\Hnagjbdf.exe157⤵
-
C:\Windows\SysWOW64\Hlcgeo32.exeC:\Windows\system32\Hlcgeo32.exe158⤵
-
C:\Windows\SysWOW64\Hpocfncj.exeC:\Windows\system32\Hpocfncj.exe159⤵
-
C:\Windows\SysWOW64\Hcnpbi32.exeC:\Windows\system32\Hcnpbi32.exe160⤵
-
C:\Windows\SysWOW64\Hgilchkf.exeC:\Windows\system32\Hgilchkf.exe161⤵
-
C:\Windows\SysWOW64\Hjhhocjj.exeC:\Windows\system32\Hjhhocjj.exe162⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hlfdkoin.exeC:\Windows\system32\Hlfdkoin.exe163⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hodpgjha.exeC:\Windows\system32\Hodpgjha.exe164⤵
-
C:\Windows\SysWOW64\Hacmcfge.exeC:\Windows\system32\Hacmcfge.exe165⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hjjddchg.exeC:\Windows\system32\Hjjddchg.exe166⤵
-
C:\Windows\SysWOW64\Hhmepp32.exeC:\Windows\system32\Hhmepp32.exe167⤵
-
C:\Windows\SysWOW64\Hkkalk32.exeC:\Windows\system32\Hkkalk32.exe168⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hogmmjfo.exeC:\Windows\system32\Hogmmjfo.exe169⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Iaeiieeb.exeC:\Windows\system32\Iaeiieeb.exe170⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe171⤵
-
C:\Windows\SysWOW64\Ilknfn32.exeC:\Windows\system32\Ilknfn32.exe172⤵
-
C:\Windows\SysWOW64\Iknnbklc.exeC:\Windows\system32\Iknnbklc.exe173⤵
-
C:\Windows\SysWOW64\Inljnfkg.exeC:\Windows\system32\Inljnfkg.exe174⤵
-
C:\Windows\SysWOW64\Ifcbodli.exeC:\Windows\system32\Ifcbodli.exe175⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ihankokm.exeC:\Windows\system32\Ihankokm.exe176⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Igdogl32.exeC:\Windows\system32\Igdogl32.exe177⤵
-
C:\Windows\SysWOW64\Iokfhi32.exeC:\Windows\system32\Iokfhi32.exe178⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Inngcfid.exeC:\Windows\system32\Inngcfid.exe179⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Iqmcpahh.exeC:\Windows\system32\Iqmcpahh.exe180⤵
-
C:\Windows\SysWOW64\Idhopq32.exeC:\Windows\system32\Idhopq32.exe181⤵
-
C:\Windows\SysWOW64\Ihdkao32.exeC:\Windows\system32\Ihdkao32.exe182⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ikbgmj32.exeC:\Windows\system32\Ikbgmj32.exe183⤵
-
C:\Windows\SysWOW64\Ijeghgoh.exeC:\Windows\system32\Ijeghgoh.exe184⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Inqcif32.exeC:\Windows\system32\Inqcif32.exe185⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Iqopea32.exeC:\Windows\system32\Iqopea32.exe186⤵
-
C:\Windows\SysWOW64\Idklfpon.exeC:\Windows\system32\Idklfpon.exe187⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Igihbknb.exeC:\Windows\system32\Igihbknb.exe188⤵
-
C:\Windows\SysWOW64\Ijgdngmf.exeC:\Windows\system32\Ijgdngmf.exe189⤵
-
C:\Windows\SysWOW64\Imfqjbli.exeC:\Windows\system32\Imfqjbli.exe190⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Iqalka32.exeC:\Windows\system32\Iqalka32.exe191⤵
-
C:\Windows\SysWOW64\Icpigm32.exeC:\Windows\system32\Icpigm32.exe192⤵
-
C:\Windows\SysWOW64\Igkdgk32.exeC:\Windows\system32\Igkdgk32.exe193⤵
-
C:\Windows\SysWOW64\Jjjacf32.exeC:\Windows\system32\Jjjacf32.exe194⤵
-
C:\Windows\SysWOW64\Jnemdecl.exeC:\Windows\system32\Jnemdecl.exe195⤵
-
C:\Windows\SysWOW64\Jmhmpb32.exeC:\Windows\system32\Jmhmpb32.exe196⤵
-
C:\Windows\SysWOW64\Jqdipqbp.exeC:\Windows\system32\Jqdipqbp.exe197⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jofiln32.exeC:\Windows\system32\Jofiln32.exe198⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jgnamk32.exeC:\Windows\system32\Jgnamk32.exe199⤵
-
C:\Windows\SysWOW64\Jjlnif32.exeC:\Windows\system32\Jjlnif32.exe200⤵
-
C:\Windows\SysWOW64\Jiondcpk.exeC:\Windows\system32\Jiondcpk.exe201⤵
-
C:\Windows\SysWOW64\Jqfffqpm.exeC:\Windows\system32\Jqfffqpm.exe202⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Joifam32.exeC:\Windows\system32\Joifam32.exe203⤵
-
C:\Windows\SysWOW64\Jbgbni32.exeC:\Windows\system32\Jbgbni32.exe204⤵
-
C:\Windows\SysWOW64\Jfcnngnd.exeC:\Windows\system32\Jfcnngnd.exe205⤵
-
C:\Windows\SysWOW64\Jiakjb32.exeC:\Windows\system32\Jiakjb32.exe206⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jmmfkafa.exeC:\Windows\system32\Jmmfkafa.exe207⤵
-
C:\Windows\SysWOW64\Jokcgmee.exeC:\Windows\system32\Jokcgmee.exe208⤵
-
C:\Windows\SysWOW64\Jcgogk32.exeC:\Windows\system32\Jcgogk32.exe209⤵
-
C:\Windows\SysWOW64\Jfekcg32.exeC:\Windows\system32\Jfekcg32.exe210⤵
-
C:\Windows\SysWOW64\Jehkodcm.exeC:\Windows\system32\Jehkodcm.exe211⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jmocpado.exeC:\Windows\system32\Jmocpado.exe212⤵
-
C:\Windows\SysWOW64\Jkbcln32.exeC:\Windows\system32\Jkbcln32.exe213⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jnqphi32.exeC:\Windows\system32\Jnqphi32.exe214⤵
-
C:\Windows\SysWOW64\Jbllihbf.exeC:\Windows\system32\Jbllihbf.exe215⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jfghif32.exeC:\Windows\system32\Jfghif32.exe216⤵
-
C:\Windows\SysWOW64\Jejhecaj.exeC:\Windows\system32\Jejhecaj.exe217⤵
-
C:\Windows\SysWOW64\Jgidao32.exeC:\Windows\system32\Jgidao32.exe218⤵
-
C:\Windows\SysWOW64\Jkdpanhg.exeC:\Windows\system32\Jkdpanhg.exe219⤵
-
C:\Windows\SysWOW64\Joplbl32.exeC:\Windows\system32\Joplbl32.exe220⤵
-
C:\Windows\SysWOW64\Jbnhng32.exeC:\Windows\system32\Jbnhng32.exe221⤵
-
C:\Windows\SysWOW64\Kaaijdgn.exeC:\Windows\system32\Kaaijdgn.exe222⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kemejc32.exeC:\Windows\system32\Kemejc32.exe223⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kgkafo32.exeC:\Windows\system32\Kgkafo32.exe224⤵
-
C:\Windows\SysWOW64\Kkgmgmfd.exeC:\Windows\system32\Kkgmgmfd.exe225⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kneicieh.exeC:\Windows\system32\Kneicieh.exe226⤵
-
C:\Windows\SysWOW64\Kbqecg32.exeC:\Windows\system32\Kbqecg32.exe227⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Keoapb32.exeC:\Windows\system32\Keoapb32.exe228⤵
-
C:\Windows\SysWOW64\Kcbakpdo.exeC:\Windows\system32\Kcbakpdo.exe229⤵
-
C:\Windows\SysWOW64\Kkijmm32.exeC:\Windows\system32\Kkijmm32.exe230⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kjljhjkl.exeC:\Windows\system32\Kjljhjkl.exe231⤵
-
C:\Windows\SysWOW64\Kmjfdejp.exeC:\Windows\system32\Kmjfdejp.exe232⤵
-
C:\Windows\SysWOW64\Kafbec32.exeC:\Windows\system32\Kafbec32.exe233⤵
-
C:\Windows\SysWOW64\Kcdnao32.exeC:\Windows\system32\Kcdnao32.exe234⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kgpjanje.exeC:\Windows\system32\Kgpjanje.exe235⤵
-
C:\Windows\SysWOW64\Kjnfniii.exeC:\Windows\system32\Kjnfniii.exe236⤵
-
C:\Windows\SysWOW64\Knjbnh32.exeC:\Windows\system32\Knjbnh32.exe237⤵
-
C:\Windows\SysWOW64\Kmmcjehm.exeC:\Windows\system32\Kmmcjehm.exe238⤵
-
C:\Windows\SysWOW64\Kpkofpgq.exeC:\Windows\system32\Kpkofpgq.exe239⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kpkofpgq.exeC:\Windows\system32\Kpkofpgq.exe240⤵
-
C:\Windows\SysWOW64\Kgbggnhc.exeC:\Windows\system32\Kgbggnhc.exe241⤵