Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
5d7c7439152b1f55a3c8e2fbd417525791bcb30aaa7a2b2662f82fc8ac0e033d.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d7c7439152b1f55a3c8e2fbd417525791bcb30aaa7a2b2662f82fc8ac0e033d.exe
Resource
win10v2004-20240802-en
General
-
Target
5d7c7439152b1f55a3c8e2fbd417525791bcb30aaa7a2b2662f82fc8ac0e033d.exe
-
Size
402KB
-
MD5
904eb1d1c80a5dcbc1bfef02fdb4a350
-
SHA1
174a7cd671dfc2def85b247860f3b68f4a90df46
-
SHA256
5d7c7439152b1f55a3c8e2fbd417525791bcb30aaa7a2b2662f82fc8ac0e033d
-
SHA512
973acf291b44e7a036b4f2e9775dee8f7ce423d79ab703b485effb794e053a1cf99954e74a8f8c14b86fb1618a86f2722be24143a622b010ce26a67664beb1f5
-
SSDEEP
6144:bibhxvEPvTpN0xHuwdkAj51VezfHZ3neNZpGkXo+TCCYOs5PHdC:mbQU
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhakobmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ehbmmn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fehccp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nnnkhmgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fklieh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ibpfel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mmmbao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bgngom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ggkeeaoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hncjcijn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bnkclm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbehgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qjngjj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccnkjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfglnm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eajkkmcb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gojcgmil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Holpmmgi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liffebgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oekegh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fccafe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lihcjaek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Acpoinec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deldfm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhcheb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfgabifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Faejglie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkiiodeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fcenlecc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ccnkjl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcoiia32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfjkahji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hpaoenff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Magceg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Baiinb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eophja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fgdoeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gdefdkma.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkooae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcffbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lflddfdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnbiml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hoaqbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkdeqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opejjgno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ehhlcgfi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkbhkqkp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khiidg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhkglo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mifplp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pqomqefe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bnabbe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agindm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dadjfg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kglipdqn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bjoqahhk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekpboc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eeegll32.exe -
Executes dropped EXE 64 IoCs
pid Process 5180 Kfonmncp.exe 2644 Kmifjh32.exe 1428 Kmkcohij.exe 3900 Kdellb32.exe 4744 Kbhlgoga.exe 5584 Lpoifc32.exe 4396 Lbmebn32.exe 5988 Lkdmdl32.exe 6104 Ligmohki.exe 5952 Lkifokpi.exe 5920 Labole32.exe 5640 Ldakhq32.exe 5800 Mpjhba32.exe 5816 Mnnile32.exe 4540 Miejqf32.exe 3888 Mgijjj32.exe 4880 Mpaocpdc.exe 432 Mneold32.exe 1904 Ncbgdk32.exe 1216 Ngncejim.exe 4584 Ngppkigk.exe 4456 Naedhb32.exe 2660 Njqild32.exe 5576 Ngdjfi32.exe 5360 Nkpffgkn.exe 3660 Najncack.exe 3056 Nalkiaah.exe 4416 Ocngpi32.exe 4232 Oqagjneq.exe 5320 Ocpdfied.exe 1300 Oqddomcn.exe 4332 Ognmlg32.exe 2684 Oklebf32.exe 4604 Onjana32.exe 4984 Oqinjm32.exe 4740 Oddjkkha.exe 4824 Ogbfggge.exe 5088 Ojabcbfi.exe 5384 Pbhjdpgk.exe 976 Pqmgelkc.exe 1532 Pdicfk32.exe 1444 Pclcagkg.exe 756 Pkckceki.exe 5480 Pjflna32.exe 1664 Pbmcpo32.exe 3312 Pqpdkliq.exe 3096 Pgjlhfam.exe 3436 Pjhhdapa.exe 3488 Pbopeoqc.exe 2952 Pglimeok.exe 5016 Pjjeiann.exe 2740 Pbamknoq.exe 4204 Pccibf32.exe 4376 Qcefhfbl.exe 1184 Qklniccn.exe 5200 Qaigajaf.exe 5300 Qgcond32.exe 5420 Qjakjphf.exe 4832 Aegogihl.exe 2712 Agelcdgp.exe 4316 Ajdhppfc.exe 6092 Abkpamff.exe 6032 Aanplj32.exe 5804 Acllhe32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Eonkeabl.exe Ekbodc32.exe File created C:\Windows\SysWOW64\Iiqklggh.exe Ieeoki32.exe File created C:\Windows\SysWOW64\Nhfnpghc.dll Lihcjaek.exe File created C:\Windows\SysWOW64\Bgcajlgd.exe Bedenqhq.exe File created C:\Windows\SysWOW64\Beinip32.exe Bambiakb.exe File created C:\Windows\SysWOW64\Cmedbplg.dll Kqbacjia.exe File created C:\Windows\SysWOW64\Lbbienji.dll Process not Found File created C:\Windows\SysWOW64\Pkckceki.exe Pclcagkg.exe File created C:\Windows\SysWOW64\Oiaabbbo.dll Meigea32.exe File opened for modification C:\Windows\SysWOW64\Hdkekc32.exe Heheogmc.exe File created C:\Windows\SysWOW64\Eijmng32.dll Process not Found File created C:\Windows\SysWOW64\Ocmpfc32.exe Odjpjflq.exe File opened for modification C:\Windows\SysWOW64\Ecqdqe32.exe Eoehpgpo.exe File created C:\Windows\SysWOW64\Fimckiag.dll Eoehpgpo.exe File created C:\Windows\SysWOW64\Egnkkl32.dll Eajkkmcb.exe File opened for modification C:\Windows\SysWOW64\Lmabeq32.exe Liffebgm.exe File opened for modification C:\Windows\SysWOW64\Hgfngiah.exe Hajfobca.exe File created C:\Windows\SysWOW64\Ohkoic32.exe Oekegh32.exe File created C:\Windows\SysWOW64\Bngfic32.dll Afgnjdfc.exe File opened for modification C:\Windows\SysWOW64\Ehdjbn32.exe Eefnfb32.exe File created C:\Windows\SysWOW64\Dfldhglh.dll Iihamf32.exe File opened for modification C:\Windows\SysWOW64\Dapheokm.exe Dmdldp32.exe File opened for modification C:\Windows\SysWOW64\Hcafnq32.exe Hofjnbcj.exe File created C:\Windows\SysWOW64\Limmea32.exe Leaqebil.exe File opened for modification C:\Windows\SysWOW64\Fmnhalmf.exe Folgfp32.exe File created C:\Windows\SysWOW64\Gejini32.exe Gaommjaj.exe File created C:\Windows\SysWOW64\Hpndiimm.dll Dankpo32.exe File created C:\Windows\SysWOW64\Jobfdqef.dll Ddodajjq.exe File created C:\Windows\SysWOW64\Efomfk32.dll Labole32.exe File created C:\Windows\SysWOW64\Lepijhih.dll Aepbngpa.exe File opened for modification C:\Windows\SysWOW64\Amamaeal.exe Anomfh32.exe File created C:\Windows\SysWOW64\Phjphp32.dll Acmkih32.exe File opened for modification C:\Windows\SysWOW64\Ibpfel32.exe Ipajiq32.exe File created C:\Windows\SysWOW64\Bmkpgcia.exe Bnhplg32.exe File opened for modification C:\Windows\SysWOW64\Efacno32.exe Dadjfg32.exe File opened for modification C:\Windows\SysWOW64\Kmfcjbic.exe Keokheia.exe File opened for modification C:\Windows\SysWOW64\Mpiahk32.exe Mlneglnf.exe File created C:\Windows\SysWOW64\Ojghbmkh.exe Oekmbo32.exe File created C:\Windows\SysWOW64\Dbpkjhfk.exe Doeoii32.exe File opened for modification C:\Windows\SysWOW64\Hkjnmc32.exe Hmgnagdf.exe File created C:\Windows\SysWOW64\Dankpo32.exe Dmboopef.exe File created C:\Windows\SysWOW64\Ahfjmgll.dll Kbhlgoga.exe File opened for modification C:\Windows\SysWOW64\Mbmgoean.exe Mpnkcjbj.exe File created C:\Windows\SysWOW64\Cpbfhemh.dll Olchiiln.exe File created C:\Windows\SysWOW64\Feogom32.dll Bgcajlgd.exe File created C:\Windows\SysWOW64\Qfegiojo.dll Jbeoqkdk.exe File created C:\Windows\SysWOW64\Ledcdg32.exe Lqigdici.exe File created C:\Windows\SysWOW64\Pkecgg32.exe Process not Found File created C:\Windows\SysWOW64\Ikhjnaoa.exe Imejcd32.exe File created C:\Windows\SysWOW64\Pommfmmi.exe Pgahbjpn.exe File created C:\Windows\SysWOW64\Maiilp32.dll Cbpbcjdn.exe File created C:\Windows\SysWOW64\Gpdbhi32.dll Fkqbpgan.exe File opened for modification C:\Windows\SysWOW64\Fhgpok32.exe Fdkcnlel.exe File created C:\Windows\SysWOW64\Fmgblo32.dll Jpklpo32.exe File created C:\Windows\SysWOW64\Dkaflm32.dll Lgcpqc32.exe File created C:\Windows\SysWOW64\Nnhmmk32.dll Hilbah32.exe File created C:\Windows\SysWOW64\Nhobalhn.dll Djhlnd32.exe File created C:\Windows\SysWOW64\Mnigik32.exe Mjmkhm32.exe File created C:\Windows\SysWOW64\Nljljd32.dll Process not Found File created C:\Windows\SysWOW64\Djijga32.dll Ddddgp32.exe File created C:\Windows\SysWOW64\Kggnlihm.dll Kfcang32.exe File created C:\Windows\SysWOW64\Ldlkbkgc.exe Lppoal32.exe File created C:\Windows\SysWOW64\Jkdjbo32.dll Mdenhioh.exe File created C:\Windows\SysWOW64\Qfbeoe32.exe Qpelgn32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 20932 20800 Process not Found 1182 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbckbi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpehmkje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdhlld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hocfnlaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efdfnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eajkkmcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fggljb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnoqhj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbbhogdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hinofhik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kioqdcme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpbkgl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bakecame.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmnfda32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehkiifdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnldcj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dobbcipe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkfdbdof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbdfjnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpiahk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgfngiah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhjekh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbeoqkdk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldqdmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqcfle32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ageeincd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkkbja32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbkihk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpdofnig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Folgfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbdoogob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oklebf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajdhppfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gcopbclh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imodbenn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccnkjl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nemifjkc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oqddomcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pbamknoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekpiii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hlqhah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocmpfc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehbmmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fehccp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfgabifl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jifnndep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Niokghmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdpofcph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knkbbcha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldakhq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmofpaai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mefjpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Negcgofd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edmpbh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gdflpdhc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hcafnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Medmjbfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aghhidem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbmpio32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekpboc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acllhe32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Klffpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Amoqle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iaficgjh.dll" Cmiliama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hpaoenff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Acllhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egaknjgl.dll" Khiidg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epokdc32.dll" Ifieqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgcojk32.dll" Qcdompoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gkinlpeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hamioh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bnmigfna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eonkeabl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eobdpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Knhobn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qmjgqfgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dobbcipe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eacdlboc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kppfkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcljln32.dll" Lbahcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cooagnhh.dll" Negcgofd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gnenbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cbieiilc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Folnqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ophgpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gemfchgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Epcjmbpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkoglp32.dll" Jilkhemk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lpkolfoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Niilao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nljecjdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cccdeldn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hocfnlaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjibff32.dll" Cmfpcboc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kbmdbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Odafke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Efacno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bohchd32.dll" Keahnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ocajabof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hdpofcph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpkkga32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqjbibhl.dll" Pjflna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dffqbool.dll" Gliapi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jkhcdkke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ccbnke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Edmgmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eoehpgpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Heheogmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcgfgf32.dll" Mpjhba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ppgpepha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fodaeqlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mbfpojnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Deldfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hgfngiah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ghpbej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ngfpabng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qjlkdjhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aehmhe32.dll" Anomfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggfnlnkb.dll" Clmpgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jpipjpce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Idkoaaek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffminj32.dll" Hgdaaick.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mbggipbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hgikmi32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 5180 2332 5d7c7439152b1f55a3c8e2fbd417525791bcb30aaa7a2b2662f82fc8ac0e033d.exe 85 PID 2332 wrote to memory of 5180 2332 5d7c7439152b1f55a3c8e2fbd417525791bcb30aaa7a2b2662f82fc8ac0e033d.exe 85 PID 2332 wrote to memory of 5180 2332 5d7c7439152b1f55a3c8e2fbd417525791bcb30aaa7a2b2662f82fc8ac0e033d.exe 85 PID 5180 wrote to memory of 2644 5180 Kfonmncp.exe 86 PID 5180 wrote to memory of 2644 5180 Kfonmncp.exe 86 PID 5180 wrote to memory of 2644 5180 Kfonmncp.exe 86 PID 2644 wrote to memory of 1428 2644 Kmifjh32.exe 87 PID 2644 wrote to memory of 1428 2644 Kmifjh32.exe 87 PID 2644 wrote to memory of 1428 2644 Kmifjh32.exe 87 PID 1428 wrote to memory of 3900 1428 Kmkcohij.exe 88 PID 1428 wrote to memory of 3900 1428 Kmkcohij.exe 88 PID 1428 wrote to memory of 3900 1428 Kmkcohij.exe 88 PID 3900 wrote to memory of 4744 3900 Kdellb32.exe 89 PID 3900 wrote to memory of 4744 3900 Kdellb32.exe 89 PID 3900 wrote to memory of 4744 3900 Kdellb32.exe 89 PID 4744 wrote to memory of 5584 4744 Kbhlgoga.exe 90 PID 4744 wrote to memory of 5584 4744 Kbhlgoga.exe 90 PID 4744 wrote to memory of 5584 4744 Kbhlgoga.exe 90 PID 5584 wrote to memory of 4396 5584 Lpoifc32.exe 91 PID 5584 wrote to memory of 4396 5584 Lpoifc32.exe 91 PID 5584 wrote to memory of 4396 5584 Lpoifc32.exe 91 PID 4396 wrote to memory of 5988 4396 Lbmebn32.exe 92 PID 4396 wrote to memory of 5988 4396 Lbmebn32.exe 92 PID 4396 wrote to memory of 5988 4396 Lbmebn32.exe 92 PID 5988 wrote to memory of 6104 5988 Lkdmdl32.exe 93 PID 5988 wrote to memory of 6104 5988 Lkdmdl32.exe 93 PID 5988 wrote to memory of 6104 5988 Lkdmdl32.exe 93 PID 6104 wrote to memory of 5952 6104 Ligmohki.exe 94 PID 6104 wrote to memory of 5952 6104 Ligmohki.exe 94 PID 6104 wrote to memory of 5952 6104 Ligmohki.exe 94 PID 5952 wrote to memory of 5920 5952 Lkifokpi.exe 95 PID 5952 wrote to memory of 5920 5952 Lkifokpi.exe 95 PID 5952 wrote to memory of 5920 5952 Lkifokpi.exe 95 PID 5920 wrote to memory of 5640 5920 Labole32.exe 96 PID 5920 wrote to memory of 5640 5920 Labole32.exe 96 PID 5920 wrote to memory of 5640 5920 Labole32.exe 96 PID 5640 wrote to memory of 5800 5640 Ldakhq32.exe 97 PID 5640 wrote to memory of 5800 5640 Ldakhq32.exe 97 PID 5640 wrote to memory of 5800 5640 Ldakhq32.exe 97 PID 5800 wrote to memory of 5816 5800 Mpjhba32.exe 98 PID 5800 wrote to memory of 5816 5800 Mpjhba32.exe 98 PID 5800 wrote to memory of 5816 5800 Mpjhba32.exe 98 PID 5816 wrote to memory of 4540 5816 Mnnile32.exe 99 PID 5816 wrote to memory of 4540 5816 Mnnile32.exe 99 PID 5816 wrote to memory of 4540 5816 Mnnile32.exe 99 PID 4540 wrote to memory of 3888 4540 Miejqf32.exe 100 PID 4540 wrote to memory of 3888 4540 Miejqf32.exe 100 PID 4540 wrote to memory of 3888 4540 Miejqf32.exe 100 PID 3888 wrote to memory of 4880 3888 Mgijjj32.exe 101 PID 3888 wrote to memory of 4880 3888 Mgijjj32.exe 101 PID 3888 wrote to memory of 4880 3888 Mgijjj32.exe 101 PID 4880 wrote to memory of 432 4880 Mpaocpdc.exe 102 PID 4880 wrote to memory of 432 4880 Mpaocpdc.exe 102 PID 4880 wrote to memory of 432 4880 Mpaocpdc.exe 102 PID 432 wrote to memory of 1904 432 Mneold32.exe 103 PID 432 wrote to memory of 1904 432 Mneold32.exe 103 PID 432 wrote to memory of 1904 432 Mneold32.exe 103 PID 1904 wrote to memory of 1216 1904 Ncbgdk32.exe 104 PID 1904 wrote to memory of 1216 1904 Ncbgdk32.exe 104 PID 1904 wrote to memory of 1216 1904 Ncbgdk32.exe 104 PID 1216 wrote to memory of 4584 1216 Ngncejim.exe 105 PID 1216 wrote to memory of 4584 1216 Ngncejim.exe 105 PID 1216 wrote to memory of 4584 1216 Ngncejim.exe 105 PID 4584 wrote to memory of 4456 4584 Ngppkigk.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d7c7439152b1f55a3c8e2fbd417525791bcb30aaa7a2b2662f82fc8ac0e033d.exe"C:\Users\Admin\AppData\Local\Temp\5d7c7439152b1f55a3c8e2fbd417525791bcb30aaa7a2b2662f82fc8ac0e033d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\Kfonmncp.exeC:\Windows\system32\Kfonmncp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5180 -
C:\Windows\SysWOW64\Kmifjh32.exeC:\Windows\system32\Kmifjh32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Kmkcohij.exeC:\Windows\system32\Kmkcohij.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\Kdellb32.exeC:\Windows\system32\Kdellb32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\Kbhlgoga.exeC:\Windows\system32\Kbhlgoga.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\Lpoifc32.exeC:\Windows\system32\Lpoifc32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5584 -
C:\Windows\SysWOW64\Lbmebn32.exeC:\Windows\system32\Lbmebn32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\Lkdmdl32.exeC:\Windows\system32\Lkdmdl32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5988 -
C:\Windows\SysWOW64\Ligmohki.exeC:\Windows\system32\Ligmohki.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6104 -
C:\Windows\SysWOW64\Lkifokpi.exeC:\Windows\system32\Lkifokpi.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5952 -
C:\Windows\SysWOW64\Labole32.exeC:\Windows\system32\Labole32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5920 -
C:\Windows\SysWOW64\Ldakhq32.exeC:\Windows\system32\Ldakhq32.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5640 -
C:\Windows\SysWOW64\Mpjhba32.exeC:\Windows\system32\Mpjhba32.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Windows\SysWOW64\Mnnile32.exeC:\Windows\system32\Mnnile32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5816 -
C:\Windows\SysWOW64\Miejqf32.exeC:\Windows\system32\Miejqf32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\Mgijjj32.exeC:\Windows\system32\Mgijjj32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\Mpaocpdc.exeC:\Windows\system32\Mpaocpdc.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\Mneold32.exeC:\Windows\system32\Mneold32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\Ncbgdk32.exeC:\Windows\system32\Ncbgdk32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\Ngncejim.exeC:\Windows\system32\Ngncejim.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\Ngppkigk.exeC:\Windows\system32\Ngppkigk.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\Naedhb32.exeC:\Windows\system32\Naedhb32.exe23⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\Njqild32.exeC:\Windows\system32\Njqild32.exe24⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\Ngdjfi32.exeC:\Windows\system32\Ngdjfi32.exe25⤵
- Executes dropped EXE
PID:5576 -
C:\Windows\SysWOW64\Nkpffgkn.exeC:\Windows\system32\Nkpffgkn.exe26⤵
- Executes dropped EXE
PID:5360 -
C:\Windows\SysWOW64\Najncack.exeC:\Windows\system32\Najncack.exe27⤵
- Executes dropped EXE
PID:3660 -
C:\Windows\SysWOW64\Nalkiaah.exeC:\Windows\system32\Nalkiaah.exe28⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\Ocngpi32.exeC:\Windows\system32\Ocngpi32.exe29⤵
- Executes dropped EXE
PID:4416 -
C:\Windows\SysWOW64\Oqagjneq.exeC:\Windows\system32\Oqagjneq.exe30⤵
- Executes dropped EXE
PID:4232 -
C:\Windows\SysWOW64\Ocpdfied.exeC:\Windows\system32\Ocpdfied.exe31⤵
- Executes dropped EXE
PID:5320 -
C:\Windows\SysWOW64\Oqddomcn.exeC:\Windows\system32\Oqddomcn.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1300 -
C:\Windows\SysWOW64\Ognmlg32.exeC:\Windows\system32\Ognmlg32.exe33⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\Oklebf32.exeC:\Windows\system32\Oklebf32.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\Onjana32.exeC:\Windows\system32\Onjana32.exe35⤵
- Executes dropped EXE
PID:4604 -
C:\Windows\SysWOW64\Oqinjm32.exeC:\Windows\system32\Oqinjm32.exe36⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\Oddjkkha.exeC:\Windows\system32\Oddjkkha.exe37⤵
- Executes dropped EXE
PID:4740 -
C:\Windows\SysWOW64\Ogbfggge.exeC:\Windows\system32\Ogbfggge.exe38⤵
- Executes dropped EXE
PID:4824 -
C:\Windows\SysWOW64\Ojabcbfi.exeC:\Windows\system32\Ojabcbfi.exe39⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\Pbhjdpgk.exeC:\Windows\system32\Pbhjdpgk.exe40⤵
- Executes dropped EXE
PID:5384 -
C:\Windows\SysWOW64\Pqmgelkc.exeC:\Windows\system32\Pqmgelkc.exe41⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\Pdicfk32.exeC:\Windows\system32\Pdicfk32.exe42⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\Pclcagkg.exeC:\Windows\system32\Pclcagkg.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1444 -
C:\Windows\SysWOW64\Pkckceki.exeC:\Windows\system32\Pkckceki.exe44⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\Pjflna32.exeC:\Windows\system32\Pjflna32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:5480 -
C:\Windows\SysWOW64\Pbmcpo32.exeC:\Windows\system32\Pbmcpo32.exe46⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\Pqpdkliq.exeC:\Windows\system32\Pqpdkliq.exe47⤵
- Executes dropped EXE
PID:3312 -
C:\Windows\SysWOW64\Pgjlhfam.exeC:\Windows\system32\Pgjlhfam.exe48⤵
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\Pjhhdapa.exeC:\Windows\system32\Pjhhdapa.exe49⤵
- Executes dropped EXE
PID:3436 -
C:\Windows\SysWOW64\Pbopeoqc.exeC:\Windows\system32\Pbopeoqc.exe50⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\Pglimeok.exeC:\Windows\system32\Pglimeok.exe51⤵
- Executes dropped EXE
PID:2952 -
C:\Windows\SysWOW64\Pjjeiann.exeC:\Windows\system32\Pjjeiann.exe52⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\Pbamknoq.exeC:\Windows\system32\Pbamknoq.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\Pccibf32.exeC:\Windows\system32\Pccibf32.exe54⤵
- Executes dropped EXE
PID:4204 -
C:\Windows\SysWOW64\Qcefhfbl.exeC:\Windows\system32\Qcefhfbl.exe55⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\Qklniccn.exeC:\Windows\system32\Qklniccn.exe56⤵
- Executes dropped EXE
PID:1184 -
C:\Windows\SysWOW64\Qaigajaf.exeC:\Windows\system32\Qaigajaf.exe57⤵
- Executes dropped EXE
PID:5200 -
C:\Windows\SysWOW64\Qgcond32.exeC:\Windows\system32\Qgcond32.exe58⤵
- Executes dropped EXE
PID:5300 -
C:\Windows\SysWOW64\Qjakjphf.exeC:\Windows\system32\Qjakjphf.exe59⤵
- Executes dropped EXE
PID:5420 -
C:\Windows\SysWOW64\Aegogihl.exeC:\Windows\system32\Aegogihl.exe60⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\SysWOW64\Agelcdgp.exeC:\Windows\system32\Agelcdgp.exe61⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\Ajdhppfc.exeC:\Windows\system32\Ajdhppfc.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\SysWOW64\Abkpamff.exeC:\Windows\system32\Abkpamff.exe63⤵
- Executes dropped EXE
PID:6092 -
C:\Windows\SysWOW64\Aanplj32.exeC:\Windows\system32\Aanplj32.exe64⤵
- Executes dropped EXE
PID:6032 -
C:\Windows\SysWOW64\Acllhe32.exeC:\Windows\system32\Acllhe32.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5804 -
C:\Windows\SysWOW64\Aghhidem.exeC:\Windows\system32\Aghhidem.exe66⤵
- System Location Discovery: System Language Discovery
PID:5980 -
C:\Windows\SysWOW64\Ajfdeoda.exeC:\Windows\system32\Ajfdeoda.exe67⤵PID:5908
-
C:\Windows\SysWOW64\Anaqfnlj.exeC:\Windows\system32\Anaqfnlj.exe68⤵PID:5492
-
C:\Windows\SysWOW64\Ajhako32.exeC:\Windows\system32\Ajhako32.exe69⤵PID:3908
-
C:\Windows\SysWOW64\Abpill32.exeC:\Windows\system32\Abpill32.exe70⤵PID:3540
-
C:\Windows\SysWOW64\Aabigiik.exeC:\Windows\system32\Aabigiik.exe71⤵PID:5760
-
C:\Windows\SysWOW64\Alhnebia.exeC:\Windows\system32\Alhnebia.exe72⤵PID:3756
-
C:\Windows\SysWOW64\Aepbngpa.exeC:\Windows\system32\Aepbngpa.exe73⤵
- Drops file in System32 directory
PID:3180 -
C:\Windows\SysWOW64\Agoojcoe.exeC:\Windows\system32\Agoojcoe.exe74⤵PID:1812
-
C:\Windows\SysWOW64\Bjmkfnni.exeC:\Windows\system32\Bjmkfnni.exe75⤵PID:2664
-
C:\Windows\SysWOW64\Bnigfm32.exeC:\Windows\system32\Bnigfm32.exe76⤵PID:5276
-
C:\Windows\SysWOW64\Bhakobmb.exeC:\Windows\system32\Bhakobmb.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5544 -
C:\Windows\SysWOW64\Bnkclm32.exeC:\Windows\system32\Bnkclm32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4216 -
C:\Windows\SysWOW64\Bbfomklh.exeC:\Windows\system32\Bbfomklh.exe79⤵PID:5004
-
C:\Windows\SysWOW64\Bhcheb32.exeC:\Windows\system32\Bhcheb32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5712 -
C:\Windows\SysWOW64\Bjbdan32.exeC:\Windows\system32\Bjbdan32.exe81⤵PID:1316
-
C:\Windows\SysWOW64\Beghnf32.exeC:\Windows\system32\Beghnf32.exe82⤵PID:640
-
C:\Windows\SysWOW64\Bhfdjb32.exeC:\Windows\system32\Bhfdjb32.exe83⤵PID:4628
-
C:\Windows\SysWOW64\Bbkihk32.exeC:\Windows\system32\Bbkihk32.exe84⤵
- System Location Discovery: System Language Discovery
PID:5664 -
C:\Windows\SysWOW64\Bejedfgg.exeC:\Windows\system32\Bejedfgg.exe85⤵PID:5240
-
C:\Windows\SysWOW64\Bdmeoc32.exeC:\Windows\system32\Bdmeoc32.exe86⤵PID:4616
-
C:\Windows\SysWOW64\Blcmqp32.exeC:\Windows\system32\Blcmqp32.exe87⤵PID:1096
-
C:\Windows\SysWOW64\Bnbiml32.exeC:\Windows\system32\Bnbiml32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4768 -
C:\Windows\SysWOW64\Belbifed.exeC:\Windows\system32\Belbifed.exe89⤵PID:4308
-
C:\Windows\SysWOW64\Bhjneadh.exeC:\Windows\system32\Bhjneadh.exe90⤵PID:3388
-
C:\Windows\SysWOW64\Cjijamcl.exeC:\Windows\system32\Cjijamcl.exe91⤵PID:3088
-
C:\Windows\SysWOW64\Cbpbcjdn.exeC:\Windows\system32\Cbpbcjdn.exe92⤵
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\Cenooeca.exeC:\Windows\system32\Cenooeca.exe93⤵PID:3980
-
C:\Windows\SysWOW64\Clhglpkn.exeC:\Windows\system32\Clhglpkn.exe94⤵PID:4344
-
C:\Windows\SysWOW64\Cjkggl32.exeC:\Windows\system32\Cjkggl32.exe95⤵PID:4148
-
C:\Windows\SysWOW64\Ceqkde32.exeC:\Windows\system32\Ceqkde32.exe96⤵PID:5928
-
C:\Windows\SysWOW64\Cdckpbhi.exeC:\Windows\system32\Cdckpbhi.exe97⤵PID:4872
-
C:\Windows\SysWOW64\Clkcaoil.exeC:\Windows\system32\Clkcaoil.exe98⤵PID:2484
-
C:\Windows\SysWOW64\Cjncml32.exeC:\Windows\system32\Cjncml32.exe99⤵PID:4868
-
C:\Windows\SysWOW64\Clmpgo32.exeC:\Windows\system32\Clmpgo32.exe100⤵
- Modifies registry class
PID:1788 -
C:\Windows\SysWOW64\Coklcj32.exeC:\Windows\system32\Coklcj32.exe101⤵PID:6096
-
C:\Windows\SysWOW64\Cdheka32.exeC:\Windows\system32\Cdheka32.exe102⤵PID:5860
-
C:\Windows\SysWOW64\Clomlo32.exeC:\Windows\system32\Clomlo32.exe103⤵PID:5824
-
C:\Windows\SysWOW64\Conihj32.exeC:\Windows\system32\Conihj32.exe104⤵PID:5188
-
C:\Windows\SysWOW64\Cbieiilc.exeC:\Windows\system32\Cbieiilc.exe105⤵
- Modifies registry class
PID:3928 -
C:\Windows\SysWOW64\Cehaedkg.exeC:\Windows\system32\Cehaedkg.exe106⤵PID:5136
-
C:\Windows\SysWOW64\Cdkaqa32.exeC:\Windows\system32\Cdkaqa32.exe107⤵PID:1220
-
C:\Windows\SysWOW64\Dlaibnbc.exeC:\Windows\system32\Dlaibnbc.exe108⤵PID:1292
-
C:\Windows\SysWOW64\Dkdjmk32.exeC:\Windows\system32\Dkdjmk32.exe109⤵PID:536
-
C:\Windows\SysWOW64\Daobjeak.exeC:\Windows\system32\Daobjeak.exe110⤵PID:5720
-
C:\Windows\SysWOW64\Dejnkd32.exeC:\Windows\system32\Dejnkd32.exe111⤵PID:3040
-
C:\Windows\SysWOW64\Dhhjgo32.exeC:\Windows\system32\Dhhjgo32.exe112⤵PID:1800
-
C:\Windows\SysWOW64\Dldfgnqa.exeC:\Windows\system32\Dldfgnqa.exe113⤵PID:4592
-
C:\Windows\SysWOW64\Dkgfck32.exeC:\Windows\system32\Dkgfck32.exe114⤵PID:5392
-
C:\Windows\SysWOW64\Dobbcipe.exeC:\Windows\system32\Dobbcipe.exe115⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Dbnodh32.exeC:\Windows\system32\Dbnodh32.exe116⤵PID:3380
-
C:\Windows\SysWOW64\Delkpc32.exeC:\Windows\system32\Delkpc32.exe117⤵PID:1540
-
C:\Windows\SysWOW64\Dhkglo32.exeC:\Windows\system32\Dhkglo32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4488 -
C:\Windows\SysWOW64\Dkichj32.exeC:\Windows\system32\Dkichj32.exe119⤵PID:5772
-
C:\Windows\SysWOW64\Doeoii32.exeC:\Windows\system32\Doeoii32.exe120⤵
- Drops file in System32 directory
PID:5832 -
C:\Windows\SysWOW64\Dbpkjhfk.exeC:\Windows\system32\Dbpkjhfk.exe121⤵PID:1332
-
C:\Windows\SysWOW64\Ddahap32.exeC:\Windows\system32\Ddahap32.exe122⤵PID:1512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-