Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 15:50
Static task
static1
Behavioral task
behavioral1
Sample
dee9d4ccceb51b090da0a48609be47a0N.exe
Resource
win7-20240704-en
General
-
Target
dee9d4ccceb51b090da0a48609be47a0N.exe
-
Size
163KB
-
MD5
dee9d4ccceb51b090da0a48609be47a0
-
SHA1
8526f7dff79fe6b27aa3e7861548dcc113a1f8a7
-
SHA256
a9ed6c707a0e74c2cc0558b0569454b5abb88174be351c891dd0cfdac788c790
-
SHA512
b375aa63aa4a3cedfaa6f88845494dfecb84a1d66bf53ca0cb45d2a9218507fb85358494b3acca505d00d8470ff8628f60a9f06846bd5605edfe237e2583d5f9
-
SSDEEP
1536:Pdr9Z0HUjpatZJBA1U+je7LGjzlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:V9OUMLkDjzltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ianambhc.exeMdigakic.exeOnkjocjd.exeNkmdmm32.exePbfehn32.exeFomndhng.exeKbikokin.exeHdgkkppm.exePinqoh32.exeGfkagc32.exeDpicceon.exeFpfkhbon.exeGhihfl32.exeJennjblp.exeEkcdegqe.exeLjhppo32.exeOenmkngi.exePanpgn32.exeMlhbgc32.exeMajdkifd.exeGgqamh32.exeKmeknakn.exeFjmdgmnl.exePedokpcm.exeOiahpkdj.exePejnpe32.exeGhagjj32.exeFnkchahn.exeJgiffg32.exeFpjlpclc.exeIebmaoed.exeOicbma32.exeBjdqfajl.exeHgjdcghp.exeDnbdbomn.exeApgcbmha.exeGiikkehc.exeJkgfgl32.exeMchmblji.exeEclejclg.exePbienj32.exeBkgchckl.exeDcppmg32.exeGlgqlkdl.exeJchhhjjg.exeCnpknl32.exePgnmjokn.exeMhobldaf.exeKlgbfo32.exeQcigjolm.exeCjqglf32.exeDbneekan.exeEfbbba32.exeQedjib32.exeAknnil32.exeFdpjcaij.exeNqbdllld.exeAdenqd32.exeElkbipdi.exeMlkegimk.exeDhmchljg.exeAndlmnki.exeJookedhp.exeOggkklnk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ianambhc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdigakic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onkjocjd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkmdmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbfehn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fomndhng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbikokin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdgkkppm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pinqoh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfkagc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpicceon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpfkhbon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghihfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jennjblp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekcdegqe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljhppo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oenmkngi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Panpgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlhbgc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Majdkifd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggqamh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmeknakn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjmdgmnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pedokpcm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oiahpkdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pejnpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghagjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnkchahn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgiffg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpjlpclc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iebmaoed.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oicbma32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjdqfajl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgjdcghp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnbdbomn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apgcbmha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Giikkehc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkgfgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mchmblji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eclejclg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbienj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkgchckl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcppmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glgqlkdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jchhhjjg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnpknl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgnmjokn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhobldaf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klgbfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcigjolm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjqglf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbneekan.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efbbba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qedjib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aknnil32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdpjcaij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqbdllld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adenqd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elkbipdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlkegimk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmchljg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Andlmnki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jookedhp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oggkklnk.exe -
Executes dropped EXE 64 IoCs
Processes:
Olobcm32.exeOicbma32.exePlfhdlfb.exePbppqf32.exePahjgb32.exeQkpnph32.exeAodqok32.exeAogmdk32.exeAknnil32.exeBoncej32.exeBjgdfg32.exeBkgqpjch.exeBmmgbbeq.exeCjqglf32.exeCopljmpo.exeCeoagcld.exeCeanmc32.exeDcihdo32.exeDbneekan.exeDmcibdad.exeElkbipdi.exeEefdgeig.exeEonhpk32.exeEmfbgg32.exeFdpjcaij.exeFpfkhbon.exeFlphccbp.exeFehmlh32.exeIiodliep.exeJjlqpp32.exeKdeehe32.exeKbjbibli.exeKghkppbp.exeKihcakpa.exeLddagi32.exeLahaqm32.exeLpnobi32.exeLppkgi32.exeLjhppo32.exeMfoqephq.exeMpeebhhf.exeMlkegimk.exeMbhnpplb.exeMdigakic.exeMookod32.exeMkelcenm.exeNqbdllld.exeNjjieace.exeNqdaal32.exeNjmejaqb.exeNcejcg32.exeNnknqpgi.exeNcggifep.exeNmpkal32.exeNbmcjc32.exeOclpdf32.exeOenmkngi.exeOnfadc32.exeOepianef.exeOljanhmc.exeOafjfokk.exeOhqbbi32.exeOnkjocjd.exeOaiglnih.exepid process 2320 Olobcm32.exe 2708 Oicbma32.exe 2744 Plfhdlfb.exe 2740 Pbppqf32.exe 2648 Pahjgb32.exe 2656 Qkpnph32.exe 2688 Aodqok32.exe 2592 Aogmdk32.exe 2952 Aknnil32.exe 2868 Boncej32.exe 1868 Bjgdfg32.exe 1632 Bkgqpjch.exe 2140 Bmmgbbeq.exe 2144 Cjqglf32.exe 2264 Copljmpo.exe 2388 Ceoagcld.exe 1988 Ceanmc32.exe 1296 Dcihdo32.exe 1544 Dbneekan.exe 1572 Dmcibdad.exe 636 Elkbipdi.exe 2552 Eefdgeig.exe 2232 Eonhpk32.exe 2548 Emfbgg32.exe 2588 Fdpjcaij.exe 1032 Fpfkhbon.exe 1044 Flphccbp.exe 2836 Fehmlh32.exe 2156 Iiodliep.exe 2296 Jjlqpp32.exe 2640 Kdeehe32.exe 2692 Kbjbibli.exe 2060 Kghkppbp.exe 2716 Kihcakpa.exe 2876 Lddagi32.exe 108 Lahaqm32.exe 396 Lpnobi32.exe 1480 Lppkgi32.exe 1892 Ljhppo32.exe 2244 Mfoqephq.exe 2800 Mpeebhhf.exe 564 Mlkegimk.exe 112 Mbhnpplb.exe 2212 Mdigakic.exe 1688 Mookod32.exe 2040 Mkelcenm.exe 936 Nqbdllld.exe 2568 Njjieace.exe 1792 Nqdaal32.exe 892 Njmejaqb.exe 2804 Ncejcg32.exe 556 Nnknqpgi.exe 2756 Ncggifep.exe 2812 Nmpkal32.exe 2904 Nbmcjc32.exe 3028 Oclpdf32.exe 2728 Oenmkngi.exe 2300 Onfadc32.exe 568 Oepianef.exe 992 Oljanhmc.exe 2496 Oafjfokk.exe 860 Ohqbbi32.exe 2380 Onkjocjd.exe 2252 Oaiglnih.exe -
Loads dropped DLL 64 IoCs
Processes:
dee9d4ccceb51b090da0a48609be47a0N.exeOlobcm32.exeOicbma32.exePlfhdlfb.exePbppqf32.exePahjgb32.exeQkpnph32.exeAodqok32.exeAogmdk32.exeAknnil32.exeBoncej32.exeBjgdfg32.exeBkgqpjch.exeBmmgbbeq.exeCjqglf32.exeCopljmpo.exeCeoagcld.exeCeanmc32.exeDcihdo32.exeDbneekan.exeDmcibdad.exeElkbipdi.exeEefdgeig.exeEonhpk32.exeEmfbgg32.exeFdpjcaij.exeFpfkhbon.exeFlphccbp.exeFehmlh32.exeIiodliep.exeJjlqpp32.exeKdeehe32.exepid process 2064 dee9d4ccceb51b090da0a48609be47a0N.exe 2064 dee9d4ccceb51b090da0a48609be47a0N.exe 2320 Olobcm32.exe 2320 Olobcm32.exe 2708 Oicbma32.exe 2708 Oicbma32.exe 2744 Plfhdlfb.exe 2744 Plfhdlfb.exe 2740 Pbppqf32.exe 2740 Pbppqf32.exe 2648 Pahjgb32.exe 2648 Pahjgb32.exe 2656 Qkpnph32.exe 2656 Qkpnph32.exe 2688 Aodqok32.exe 2688 Aodqok32.exe 2592 Aogmdk32.exe 2592 Aogmdk32.exe 2952 Aknnil32.exe 2952 Aknnil32.exe 2868 Boncej32.exe 2868 Boncej32.exe 1868 Bjgdfg32.exe 1868 Bjgdfg32.exe 1632 Bkgqpjch.exe 1632 Bkgqpjch.exe 2140 Bmmgbbeq.exe 2140 Bmmgbbeq.exe 2144 Cjqglf32.exe 2144 Cjqglf32.exe 2264 Copljmpo.exe 2264 Copljmpo.exe 2388 Ceoagcld.exe 2388 Ceoagcld.exe 1988 Ceanmc32.exe 1988 Ceanmc32.exe 1296 Dcihdo32.exe 1296 Dcihdo32.exe 1544 Dbneekan.exe 1544 Dbneekan.exe 1572 Dmcibdad.exe 1572 Dmcibdad.exe 636 Elkbipdi.exe 636 Elkbipdi.exe 2552 Eefdgeig.exe 2552 Eefdgeig.exe 2232 Eonhpk32.exe 2232 Eonhpk32.exe 2548 Emfbgg32.exe 2548 Emfbgg32.exe 2588 Fdpjcaij.exe 2588 Fdpjcaij.exe 1032 Fpfkhbon.exe 1032 Fpfkhbon.exe 1044 Flphccbp.exe 1044 Flphccbp.exe 2836 Fehmlh32.exe 2836 Fehmlh32.exe 2156 Iiodliep.exe 2156 Iiodliep.exe 2296 Jjlqpp32.exe 2296 Jjlqpp32.exe 2640 Kdeehe32.exe 2640 Kdeehe32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fpjlpclc.exeJookedhp.exeLahaqm32.exeGlgqlkdl.exePpelfbol.exeBpokkdim.exeCdlppf32.exeMhkkjnmo.exeDmcibdad.exeFjjeid32.exePnbcij32.exeAbmkhmfe.exeEjkampao.exeQjacai32.exeMlhbgc32.exeBkjpncii.exeDjiegp32.exeFfokan32.exeLdgikklb.exeGaiehjfb.exeIiodliep.exeMkelcenm.exeKfmfchfo.exeMamjchoa.exeNgolgn32.exeNkmdmm32.exeEnmplm32.exeKbjbibli.exeOepianef.exePedokpcm.exeDgbiggof.exeKlgbfo32.exeLmondpbc.exeLddagi32.exeOakcan32.exeGgmldj32.exeIgjckcbo.exeMhobldaf.exeHpnpam32.exeKnnagehi.exeEkjjebed.exePahjgb32.exeIkqcgj32.exeFeqbilcq.exePcikllja.exeQedjib32.exeCnpknl32.exeLcbppk32.exeBoncej32.exeAgonig32.exeGbglgcbc.exeCadfbi32.exeJalolemm.exeClheeh32.exeIbehna32.exeOfaaghom.exePmbpda32.exeKdeehe32.exeMookod32.exeDcffmb32.exedescription ioc process File created C:\Windows\SysWOW64\Ficcefan.dll Fpjlpclc.exe File opened for modification C:\Windows\SysWOW64\Jbmgapgc.exe Jookedhp.exe File created C:\Windows\SysWOW64\Lpnobi32.exe Lahaqm32.exe File created C:\Windows\SysWOW64\Gepeep32.exe Glgqlkdl.exe File created C:\Windows\SysWOW64\Kehcdieo.dll Ppelfbol.exe File created C:\Windows\SysWOW64\Belcck32.exe Bpokkdim.exe File opened for modification C:\Windows\SysWOW64\Clheeh32.exe Cdlppf32.exe File opened for modification C:\Windows\SysWOW64\Mbqpgf32.exe Mhkkjnmo.exe File opened for modification C:\Windows\SysWOW64\Elkbipdi.exe Dmcibdad.exe File created C:\Windows\SysWOW64\Ppmlkl32.dll Fjjeid32.exe File opened for modification C:\Windows\SysWOW64\Pgjgapaa.exe Pnbcij32.exe File created C:\Windows\SysWOW64\Libmghda.dll Abmkhmfe.exe File created C:\Windows\SysWOW64\Ehmbdbbl.dll Ejkampao.exe File created C:\Windows\SysWOW64\Ifbalb32.dll Qjacai32.exe File created C:\Windows\SysWOW64\Mhobldaf.exe Mlhbgc32.exe File opened for modification C:\Windows\SysWOW64\Bpfhfjgq.exe Bkjpncii.exe File created C:\Windows\SysWOW64\Dqcmdjjo.exe Djiegp32.exe File opened for modification C:\Windows\SysWOW64\Fcckjb32.exe Ffokan32.exe File opened for modification C:\Windows\SysWOW64\Lmondpbc.exe Ldgikklb.exe File created C:\Windows\SysWOW64\Hmpemkkf.exe Gaiehjfb.exe File created C:\Windows\SysWOW64\Jjlqpp32.exe Iiodliep.exe File created C:\Windows\SysWOW64\Nqbdllld.exe Mkelcenm.exe File opened for modification C:\Windows\SysWOW64\Lpekln32.exe Kfmfchfo.exe File created C:\Windows\SysWOW64\Odcqbapk.dll Mamjchoa.exe File opened for modification C:\Windows\SysWOW64\Nkmdmm32.exe Ngolgn32.exe File created C:\Windows\SysWOW64\Oaeken32.dll Nkmdmm32.exe File created C:\Windows\SysWOW64\Ehbdif32.exe Enmplm32.exe File created C:\Windows\SysWOW64\Kghkppbp.exe Kbjbibli.exe File opened for modification C:\Windows\SysWOW64\Oljanhmc.exe Oepianef.exe File opened for modification C:\Windows\SysWOW64\Qomcdf32.exe Pedokpcm.exe File created C:\Windows\SysWOW64\Cnifhcei.dll Dgbiggof.exe File created C:\Windows\SysWOW64\Nbnhppoa.dll Klgbfo32.exe File created C:\Windows\SysWOW64\Hjbpgn32.dll Lmondpbc.exe File opened for modification C:\Windows\SysWOW64\Lahaqm32.exe Lddagi32.exe File opened for modification C:\Windows\SysWOW64\Pfhlie32.exe Oakcan32.exe File opened for modification C:\Windows\SysWOW64\Gljdlq32.exe Ggmldj32.exe File created C:\Windows\SysWOW64\Ijklmn32.exe Igjckcbo.exe File created C:\Windows\SysWOW64\Hcmmoflm.dll Mhobldaf.exe File opened for modification C:\Windows\SysWOW64\Hifdjcif.exe Hpnpam32.exe File created C:\Windows\SysWOW64\Fihmiqhb.dll Knnagehi.exe File opened for modification C:\Windows\SysWOW64\Efoobkej.exe Ekjjebed.exe File created C:\Windows\SysWOW64\Keemfmgm.dll Igjckcbo.exe File created C:\Windows\SysWOW64\Qkpnph32.exe Pahjgb32.exe File created C:\Windows\SysWOW64\Iqnlpq32.exe Ikqcgj32.exe File created C:\Windows\SysWOW64\Ijmqbl32.dll Feqbilcq.exe File created C:\Windows\SysWOW64\Pmbpda32.exe Pcikllja.exe File opened for modification C:\Windows\SysWOW64\Qjacai32.exe Qedjib32.exe File opened for modification C:\Windows\SysWOW64\Cjglcmbi.exe Cnpknl32.exe File created C:\Windows\SysWOW64\Lafpipoa.exe Lcbppk32.exe File created C:\Windows\SysWOW64\Nafmhl32.dll Boncej32.exe File opened for modification C:\Windows\SysWOW64\Apgcbmha.exe Agonig32.exe File opened for modification C:\Windows\SysWOW64\Fnifbaja.exe Feqbilcq.exe File created C:\Windows\SysWOW64\Goompeid.dll Gbglgcbc.exe File created C:\Windows\SysWOW64\Paejod32.dll Cadfbi32.exe File opened for modification C:\Windows\SysWOW64\Jjdcdjcm.exe Jalolemm.exe File created C:\Windows\SysWOW64\Njqlopmg.dll Clheeh32.exe File created C:\Windows\SysWOW64\Hkkcbdhc.exe Gbglgcbc.exe File created C:\Windows\SysWOW64\Ihopjl32.exe Ibehna32.exe File created C:\Windows\SysWOW64\Lhiqhdca.dll Ofaaghom.exe File opened for modification C:\Windows\SysWOW64\Piipibff.exe Pmbpda32.exe File created C:\Windows\SysWOW64\Bjgdfg32.exe Boncej32.exe File created C:\Windows\SysWOW64\Kbjbibli.exe Kdeehe32.exe File created C:\Windows\SysWOW64\Nlgeqb32.dll Mookod32.exe File created C:\Windows\SysWOW64\Bnejjf32.dll Dcffmb32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4908 1724 WerFault.exe Joagkd32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Bkjpncii.exeFcckjb32.exeChkpakla.exeEmfbgg32.exeKopldl32.exeFpdqlkhe.exeBebjdjal.exePjafbfca.exeAoilcc32.exeEfllcf32.exeLhclfphg.exeAhhgkdfo.exeFfokan32.exeNcejcg32.exeOhqbbi32.exeEclejclg.exeGnfoao32.exeHpnpam32.exeNijdcdgn.exeMdfejn32.exeHmojfcdk.exeBlmikkle.exeHkkcbdhc.exeMmaghc32.exeDbadcdgp.exeGbdobc32.exeOafjfokk.exeFlpkll32.exeLmmaoq32.exeLmondpbc.exeMhbhecjc.exeIlfbpk32.exeAhomlb32.exeBpokkdim.exePmbpda32.exeBkhjcing.exeMpgdaqmh.exeLhmjha32.exeAajedn32.exeFallil32.exePiipibff.exeDcofqphi.exeAodqok32.exeLpnobi32.exeDmcibdad.exeMcpmonea.exeAijgemok.exeJbgdcapi.exeMkelcenm.exeHcdihn32.exeIhhjjm32.exePeandcih.exeCadfbi32.exeGapbbk32.exeOcglmcdp.exeLpekln32.exeGjpakdbl.exeAlmmlg32.exeQedjib32.exeFmffhi32.exeAknnil32.exeOenmkngi.exeAdkbgf32.exePgfnfq32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkjpncii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcckjb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chkpakla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emfbgg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kopldl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fpdqlkhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bebjdjal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjafbfca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aoilcc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efllcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhclfphg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahhgkdfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffokan32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncejcg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohqbbi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eclejclg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnfoao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpnpam32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nijdcdgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdfejn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmojfcdk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blmikkle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkkcbdhc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmaghc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbadcdgp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbdobc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oafjfokk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flpkll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmmaoq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmondpbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhbhecjc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilfbpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahomlb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpokkdim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmbpda32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkhjcing.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpgdaqmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhmjha32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aajedn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fallil32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Piipibff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcofqphi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aodqok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpnobi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmcibdad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mcpmonea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aijgemok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbgdcapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkelcenm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hcdihn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihhjjm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Peandcih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cadfbi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gapbbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocglmcdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpekln32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjpakdbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Almmlg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qedjib32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmffhi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aknnil32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oenmkngi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adkbgf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgfnfq32.exe -
Modifies registry class 64 IoCs
Processes:
Oepianef.exeLphnlcnh.exeMcpmonea.exeIackhb32.exeIebmaoed.exeDcihdo32.exeElkbipdi.exeFkpeojha.exeCgcmiclk.exeQegnii32.exeMogqlgbi.exeAogmdk32.exeMdigakic.exeIgdndl32.exeKejdqffo.exeBkgchckl.exeGkojcgga.exeIkqcgj32.exeHafdbmjp.exeQedjib32.exeGiikkehc.exeHobcok32.exeOqajqi32.exePafpjljk.exeJoohmk32.exeNkmdmm32.exePnbcij32.exeBoncej32.exeBpdkajic.exeGepeep32.exeLllkaobc.exeIkcbfb32.exeKdeehe32.exeIqdbqp32.exeDjiegp32.exeKgdijk32.exeKmeknakn.exeNpbpjn32.exeMhobldaf.exeAlfflhpa.exeFooghg32.exeIanambhc.exeDjfagjai.exeEbpgoh32.exeCdlppf32.exeMbqpgf32.exeAabfqp32.exeLejppj32.exeMajdkifd.exeQoopie32.exeConbmfif.exeDcppmg32.exeIgjabj32.exeEjpkho32.exeIhhjjm32.exeHoflpbmo.exeKihcakpa.exeMookod32.exeFallil32.exeFnoiqpqk.exeOakcan32.exeFdemap32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oepianef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lphnlcnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcpmonea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iackhb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iebmaoed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdpinonc.dll" Dcihdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eebendko.dll" Elkbipdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkpeojha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjkjek32.dll" Cgcmiclk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qegnii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mogqlgbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aogmdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdigakic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igdndl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eepjmp32.dll" Kejdqffo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkgchckl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkojcgga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcabebjh.dll" Ikqcgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmpepjid.dll" Hafdbmjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qedjib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Giikkehc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hobcok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfbgmg32.dll" Oqajqi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pafpjljk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Joohmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkmdmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnbcij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Boncej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bpdkajic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjnbiqik.dll" Gepeep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lllkaobc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ikcbfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdeehe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kejdqffo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifddhm32.dll" Iqdbqp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djiegp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgdijk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlmkdf32.dll" Kmeknakn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npbpjn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhobldaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnmbollk.dll" Alfflhpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjhecdda.dll" Fooghg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ianambhc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djfagjai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebpgoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gepeep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdlppf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcqqajef.dll" Mbqpgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eapgpd32.dll" Aabfqp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lejppj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnpdkcam.dll" Majdkifd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gaeonhdm.dll" Qoopie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Conbmfif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcppmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igjabj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjpljb32.dll" Ejpkho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihhjjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkmnmd32.dll" Hoflpbmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kihcakpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mookod32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fallil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iceohloo.dll" Fnoiqpqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oakcan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdemap32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dee9d4ccceb51b090da0a48609be47a0N.exeOlobcm32.exeOicbma32.exePlfhdlfb.exePbppqf32.exePahjgb32.exeQkpnph32.exeAodqok32.exeAogmdk32.exeAknnil32.exeBoncej32.exeBjgdfg32.exeBkgqpjch.exeBmmgbbeq.exeCjqglf32.exeCopljmpo.exedescription pid process target process PID 2064 wrote to memory of 2320 2064 dee9d4ccceb51b090da0a48609be47a0N.exe Olobcm32.exe PID 2064 wrote to memory of 2320 2064 dee9d4ccceb51b090da0a48609be47a0N.exe Olobcm32.exe PID 2064 wrote to memory of 2320 2064 dee9d4ccceb51b090da0a48609be47a0N.exe Olobcm32.exe PID 2064 wrote to memory of 2320 2064 dee9d4ccceb51b090da0a48609be47a0N.exe Olobcm32.exe PID 2320 wrote to memory of 2708 2320 Olobcm32.exe Oicbma32.exe PID 2320 wrote to memory of 2708 2320 Olobcm32.exe Oicbma32.exe PID 2320 wrote to memory of 2708 2320 Olobcm32.exe Oicbma32.exe PID 2320 wrote to memory of 2708 2320 Olobcm32.exe Oicbma32.exe PID 2708 wrote to memory of 2744 2708 Oicbma32.exe Plfhdlfb.exe PID 2708 wrote to memory of 2744 2708 Oicbma32.exe Plfhdlfb.exe PID 2708 wrote to memory of 2744 2708 Oicbma32.exe Plfhdlfb.exe PID 2708 wrote to memory of 2744 2708 Oicbma32.exe Plfhdlfb.exe PID 2744 wrote to memory of 2740 2744 Plfhdlfb.exe Pbppqf32.exe PID 2744 wrote to memory of 2740 2744 Plfhdlfb.exe Pbppqf32.exe PID 2744 wrote to memory of 2740 2744 Plfhdlfb.exe Pbppqf32.exe PID 2744 wrote to memory of 2740 2744 Plfhdlfb.exe Pbppqf32.exe PID 2740 wrote to memory of 2648 2740 Pbppqf32.exe Pahjgb32.exe PID 2740 wrote to memory of 2648 2740 Pbppqf32.exe Pahjgb32.exe PID 2740 wrote to memory of 2648 2740 Pbppqf32.exe Pahjgb32.exe PID 2740 wrote to memory of 2648 2740 Pbppqf32.exe Pahjgb32.exe PID 2648 wrote to memory of 2656 2648 Pahjgb32.exe Qkpnph32.exe PID 2648 wrote to memory of 2656 2648 Pahjgb32.exe Qkpnph32.exe PID 2648 wrote to memory of 2656 2648 Pahjgb32.exe Qkpnph32.exe PID 2648 wrote to memory of 2656 2648 Pahjgb32.exe Qkpnph32.exe PID 2656 wrote to memory of 2688 2656 Qkpnph32.exe Aodqok32.exe PID 2656 wrote to memory of 2688 2656 Qkpnph32.exe Aodqok32.exe PID 2656 wrote to memory of 2688 2656 Qkpnph32.exe Aodqok32.exe PID 2656 wrote to memory of 2688 2656 Qkpnph32.exe Aodqok32.exe PID 2688 wrote to memory of 2592 2688 Aodqok32.exe Aogmdk32.exe PID 2688 wrote to memory of 2592 2688 Aodqok32.exe Aogmdk32.exe PID 2688 wrote to memory of 2592 2688 Aodqok32.exe Aogmdk32.exe PID 2688 wrote to memory of 2592 2688 Aodqok32.exe Aogmdk32.exe PID 2592 wrote to memory of 2952 2592 Aogmdk32.exe Aknnil32.exe PID 2592 wrote to memory of 2952 2592 Aogmdk32.exe Aknnil32.exe PID 2592 wrote to memory of 2952 2592 Aogmdk32.exe Aknnil32.exe PID 2592 wrote to memory of 2952 2592 Aogmdk32.exe Aknnil32.exe PID 2952 wrote to memory of 2868 2952 Aknnil32.exe Boncej32.exe PID 2952 wrote to memory of 2868 2952 Aknnil32.exe Boncej32.exe PID 2952 wrote to memory of 2868 2952 Aknnil32.exe Boncej32.exe PID 2952 wrote to memory of 2868 2952 Aknnil32.exe Boncej32.exe PID 2868 wrote to memory of 1868 2868 Boncej32.exe Bjgdfg32.exe PID 2868 wrote to memory of 1868 2868 Boncej32.exe Bjgdfg32.exe PID 2868 wrote to memory of 1868 2868 Boncej32.exe Bjgdfg32.exe PID 2868 wrote to memory of 1868 2868 Boncej32.exe Bjgdfg32.exe PID 1868 wrote to memory of 1632 1868 Bjgdfg32.exe Bkgqpjch.exe PID 1868 wrote to memory of 1632 1868 Bjgdfg32.exe Bkgqpjch.exe PID 1868 wrote to memory of 1632 1868 Bjgdfg32.exe Bkgqpjch.exe PID 1868 wrote to memory of 1632 1868 Bjgdfg32.exe Bkgqpjch.exe PID 1632 wrote to memory of 2140 1632 Bkgqpjch.exe Bmmgbbeq.exe PID 1632 wrote to memory of 2140 1632 Bkgqpjch.exe Bmmgbbeq.exe PID 1632 wrote to memory of 2140 1632 Bkgqpjch.exe Bmmgbbeq.exe PID 1632 wrote to memory of 2140 1632 Bkgqpjch.exe Bmmgbbeq.exe PID 2140 wrote to memory of 2144 2140 Bmmgbbeq.exe Cjqglf32.exe PID 2140 wrote to memory of 2144 2140 Bmmgbbeq.exe Cjqglf32.exe PID 2140 wrote to memory of 2144 2140 Bmmgbbeq.exe Cjqglf32.exe PID 2140 wrote to memory of 2144 2140 Bmmgbbeq.exe Cjqglf32.exe PID 2144 wrote to memory of 2264 2144 Cjqglf32.exe Copljmpo.exe PID 2144 wrote to memory of 2264 2144 Cjqglf32.exe Copljmpo.exe PID 2144 wrote to memory of 2264 2144 Cjqglf32.exe Copljmpo.exe PID 2144 wrote to memory of 2264 2144 Cjqglf32.exe Copljmpo.exe PID 2264 wrote to memory of 2388 2264 Copljmpo.exe Ceoagcld.exe PID 2264 wrote to memory of 2388 2264 Copljmpo.exe Ceoagcld.exe PID 2264 wrote to memory of 2388 2264 Copljmpo.exe Ceoagcld.exe PID 2264 wrote to memory of 2388 2264 Copljmpo.exe Ceoagcld.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dee9d4ccceb51b090da0a48609be47a0N.exe"C:\Users\Admin\AppData\Local\Temp\dee9d4ccceb51b090da0a48609be47a0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\Olobcm32.exeC:\Windows\system32\Olobcm32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Oicbma32.exeC:\Windows\system32\Oicbma32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Plfhdlfb.exeC:\Windows\system32\Plfhdlfb.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Pbppqf32.exeC:\Windows\system32\Pbppqf32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Pahjgb32.exeC:\Windows\system32\Pahjgb32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\Qkpnph32.exeC:\Windows\system32\Qkpnph32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Aodqok32.exeC:\Windows\system32\Aodqok32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Aogmdk32.exeC:\Windows\system32\Aogmdk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Aknnil32.exeC:\Windows\system32\Aknnil32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Boncej32.exeC:\Windows\system32\Boncej32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Bjgdfg32.exeC:\Windows\system32\Bjgdfg32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\Bkgqpjch.exeC:\Windows\system32\Bkgqpjch.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\Bmmgbbeq.exeC:\Windows\system32\Bmmgbbeq.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\Cjqglf32.exeC:\Windows\system32\Cjqglf32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\Copljmpo.exeC:\Windows\system32\Copljmpo.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Ceoagcld.exeC:\Windows\system32\Ceoagcld.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388 -
C:\Windows\SysWOW64\Ceanmc32.exeC:\Windows\system32\Ceanmc32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Windows\SysWOW64\Dcihdo32.exeC:\Windows\system32\Dcihdo32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1296 -
C:\Windows\SysWOW64\Dbneekan.exeC:\Windows\system32\Dbneekan.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Windows\SysWOW64\Dmcibdad.exeC:\Windows\system32\Dmcibdad.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\Elkbipdi.exeC:\Windows\system32\Elkbipdi.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:636 -
C:\Windows\SysWOW64\Eefdgeig.exeC:\Windows\system32\Eefdgeig.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Windows\SysWOW64\Eonhpk32.exeC:\Windows\system32\Eonhpk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2232 -
C:\Windows\SysWOW64\Emfbgg32.exeC:\Windows\system32\Emfbgg32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\Fdpjcaij.exeC:\Windows\system32\Fdpjcaij.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2588 -
C:\Windows\SysWOW64\Fpfkhbon.exeC:\Windows\system32\Fpfkhbon.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1032 -
C:\Windows\SysWOW64\Flphccbp.exeC:\Windows\system32\Flphccbp.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Windows\SysWOW64\Fehmlh32.exeC:\Windows\system32\Fehmlh32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2836 -
C:\Windows\SysWOW64\Iiodliep.exeC:\Windows\system32\Iiodliep.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2156 -
C:\Windows\SysWOW64\Jjlqpp32.exeC:\Windows\system32\Jjlqpp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296 -
C:\Windows\SysWOW64\Kdeehe32.exeC:\Windows\system32\Kdeehe32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2640 -
C:\Windows\SysWOW64\Kbjbibli.exeC:\Windows\system32\Kbjbibli.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\Kghkppbp.exeC:\Windows\system32\Kghkppbp.exe34⤵
- Executes dropped EXE
PID:2060 -
C:\Windows\SysWOW64\Kihcakpa.exeC:\Windows\system32\Kihcakpa.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:2716 -
C:\Windows\SysWOW64\Lddagi32.exeC:\Windows\system32\Lddagi32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2876 -
C:\Windows\SysWOW64\Lahaqm32.exeC:\Windows\system32\Lahaqm32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:108 -
C:\Windows\SysWOW64\Lpnobi32.exeC:\Windows\system32\Lpnobi32.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:396 -
C:\Windows\SysWOW64\Lppkgi32.exeC:\Windows\system32\Lppkgi32.exe39⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\Ljhppo32.exeC:\Windows\system32\Ljhppo32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\Mfoqephq.exeC:\Windows\system32\Mfoqephq.exe41⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Mpeebhhf.exeC:\Windows\system32\Mpeebhhf.exe42⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Mlkegimk.exeC:\Windows\system32\Mlkegimk.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\Mbhnpplb.exeC:\Windows\system32\Mbhnpplb.exe44⤵
- Executes dropped EXE
PID:112 -
C:\Windows\SysWOW64\Mdigakic.exeC:\Windows\system32\Mdigakic.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2212 -
C:\Windows\SysWOW64\Mookod32.exeC:\Windows\system32\Mookod32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Mkelcenm.exeC:\Windows\system32\Mkelcenm.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\Nqbdllld.exeC:\Windows\system32\Nqbdllld.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:936 -
C:\Windows\SysWOW64\Njjieace.exeC:\Windows\system32\Njjieace.exe49⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Nqdaal32.exeC:\Windows\system32\Nqdaal32.exe50⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\Njmejaqb.exeC:\Windows\system32\Njmejaqb.exe51⤵
- Executes dropped EXE
PID:892 -
C:\Windows\SysWOW64\Ncejcg32.exeC:\Windows\system32\Ncejcg32.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\Nnknqpgi.exeC:\Windows\system32\Nnknqpgi.exe53⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\Ncggifep.exeC:\Windows\system32\Ncggifep.exe54⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\Nmpkal32.exeC:\Windows\system32\Nmpkal32.exe55⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\Nbmcjc32.exeC:\Windows\system32\Nbmcjc32.exe56⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\Oclpdf32.exeC:\Windows\system32\Oclpdf32.exe57⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\Oenmkngi.exeC:\Windows\system32\Oenmkngi.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\Onfadc32.exeC:\Windows\system32\Onfadc32.exe59⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\Oepianef.exeC:\Windows\system32\Oepianef.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:568 -
C:\Windows\SysWOW64\Oljanhmc.exeC:\Windows\system32\Oljanhmc.exe61⤵
- Executes dropped EXE
PID:992 -
C:\Windows\SysWOW64\Oafjfokk.exeC:\Windows\system32\Oafjfokk.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\Ohqbbi32.exeC:\Windows\system32\Ohqbbi32.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\Onkjocjd.exeC:\Windows\system32\Onkjocjd.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Oaiglnih.exeC:\Windows\system32\Oaiglnih.exe65⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\Ojakdd32.exeC:\Windows\system32\Ojakdd32.exe66⤵PID:1096
-
C:\Windows\SysWOW64\Oakcan32.exeC:\Windows\system32\Oakcan32.exe67⤵
- Drops file in System32 directory
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Pfhlie32.exeC:\Windows\system32\Pfhlie32.exe68⤵PID:672
-
C:\Windows\SysWOW64\Panpgn32.exeC:\Windows\system32\Panpgn32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2028 -
C:\Windows\SysWOW64\Pfjiod32.exeC:\Windows\system32\Pfjiod32.exe70⤵PID:1264
-
C:\Windows\SysWOW64\Papmlmbp.exeC:\Windows\system32\Papmlmbp.exe71⤵PID:2004
-
C:\Windows\SysWOW64\Pdnihiad.exeC:\Windows\system32\Pdnihiad.exe72⤵PID:1232
-
C:\Windows\SysWOW64\Pmgnan32.exeC:\Windows\system32\Pmgnan32.exe73⤵PID:2176
-
C:\Windows\SysWOW64\Pfobjdoe.exeC:\Windows\system32\Pfobjdoe.exe74⤵PID:2772
-
C:\Windows\SysWOW64\Ppgfciee.exeC:\Windows\system32\Ppgfciee.exe75⤵PID:2808
-
C:\Windows\SysWOW64\Pedokpcm.exeC:\Windows\system32\Pedokpcm.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:864 -
C:\Windows\SysWOW64\Qomcdf32.exeC:\Windows\system32\Qomcdf32.exe77⤵PID:2608
-
C:\Windows\SysWOW64\Qoopie32.exeC:\Windows\system32\Qoopie32.exe78⤵
- Modifies registry class
PID:3016 -
C:\Windows\SysWOW64\Qeihfp32.exeC:\Windows\system32\Qeihfp32.exe79⤵PID:2996
-
C:\Windows\SysWOW64\Aoamoefh.exeC:\Windows\system32\Aoamoefh.exe80⤵PID:1452
-
C:\Windows\SysWOW64\Agmacgcc.exeC:\Windows\system32\Agmacgcc.exe81⤵PID:2148
-
C:\Windows\SysWOW64\Aabfqp32.exeC:\Windows\system32\Aabfqp32.exe82⤵
- Modifies registry class
PID:1884 -
C:\Windows\SysWOW64\Agonig32.exeC:\Windows\system32\Agonig32.exe83⤵
- Drops file in System32 directory
PID:608 -
C:\Windows\SysWOW64\Apgcbmha.exeC:\Windows\system32\Apgcbmha.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1604 -
C:\Windows\SysWOW64\Adekhkng.exeC:\Windows\system32\Adekhkng.exe85⤵PID:1028
-
C:\Windows\SysWOW64\Ajbdpblo.exeC:\Windows\system32\Ajbdpblo.exe86⤵PID:1496
-
C:\Windows\SysWOW64\Boolhikf.exeC:\Windows\system32\Boolhikf.exe87⤵PID:2180
-
C:\Windows\SysWOW64\Bjdqfajl.exeC:\Windows\system32\Bjdqfajl.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2276 -
C:\Windows\SysWOW64\Bapejd32.exeC:\Windows\system32\Bapejd32.exe89⤵PID:1796
-
C:\Windows\SysWOW64\Bkhjcing.exeC:\Windows\system32\Bkhjcing.exe90⤵
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\Bcobdgoj.exeC:\Windows\system32\Bcobdgoj.exe91⤵PID:2784
-
C:\Windows\SysWOW64\Bfnnpbnn.exeC:\Windows\system32\Bfnnpbnn.exe92⤵PID:964
-
C:\Windows\SysWOW64\Bnicddki.exeC:\Windows\system32\Bnicddki.exe93⤵PID:3012
-
C:\Windows\SysWOW64\Bhngbm32.exeC:\Windows\system32\Bhngbm32.exe94⤵PID:940
-
C:\Windows\SysWOW64\Dhmchljg.exeC:\Windows\system32\Dhmchljg.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2108 -
C:\Windows\SysWOW64\Eiplecnc.exeC:\Windows\system32\Eiplecnc.exe96⤵PID:1848
-
C:\Windows\SysWOW64\Edfqclni.exeC:\Windows\system32\Edfqclni.exe97⤵PID:1208
-
C:\Windows\SysWOW64\Ehjbaooe.exeC:\Windows\system32\Ehjbaooe.exe98⤵PID:1488
-
C:\Windows\SysWOW64\Ebpgoh32.exeC:\Windows\system32\Ebpgoh32.exe99⤵
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Flhkhnel.exeC:\Windows\system32\Flhkhnel.exe100⤵PID:2316
-
C:\Windows\SysWOW64\Fillabde.exeC:\Windows\system32\Fillabde.exe101⤵PID:2696
-
C:\Windows\SysWOW64\Fkmhij32.exeC:\Windows\system32\Fkmhij32.exe102⤵PID:3052
-
C:\Windows\SysWOW64\Fdemap32.exeC:\Windows\system32\Fdemap32.exe103⤵
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Fkpeojha.exeC:\Windows\system32\Fkpeojha.exe104⤵
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\Feeilbhg.exeC:\Windows\system32\Feeilbhg.exe105⤵PID:2960
-
C:\Windows\SysWOW64\Fomndhng.exeC:\Windows\system32\Fomndhng.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2944 -
C:\Windows\SysWOW64\Figoefkf.exeC:\Windows\system32\Figoefkf.exe107⤵PID:3008
-
C:\Windows\SysWOW64\Giikkehc.exeC:\Windows\system32\Giikkehc.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1372 -
C:\Windows\SysWOW64\Ggmldj32.exeC:\Windows\system32\Ggmldj32.exe109⤵
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\Gljdlq32.exeC:\Windows\system32\Gljdlq32.exe110⤵PID:2216
-
C:\Windows\SysWOW64\Gcdmikma.exeC:\Windows\system32\Gcdmikma.exe111⤵PID:2200
-
C:\Windows\SysWOW64\Gcfioj32.exeC:\Windows\system32\Gcfioj32.exe112⤵PID:1736
-
C:\Windows\SysWOW64\Gjpakdbl.exeC:\Windows\system32\Gjpakdbl.exe113⤵
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\Gomjckqc.exeC:\Windows\system32\Gomjckqc.exe114⤵PID:944
-
C:\Windows\SysWOW64\Hkdkhl32.exeC:\Windows\system32\Hkdkhl32.exe115⤵PID:584
-
C:\Windows\SysWOW64\Hobcok32.exeC:\Windows\system32\Hobcok32.exe116⤵
- Modifies registry class
PID:2260 -
C:\Windows\SysWOW64\Hdolga32.exeC:\Windows\system32\Hdolga32.exe117⤵PID:2432
-
C:\Windows\SysWOW64\Hcdihn32.exeC:\Windows\system32\Hcdihn32.exe118⤵
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\Hcfenn32.exeC:\Windows\system32\Hcfenn32.exe119⤵PID:1568
-
C:\Windows\SysWOW64\Hmojfcdk.exeC:\Windows\system32\Hmojfcdk.exe120⤵
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\Igdndl32.exeC:\Windows\system32\Igdndl32.exe121⤵
- Modifies registry class
PID:2940 -
C:\Windows\SysWOW64\Ickoimie.exeC:\Windows\system32\Ickoimie.exe122⤵PID:2980
-
C:\Windows\SysWOW64\Iihgadhl.exeC:\Windows\system32\Iihgadhl.exe123⤵PID:2184
-
C:\Windows\SysWOW64\Ikhqbo32.exeC:\Windows\system32\Ikhqbo32.exe124⤵PID:916
-
C:\Windows\SysWOW64\Iilalc32.exeC:\Windows\system32\Iilalc32.exe125⤵PID:2384
-
C:\Windows\SysWOW64\Iionacad.exeC:\Windows\system32\Iionacad.exe126⤵PID:2240
-
C:\Windows\SysWOW64\Jajbfeop.exeC:\Windows\system32\Jajbfeop.exe127⤵PID:1668
-
C:\Windows\SysWOW64\Jalolemm.exeC:\Windows\system32\Jalolemm.exe128⤵
- Drops file in System32 directory
PID:2304 -
C:\Windows\SysWOW64\Jjdcdjcm.exeC:\Windows\system32\Jjdcdjcm.exe129⤵PID:2564
-
C:\Windows\SysWOW64\Jpalmaad.exeC:\Windows\system32\Jpalmaad.exe130⤵PID:3056
-
C:\Windows\SysWOW64\Jjgpjjak.exeC:\Windows\system32\Jjgpjjak.exe131⤵PID:2556
-
C:\Windows\SysWOW64\Jbbenlof.exeC:\Windows\system32\Jbbenlof.exe132⤵PID:2732
-
C:\Windows\SysWOW64\Jmhile32.exeC:\Windows\system32\Jmhile32.exe133⤵PID:2748
-
C:\Windows\SysWOW64\Jcaahofh.exeC:\Windows\system32\Jcaahofh.exe134⤵PID:2680
-
C:\Windows\SysWOW64\Kphbmp32.exeC:\Windows\system32\Kphbmp32.exe135⤵PID:3048
-
C:\Windows\SysWOW64\Kiafff32.exeC:\Windows\system32\Kiafff32.exe136⤵PID:1784
-
C:\Windows\SysWOW64\Kbikokin.exeC:\Windows\system32\Kbikokin.exe137⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2324 -
C:\Windows\SysWOW64\Kopldl32.exeC:\Windows\system32\Kopldl32.exe138⤵
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\Kejdqffo.exeC:\Windows\system32\Kejdqffo.exe139⤵
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Kmeiei32.exeC:\Windows\system32\Kmeiei32.exe140⤵PID:1752
-
C:\Windows\SysWOW64\Kfnmnojj.exeC:\Windows\system32\Kfnmnojj.exe141⤵PID:1012
-
C:\Windows\SysWOW64\Kmgekh32.exeC:\Windows\system32\Kmgekh32.exe142⤵PID:1832
-
C:\Windows\SysWOW64\Lhmjha32.exeC:\Windows\system32\Lhmjha32.exe143⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\Lphnlcnh.exeC:\Windows\system32\Lphnlcnh.exe144⤵
- Modifies registry class
PID:2644 -
C:\Windows\SysWOW64\Llooad32.exeC:\Windows\system32\Llooad32.exe145⤵PID:2872
-
C:\Windows\SysWOW64\Lcignoki.exeC:\Windows\system32\Lcignoki.exe146⤵PID:960
-
C:\Windows\SysWOW64\Lophcpam.exeC:\Windows\system32\Lophcpam.exe147⤵PID:2512
-
C:\Windows\SysWOW64\Lejppj32.exeC:\Windows\system32\Lejppj32.exe148⤵
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\Lpodmb32.exeC:\Windows\system32\Lpodmb32.exe149⤵PID:660
-
C:\Windows\SysWOW64\Mkiemqdo.exeC:\Windows\system32\Mkiemqdo.exe150⤵PID:932
-
C:\Windows\SysWOW64\Mcpmonea.exeC:\Windows\system32\Mcpmonea.exe151⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2560 -
C:\Windows\SysWOW64\Mlhbgc32.exeC:\Windows\system32\Mlhbgc32.exe152⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1788 -
C:\Windows\SysWOW64\Mhobldaf.exeC:\Windows\system32\Mhobldaf.exe153⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Moikinib.exeC:\Windows\system32\Moikinib.exe154⤵PID:832
-
C:\Windows\SysWOW64\Mhaobd32.exeC:\Windows\system32\Mhaobd32.exe155⤵PID:2220
-
C:\Windows\SysWOW64\Majdkifd.exeC:\Windows\system32\Majdkifd.exe156⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Mckpba32.exeC:\Windows\system32\Mckpba32.exe157⤵PID:2032
-
C:\Windows\SysWOW64\Mqoqlfkl.exeC:\Windows\system32\Mqoqlfkl.exe158⤵PID:1744
-
C:\Windows\SysWOW64\Nbjpjm32.exeC:\Windows\system32\Nbjpjm32.exe159⤵PID:2612
-
C:\Windows\SysWOW64\Onqaonnc.exeC:\Windows\system32\Onqaonnc.exe160⤵PID:236
-
C:\Windows\SysWOW64\Okdahbmm.exeC:\Windows\system32\Okdahbmm.exe161⤵PID:1616
-
C:\Windows\SysWOW64\Oqajqi32.exeC:\Windows\system32\Oqajqi32.exe162⤵
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\Ojjnioae.exeC:\Windows\system32\Ojjnioae.exe163⤵PID:1564
-
C:\Windows\SysWOW64\Ocbbbd32.exeC:\Windows\system32\Ocbbbd32.exe164⤵PID:912
-
C:\Windows\SysWOW64\Omjgkjof.exeC:\Windows\system32\Omjgkjof.exe165⤵PID:1800
-
C:\Windows\SysWOW64\Ogpkhb32.exeC:\Windows\system32\Ogpkhb32.exe166⤵PID:1644
-
C:\Windows\SysWOW64\Oiahpkdj.exeC:\Windows\system32\Oiahpkdj.exe167⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1812 -
C:\Windows\SysWOW64\Ocglmcdp.exeC:\Windows\system32\Ocglmcdp.exe168⤵
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\Picdejbg.exeC:\Windows\system32\Picdejbg.exe169⤵PID:2840
-
C:\Windows\SysWOW64\Pejejkhl.exeC:\Windows\system32\Pejejkhl.exe170⤵PID:1536
-
C:\Windows\SysWOW64\Pnbjca32.exeC:\Windows\system32\Pnbjca32.exe171⤵PID:2508
-
C:\Windows\SysWOW64\Pihnqj32.exeC:\Windows\system32\Pihnqj32.exe172⤵PID:2084
-
C:\Windows\SysWOW64\Ppbfmdfo.exeC:\Windows\system32\Ppbfmdfo.exe173⤵PID:3020
-
C:\Windows\SysWOW64\Pjlgna32.exeC:\Windows\system32\Pjlgna32.exe174⤵PID:2436
-
C:\Windows\SysWOW64\Pafpjljk.exeC:\Windows\system32\Pafpjljk.exe175⤵
- Modifies registry class
PID:2780 -
C:\Windows\SysWOW64\Qahlpkhh.exeC:\Windows\system32\Qahlpkhh.exe176⤵PID:1332
-
C:\Windows\SysWOW64\Qjqqianh.exeC:\Windows\system32\Qjqqianh.exe177⤵PID:2760
-
C:\Windows\SysWOW64\Qhdabemb.exeC:\Windows\system32\Qhdabemb.exe178⤵PID:2464
-
C:\Windows\SysWOW64\Adkbgf32.exeC:\Windows\system32\Adkbgf32.exe179⤵
- System Location Discovery: System Language Discovery
PID:1072 -
C:\Windows\SysWOW64\Alfflhpa.exeC:\Windows\system32\Alfflhpa.exe180⤵
- Modifies registry class
PID:1080 -
C:\Windows\SysWOW64\Aijgemok.exeC:\Windows\system32\Aijgemok.exe181⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\Aoilcc32.exeC:\Windows\system32\Aoilcc32.exe182⤵
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\Almmlg32.exeC:\Windows\system32\Almmlg32.exe183⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\Aajedn32.exeC:\Windows\system32\Aajedn32.exe184⤵
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\Bonenbgj.exeC:\Windows\system32\Bonenbgj.exe185⤵PID:2236
-
C:\Windows\SysWOW64\Bncboo32.exeC:\Windows\system32\Bncboo32.exe186⤵PID:3128
-
C:\Windows\SysWOW64\Bdmklico.exeC:\Windows\system32\Bdmklico.exe187⤵PID:3208
-
C:\Windows\SysWOW64\Bkgchckl.exeC:\Windows\system32\Bkgchckl.exe188⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3248 -
C:\Windows\SysWOW64\Bpdkajic.exeC:\Windows\system32\Bpdkajic.exe189⤵
- Modifies registry class
PID:3288 -
C:\Windows\SysWOW64\Bkjpncii.exeC:\Windows\system32\Bkjpncii.exe190⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Windows\SysWOW64\Bpfhfjgq.exeC:\Windows\system32\Bpfhfjgq.exe191⤵PID:3368
-
C:\Windows\SysWOW64\Blmikkle.exeC:\Windows\system32\Blmikkle.exe192⤵
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Windows\SysWOW64\Cgcmiclk.exeC:\Windows\system32\Cgcmiclk.exe193⤵
- Modifies registry class
PID:3448 -
C:\Windows\SysWOW64\Conbmfif.exeC:\Windows\system32\Conbmfif.exe194⤵
- Modifies registry class
PID:3488 -
C:\Windows\SysWOW64\Clbbfj32.exeC:\Windows\system32\Clbbfj32.exe195⤵PID:3528
-
C:\Windows\SysWOW64\Cdmgkl32.exeC:\Windows\system32\Cdmgkl32.exe196⤵PID:3568
-
C:\Windows\SysWOW64\Cnekcblk.exeC:\Windows\system32\Cnekcblk.exe197⤵PID:3608
-
C:\Windows\SysWOW64\Chkpakla.exeC:\Windows\system32\Chkpakla.exe198⤵
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Windows\SysWOW64\Cbcdjpba.exeC:\Windows\system32\Cbcdjpba.exe199⤵PID:3688
-
C:\Windows\SysWOW64\Djoinbpm.exeC:\Windows\system32\Djoinbpm.exe200⤵PID:3732
-
C:\Windows\SysWOW64\Dgbiggof.exeC:\Windows\system32\Dgbiggof.exe201⤵
- Drops file in System32 directory
PID:3772 -
C:\Windows\SysWOW64\Dqknqleg.exeC:\Windows\system32\Dqknqleg.exe202⤵PID:3812
-
C:\Windows\SysWOW64\Dmaoem32.exeC:\Windows\system32\Dmaoem32.exe203⤵PID:3852
-
C:\Windows\SysWOW64\Dqpgll32.exeC:\Windows\system32\Dqpgll32.exe204⤵PID:3892
-
C:\Windows\SysWOW64\Dbadcdgp.exeC:\Windows\system32\Dbadcdgp.exe205⤵
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\Dcppmg32.exeC:\Windows\system32\Dcppmg32.exe206⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3972 -
C:\Windows\SysWOW64\Elleai32.exeC:\Windows\system32\Elleai32.exe207⤵PID:4012
-
C:\Windows\SysWOW64\Eipekmjg.exeC:\Windows\system32\Eipekmjg.exe208⤵PID:4052
-
C:\Windows\SysWOW64\Elnagijk.exeC:\Windows\system32\Elnagijk.exe209⤵PID:4092
-
C:\Windows\SysWOW64\Ebjfiboe.exeC:\Windows\system32\Ebjfiboe.exe210⤵PID:3104
-
C:\Windows\SysWOW64\Ehgoaiml.exeC:\Windows\system32\Ehgoaiml.exe211⤵PID:3160
-
C:\Windows\SysWOW64\Efllcf32.exeC:\Windows\system32\Efllcf32.exe212⤵
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Windows\SysWOW64\Fpdqlkhe.exeC:\Windows\system32\Fpdqlkhe.exe213⤵
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Windows\SysWOW64\Fjjeid32.exeC:\Windows\system32\Fjjeid32.exe214⤵
- Drops file in System32 directory
PID:3296 -
C:\Windows\SysWOW64\Fpgmak32.exeC:\Windows\system32\Fpgmak32.exe215⤵PID:3344
-
C:\Windows\SysWOW64\Flnnfllf.exeC:\Windows\system32\Flnnfllf.exe216⤵PID:3404
-
C:\Windows\SysWOW64\Ffcbce32.exeC:\Windows\system32\Ffcbce32.exe217⤵PID:3536
-
C:\Windows\SysWOW64\Flpkll32.exeC:\Windows\system32\Flpkll32.exe218⤵
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Windows\SysWOW64\Fooghg32.exeC:\Windows\system32\Fooghg32.exe219⤵
- Modifies registry class
PID:3588 -
C:\Windows\SysWOW64\Fblpnepn.exeC:\Windows\system32\Fblpnepn.exe220⤵PID:3664
-
C:\Windows\SysWOW64\Ghihfl32.exeC:\Windows\system32\Ghihfl32.exe221⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3716 -
C:\Windows\SysWOW64\Gaamobdf.exeC:\Windows\system32\Gaamobdf.exe222⤵PID:3768
-
C:\Windows\SysWOW64\Glgqlkdl.exeC:\Windows\system32\Glgqlkdl.exe223⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3820 -
C:\Windows\SysWOW64\Gepeep32.exeC:\Windows\system32\Gepeep32.exe224⤵
- Modifies registry class
PID:3868 -
C:\Windows\SysWOW64\Ggqamh32.exeC:\Windows\system32\Ggqamh32.exe225⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3920 -
C:\Windows\SysWOW64\Gaffja32.exeC:\Windows\system32\Gaffja32.exe226⤵PID:3960
-
C:\Windows\SysWOW64\Gkojcgga.exeC:\Windows\system32\Gkojcgga.exe227⤵
- Modifies registry class
PID:4020 -
C:\Windows\SysWOW64\Gcjogidl.exeC:\Windows\system32\Gcjogidl.exe228⤵PID:4068
-
C:\Windows\SysWOW64\Hpnpam32.exeC:\Windows\system32\Hpnpam32.exe229⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Windows\SysWOW64\Hifdjcif.exeC:\Windows\system32\Hifdjcif.exe230⤵PID:3116
-
C:\Windows\SysWOW64\Hgjdcghp.exeC:\Windows\system32\Hgjdcghp.exe231⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3192 -
C:\Windows\SysWOW64\Hoeigi32.exeC:\Windows\system32\Hoeigi32.exe232⤵PID:3272
-
C:\Windows\SysWOW64\Hccbnhla.exeC:\Windows\system32\Hccbnhla.exe233⤵PID:3324
-
C:\Windows\SysWOW64\Hojbbiae.exeC:\Windows\system32\Hojbbiae.exe234⤵PID:3384
-
C:\Windows\SysWOW64\Hdgkkppm.exeC:\Windows\system32\Hdgkkppm.exe235⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3464 -
C:\Windows\SysWOW64\Ikqcgj32.exeC:\Windows\system32\Ikqcgj32.exe236⤵
- Drops file in System32 directory
- Modifies registry class
PID:3504 -
C:\Windows\SysWOW64\Iqnlpq32.exeC:\Windows\system32\Iqnlpq32.exe237⤵PID:3556
-
C:\Windows\SysWOW64\Inaliedk.exeC:\Windows\system32\Inaliedk.exe238⤵PID:3600
-
C:\Windows\SysWOW64\Igjabj32.exeC:\Windows\system32\Igjabj32.exe239⤵
- Modifies registry class
PID:3680 -
C:\Windows\SysWOW64\Indiodbh.exeC:\Windows\system32\Indiodbh.exe240⤵PID:3740
-
C:\Windows\SysWOW64\Ifoncgpc.exeC:\Windows\system32\Ifoncgpc.exe241⤵PID:3828
-
C:\Windows\SysWOW64\Iqdbqp32.exeC:\Windows\system32\Iqdbqp32.exe242⤵
- Modifies registry class
PID:3860