Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
755cb21601ea9b36989fd63cb22d7970N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
755cb21601ea9b36989fd63cb22d7970N.exe
Resource
win10v2004-20240802-en
General
-
Target
755cb21601ea9b36989fd63cb22d7970N.exe
-
Size
1.8MB
-
MD5
755cb21601ea9b36989fd63cb22d7970
-
SHA1
9b80ec2c39f7a83af9602e881e07d73e43958983
-
SHA256
cd236eb44a904a1001ccf5b90be9a5f4d9f2444364f70463c5340e863896dd04
-
SHA512
7cecbbbc60f6308aef9304ee6b668168f0402b1d0f35ebfed4c163576604c60da91c4ea6237715a8360394ce56c5d94860b62b15c339f68ab518630091f8301a
-
SSDEEP
24576:ApKm2Nys/q1tF1Pm0jdA5uBAdpFZymfDdGsJm1OVmfihT:A12Nys/q1tF1Pm0jdFmyMPT
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bljkgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgbhibkd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfdfhgko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfgcnfil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Maoejcim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nackdfgc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgoejm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjhlea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbigio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgjile32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gngend32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hobgbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjlnig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 755cb21601ea9b36989fd63cb22d7970N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Filnlg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkgcic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ociooe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caffkapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgoejm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqhblm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkhqnoci.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmblfiho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odddfadd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejjjef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfieccco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejbjidmm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmocpbbm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfgpom32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehhjkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kokcfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lihajcfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idhcqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Namedgnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Leoaod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oihclk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iedmjhkh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkhqnoci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efpdoqjm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqjepofl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpfnbkfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpikhk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mckdaojc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Naoaig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cacjebbl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmimqgnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iecfpa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdgcniko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faihlcnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghppaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlgigemg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apcjbeea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfgdhkki.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmffpdoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmblfiho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjmodpoe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcpgmiph.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmleqnbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcgbhiia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feboahlo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdljaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kipafe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaagoqcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nollblqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Filnlg32.exe -
Executes dropped EXE 64 IoCs
pid Process 1820 Bpqgcq32.exe 2684 Dqcqgc32.exe 2844 Dgoejm32.exe 2884 Feglmd32.exe 2728 Filnlg32.exe 2608 Feboahlo.exe 2452 Gmicai32.exe 940 Kcofnejq.exe 2652 Niangl32.exe 2784 Nlaghg32.exe 1956 Nkgcic32.exe 2388 Ngpadd32.exe 1084 Ociooe32.exe 1320 Oihclk32.exe 2164 Obcekq32.exe 1880 Pqhblm32.exe 1672 Pbhnfpoe.exe 1752 Pnooka32.exe 1376 Pjeppb32.exe 2920 Pjhlea32.exe 2284 Qbcajdee.exe 2512 Qbenoccc.exe 2212 Anlodd32.exe 876 Abjgjc32.exe 2100 Aaodlode.exe 2232 Aemmanjl.exe 2228 Bpfnbkfk.exe 2848 Bpikhk32.exe 2852 Bdgcniko.exe 2604 Boqdng32.exe 2832 Bcnmdend.exe 3028 Cacjebbl.exe 1052 Caffkapi.exe 2432 Cdfpmm32.exe 1740 Ccllnibb.exe 1816 Cppmgm32.exe 1712 Dpbjmm32.exe 1172 Encjpebq.exe 2316 Ejjjef32.exe 1976 Efakjgni.exe 2288 Fjaqeebm.exe 2960 Fifnfage.exe 848 Fadoqc32.exe 2352 Febgfbhc.exe 2140 Faihlcnh.exe 2584 Gpnemo32.exe 1448 Gppbbo32.exe 2312 Gpbohooj.exe 2180 Gliomp32.exe 1764 Ghppaq32.exe 2492 Hhbmgp32.exe 2104 Hefmqdgj.exe 868 Hdljaa32.exe 1060 Hdnggq32.exe 2528 Igopilfp.exe 2224 Iedmjhkh.exe 1524 Igcidk32.exe 2216 Ifhfeggb.exe 2600 Idncfdlj.exe 2640 Jhlllb32.exe 2900 Jgaino32.exe 1532 Jchjbpmm.exe 944 Jcjfho32.exe 936 Jfkojj32.exe -
Loads dropped DLL 64 IoCs
pid Process 2176 755cb21601ea9b36989fd63cb22d7970N.exe 2176 755cb21601ea9b36989fd63cb22d7970N.exe 1820 Bpqgcq32.exe 1820 Bpqgcq32.exe 2684 Dqcqgc32.exe 2684 Dqcqgc32.exe 2844 Dgoejm32.exe 2844 Dgoejm32.exe 2884 Feglmd32.exe 2884 Feglmd32.exe 2728 Filnlg32.exe 2728 Filnlg32.exe 2608 Feboahlo.exe 2608 Feboahlo.exe 2452 Gmicai32.exe 2452 Gmicai32.exe 940 Kcofnejq.exe 940 Kcofnejq.exe 2652 Niangl32.exe 2652 Niangl32.exe 2784 Nlaghg32.exe 2784 Nlaghg32.exe 1956 Nkgcic32.exe 1956 Nkgcic32.exe 2388 Ngpadd32.exe 2388 Ngpadd32.exe 1084 Ociooe32.exe 1084 Ociooe32.exe 1320 Oihclk32.exe 1320 Oihclk32.exe 2164 Obcekq32.exe 2164 Obcekq32.exe 1880 Pqhblm32.exe 1880 Pqhblm32.exe 1672 Pbhnfpoe.exe 1672 Pbhnfpoe.exe 1752 Pnooka32.exe 1752 Pnooka32.exe 1376 Pjeppb32.exe 1376 Pjeppb32.exe 2920 Pjhlea32.exe 2920 Pjhlea32.exe 2284 Qbcajdee.exe 2284 Qbcajdee.exe 2512 Qbenoccc.exe 2512 Qbenoccc.exe 2212 Anlodd32.exe 2212 Anlodd32.exe 876 Abjgjc32.exe 876 Abjgjc32.exe 2100 Aaodlode.exe 2100 Aaodlode.exe 2232 Aemmanjl.exe 2232 Aemmanjl.exe 2228 Bpfnbkfk.exe 2228 Bpfnbkfk.exe 2848 Bpikhk32.exe 2848 Bpikhk32.exe 2852 Bdgcniko.exe 2852 Bdgcniko.exe 2604 Boqdng32.exe 2604 Boqdng32.exe 2832 Bcnmdend.exe 2832 Bcnmdend.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nlnnjada.dll Bpikhk32.exe File created C:\Windows\SysWOW64\Ijmffknn.dll Mkhqnoci.exe File created C:\Windows\SysWOW64\Icogicoo.dll Ipocfobh.exe File opened for modification C:\Windows\SysWOW64\Jneadc32.exe Ilfdkp32.exe File opened for modification C:\Windows\SysWOW64\Naoaig32.exe Namedgnk.exe File created C:\Windows\SysWOW64\Abjgjc32.exe Anlodd32.exe File created C:\Windows\SysWOW64\Bcnmdend.exe Boqdng32.exe File opened for modification C:\Windows\SysWOW64\Ifhfeggb.exe Igcidk32.exe File created C:\Windows\SysWOW64\Mfomnefg.dll Feglmd32.exe File created C:\Windows\SysWOW64\Feboahlo.exe Filnlg32.exe File opened for modification C:\Windows\SysWOW64\Labllf32.exe Lellfe32.exe File created C:\Windows\SysWOW64\Pjeppb32.exe Pnooka32.exe File created C:\Windows\SysWOW64\Foiijogl.dll Efakjgni.exe File opened for modification C:\Windows\SysWOW64\Lmimqgnn.exe Labllf32.exe File created C:\Windows\SysWOW64\Cgpkcbmg.exe Cgmonc32.exe File created C:\Windows\SysWOW64\Efngjalp.exe Eflkda32.exe File created C:\Windows\SysWOW64\Gaagoqcp.exe Gaokjaeb.exe File opened for modification C:\Windows\SysWOW64\Jchjbpmm.exe Jgaino32.exe File opened for modification C:\Windows\SysWOW64\Mpopma32.exe Mmnflf32.exe File created C:\Windows\SysWOW64\Mkhqnoci.exe Mpopma32.exe File opened for modification C:\Windows\SysWOW64\Pgjile32.exe Pfgpom32.exe File created C:\Windows\SysWOW64\Odddfadd.exe Nackdfgc.exe File created C:\Windows\SysWOW64\Acpcii32.dll Bdgcniko.exe File created C:\Windows\SysWOW64\Gfjdhm32.dll Encjpebq.exe File opened for modification C:\Windows\SysWOW64\Fifnfage.exe Fjaqeebm.exe File created C:\Windows\SysWOW64\Dcjmpg32.dll Jhlllb32.exe File opened for modification C:\Windows\SysWOW64\Kineaecj.exe Kikhkeel.exe File created C:\Windows\SysWOW64\Ipbhmp32.dll Llkfan32.exe File created C:\Windows\SysWOW64\Jgaino32.exe Jhlllb32.exe File opened for modification C:\Windows\SysWOW64\Kjlnig32.exe Kbaidejd.exe File created C:\Windows\SysWOW64\Qgpkfd32.dll Amcaqj32.exe File created C:\Windows\SysWOW64\Padece32.dll Nmblfiho.exe File created C:\Windows\SysWOW64\Nackdfgc.exe Nmfbohal.exe File created C:\Windows\SysWOW64\Dqcqgc32.exe Bpqgcq32.exe File created C:\Windows\SysWOW64\Fcpgmiph.exe Fjgcdc32.exe File opened for modification C:\Windows\SysWOW64\Gmghdahd.exe Gaagoqcp.exe File created C:\Windows\SysWOW64\Ihpflo32.dll Kjlnig32.exe File created C:\Windows\SysWOW64\Oiglfmom.dll Naoaig32.exe File created C:\Windows\SysWOW64\Cgbhibkd.exe Cgpkcbmg.exe File created C:\Windows\SysWOW64\Mdmeabil.dll Kfconhmc.exe File created C:\Windows\SysWOW64\Goccgj32.dll Nmfbohal.exe File opened for modification C:\Windows\SysWOW64\Cgmonc32.exe Bdmflh32.exe File opened for modification C:\Windows\SysWOW64\Lgbgfofa.exe Llkfan32.exe File opened for modification C:\Windows\SysWOW64\Odddfadd.exe Nackdfgc.exe File opened for modification C:\Windows\SysWOW64\Pqhblm32.exe Obcekq32.exe File opened for modification C:\Windows\SysWOW64\Qbenoccc.exe Qbcajdee.exe File created C:\Windows\SysWOW64\Jpedcc32.dll Aaodlode.exe File opened for modification C:\Windows\SysWOW64\Cdfpmm32.exe Caffkapi.exe File opened for modification C:\Windows\SysWOW64\Idhcqn32.exe Iecfpa32.exe File created C:\Windows\SysWOW64\Plaodphk.dll Idhcqn32.exe File created C:\Windows\SysWOW64\Fhgflj32.dll Feboahlo.exe File created C:\Windows\SysWOW64\Lnkoao32.dll Mckdaojc.exe File created C:\Windows\SysWOW64\Gliomp32.exe Gpbohooj.exe File created C:\Windows\SysWOW64\Oikonihp.dll Iedmjhkh.exe File created C:\Windows\SysWOW64\Nddbln32.dll Amnheklf.exe File created C:\Windows\SysWOW64\Ehhjkm32.exe Dnnijocj.exe File created C:\Windows\SysWOW64\Kokcfn32.exe Kfconhmc.exe File opened for modification C:\Windows\SysWOW64\Filnlg32.exe Feglmd32.exe File created C:\Windows\SysWOW64\Kikhkeel.exe Jfkojj32.exe File opened for modification C:\Windows\SysWOW64\Iddieoqi.exe Ilheam32.exe File created C:\Windows\SysWOW64\Agblkhpc.dll Iddieoqi.exe File created C:\Windows\SysWOW64\Hjoefnpn.dll Jgaino32.exe File created C:\Windows\SysWOW64\Kjaohmno.dll Labllf32.exe File opened for modification C:\Windows\SysWOW64\Maoejcim.exe Mckdaojc.exe -
Program crash 1 IoCs
pid pid_target Process 2664 3808 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqamjb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abjgjc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fifnfage.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkhqnoci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgjile32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hfdfhgko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgbgfofa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caffkapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gliomp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpopma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmpppijb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcpgmiph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilfdkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfhljd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oonego32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Feglmd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ociooe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghppaq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfieccco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hobgbi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdljaa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kegbkffk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgbhibkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Commmdhp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpbjmm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Febgfbhc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgaino32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amnheklf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apcjbeea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cckeccnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gicfeogg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Naoaig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcofnejq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkgcic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhbmgp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iedmjhkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jhlllb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qbenoccc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgpkcbmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnnijocj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gaagoqcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilheam32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmimqgnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aalqlibl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blodbffq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqhblm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pbhnfpoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bcnmdend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cacjebbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cppmgm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jagfnf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Niangl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkmjio32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnefdqke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnooka32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maoejcim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nollblqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpqgcq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjeppb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdfpmm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ejbjidmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idhcqn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obcekq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lellfe32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmocpbbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qbcajdee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpopma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcadpj32.dll" Hoddhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjlnig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbhnfpoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnjdbo32.dll" Dnefdqke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bpfnbkfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boqdng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgjile32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmbefc32.dll" Apcjbeea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eqjepofl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jneadc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nekjkl32.dll" Dqcqgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eniani32.dll" Qbcajdee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcgbhiia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lndejb32.dll" Jchjbpmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dodcncbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gicfeogg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjlnig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bpqgcq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjaqeebm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifhfeggb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lellfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdgcniko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjbbpfmo.dll" Gppbbo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpopma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkhqnoci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfgpom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjmbei32.dll" Cdfpmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdgjpb32.dll" Lmimqgnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fadoqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgcflmnb.dll" Ghppaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbcbih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngpadd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnooka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oepcbpdp.dll" Gngend32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dohoqich.dll" Kbaidejd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nackdfgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Niangl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Moohajdi.dll" Faihlcnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fiebko32.dll" Blodbffq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfieccco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Obcekq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkmjio32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehhjkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agblkhpc.dll" Iddieoqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkgcic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcjmpg32.dll" Jhlllb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egmmbjdp.dll" Ehhjkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acpcii32.dll" Bdgcniko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgaino32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cddoggde.dll" Fadoqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gppbbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emidnali.dll" Nmpppijb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmblfiho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppjfgqhg.dll" Bdmflh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikhbhpao.dll" Nlaghg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlaghg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijmffknn.dll" Mkhqnoci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnnijocj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efpdoqjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efnekmmb.dll" Jcgbhiia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oopidofg.dll" Odddfadd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1820 2176 755cb21601ea9b36989fd63cb22d7970N.exe 29 PID 2176 wrote to memory of 1820 2176 755cb21601ea9b36989fd63cb22d7970N.exe 29 PID 2176 wrote to memory of 1820 2176 755cb21601ea9b36989fd63cb22d7970N.exe 29 PID 2176 wrote to memory of 1820 2176 755cb21601ea9b36989fd63cb22d7970N.exe 29 PID 1820 wrote to memory of 2684 1820 Bpqgcq32.exe 30 PID 1820 wrote to memory of 2684 1820 Bpqgcq32.exe 30 PID 1820 wrote to memory of 2684 1820 Bpqgcq32.exe 30 PID 1820 wrote to memory of 2684 1820 Bpqgcq32.exe 30 PID 2684 wrote to memory of 2844 2684 Dqcqgc32.exe 31 PID 2684 wrote to memory of 2844 2684 Dqcqgc32.exe 31 PID 2684 wrote to memory of 2844 2684 Dqcqgc32.exe 31 PID 2684 wrote to memory of 2844 2684 Dqcqgc32.exe 31 PID 2844 wrote to memory of 2884 2844 Dgoejm32.exe 32 PID 2844 wrote to memory of 2884 2844 Dgoejm32.exe 32 PID 2844 wrote to memory of 2884 2844 Dgoejm32.exe 32 PID 2844 wrote to memory of 2884 2844 Dgoejm32.exe 32 PID 2884 wrote to memory of 2728 2884 Feglmd32.exe 33 PID 2884 wrote to memory of 2728 2884 Feglmd32.exe 33 PID 2884 wrote to memory of 2728 2884 Feglmd32.exe 33 PID 2884 wrote to memory of 2728 2884 Feglmd32.exe 33 PID 2728 wrote to memory of 2608 2728 Filnlg32.exe 34 PID 2728 wrote to memory of 2608 2728 Filnlg32.exe 34 PID 2728 wrote to memory of 2608 2728 Filnlg32.exe 34 PID 2728 wrote to memory of 2608 2728 Filnlg32.exe 34 PID 2608 wrote to memory of 2452 2608 Feboahlo.exe 35 PID 2608 wrote to memory of 2452 2608 Feboahlo.exe 35 PID 2608 wrote to memory of 2452 2608 Feboahlo.exe 35 PID 2608 wrote to memory of 2452 2608 Feboahlo.exe 35 PID 2452 wrote to memory of 940 2452 Gmicai32.exe 36 PID 2452 wrote to memory of 940 2452 Gmicai32.exe 36 PID 2452 wrote to memory of 940 2452 Gmicai32.exe 36 PID 2452 wrote to memory of 940 2452 Gmicai32.exe 36 PID 940 wrote to memory of 2652 940 Kcofnejq.exe 37 PID 940 wrote to memory of 2652 940 Kcofnejq.exe 37 PID 940 wrote to memory of 2652 940 Kcofnejq.exe 37 PID 940 wrote to memory of 2652 940 Kcofnejq.exe 37 PID 2652 wrote to memory of 2784 2652 Niangl32.exe 38 PID 2652 wrote to memory of 2784 2652 Niangl32.exe 38 PID 2652 wrote to memory of 2784 2652 Niangl32.exe 38 PID 2652 wrote to memory of 2784 2652 Niangl32.exe 38 PID 2784 wrote to memory of 1956 2784 Nlaghg32.exe 39 PID 2784 wrote to memory of 1956 2784 Nlaghg32.exe 39 PID 2784 wrote to memory of 1956 2784 Nlaghg32.exe 39 PID 2784 wrote to memory of 1956 2784 Nlaghg32.exe 39 PID 1956 wrote to memory of 2388 1956 Nkgcic32.exe 40 PID 1956 wrote to memory of 2388 1956 Nkgcic32.exe 40 PID 1956 wrote to memory of 2388 1956 Nkgcic32.exe 40 PID 1956 wrote to memory of 2388 1956 Nkgcic32.exe 40 PID 2388 wrote to memory of 1084 2388 Ngpadd32.exe 41 PID 2388 wrote to memory of 1084 2388 Ngpadd32.exe 41 PID 2388 wrote to memory of 1084 2388 Ngpadd32.exe 41 PID 2388 wrote to memory of 1084 2388 Ngpadd32.exe 41 PID 1084 wrote to memory of 1320 1084 Ociooe32.exe 42 PID 1084 wrote to memory of 1320 1084 Ociooe32.exe 42 PID 1084 wrote to memory of 1320 1084 Ociooe32.exe 42 PID 1084 wrote to memory of 1320 1084 Ociooe32.exe 42 PID 1320 wrote to memory of 2164 1320 Oihclk32.exe 43 PID 1320 wrote to memory of 2164 1320 Oihclk32.exe 43 PID 1320 wrote to memory of 2164 1320 Oihclk32.exe 43 PID 1320 wrote to memory of 2164 1320 Oihclk32.exe 43 PID 2164 wrote to memory of 1880 2164 Obcekq32.exe 44 PID 2164 wrote to memory of 1880 2164 Obcekq32.exe 44 PID 2164 wrote to memory of 1880 2164 Obcekq32.exe 44 PID 2164 wrote to memory of 1880 2164 Obcekq32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\755cb21601ea9b36989fd63cb22d7970N.exe"C:\Users\Admin\AppData\Local\Temp\755cb21601ea9b36989fd63cb22d7970N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\Bpqgcq32.exeC:\Windows\system32\Bpqgcq32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\Dqcqgc32.exeC:\Windows\system32\Dqcqgc32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Dgoejm32.exeC:\Windows\system32\Dgoejm32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Feglmd32.exeC:\Windows\system32\Feglmd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Filnlg32.exeC:\Windows\system32\Filnlg32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Feboahlo.exeC:\Windows\system32\Feboahlo.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Gmicai32.exeC:\Windows\system32\Gmicai32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\Kcofnejq.exeC:\Windows\system32\Kcofnejq.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\Niangl32.exeC:\Windows\system32\Niangl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Nlaghg32.exeC:\Windows\system32\Nlaghg32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Nkgcic32.exeC:\Windows\system32\Nkgcic32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Ngpadd32.exeC:\Windows\system32\Ngpadd32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\Ociooe32.exeC:\Windows\system32\Ociooe32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\Oihclk32.exeC:\Windows\system32\Oihclk32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\Obcekq32.exeC:\Windows\system32\Obcekq32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\Pqhblm32.exeC:\Windows\system32\Pqhblm32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Windows\SysWOW64\Pbhnfpoe.exeC:\Windows\system32\Pbhnfpoe.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\Pnooka32.exeC:\Windows\system32\Pnooka32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1752 -
C:\Windows\SysWOW64\Pjeppb32.exeC:\Windows\system32\Pjeppb32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\Pjhlea32.exeC:\Windows\system32\Pjhlea32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2920 -
C:\Windows\SysWOW64\Qbcajdee.exeC:\Windows\system32\Qbcajdee.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2284 -
C:\Windows\SysWOW64\Qbenoccc.exeC:\Windows\system32\Qbenoccc.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\Anlodd32.exeC:\Windows\system32\Anlodd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2212 -
C:\Windows\SysWOW64\Abjgjc32.exeC:\Windows\system32\Abjgjc32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\SysWOW64\Aaodlode.exeC:\Windows\system32\Aaodlode.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\Aemmanjl.exeC:\Windows\system32\Aemmanjl.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2232 -
C:\Windows\SysWOW64\Bpfnbkfk.exeC:\Windows\system32\Bpfnbkfk.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2228 -
C:\Windows\SysWOW64\Bpikhk32.exeC:\Windows\system32\Bpikhk32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Bdgcniko.exeC:\Windows\system32\Bdgcniko.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2852 -
C:\Windows\SysWOW64\Boqdng32.exeC:\Windows\system32\Boqdng32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2604 -
C:\Windows\SysWOW64\Bcnmdend.exeC:\Windows\system32\Bcnmdend.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\Cacjebbl.exeC:\Windows\system32\Cacjebbl.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\Caffkapi.exeC:\Windows\system32\Caffkapi.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\Cdfpmm32.exeC:\Windows\system32\Cdfpmm32.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2432 -
C:\Windows\SysWOW64\Ccllnibb.exeC:\Windows\system32\Ccllnibb.exe36⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Cppmgm32.exeC:\Windows\system32\Cppmgm32.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Windows\SysWOW64\Dpbjmm32.exeC:\Windows\system32\Dpbjmm32.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\SysWOW64\Encjpebq.exeC:\Windows\system32\Encjpebq.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1172 -
C:\Windows\SysWOW64\Ejjjef32.exeC:\Windows\system32\Ejjjef32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\Efakjgni.exeC:\Windows\system32\Efakjgni.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1976 -
C:\Windows\SysWOW64\Fjaqeebm.exeC:\Windows\system32\Fjaqeebm.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Fifnfage.exeC:\Windows\system32\Fifnfage.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\Fadoqc32.exeC:\Windows\system32\Fadoqc32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:848 -
C:\Windows\SysWOW64\Febgfbhc.exeC:\Windows\system32\Febgfbhc.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\Faihlcnh.exeC:\Windows\system32\Faihlcnh.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\Gpnemo32.exeC:\Windows\system32\Gpnemo32.exe47⤵
- Executes dropped EXE
PID:2584 -
C:\Windows\SysWOW64\Gppbbo32.exeC:\Windows\system32\Gppbbo32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:1448 -
C:\Windows\SysWOW64\Gpbohooj.exeC:\Windows\system32\Gpbohooj.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\Gliomp32.exeC:\Windows\system32\Gliomp32.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\Ghppaq32.exeC:\Windows\system32\Ghppaq32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1764 -
C:\Windows\SysWOW64\Hhbmgp32.exeC:\Windows\system32\Hhbmgp32.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\Hefmqdgj.exeC:\Windows\system32\Hefmqdgj.exe53⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\Hdljaa32.exeC:\Windows\system32\Hdljaa32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868 -
C:\Windows\SysWOW64\Hdnggq32.exeC:\Windows\system32\Hdnggq32.exe55⤵
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\Igopilfp.exeC:\Windows\system32\Igopilfp.exe56⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\Iedmjhkh.exeC:\Windows\system32\Iedmjhkh.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\Igcidk32.exeC:\Windows\system32\Igcidk32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1524 -
C:\Windows\SysWOW64\Ifhfeggb.exeC:\Windows\system32\Ifhfeggb.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:2216 -
C:\Windows\SysWOW64\Idncfdlj.exeC:\Windows\system32\Idncfdlj.exe60⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\Jhlllb32.exeC:\Windows\system32\Jhlllb32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2640 -
C:\Windows\SysWOW64\Jgaino32.exeC:\Windows\system32\Jgaino32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2900 -
C:\Windows\SysWOW64\Jchjbpmm.exeC:\Windows\system32\Jchjbpmm.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:1532 -
C:\Windows\SysWOW64\Jcjfho32.exeC:\Windows\system32\Jcjfho32.exe64⤵
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\Jfkojj32.exeC:\Windows\system32\Jfkojj32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\Kikhkeel.exeC:\Windows\system32\Kikhkeel.exe66⤵
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\Kineaecj.exeC:\Windows\system32\Kineaecj.exe67⤵PID:976
-
C:\Windows\SysWOW64\Kipafe32.exeC:\Windows\system32\Kipafe32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2324 -
C:\Windows\SysWOW64\Kegbkffk.exeC:\Windows\system32\Kegbkffk.exe69⤵
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\Lclombkc.exeC:\Windows\system32\Lclombkc.exe70⤵PID:2692
-
C:\Windows\SysWOW64\Lellfe32.exeC:\Windows\system32\Lellfe32.exe71⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1516 -
C:\Windows\SysWOW64\Labllf32.exeC:\Windows\system32\Labllf32.exe72⤵
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\Lmimqgnn.exeC:\Windows\system32\Lmimqgnn.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Llnjac32.exeC:\Windows\system32\Llnjac32.exe74⤵PID:2188
-
C:\Windows\SysWOW64\Mmnflf32.exeC:\Windows\system32\Mmnflf32.exe75⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\Mpopma32.exeC:\Windows\system32\Mpopma32.exe76⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Mkhqnoci.exeC:\Windows\system32\Mkhqnoci.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:916 -
C:\Windows\SysWOW64\Mofidn32.exeC:\Windows\system32\Mofidn32.exe78⤵PID:2504
-
C:\Windows\SysWOW64\Mkmjio32.exeC:\Windows\system32\Mkmjio32.exe79⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\Nmnckj32.exeC:\Windows\system32\Nmnckj32.exe80⤵PID:1096
-
C:\Windows\SysWOW64\Nmpppijb.exeC:\Windows\system32\Nmpppijb.exe81⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Nmblfiho.exeC:\Windows\system32\Nmblfiho.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2632 -
C:\Windows\SysWOW64\Nlgigemg.exeC:\Windows\system32\Nlgigemg.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3036 -
C:\Windows\SysWOW64\Pbigio32.exeC:\Windows\system32\Pbigio32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2724 -
C:\Windows\SysWOW64\Pfgpom32.exeC:\Windows\system32\Pfgpom32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2136 -
C:\Windows\SysWOW64\Pgjile32.exeC:\Windows\system32\Pgjile32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1856 -
C:\Windows\SysWOW64\Qgmfbe32.exeC:\Windows\system32\Qgmfbe32.exe87⤵PID:1368
-
C:\Windows\SysWOW64\Qjmodpoe.exeC:\Windows\system32\Qjmodpoe.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2200 -
C:\Windows\SysWOW64\Amnheklf.exeC:\Windows\system32\Amnheklf.exe89⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\Aalqlibl.exeC:\Windows\system32\Aalqlibl.exe90⤵
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\Amcaqj32.exeC:\Windows\system32\Amcaqj32.exe91⤵
- Drops file in System32 directory
PID:2416 -
C:\Windows\SysWOW64\Apcjbeea.exeC:\Windows\system32\Apcjbeea.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1220 -
C:\Windows\SysWOW64\Bljkgf32.exeC:\Windows\system32\Bljkgf32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2272 -
C:\Windows\SysWOW64\Blmhmf32.exeC:\Windows\system32\Blmhmf32.exe94⤵PID:2472
-
C:\Windows\SysWOW64\Blodbffq.exeC:\Windows\system32\Blodbffq.exe95⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2380 -
C:\Windows\SysWOW64\Bfieccco.exeC:\Windows\system32\Bfieccco.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\Bdmflh32.exeC:\Windows\system32\Bdmflh32.exe97⤵
- Drops file in System32 directory
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Cgmonc32.exeC:\Windows\system32\Cgmonc32.exe98⤵
- Drops file in System32 directory
PID:2964 -
C:\Windows\SysWOW64\Cgpkcbmg.exeC:\Windows\system32\Cgpkcbmg.exe99⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\Cgbhibkd.exeC:\Windows\system32\Cgbhibkd.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Windows\SysWOW64\Commmdhp.exeC:\Windows\system32\Commmdhp.exe101⤵
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\Cckeccnf.exeC:\Windows\system32\Cckeccnf.exe102⤵
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\SysWOW64\Dnefdqke.exeC:\Windows\system32\Dnefdqke.exe103⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3308 -
C:\Windows\SysWOW64\Dodcncbh.exeC:\Windows\system32\Dodcncbh.exe104⤵
- Modifies registry class
PID:3380 -
C:\Windows\SysWOW64\Dnipop32.exeC:\Windows\system32\Dnipop32.exe105⤵PID:3440
-
C:\Windows\SysWOW64\Dlompl32.exeC:\Windows\system32\Dlompl32.exe106⤵PID:3504
-
C:\Windows\SysWOW64\Dnnijocj.exeC:\Windows\system32\Dnnijocj.exe107⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3564 -
C:\Windows\SysWOW64\Ehhjkm32.exeC:\Windows\system32\Ehhjkm32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3628 -
C:\Windows\SysWOW64\Eflkda32.exeC:\Windows\system32\Eflkda32.exe109⤵
- Drops file in System32 directory
PID:3688 -
C:\Windows\SysWOW64\Efngjalp.exeC:\Windows\system32\Efngjalp.exe110⤵PID:3744
-
C:\Windows\SysWOW64\Efpdoqjm.exeC:\Windows\system32\Efpdoqjm.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3800 -
C:\Windows\SysWOW64\Eqjepofl.exeC:\Windows\system32\Eqjepofl.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3860 -
C:\Windows\SysWOW64\Ejbjidmm.exeC:\Windows\system32\Ejbjidmm.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3916 -
C:\Windows\SysWOW64\Fkbfbg32.exeC:\Windows\system32\Fkbfbg32.exe114⤵PID:3976
-
C:\Windows\SysWOW64\Fjgcdc32.exeC:\Windows\system32\Fjgcdc32.exe115⤵
- Drops file in System32 directory
PID:4032 -
C:\Windows\SysWOW64\Fcpgmiph.exeC:\Windows\system32\Fcpgmiph.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\Fpfhaj32.exeC:\Windows\system32\Fpfhaj32.exe117⤵PID:1724
-
C:\Windows\SysWOW64\Fphegici.exeC:\Windows\system32\Fphegici.exe118⤵PID:2440
-
C:\Windows\SysWOW64\Gmleqnbc.exeC:\Windows\system32\Gmleqnbc.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:456 -
C:\Windows\SysWOW64\Gicfeogg.exeC:\Windows\system32\Gicfeogg.exe120⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Gaokjaeb.exeC:\Windows\system32\Gaokjaeb.exe121⤵
- Drops file in System32 directory
PID:2668 -
C:\Windows\SysWOW64\Gaagoqcp.exeC:\Windows\system32\Gaagoqcp.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-