Analysis
-
max time kernel
103s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
a2b6a41f60ee46e1090aa40f894f9a30N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2b6a41f60ee46e1090aa40f894f9a30N.exe
Resource
win10v2004-20240802-en
General
-
Target
a2b6a41f60ee46e1090aa40f894f9a30N.exe
-
Size
844KB
-
MD5
a2b6a41f60ee46e1090aa40f894f9a30
-
SHA1
7696fe93282863437205dfdab588780a22c0240a
-
SHA256
bf8e762820cb91c4a361975851914abd1478cce10404b609c45a2e0e28aefc39
-
SHA512
6ca55d20cd3ca20da51aa94e711b46511cc0880cdb4c235532004babe19e720298b3195c92e0fb84096220d9c4953d680cf0bbd4949a3a9d709abb1d777db06f
-
SSDEEP
24576:4gNyCH5W3TnbQihMpQnqrdX72LbY6x46uR/qYglMi:9yCH5W3TbQihw+cdX2x46uhqllMi
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Depgeiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mfpfbemc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbmoke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lbbmlbej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pmhbbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bamfloef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deanooeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dnfoho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Haiagm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgmfph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gfclic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmidimen.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clmdjmpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mcagma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pgdfbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmipmlan.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Honpqaff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aibjlcli.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbpplglj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfpfbemc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfbnfcli.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Higikdhn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mleedphf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbhdfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnedpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fnlhibff.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnegod32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnbagfdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dqagddge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfcoll32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcmnbbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gbecce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Phiekdeo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cflcglho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdmbiojc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihhlbegd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mjoecjgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aamhdckg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekofijic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qdcdnm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bohejibe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhmijn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppafopqq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bannajom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Odkkdqmd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plnhbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gnkkeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Joomnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkelhemb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnnblfgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bjillfhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cnfnlk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdcahdib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gckknqkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nebijfkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ldcjooac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Noffadai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mjappa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iopgjp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiiapg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hekfpo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlbadj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhpeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjglpncm.exe -
Executes dropped EXE 64 IoCs
pid Process 2388 Aabhiikm.exe 2724 Ajkmbo32.exe 2720 Bbmggp32.exe 2696 Bbpdmp32.exe 2576 Bcbabodk.exe 2640 Eickdlcd.exe 2944 Fhonegbd.exe 2440 Fmnccn32.exe 1272 Hegdinpd.exe 592 Hgbdge32.exe 1816 Jggiah32.exe 960 Knldaf32.exe 1532 Knnagehi.exe 304 Lmjdia32.exe 2136 Mhpeem32.exe 1288 Majfcb32.exe 1728 Odkkdqmd.exe 1268 Ojjqbg32.exe 1328 Pbjoaibo.exe 2312 Pcikllja.exe 1992 Pqdend32.exe 2208 Pafacd32.exe 1804 Aamhdckg.exe 1460 Algida32.exe 2852 Ahbcda32.exe 2688 Blplkp32.exe 2800 Bpdnjb32.exe 2836 Bgablmfa.exe 2612 Cpigeblb.exe 2584 Ckeekp32.exe 3052 Cnfnlk32.exe 2556 Dnkggjpj.exe 2196 Dkohanoc.exe 2140 Dfmbmkgm.exe 2624 Ehnknfdn.exe 2872 Ehbdif32.exe 908 Ffmnloih.exe 1964 Fcqoec32.exe 1740 Fpgpjdnf.exe 2180 Fmkpchmp.exe 3040 Fpliec32.exe 2224 Gbmbgngb.exe 2020 Gjhfkqdm.exe 2032 Gmipmlan.exe 1568 Gdedoegh.exe 636 Gaiehjfb.exe 2992 Hidjml32.exe 2088 Hpqoofhg.exe 2500 Hbagaa32.exe 2776 Hafdbmjp.exe 2764 Haiagm32.exe 2936 Iomaaa32.exe 1600 Inbobn32.exe 2544 Ikhlaaif.exe 2420 Igomfb32.exe 2644 Jfdigocb.exe 2056 Jpjndh32.exe 1744 Jjbbmmih.exe 1956 Jbpcgo32.exe 1316 Jbbpmo32.exe 1120 Koacjg32.exe 696 Lbbmlbej.exe 964 Lfpebq32.exe 2204 Lnkjfcik.exe -
Loads dropped DLL 64 IoCs
pid Process 2260 a2b6a41f60ee46e1090aa40f894f9a30N.exe 2260 a2b6a41f60ee46e1090aa40f894f9a30N.exe 2388 Aabhiikm.exe 2388 Aabhiikm.exe 2724 Ajkmbo32.exe 2724 Ajkmbo32.exe 2720 Bbmggp32.exe 2720 Bbmggp32.exe 2696 Bbpdmp32.exe 2696 Bbpdmp32.exe 2576 Bcbabodk.exe 2576 Bcbabodk.exe 2640 Eickdlcd.exe 2640 Eickdlcd.exe 2944 Fhonegbd.exe 2944 Fhonegbd.exe 2440 Fmnccn32.exe 2440 Fmnccn32.exe 1272 Hegdinpd.exe 1272 Hegdinpd.exe 592 Hgbdge32.exe 592 Hgbdge32.exe 1816 Jggiah32.exe 1816 Jggiah32.exe 960 Knldaf32.exe 960 Knldaf32.exe 1532 Knnagehi.exe 1532 Knnagehi.exe 304 Lmjdia32.exe 304 Lmjdia32.exe 2136 Mhpeem32.exe 2136 Mhpeem32.exe 1288 Majfcb32.exe 1288 Majfcb32.exe 1728 Odkkdqmd.exe 1728 Odkkdqmd.exe 1268 Ojjqbg32.exe 1268 Ojjqbg32.exe 1328 Pbjoaibo.exe 1328 Pbjoaibo.exe 2312 Pcikllja.exe 2312 Pcikllja.exe 1992 Pqdend32.exe 1992 Pqdend32.exe 2208 Pafacd32.exe 2208 Pafacd32.exe 1804 Aamhdckg.exe 1804 Aamhdckg.exe 1460 Algida32.exe 1460 Algida32.exe 2852 Ahbcda32.exe 2852 Ahbcda32.exe 2688 Blplkp32.exe 2688 Blplkp32.exe 2800 Bpdnjb32.exe 2800 Bpdnjb32.exe 2836 Bgablmfa.exe 2836 Bgablmfa.exe 2612 Cpigeblb.exe 2612 Cpigeblb.exe 2584 Ckeekp32.exe 2584 Ckeekp32.exe 3052 Cnfnlk32.exe 3052 Cnfnlk32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ffiedlhj.dll Dmpckbci.exe File created C:\Windows\SysWOW64\Gmhibenb.exe Gpdhiaoi.exe File opened for modification C:\Windows\SysWOW64\Liaggk32.exe Lfanep32.exe File created C:\Windows\SysWOW64\Jpneniod.dll Aggbif32.exe File created C:\Windows\SysWOW64\Nhlfnn32.dll Mlbadj32.exe File opened for modification C:\Windows\SysWOW64\Bcnomjbg.exe Bamfloef.exe File created C:\Windows\SysWOW64\Fidfhd32.dll Jifjod32.exe File opened for modification C:\Windows\SysWOW64\Aacknfhl.exe Aejncedk.exe File created C:\Windows\SysWOW64\Icmkpibd.exe Imccco32.exe File opened for modification C:\Windows\SysWOW64\Ambohapm.exe Aibjlcli.exe File opened for modification C:\Windows\SysWOW64\Bpmqom32.exe Apjdin32.exe File opened for modification C:\Windows\SysWOW64\Oeklpeco.exe Onognkne.exe File opened for modification C:\Windows\SysWOW64\Djaiho32.exe Dnkhcnfe.exe File created C:\Windows\SysWOW64\Kgjjlh32.dll Lohlcoid.exe File opened for modification C:\Windows\SysWOW64\Qlmnfh32.exe Qljaah32.exe File created C:\Windows\SysWOW64\Edgmjhfh.exe Ebddmq32.exe File created C:\Windows\SysWOW64\Gadlio32.exe Gkkdldhe.exe File created C:\Windows\SysWOW64\Cnfnlk32.exe Ckeekp32.exe File created C:\Windows\SysWOW64\Khgenplk.dll Milagp32.exe File created C:\Windows\SysWOW64\Clcjjimp.dll Nlibhhme.exe File opened for modification C:\Windows\SysWOW64\Qnkdeagl.exe Qdbpml32.exe File opened for modification C:\Windows\SysWOW64\Bfldopno.exe Bmacqj32.exe File created C:\Windows\SysWOW64\Ecjijqbk.dll Jaflocqd.exe File opened for modification C:\Windows\SysWOW64\Mkjkkf32.exe Mlenijej.exe File created C:\Windows\SysWOW64\Bohejibe.exe Aaddaecl.exe File opened for modification C:\Windows\SysWOW64\Ajkmbo32.exe Aabhiikm.exe File created C:\Windows\SysWOW64\Fcqoec32.exe Ffmnloih.exe File created C:\Windows\SysWOW64\Pkopjh32.exe Oohoeg32.exe File created C:\Windows\SysWOW64\Dpjmne32.dll Dbpplglj.exe File opened for modification C:\Windows\SysWOW64\Dkkajlph.exe Dkhedlbj.exe File opened for modification C:\Windows\SysWOW64\Majfcb32.exe Mhpeem32.exe File created C:\Windows\SysWOW64\Haiagm32.exe Hafdbmjp.exe File created C:\Windows\SysWOW64\Jdipnedn.exe Jgbboa32.exe File created C:\Windows\SysWOW64\Olhhmele.exe Oigokj32.exe File created C:\Windows\SysWOW64\Lpoinb32.dll Deanooeb.exe File opened for modification C:\Windows\SysWOW64\Jpfikjfe.exe Imgmonga.exe File created C:\Windows\SysWOW64\Lhefnd32.dll Bcgdknlh.exe File created C:\Windows\SysWOW64\Epaeea32.dll Eickdlcd.exe File created C:\Windows\SysWOW64\Pomceb32.dll Olclimif.exe File created C:\Windows\SysWOW64\Ffdgef32.exe Fqeagpop.exe File opened for modification C:\Windows\SysWOW64\Kdinea32.exe Kojihjbi.exe File opened for modification C:\Windows\SysWOW64\Bbbckh32.exe Benbbcmf.exe File opened for modification C:\Windows\SysWOW64\Donijk32.exe Deeeafii.exe File opened for modification C:\Windows\SysWOW64\Jdnkamhm.exe Jifjod32.exe File opened for modification C:\Windows\SysWOW64\Qpfojp32.exe Ppafopqq.exe File created C:\Windows\SysWOW64\Bdcaib32.dll Jclqefac.exe File created C:\Windows\SysWOW64\Qljaah32.exe Pnedpl32.exe File created C:\Windows\SysWOW64\Agmehd32.exe Ajidnp32.exe File created C:\Windows\SysWOW64\Ibaonfll.exe Ilbnfmhd.exe File opened for modification C:\Windows\SysWOW64\Jjnqhh32.exe Jaflocqd.exe File created C:\Windows\SysWOW64\Cidnjk32.dll Peiliihm.exe File created C:\Windows\SysWOW64\Gnfmnibf.dll Dfmbmkgm.exe File opened for modification C:\Windows\SysWOW64\Hidjml32.exe Gaiehjfb.exe File opened for modification C:\Windows\SysWOW64\Pnedpl32.exe Ppacfg32.exe File created C:\Windows\SysWOW64\Idjlbqmb.exe Hebckd32.exe File opened for modification C:\Windows\SysWOW64\Oqpbhobj.exe Ojdnfemp.exe File created C:\Windows\SysWOW64\Nihjfm32.exe Mheqie32.exe File created C:\Windows\SysWOW64\Eknmgkpa.dll Bciohe32.exe File created C:\Windows\SysWOW64\Ojkcfdgh.exe Opepik32.exe File created C:\Windows\SysWOW64\Ifkbna32.dll Bgbncdmm.exe File created C:\Windows\SysWOW64\Camlpldf.exe Ccikghel.exe File created C:\Windows\SysWOW64\Pajldmna.dll Lhmijn32.exe File created C:\Windows\SysWOW64\Dgfbla32.dll Dnqkammo.exe File created C:\Windows\SysWOW64\Hcpphd32.dll Idligq32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3520 2604 WerFault.exe 500 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hecedmaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kibcnb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkjdkqcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Paldmbmq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plnhbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgmjla32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbbckh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnfoho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkkigf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojkcfdgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpigeblb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbibla32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olclimif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgmogcpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hidjml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhimaill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onognkne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Depgeiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfpfbemc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oldajoho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmophe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bamfloef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oncqik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pemedh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlbncmih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Noffadai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fqbeapqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bcgdknlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nnokohkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cqgkkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eenfnmfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkfpefme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iiiapg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eehpoaaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opaeok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Higikdhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odkkdqmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdgeanne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnnblfgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghdfhc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbmeokdm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fbnpfnfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojjqbg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbilclhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgclfc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjdeaohb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hcbogk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djaiho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmmjbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hljljflh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idffib32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olpiig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efmchp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdeekjmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aacknfhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Koacjg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oigokj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qljaah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cknikooe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fpgpjdnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbobn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpoapf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gecmghkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjappa32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bbmggp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qfbcae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anqeihcn.dll" Qnkdeagl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plgfigda.dll" Bbilclhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cgoikj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iomaaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gmhibenb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pgdfbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmfnedeb.dll" Ppacfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jendlk32.dll" Dpoapf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jjocaaoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfgcec32.dll" Pphlokep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gljbaeaa.dll" a2b6a41f60ee46e1090aa40f894f9a30N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eickdlcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oikhfd32.dll" Dkggel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lfhgng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iifphj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jgnjof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nkfpefme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cbdpag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajidnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hjlhcegl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfjbqafo.dll" Jjfplfll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdiode32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdmekohf.dll" Bpmqom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klehma32.dll" Hhfcnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lgfmmaem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pmophe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mjfdfcjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpneniod.dll" Aggbif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmbpaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdgaibdg.dll" Icdllk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bbpdmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lmjdia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ikhlaaif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hjglpncm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Acjllqke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gemkfile.dll" Lpejnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Benbbcmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jaflocqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaomhmnf.dll" Klgeih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oqpbhobj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Koacjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fdcahdib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oeklpeco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhcbfdbh.dll" Begegn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fqbeapqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fqeagpop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fgmogcpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oldajoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkbggj32.dll" Aacknfhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Klnljghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bcnomjbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikfhqc32.dll" Ajidnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nfafci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ieckbh32.dll" Aabhiikm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hekfpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} a2b6a41f60ee46e1090aa40f894f9a30N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcldnd32.dll" Fmkpchmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lnkjfcik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hpfamd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pjdeaohb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bcnomjbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bimdka32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2388 2260 a2b6a41f60ee46e1090aa40f894f9a30N.exe 29 PID 2260 wrote to memory of 2388 2260 a2b6a41f60ee46e1090aa40f894f9a30N.exe 29 PID 2260 wrote to memory of 2388 2260 a2b6a41f60ee46e1090aa40f894f9a30N.exe 29 PID 2260 wrote to memory of 2388 2260 a2b6a41f60ee46e1090aa40f894f9a30N.exe 29 PID 2388 wrote to memory of 2724 2388 Aabhiikm.exe 30 PID 2388 wrote to memory of 2724 2388 Aabhiikm.exe 30 PID 2388 wrote to memory of 2724 2388 Aabhiikm.exe 30 PID 2388 wrote to memory of 2724 2388 Aabhiikm.exe 30 PID 2724 wrote to memory of 2720 2724 Ajkmbo32.exe 31 PID 2724 wrote to memory of 2720 2724 Ajkmbo32.exe 31 PID 2724 wrote to memory of 2720 2724 Ajkmbo32.exe 31 PID 2724 wrote to memory of 2720 2724 Ajkmbo32.exe 31 PID 2720 wrote to memory of 2696 2720 Bbmggp32.exe 32 PID 2720 wrote to memory of 2696 2720 Bbmggp32.exe 32 PID 2720 wrote to memory of 2696 2720 Bbmggp32.exe 32 PID 2720 wrote to memory of 2696 2720 Bbmggp32.exe 32 PID 2696 wrote to memory of 2576 2696 Bbpdmp32.exe 33 PID 2696 wrote to memory of 2576 2696 Bbpdmp32.exe 33 PID 2696 wrote to memory of 2576 2696 Bbpdmp32.exe 33 PID 2696 wrote to memory of 2576 2696 Bbpdmp32.exe 33 PID 2576 wrote to memory of 2640 2576 Bcbabodk.exe 34 PID 2576 wrote to memory of 2640 2576 Bcbabodk.exe 34 PID 2576 wrote to memory of 2640 2576 Bcbabodk.exe 34 PID 2576 wrote to memory of 2640 2576 Bcbabodk.exe 34 PID 2640 wrote to memory of 2944 2640 Eickdlcd.exe 35 PID 2640 wrote to memory of 2944 2640 Eickdlcd.exe 35 PID 2640 wrote to memory of 2944 2640 Eickdlcd.exe 35 PID 2640 wrote to memory of 2944 2640 Eickdlcd.exe 35 PID 2944 wrote to memory of 2440 2944 Fhonegbd.exe 36 PID 2944 wrote to memory of 2440 2944 Fhonegbd.exe 36 PID 2944 wrote to memory of 2440 2944 Fhonegbd.exe 36 PID 2944 wrote to memory of 2440 2944 Fhonegbd.exe 36 PID 2440 wrote to memory of 1272 2440 Fmnccn32.exe 37 PID 2440 wrote to memory of 1272 2440 Fmnccn32.exe 37 PID 2440 wrote to memory of 1272 2440 Fmnccn32.exe 37 PID 2440 wrote to memory of 1272 2440 Fmnccn32.exe 37 PID 1272 wrote to memory of 592 1272 Hegdinpd.exe 38 PID 1272 wrote to memory of 592 1272 Hegdinpd.exe 38 PID 1272 wrote to memory of 592 1272 Hegdinpd.exe 38 PID 1272 wrote to memory of 592 1272 Hegdinpd.exe 38 PID 592 wrote to memory of 1816 592 Hgbdge32.exe 39 PID 592 wrote to memory of 1816 592 Hgbdge32.exe 39 PID 592 wrote to memory of 1816 592 Hgbdge32.exe 39 PID 592 wrote to memory of 1816 592 Hgbdge32.exe 39 PID 1816 wrote to memory of 960 1816 Jggiah32.exe 40 PID 1816 wrote to memory of 960 1816 Jggiah32.exe 40 PID 1816 wrote to memory of 960 1816 Jggiah32.exe 40 PID 1816 wrote to memory of 960 1816 Jggiah32.exe 40 PID 960 wrote to memory of 1532 960 Knldaf32.exe 41 PID 960 wrote to memory of 1532 960 Knldaf32.exe 41 PID 960 wrote to memory of 1532 960 Knldaf32.exe 41 PID 960 wrote to memory of 1532 960 Knldaf32.exe 41 PID 1532 wrote to memory of 304 1532 Knnagehi.exe 42 PID 1532 wrote to memory of 304 1532 Knnagehi.exe 42 PID 1532 wrote to memory of 304 1532 Knnagehi.exe 42 PID 1532 wrote to memory of 304 1532 Knnagehi.exe 42 PID 304 wrote to memory of 2136 304 Lmjdia32.exe 43 PID 304 wrote to memory of 2136 304 Lmjdia32.exe 43 PID 304 wrote to memory of 2136 304 Lmjdia32.exe 43 PID 304 wrote to memory of 2136 304 Lmjdia32.exe 43 PID 2136 wrote to memory of 1288 2136 Mhpeem32.exe 44 PID 2136 wrote to memory of 1288 2136 Mhpeem32.exe 44 PID 2136 wrote to memory of 1288 2136 Mhpeem32.exe 44 PID 2136 wrote to memory of 1288 2136 Mhpeem32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2b6a41f60ee46e1090aa40f894f9a30N.exe"C:\Users\Admin\AppData\Local\Temp\a2b6a41f60ee46e1090aa40f894f9a30N.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Aabhiikm.exeC:\Windows\system32\Aabhiikm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\Ajkmbo32.exeC:\Windows\system32\Ajkmbo32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Bbmggp32.exeC:\Windows\system32\Bbmggp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Bbpdmp32.exeC:\Windows\system32\Bbpdmp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Bcbabodk.exeC:\Windows\system32\Bcbabodk.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Eickdlcd.exeC:\Windows\system32\Eickdlcd.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Fhonegbd.exeC:\Windows\system32\Fhonegbd.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Fmnccn32.exeC:\Windows\system32\Fmnccn32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Hegdinpd.exeC:\Windows\system32\Hegdinpd.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Hgbdge32.exeC:\Windows\system32\Hgbdge32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\Jggiah32.exeC:\Windows\system32\Jggiah32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\Knldaf32.exeC:\Windows\system32\Knldaf32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\Knnagehi.exeC:\Windows\system32\Knnagehi.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\Lmjdia32.exeC:\Windows\system32\Lmjdia32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\Mhpeem32.exeC:\Windows\system32\Mhpeem32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\Majfcb32.exeC:\Windows\system32\Majfcb32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288 -
C:\Windows\SysWOW64\Odkkdqmd.exeC:\Windows\system32\Odkkdqmd.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\Ojjqbg32.exeC:\Windows\system32\Ojjqbg32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Windows\SysWOW64\Pbjoaibo.exeC:\Windows\system32\Pbjoaibo.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1328 -
C:\Windows\SysWOW64\Pcikllja.exeC:\Windows\system32\Pcikllja.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2312 -
C:\Windows\SysWOW64\Pqdend32.exeC:\Windows\system32\Pqdend32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992 -
C:\Windows\SysWOW64\Pafacd32.exeC:\Windows\system32\Pafacd32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2208 -
C:\Windows\SysWOW64\Aamhdckg.exeC:\Windows\system32\Aamhdckg.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Windows\SysWOW64\Algida32.exeC:\Windows\system32\Algida32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1460 -
C:\Windows\SysWOW64\Ahbcda32.exeC:\Windows\system32\Ahbcda32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Windows\SysWOW64\Blplkp32.exeC:\Windows\system32\Blplkp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688 -
C:\Windows\SysWOW64\Bpdnjb32.exeC:\Windows\system32\Bpdnjb32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800 -
C:\Windows\SysWOW64\Bgablmfa.exeC:\Windows\system32\Bgablmfa.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2836 -
C:\Windows\SysWOW64\Cpigeblb.exeC:\Windows\system32\Cpigeblb.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\Ckeekp32.exeC:\Windows\system32\Ckeekp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\Cnfnlk32.exeC:\Windows\system32\Cnfnlk32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3052 -
C:\Windows\SysWOW64\Dnkggjpj.exeC:\Windows\system32\Dnkggjpj.exe33⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\Dkohanoc.exeC:\Windows\system32\Dkohanoc.exe34⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Dfmbmkgm.exeC:\Windows\system32\Dfmbmkgm.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2140 -
C:\Windows\SysWOW64\Ehnknfdn.exeC:\Windows\system32\Ehnknfdn.exe36⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\Ehbdif32.exeC:\Windows\system32\Ehbdif32.exe37⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\Ffmnloih.exeC:\Windows\system32\Ffmnloih.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\Fcqoec32.exeC:\Windows\system32\Fcqoec32.exe39⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\Fpgpjdnf.exeC:\Windows\system32\Fpgpjdnf.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\Fmkpchmp.exeC:\Windows\system32\Fmkpchmp.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Fpliec32.exeC:\Windows\system32\Fpliec32.exe42⤵
- Executes dropped EXE
PID:3040 -
C:\Windows\SysWOW64\Gbmbgngb.exeC:\Windows\system32\Gbmbgngb.exe43⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\Gjhfkqdm.exeC:\Windows\system32\Gjhfkqdm.exe44⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Gmipmlan.exeC:\Windows\system32\Gmipmlan.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\Gdedoegh.exeC:\Windows\system32\Gdedoegh.exe46⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\Gaiehjfb.exeC:\Windows\system32\Gaiehjfb.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:636 -
C:\Windows\SysWOW64\Hidjml32.exeC:\Windows\system32\Hidjml32.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\Hpqoofhg.exeC:\Windows\system32\Hpqoofhg.exe49⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\Hbagaa32.exeC:\Windows\system32\Hbagaa32.exe50⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\Hljljflh.exeC:\Windows\system32\Hljljflh.exe51⤵
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\SysWOW64\Hafdbmjp.exeC:\Windows\system32\Hafdbmjp.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2776 -
C:\Windows\SysWOW64\Haiagm32.exeC:\Windows\system32\Haiagm32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\Iomaaa32.exeC:\Windows\system32\Iomaaa32.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2936 -
C:\Windows\SysWOW64\Inbobn32.exeC:\Windows\system32\Inbobn32.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\SysWOW64\Ikhlaaif.exeC:\Windows\system32\Ikhlaaif.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2544 -
C:\Windows\SysWOW64\Igomfb32.exeC:\Windows\system32\Igomfb32.exe57⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\Jfdigocb.exeC:\Windows\system32\Jfdigocb.exe58⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\Jpjndh32.exeC:\Windows\system32\Jpjndh32.exe59⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Jjbbmmih.exeC:\Windows\system32\Jjbbmmih.exe60⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Jbpcgo32.exeC:\Windows\system32\Jbpcgo32.exe61⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Jbbpmo32.exeC:\Windows\system32\Jbbpmo32.exe62⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\SysWOW64\Koacjg32.exeC:\Windows\system32\Koacjg32.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1120 -
C:\Windows\SysWOW64\Lbbmlbej.exeC:\Windows\system32\Lbbmlbej.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:696 -
C:\Windows\SysWOW64\Lfpebq32.exeC:\Windows\system32\Lfpebq32.exe65⤵
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\Lnkjfcik.exeC:\Windows\system32\Lnkjfcik.exe66⤵
- Executes dropped EXE
- Modifies registry class
PID:2204 -
C:\Windows\SysWOW64\Lbibla32.exeC:\Windows\system32\Lbibla32.exe67⤵
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\Mjfdfcjj.exeC:\Windows\system32\Mjfdfcjj.exe68⤵
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Milagp32.exeC:\Windows\system32\Milagp32.exe69⤵
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\Mjknab32.exeC:\Windows\system32\Mjknab32.exe70⤵PID:1496
-
C:\Windows\SysWOW64\Mfbnfcli.exeC:\Windows\system32\Mfbnfcli.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2784 -
C:\Windows\SysWOW64\Momckfid.exeC:\Windows\system32\Momckfid.exe72⤵PID:2264
-
C:\Windows\SysWOW64\Mbkladpj.exeC:\Windows\system32\Mbkladpj.exe73⤵PID:2988
-
C:\Windows\SysWOW64\Nkfpefme.exeC:\Windows\system32\Nkfpefme.exe74⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2704 -
C:\Windows\SysWOW64\Nodikecl.exeC:\Windows\system32\Nodikecl.exe75⤵PID:984
-
C:\Windows\SysWOW64\Noffadai.exeC:\Windows\system32\Noffadai.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\Nipgab32.exeC:\Windows\system32\Nipgab32.exe77⤵PID:2876
-
C:\Windows\SysWOW64\Olapcm32.exeC:\Windows\system32\Olapcm32.exe78⤵PID:1864
-
C:\Windows\SysWOW64\Olclimif.exeC:\Windows\system32\Olclimif.exe79⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\Oekaab32.exeC:\Windows\system32\Oekaab32.exe80⤵PID:1660
-
C:\Windows\SysWOW64\Opaeok32.exeC:\Windows\system32\Opaeok32.exe81⤵
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\SysWOW64\Okkfoikl.exeC:\Windows\system32\Okkfoikl.exe82⤵PID:2144
-
C:\Windows\SysWOW64\Oohoeg32.exeC:\Windows\system32\Oohoeg32.exe83⤵
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\Pkopjh32.exeC:\Windows\system32\Pkopjh32.exe84⤵PID:2452
-
C:\Windows\SysWOW64\Paldmbmq.exeC:\Windows\system32\Paldmbmq.exe85⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\Pmeemp32.exeC:\Windows\system32\Pmeemp32.exe86⤵PID:2040
-
C:\Windows\SysWOW64\Pmhbbp32.exeC:\Windows\system32\Pmhbbp32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1988 -
C:\Windows\SysWOW64\Pgmfph32.exeC:\Windows\system32\Pgmfph32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2288 -
C:\Windows\SysWOW64\Qfbcae32.exeC:\Windows\system32\Qfbcae32.exe89⤵
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Qbidffao.exeC:\Windows\system32\Qbidffao.exe90⤵PID:2796
-
C:\Windows\SysWOW64\Abkqle32.exeC:\Windows\system32\Abkqle32.exe91⤵PID:2592
-
C:\Windows\SysWOW64\Aeljmq32.exeC:\Windows\system32\Aeljmq32.exe92⤵PID:1940
-
C:\Windows\SysWOW64\Ajkokgia.exeC:\Windows\system32\Ajkokgia.exe93⤵PID:1400
-
C:\Windows\SysWOW64\Apjdin32.exeC:\Windows\system32\Apjdin32.exe94⤵
- Drops file in System32 directory
PID:588 -
C:\Windows\SysWOW64\Bpmqom32.exeC:\Windows\system32\Bpmqom32.exe95⤵
- Modifies registry class
PID:3000 -
C:\Windows\SysWOW64\Bmcnmapk.exeC:\Windows\system32\Bmcnmapk.exe96⤵PID:2392
-
C:\Windows\SysWOW64\Benbbcmf.exeC:\Windows\system32\Benbbcmf.exe97⤵
- Drops file in System32 directory
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Bbbckh32.exeC:\Windows\system32\Bbbckh32.exe98⤵
- System Location Discovery: System Language Discovery
PID:276 -
C:\Windows\SysWOW64\Cbdpag32.exeC:\Windows\system32\Cbdpag32.exe99⤵
- Modifies registry class
PID:2348 -
C:\Windows\SysWOW64\Clmdjmpm.exeC:\Windows\system32\Clmdjmpm.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1052 -
C:\Windows\SysWOW64\Conmkh32.exeC:\Windows\system32\Conmkh32.exe101⤵PID:2664
-
C:\Windows\SysWOW64\Cdmbiojc.exeC:\Windows\system32\Cdmbiojc.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2816 -
C:\Windows\SysWOW64\Deeeafii.exeC:\Windows\system32\Deeeafii.exe103⤵
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\Donijk32.exeC:\Windows\system32\Donijk32.exe104⤵PID:2628
-
C:\Windows\SysWOW64\Danblfmk.exeC:\Windows\system32\Danblfmk.exe105⤵PID:3048
-
C:\Windows\SysWOW64\Dkggel32.exeC:\Windows\system32\Dkggel32.exe106⤵
- Modifies registry class
PID:2416 -
C:\Windows\SysWOW64\Egmhjm32.exeC:\Windows\system32\Egmhjm32.exe107⤵PID:2464
-
C:\Windows\SysWOW64\Egpdom32.exeC:\Windows\system32\Egpdom32.exe108⤵PID:2928
-
C:\Windows\SysWOW64\Efeaqi32.exeC:\Windows\system32\Efeaqi32.exe109⤵PID:2436
-
C:\Windows\SysWOW64\Ehfjbd32.exeC:\Windows\system32\Ehfjbd32.exe110⤵PID:2328
-
C:\Windows\SysWOW64\Fobodn32.exeC:\Windows\system32\Fobodn32.exe111⤵PID:2400
-
C:\Windows\SysWOW64\Fnglekch.exeC:\Windows\system32\Fnglekch.exe112⤵PID:392
-
C:\Windows\SysWOW64\Fdcahdib.exeC:\Windows\system32\Fdcahdib.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\Fefnmdfo.exeC:\Windows\system32\Fefnmdfo.exe114⤵PID:2316
-
C:\Windows\SysWOW64\Gckknqkg.exeC:\Windows\system32\Gckknqkg.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2832 -
C:\Windows\SysWOW64\Gpbkca32.exeC:\Windows\system32\Gpbkca32.exe116⤵PID:1868
-
C:\Windows\SysWOW64\Gpdhiaoi.exeC:\Windows\system32\Gpdhiaoi.exe117⤵
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\Gmhibenb.exeC:\Windows\system32\Gmhibenb.exe118⤵
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Gecmghkm.exeC:\Windows\system32\Gecmghkm.exe119⤵
- System Location Discovery: System Language Discovery
PID:944 -
C:\Windows\SysWOW64\Ghdfhc32.exeC:\Windows\system32\Ghdfhc32.exe120⤵
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Windows\SysWOW64\Hhfcnb32.exeC:\Windows\system32\Hhfcnb32.exe121⤵
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Hjglpncm.exeC:\Windows\system32\Hjglpncm.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-