Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe
Resource
win10v2004-20240802-en
General
-
Target
15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe
-
Size
361KB
-
MD5
f0c6f991b8759373630ff52879feec57
-
SHA1
a84b450d6063271eddab5fc5623150420a6a5805
-
SHA256
15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7
-
SHA512
f52686e92af1b2701808ce5474210d3fb75631f0a16bf18235bb3b6acdd3c20cbeea000a1977e95f78c432668929b35c6721f5b05e1b598e0f74a92611b0f590
-
SSDEEP
6144:WjwfvjVosVQ///NR5fLvQ///NREQ///NR5fLYG3eujPQ///NR5f:+Ew/Nq/NZ/NcZ7/N
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnglekch.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdlakf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhgdig32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfkojj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpaejlmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apflic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jinkkgeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldhcjn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffhoam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbbjon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boekqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lqiohh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mloigc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ialbon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqmmpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Colhlcig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qpilpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdnggq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceclmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecaeoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eafapd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flfbfken.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nggpgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iilqnp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idedbf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcppegna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkifld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfieccco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edcgcfhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihinkn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjnhennh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nidcpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnnhbkmj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djeoan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gboqgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jiamnlhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Neagan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogjjie32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klakhp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgkncfdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcflbpnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahcoli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jklbed32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deaacl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbidgfag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found -
Executes dropped EXE 64 IoCs
pid Process 2212 Hkifld32.exe 2152 Ilaieljl.exe 2732 Ibehna32.exe 2752 Jcmjfiab.exe 2800 Koidficq.exe 2668 Kejfio32.exe 2724 Lneghd32.exe 2584 Lpmjplag.exe 2100 Moecghdl.exe 1844 Mhpeem32.exe 1016 Miekhd32.exe 1676 Nhmdoq32.exe 1760 Noiiaj32.exe 2928 Ohfgeo32.exe 2340 Oqdioaqf.exe 2256 Pmpcoabe.exe 2496 Pqdend32.exe 2972 Peandcih.exe 1328 Apphpp32.exe 1748 Acnqen32.exe 868 Bbhgbj32.exe 2688 Blplkp32.exe 1604 Bfjmkn32.exe 1508 Bfoffmhd.exe 3064 Bgablmfa.exe 856 Ckeekp32.exe 564 Chiedc32.exe 764 Cadfbi32.exe 2836 Dgclpp32.exe 2764 Dclikp32.exe 2768 Eklgjbca.exe 2648 Eddlcgjb.exe 2844 Ekqqea32.exe 2672 Ffokan32.exe 2516 Fcckjb32.exe 1632 Fpliec32.exe 1768 Fpnekc32.exe 2592 Gabohk32.exe 556 Glgcec32.exe 1416 Gjomlp32.exe 1936 Gdgadeee.exe 2784 Hdjnje32.exe 2512 Hmbbcjic.exe 2248 Hemggm32.exe 1784 Hbagaa32.exe 1708 Hbcdfq32.exe 2984 Hinlck32.exe 2552 Haiagm32.exe 596 Iaknmm32.exe 2992 Ighfecdb.exe 1592 Ihgcof32.exe 2696 Ipbgci32.exe 2748 Ikhlaaif.exe 2960 Igomfb32.exe 1092 Jhbfcj32.exe 2076 Jbmgapgc.exe 1956 Jndgfqlh.exe 2872 Jocdqc32.exe 976 Jqeqhlii.exe 2856 Kjmeaa32.exe 1792 Kgaejeoc.exe 2424 Kffblb32.exe 2420 Knmjmodm.exe 1820 Kmbgnl32.exe -
Loads dropped DLL 64 IoCs
pid Process 3020 15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe 3020 15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe 2212 Hkifld32.exe 2212 Hkifld32.exe 2152 Ilaieljl.exe 2152 Ilaieljl.exe 2732 Ibehna32.exe 2732 Ibehna32.exe 2752 Jcmjfiab.exe 2752 Jcmjfiab.exe 2800 Koidficq.exe 2800 Koidficq.exe 2668 Kejfio32.exe 2668 Kejfio32.exe 2724 Lneghd32.exe 2724 Lneghd32.exe 2584 Lpmjplag.exe 2584 Lpmjplag.exe 2100 Moecghdl.exe 2100 Moecghdl.exe 1844 Mhpeem32.exe 1844 Mhpeem32.exe 1016 Miekhd32.exe 1016 Miekhd32.exe 1676 Nhmdoq32.exe 1676 Nhmdoq32.exe 1760 Noiiaj32.exe 1760 Noiiaj32.exe 2928 Ohfgeo32.exe 2928 Ohfgeo32.exe 2340 Oqdioaqf.exe 2340 Oqdioaqf.exe 2256 Pmpcoabe.exe 2256 Pmpcoabe.exe 2496 Pqdend32.exe 2496 Pqdend32.exe 2972 Peandcih.exe 2972 Peandcih.exe 1328 Apphpp32.exe 1328 Apphpp32.exe 1748 Acnqen32.exe 1748 Acnqen32.exe 868 Bbhgbj32.exe 868 Bbhgbj32.exe 2688 Blplkp32.exe 2688 Blplkp32.exe 1604 Bfjmkn32.exe 1604 Bfjmkn32.exe 1508 Bfoffmhd.exe 1508 Bfoffmhd.exe 3064 Bgablmfa.exe 3064 Bgablmfa.exe 856 Ckeekp32.exe 856 Ckeekp32.exe 564 Chiedc32.exe 564 Chiedc32.exe 764 Cadfbi32.exe 764 Cadfbi32.exe 2836 Dgclpp32.exe 2836 Dgclpp32.exe 2764 Dclikp32.exe 2764 Dclikp32.exe 2768 Eklgjbca.exe 2768 Eklgjbca.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Pnalqqbf.exe Pamkgl32.exe File opened for modification C:\Windows\SysWOW64\Eielhi32.exe Elaloeai.exe File opened for modification C:\Windows\SysWOW64\Qndmgbol.exe Qgjdkh32.exe File opened for modification C:\Windows\SysWOW64\Mmhplk32.exe Mpdpcg32.exe File opened for modification C:\Windows\SysWOW64\Eacnbkkk.exe Elfejd32.exe File created C:\Windows\SysWOW64\Onfjki32.dll Process not Found File opened for modification C:\Windows\SysWOW64\Jchmgm32.exe Process not Found File created C:\Windows\SysWOW64\Pekffp32.exe Pamnpahp.exe File created C:\Windows\SysWOW64\Mijgfmoc.exe Mihkqm32.exe File opened for modification C:\Windows\SysWOW64\Mcppegna.exe Mpbhoigk.exe File created C:\Windows\SysWOW64\Mpjjmc32.dll Jaflocqd.exe File opened for modification C:\Windows\SysWOW64\Hnfigmhk.exe Hcpejd32.exe File created C:\Windows\SysWOW64\Hghjdjcn.dll Jjloak32.exe File created C:\Windows\SysWOW64\Goigpb32.exe Fjlogk32.exe File created C:\Windows\SysWOW64\Jbehkb32.exe Jbblfbdk.exe File opened for modification C:\Windows\SysWOW64\Nkejha32.exe Process not Found File created C:\Windows\SysWOW64\Mbgapn32.dll Cadfbi32.exe File opened for modification C:\Windows\SysWOW64\Bnjlcgnp.exe Apflic32.exe File opened for modification C:\Windows\SysWOW64\Odgennoi.exe Oojmegqa.exe File created C:\Windows\SysWOW64\Ikpnhi32.exe Imlnod32.exe File opened for modification C:\Windows\SysWOW64\Fajfkcmg.exe Process not Found File created C:\Windows\SysWOW64\Nfgnniia.exe Process not Found File created C:\Windows\SysWOW64\Eahqhj32.dll Process not Found File created C:\Windows\SysWOW64\Cibqqhnb.dll Milagp32.exe File created C:\Windows\SysWOW64\Fbddne32.exe Fjipic32.exe File created C:\Windows\SysWOW64\Dcgpkogc.dll Kmmgjb32.exe File created C:\Windows\SysWOW64\Iplpfi32.exe Ifdlmcjo.exe File created C:\Windows\SysWOW64\Ojamjlif.exe Process not Found File opened for modification C:\Windows\SysWOW64\Bbhgbj32.exe Acnqen32.exe File opened for modification C:\Windows\SysWOW64\Djeoan32.exe Dnnnlmob.exe File opened for modification C:\Windows\SysWOW64\Igijjqba.exe Inpeak32.exe File opened for modification C:\Windows\SysWOW64\Pbkdoogb.exe Pmnlfhik.exe File created C:\Windows\SysWOW64\Jlmjko32.exe Joijbk32.exe File created C:\Windows\SysWOW64\Deaacl32.exe Dcahbaeq.exe File opened for modification C:\Windows\SysWOW64\Cpojcpcm.exe Ceeibbgn.exe File created C:\Windows\SysWOW64\Ndmidq32.exe Nnbagfdg.exe File created C:\Windows\SysWOW64\Emhdhipd.exe Emfhbi32.exe File created C:\Windows\SysWOW64\Fkglgnjp.dll Baipemgk.exe File created C:\Windows\SysWOW64\Aoapeonh.exe Aoocpoqk.exe File created C:\Windows\SysWOW64\Ogjjie32.exe Omaepoml.exe File created C:\Windows\SysWOW64\Pemedh32.exe Poapbn32.exe File opened for modification C:\Windows\SysWOW64\Hqjijk32.exe Gcfiqgfp.exe File opened for modification C:\Windows\SysWOW64\Oddanh32.exe Nnhmkohe.exe File opened for modification C:\Windows\SysWOW64\Gnlbpman.exe Gbeakllj.exe File created C:\Windows\SysWOW64\Ecfckn32.dll Iihkea32.exe File created C:\Windows\SysWOW64\Almjdkpo.dll Ibjkfpih.exe File created C:\Windows\SysWOW64\Geaamlck.exe Gogipbln.exe File created C:\Windows\SysWOW64\Mcppegna.exe Mpbhoigk.exe File created C:\Windows\SysWOW64\Bgfhllep.dll Nmdfglhm.exe File opened for modification C:\Windows\SysWOW64\Abfmecba.exe Afolpb32.exe File created C:\Windows\SysWOW64\Elokeaab.dll Nebijfkj.exe File created C:\Windows\SysWOW64\Kbanfbfk.exe Jjfiap32.exe File created C:\Windows\SysWOW64\Pnalqqbf.exe Pamkgl32.exe File opened for modification C:\Windows\SysWOW64\Plcgjpmi.exe Plakep32.exe File created C:\Windows\SysWOW64\Hjmlffnj.dll Oiaogajo.exe File opened for modification C:\Windows\SysWOW64\Cdhjjddc.exe Ccinpa32.exe File created C:\Windows\SysWOW64\Apilpbdg.dll Fhfhip32.exe File created C:\Windows\SysWOW64\Djgoigki.exe Process not Found File opened for modification C:\Windows\SysWOW64\Giaipo32.exe Fcdahh32.exe File created C:\Windows\SysWOW64\Hdplem32.dll Process not Found File opened for modification C:\Windows\SysWOW64\Jlplbp32.exe Process not Found File created C:\Windows\SysWOW64\Ahjmdf32.dll Process not Found File created C:\Windows\SysWOW64\Mjicdl32.exe Mmebkg32.exe File created C:\Windows\SysWOW64\Eopjka32.dll Jkcjchco.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3336 2640 Process not Found 1294 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oiikbf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glgcec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkfpefme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfjjbi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jpnhoh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iefenj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kejfio32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlodma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqamjb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfkcgg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjomgpmq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfoipfoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omaepoml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihinkn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oncqik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inllflpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alpmep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jhjapklh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmhmdb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbagaa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlfahgpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmdfglhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opjjlo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Makhlkel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fhpdbmgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aibejf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lneghd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddjmaebi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jegheghc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojpedn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdhhepmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nadaolko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpogglpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nackdfgc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddbegmqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjbqei32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppmjkhma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flbmmm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmgaikep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hakcinfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mibmdq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpbhoigk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpojcpcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmnjgo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkcnleom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgaino32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jklbed32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgaejeoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eehpoaaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nomdfjpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkccpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mflncjgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2372 Process not Found -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmfeokoo.dll" Ljqcbjee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apflic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdbidfjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaioemba.dll" Ambohapm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgojedag.dll" Dhpkgoja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Diqabd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfkaabaa.dll" Bfieccco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Giabcd32.dll" Jkbgllfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofhlfegf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpkaomqn.dll" Oncqik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfcgnl32.dll" Oohbhqjh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdijjmef.dll" Bgablmfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eddlcgjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcckjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcihlc32.dll" Omqnfiip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgijop32.dll" Jcmjfiab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdfnlkce.dll" Aohfejcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eahqhj32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njdcmn32.dll" Pamnpahp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmngef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdapemfi.dll" Bdlakf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhbkngpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Joijbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jiamnlhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nekpcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icfaia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckeekp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eddlcgjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpmkjlbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfhnmiii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klhjaf32.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nadaolko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ongonccn.dll" Dphlkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elafbcao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bijakkmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gahkdipc.dll" Mhjdadde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odcffafd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gobnljhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oomlcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofpbgqal.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mglihlok.dll" Neihmpon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igijjqba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkdgddmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gichng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gqajfmpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdqege32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kapgeh32.dll" Idedbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndkogj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fihhjm32.dll" Dcoklagc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opjpqk32.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmpcoabe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjbfek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bqhffj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jedgnjon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2212 3020 15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe 29 PID 3020 wrote to memory of 2212 3020 15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe 29 PID 3020 wrote to memory of 2212 3020 15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe 29 PID 3020 wrote to memory of 2212 3020 15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe 29 PID 2212 wrote to memory of 2152 2212 Hkifld32.exe 30 PID 2212 wrote to memory of 2152 2212 Hkifld32.exe 30 PID 2212 wrote to memory of 2152 2212 Hkifld32.exe 30 PID 2212 wrote to memory of 2152 2212 Hkifld32.exe 30 PID 2152 wrote to memory of 2732 2152 Ilaieljl.exe 31 PID 2152 wrote to memory of 2732 2152 Ilaieljl.exe 31 PID 2152 wrote to memory of 2732 2152 Ilaieljl.exe 31 PID 2152 wrote to memory of 2732 2152 Ilaieljl.exe 31 PID 2732 wrote to memory of 2752 2732 Ibehna32.exe 32 PID 2732 wrote to memory of 2752 2732 Ibehna32.exe 32 PID 2732 wrote to memory of 2752 2732 Ibehna32.exe 32 PID 2732 wrote to memory of 2752 2732 Ibehna32.exe 32 PID 2752 wrote to memory of 2800 2752 Jcmjfiab.exe 33 PID 2752 wrote to memory of 2800 2752 Jcmjfiab.exe 33 PID 2752 wrote to memory of 2800 2752 Jcmjfiab.exe 33 PID 2752 wrote to memory of 2800 2752 Jcmjfiab.exe 33 PID 2800 wrote to memory of 2668 2800 Koidficq.exe 34 PID 2800 wrote to memory of 2668 2800 Koidficq.exe 34 PID 2800 wrote to memory of 2668 2800 Koidficq.exe 34 PID 2800 wrote to memory of 2668 2800 Koidficq.exe 34 PID 2668 wrote to memory of 2724 2668 Kejfio32.exe 35 PID 2668 wrote to memory of 2724 2668 Kejfio32.exe 35 PID 2668 wrote to memory of 2724 2668 Kejfio32.exe 35 PID 2668 wrote to memory of 2724 2668 Kejfio32.exe 35 PID 2724 wrote to memory of 2584 2724 Lneghd32.exe 36 PID 2724 wrote to memory of 2584 2724 Lneghd32.exe 36 PID 2724 wrote to memory of 2584 2724 Lneghd32.exe 36 PID 2724 wrote to memory of 2584 2724 Lneghd32.exe 36 PID 2584 wrote to memory of 2100 2584 Lpmjplag.exe 37 PID 2584 wrote to memory of 2100 2584 Lpmjplag.exe 37 PID 2584 wrote to memory of 2100 2584 Lpmjplag.exe 37 PID 2584 wrote to memory of 2100 2584 Lpmjplag.exe 37 PID 2100 wrote to memory of 1844 2100 Moecghdl.exe 38 PID 2100 wrote to memory of 1844 2100 Moecghdl.exe 38 PID 2100 wrote to memory of 1844 2100 Moecghdl.exe 38 PID 2100 wrote to memory of 1844 2100 Moecghdl.exe 38 PID 1844 wrote to memory of 1016 1844 Mhpeem32.exe 39 PID 1844 wrote to memory of 1016 1844 Mhpeem32.exe 39 PID 1844 wrote to memory of 1016 1844 Mhpeem32.exe 39 PID 1844 wrote to memory of 1016 1844 Mhpeem32.exe 39 PID 1016 wrote to memory of 1676 1016 Miekhd32.exe 40 PID 1016 wrote to memory of 1676 1016 Miekhd32.exe 40 PID 1016 wrote to memory of 1676 1016 Miekhd32.exe 40 PID 1016 wrote to memory of 1676 1016 Miekhd32.exe 40 PID 1676 wrote to memory of 1760 1676 Nhmdoq32.exe 41 PID 1676 wrote to memory of 1760 1676 Nhmdoq32.exe 41 PID 1676 wrote to memory of 1760 1676 Nhmdoq32.exe 41 PID 1676 wrote to memory of 1760 1676 Nhmdoq32.exe 41 PID 1760 wrote to memory of 2928 1760 Noiiaj32.exe 42 PID 1760 wrote to memory of 2928 1760 Noiiaj32.exe 42 PID 1760 wrote to memory of 2928 1760 Noiiaj32.exe 42 PID 1760 wrote to memory of 2928 1760 Noiiaj32.exe 42 PID 2928 wrote to memory of 2340 2928 Ohfgeo32.exe 43 PID 2928 wrote to memory of 2340 2928 Ohfgeo32.exe 43 PID 2928 wrote to memory of 2340 2928 Ohfgeo32.exe 43 PID 2928 wrote to memory of 2340 2928 Ohfgeo32.exe 43 PID 2340 wrote to memory of 2256 2340 Oqdioaqf.exe 44 PID 2340 wrote to memory of 2256 2340 Oqdioaqf.exe 44 PID 2340 wrote to memory of 2256 2340 Oqdioaqf.exe 44 PID 2340 wrote to memory of 2256 2340 Oqdioaqf.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe"C:\Users\Admin\AppData\Local\Temp\15ba1685fbd097231d52f5c3d3787e61a44f24b5f72182ba992a0aaaf69129b7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Hkifld32.exeC:\Windows\system32\Hkifld32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\Ilaieljl.exeC:\Windows\system32\Ilaieljl.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\Ibehna32.exeC:\Windows\system32\Ibehna32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Jcmjfiab.exeC:\Windows\system32\Jcmjfiab.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\Koidficq.exeC:\Windows\system32\Koidficq.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Kejfio32.exeC:\Windows\system32\Kejfio32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Lneghd32.exeC:\Windows\system32\Lneghd32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Lpmjplag.exeC:\Windows\system32\Lpmjplag.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\Moecghdl.exeC:\Windows\system32\Moecghdl.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\Mhpeem32.exeC:\Windows\system32\Mhpeem32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\Miekhd32.exeC:\Windows\system32\Miekhd32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\Nhmdoq32.exeC:\Windows\system32\Nhmdoq32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\Noiiaj32.exeC:\Windows\system32\Noiiaj32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\Ohfgeo32.exeC:\Windows\system32\Ohfgeo32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\Oqdioaqf.exeC:\Windows\system32\Oqdioaqf.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\Pmpcoabe.exeC:\Windows\system32\Pmpcoabe.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Pqdend32.exeC:\Windows\system32\Pqdend32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2496 -
C:\Windows\SysWOW64\Peandcih.exeC:\Windows\system32\Peandcih.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2972 -
C:\Windows\SysWOW64\Apphpp32.exeC:\Windows\system32\Apphpp32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1328 -
C:\Windows\SysWOW64\Acnqen32.exeC:\Windows\system32\Acnqen32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\Bbhgbj32.exeC:\Windows\system32\Bbhgbj32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:868 -
C:\Windows\SysWOW64\Blplkp32.exeC:\Windows\system32\Blplkp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688 -
C:\Windows\SysWOW64\Bfjmkn32.exeC:\Windows\system32\Bfjmkn32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Windows\SysWOW64\Bfoffmhd.exeC:\Windows\system32\Bfoffmhd.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Windows\SysWOW64\Bgablmfa.exeC:\Windows\system32\Bgablmfa.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3064 -
C:\Windows\SysWOW64\Ckeekp32.exeC:\Windows\system32\Ckeekp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:856 -
C:\Windows\SysWOW64\Chiedc32.exeC:\Windows\system32\Chiedc32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:564 -
C:\Windows\SysWOW64\Cadfbi32.exeC:\Windows\system32\Cadfbi32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:764 -
C:\Windows\SysWOW64\Dgclpp32.exeC:\Windows\system32\Dgclpp32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2836 -
C:\Windows\SysWOW64\Dclikp32.exeC:\Windows\system32\Dclikp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764 -
C:\Windows\SysWOW64\Eklgjbca.exeC:\Windows\system32\Eklgjbca.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Windows\SysWOW64\Eddlcgjb.exeC:\Windows\system32\Eddlcgjb.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2648 -
C:\Windows\SysWOW64\Ekqqea32.exeC:\Windows\system32\Ekqqea32.exe34⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\Ffokan32.exeC:\Windows\system32\Ffokan32.exe35⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\Fcckjb32.exeC:\Windows\system32\Fcckjb32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Fpliec32.exeC:\Windows\system32\Fpliec32.exe37⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\Fpnekc32.exeC:\Windows\system32\Fpnekc32.exe38⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\Gabohk32.exeC:\Windows\system32\Gabohk32.exe39⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\Glgcec32.exeC:\Windows\system32\Glgcec32.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:556 -
C:\Windows\SysWOW64\Gjomlp32.exeC:\Windows\system32\Gjomlp32.exe41⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Gdgadeee.exeC:\Windows\system32\Gdgadeee.exe42⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\Hdjnje32.exeC:\Windows\system32\Hdjnje32.exe43⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\Hmbbcjic.exeC:\Windows\system32\Hmbbcjic.exe44⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\Hemggm32.exeC:\Windows\system32\Hemggm32.exe45⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\Hbagaa32.exeC:\Windows\system32\Hbagaa32.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\Hbcdfq32.exeC:\Windows\system32\Hbcdfq32.exe47⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\Hinlck32.exeC:\Windows\system32\Hinlck32.exe48⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\Haiagm32.exeC:\Windows\system32\Haiagm32.exe49⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\Iaknmm32.exeC:\Windows\system32\Iaknmm32.exe50⤵
- Executes dropped EXE
PID:596 -
C:\Windows\SysWOW64\Ighfecdb.exeC:\Windows\system32\Ighfecdb.exe51⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\Ihgcof32.exeC:\Windows\system32\Ihgcof32.exe52⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\Ipbgci32.exeC:\Windows\system32\Ipbgci32.exe53⤵
- Executes dropped EXE
PID:2696 -
C:\Windows\SysWOW64\Ikhlaaif.exeC:\Windows\system32\Ikhlaaif.exe54⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\Igomfb32.exeC:\Windows\system32\Igomfb32.exe55⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\Jhbfcj32.exeC:\Windows\system32\Jhbfcj32.exe56⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Jbmgapgc.exeC:\Windows\system32\Jbmgapgc.exe57⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\Jndgfqlh.exeC:\Windows\system32\Jndgfqlh.exe58⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Jocdqc32.exeC:\Windows\system32\Jocdqc32.exe59⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\Jqeqhlii.exeC:\Windows\system32\Jqeqhlii.exe60⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\Kjmeaa32.exeC:\Windows\system32\Kjmeaa32.exe61⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\Kgaejeoc.exeC:\Windows\system32\Kgaejeoc.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\Kffblb32.exeC:\Windows\system32\Kffblb32.exe63⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\Knmjmodm.exeC:\Windows\system32\Knmjmodm.exe64⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\Kmbgnl32.exeC:\Windows\system32\Kmbgnl32.exe65⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\SysWOW64\Kcmpjfqa.exeC:\Windows\system32\Kcmpjfqa.exe66⤵PID:2080
-
C:\Windows\SysWOW64\Kkhdohnm.exeC:\Windows\system32\Kkhdohnm.exe67⤵PID:1764
-
C:\Windows\SysWOW64\Lmgaikep.exeC:\Windows\system32\Lmgaikep.exe68⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\Lfpebq32.exeC:\Windows\system32\Lfpebq32.exe69⤵PID:1504
-
C:\Windows\SysWOW64\Leebcm32.exeC:\Windows\system32\Leebcm32.exe70⤵PID:2544
-
C:\Windows\SysWOW64\Lalchnfl.exeC:\Windows\system32\Lalchnfl.exe71⤵PID:632
-
C:\Windows\SysWOW64\Lmbcmo32.exeC:\Windows\system32\Lmbcmo32.exe72⤵PID:2756
-
C:\Windows\SysWOW64\Mmepboin.exeC:\Windows\system32\Mmepboin.exe73⤵PID:2736
-
C:\Windows\SysWOW64\Milagp32.exeC:\Windows\system32\Milagp32.exe74⤵
- Drops file in System32 directory
PID:2676 -
C:\Windows\SysWOW64\Minnmomo.exeC:\Windows\system32\Minnmomo.exe75⤵PID:2788
-
C:\Windows\SysWOW64\Mmlfcn32.exeC:\Windows\system32\Mmlfcn32.exe76⤵PID:304
-
C:\Windows\SysWOW64\Neihmpon.exeC:\Windows\system32\Neihmpon.exe77⤵
- Modifies registry class
PID:592 -
C:\Windows\SysWOW64\Nkfpefme.exeC:\Windows\system32\Nkfpefme.exe78⤵
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\Nhjaok32.exeC:\Windows\system32\Nhjaok32.exe79⤵PID:2104
-
C:\Windows\SysWOW64\Nkkjpf32.exeC:\Windows\system32\Nkkjpf32.exe80⤵PID:2284
-
C:\Windows\SysWOW64\Nmifla32.exeC:\Windows\system32\Nmifla32.exe81⤵PID:1588
-
C:\Windows\SysWOW64\Nkmffegm.exeC:\Windows\system32\Nkmffegm.exe82⤵PID:1732
-
C:\Windows\SysWOW64\Ngdgkf32.exeC:\Windows\system32\Ngdgkf32.exe83⤵PID:2412
-
C:\Windows\SysWOW64\Olapcm32.exeC:\Windows\system32\Olapcm32.exe84⤵PID:964
-
C:\Windows\SysWOW64\Olclimif.exeC:\Windows\system32\Olclimif.exe85⤵PID:1848
-
C:\Windows\SysWOW64\Oekaab32.exeC:\Windows\system32\Oekaab32.exe86⤵PID:2320
-
C:\Windows\SysWOW64\Oenngb32.exeC:\Windows\system32\Oenngb32.exe87⤵PID:2520
-
C:\Windows\SysWOW64\Oofbph32.exeC:\Windows\system32\Oofbph32.exe88⤵PID:2948
-
C:\Windows\SysWOW64\Okmceiii.exeC:\Windows\system32\Okmceiii.exe89⤵PID:2912
-
C:\Windows\SysWOW64\Onkoadhm.exeC:\Windows\system32\Onkoadhm.exe90⤵PID:2568
-
C:\Windows\SysWOW64\Pokkkgpo.exeC:\Windows\system32\Pokkkgpo.exe91⤵PID:2920
-
C:\Windows\SysWOW64\Aacjba32.exeC:\Windows\system32\Aacjba32.exe92⤵PID:2680
-
C:\Windows\SysWOW64\Acfpilmp.exeC:\Windows\system32\Acfpilmp.exe93⤵PID:1108
-
C:\Windows\SysWOW64\Bchmolkm.exeC:\Windows\system32\Bchmolkm.exe94⤵PID:1200
-
C:\Windows\SysWOW64\Bhmonoli.exeC:\Windows\system32\Bhmonoli.exe95⤵PID:1132
-
C:\Windows\SysWOW64\Bbbckh32.exeC:\Windows\system32\Bbbckh32.exe96⤵PID:320
-
C:\Windows\SysWOW64\Coidpiac.exeC:\Windows\system32\Coidpiac.exe97⤵PID:828
-
C:\Windows\SysWOW64\Ceclmc32.exeC:\Windows\system32\Ceclmc32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2252 -
C:\Windows\SysWOW64\Ceeibbgn.exeC:\Windows\system32\Ceeibbgn.exe99⤵
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\Cpojcpcm.exeC:\Windows\system32\Cpojcpcm.exe100⤵
- System Location Discovery: System Language Discovery
PID:612 -
C:\Windows\SysWOW64\Ckdnpicb.exeC:\Windows\system32\Ckdnpicb.exe101⤵PID:1692
-
C:\Windows\SysWOW64\Ckgkfi32.exeC:\Windows\system32\Ckgkfi32.exe102⤵PID:2308
-
C:\Windows\SysWOW64\Doipoldo.exeC:\Windows\system32\Doipoldo.exe103⤵PID:2556
-
C:\Windows\SysWOW64\Dokmel32.exeC:\Windows\system32\Dokmel32.exe104⤵PID:1600
-
C:\Windows\SysWOW64\Diqabd32.exeC:\Windows\system32\Diqabd32.exe105⤵
- Modifies registry class
PID:2208 -
C:\Windows\SysWOW64\Dlajdpoc.exeC:\Windows\system32\Dlajdpoc.exe106⤵PID:2084
-
C:\Windows\SysWOW64\Dejnme32.exeC:\Windows\system32\Dejnme32.exe107⤵PID:1992
-
C:\Windows\SysWOW64\Ekicjlai.exeC:\Windows\system32\Ekicjlai.exe108⤵PID:2892
-
C:\Windows\SysWOW64\Ecdhonoc.exeC:\Windows\system32\Ecdhonoc.exe109⤵PID:2828
-
C:\Windows\SysWOW64\Efeaqi32.exeC:\Windows\system32\Efeaqi32.exe110⤵PID:980
-
C:\Windows\SysWOW64\Elafbcao.exeC:\Windows\system32\Elafbcao.exe111⤵
- Modifies registry class
PID:332 -
C:\Windows\SysWOW64\Efjklh32.exeC:\Windows\system32\Efjklh32.exe112⤵PID:528
-
C:\Windows\SysWOW64\Fflgahfm.exeC:\Windows\system32\Fflgahfm.exe113⤵PID:1868
-
C:\Windows\SysWOW64\Fnglekch.exeC:\Windows\system32\Fnglekch.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:952 -
C:\Windows\SysWOW64\Fniikj32.exeC:\Windows\system32\Fniikj32.exe115⤵PID:1260
-
C:\Windows\SysWOW64\Fknido32.exeC:\Windows\system32\Fknido32.exe116⤵PID:1380
-
C:\Windows\SysWOW64\Fefnmdfo.exeC:\Windows\system32\Fefnmdfo.exe117⤵PID:1532
-
C:\Windows\SysWOW64\Fjbfek32.exeC:\Windows\system32\Fjbfek32.exe118⤵
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Gckknqkg.exeC:\Windows\system32\Gckknqkg.exe119⤵PID:2576
-
C:\Windows\SysWOW64\Gijplg32.exeC:\Windows\system32\Gijplg32.exe120⤵PID:1696
-
C:\Windows\SysWOW64\Gbbdemnl.exeC:\Windows\system32\Gbbdemnl.exe121⤵PID:1476
-
C:\Windows\SysWOW64\Gbeakllj.exeC:\Windows\system32\Gbeakllj.exe122⤵
- Drops file in System32 directory
PID:2460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-