Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 04:57 UTC
Static task
static1
Behavioral task
behavioral1
Sample
51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe
Resource
win10v2004-20240802-en
General
-
Target
51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe
-
Size
768KB
-
MD5
aae7339dd8a337bd6c714d1822046840
-
SHA1
9e15985e00e56a8104aa27a85b5193d2d38a8b50
-
SHA256
51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbd
-
SHA512
0c9cd274818ea3218158c756a5ec26e2d9bde1cd99d29391ccad0b9cb504d03c7705bd74d13e99bbe008529066fbb69c189026d03cd05f432fe0894f155151de
-
SSDEEP
12288:VWmIm/+zrWAI5KFum/+zrWAIAqWim/+zrWAI5KF4cr6VDsEqacjgqANXcol27Z5Y:V7Imm0BmmvFimm0Xcr6VDsEqacjgqAN1
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ejleamon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ldcema32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbhpidak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hqmmja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gngdcpjl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpohplpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmlpjhlf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cnjkkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndhkgd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koaohila.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gjmnmk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oojmegqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nnjnbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jhhcpkmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hbohblcg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mddjpbgl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnicgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Holcka32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mammfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jbdpeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okdlha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bdemcpqm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dggenkmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpgiln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lonoamqo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afmack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ohmneokp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fcacfd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlcimd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jicigg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phlaqc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djaiho32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obbbbhkf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknejb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdilbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjaqeebm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mbdhinmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndjloanf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfecfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bpkgmk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gakjcp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfjjbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nqfigjgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kfmjfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bqpejh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bedjmcgp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Accobock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dglfkebm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bnemnbmm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndjloanf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohmneokp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ganfhpfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qmilachg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cngebd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qhoqolhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Heiaqjhc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhkdch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ikplopnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Maocak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apcfqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hmiicj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbhfojgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jdlefd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Abnpjnem.exe -
Executes dropped EXE 64 IoCs
pid Process 2032 Ffbjpfmg.exe 2104 Fcfjik32.exe 2748 Gplgmodq.exe 2804 Hpodbo32.exe 2908 Inkgdjqn.exe 2652 Ihehbpel.exe 3044 Jdlefd32.exe 2484 Jgmnhojl.exe 2356 Lkhfhaea.exe 2004 Llhcad32.exe 2444 Lkmpcpak.exe 1392 Lnnidk32.exe 2876 Lqnbffkn.exe 964 Mjgfol32.exe 2968 Mfngdmgb.exe 2176 Mbdhinmf.exe 2144 Mphhbblp.exe 2424 Mpkehbjm.exe 976 Nagakhfn.exe 1724 Olablfbm.exe 932 Omqnfiip.exe 1256 Oelcjkgk.exe 1656 Oenppk32.exe 2400 Olkebejb.exe 2472 Pokndp32.exe 2096 Palgek32.exe 3064 Pncgjl32.exe 2184 Penlon32.exe 2664 Pcbmhb32.exe 2392 Qhabfibb.exe 2560 Anpgdp32.exe 2540 Abnpjnem.exe 1252 Acbigfii.exe 3056 Afbbiafj.exe 2860 Bickkl32.exe 584 Bmacqj32.exe 1712 Bnemnbmm.exe 1628 Bngicb32.exe 1320 Ckkjmf32.exe 1428 Cgbjbgph.exe 112 Ccikghel.exe 1516 Cpolli32.exe 2504 Caohfl32.exe 2296 Cpdeghgk.exe 772 Dmhfpmee.exe 1104 Diofenki.exe 2720 Diackmif.exe 2896 Dhfpljnn.exe 2928 Ddmaak32.exe 860 Edpnfjap.exe 2936 Epfnkk32.exe 1820 Ephkak32.exe 2284 Eonhbg32.exe 1536 Epmdljal.exe 2044 Fldeakgp.exe 2056 Fdojendk.exe 1612 Feofpqkn.exe 2732 Fhpoalho.exe 1772 Fcipaien.exe 2692 Godjaj32.exe 876 Gcbchhmc.exe 2824 Gbhpidak.exe 2912 Hqmmja32.exe 2672 Hkenmidf.exe -
Loads dropped DLL 64 IoCs
pid Process 1568 51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe 1568 51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe 2032 Ffbjpfmg.exe 2032 Ffbjpfmg.exe 2104 Fcfjik32.exe 2104 Fcfjik32.exe 2748 Gplgmodq.exe 2748 Gplgmodq.exe 2804 Hpodbo32.exe 2804 Hpodbo32.exe 2908 Inkgdjqn.exe 2908 Inkgdjqn.exe 2652 Ihehbpel.exe 2652 Ihehbpel.exe 3044 Jdlefd32.exe 3044 Jdlefd32.exe 2484 Jgmnhojl.exe 2484 Jgmnhojl.exe 2356 Lkhfhaea.exe 2356 Lkhfhaea.exe 2004 Llhcad32.exe 2004 Llhcad32.exe 2444 Lkmpcpak.exe 2444 Lkmpcpak.exe 1392 Lnnidk32.exe 1392 Lnnidk32.exe 2876 Lqnbffkn.exe 2876 Lqnbffkn.exe 964 Mjgfol32.exe 964 Mjgfol32.exe 2968 Mfngdmgb.exe 2968 Mfngdmgb.exe 2176 Mbdhinmf.exe 2176 Mbdhinmf.exe 2144 Mphhbblp.exe 2144 Mphhbblp.exe 2424 Mpkehbjm.exe 2424 Mpkehbjm.exe 976 Nagakhfn.exe 976 Nagakhfn.exe 1724 Olablfbm.exe 1724 Olablfbm.exe 932 Omqnfiip.exe 932 Omqnfiip.exe 1256 Oelcjkgk.exe 1256 Oelcjkgk.exe 1656 Oenppk32.exe 1656 Oenppk32.exe 2400 Olkebejb.exe 2400 Olkebejb.exe 2472 Pokndp32.exe 2472 Pokndp32.exe 2096 Palgek32.exe 2096 Palgek32.exe 3064 Pncgjl32.exe 3064 Pncgjl32.exe 2184 Penlon32.exe 2184 Penlon32.exe 2664 Pcbmhb32.exe 2664 Pcbmhb32.exe 2392 Qhabfibb.exe 2392 Qhabfibb.exe 2560 Anpgdp32.exe 2560 Anpgdp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Gifgml32.exe Gclopbjo.exe File opened for modification C:\Windows\SysWOW64\Ndhkgd32.exe Nhajbc32.exe File created C:\Windows\SysWOW64\Lqnbffkn.exe Lnnidk32.exe File created C:\Windows\SysWOW64\Bngicb32.exe Bnemnbmm.exe File created C:\Windows\SysWOW64\Ddogmf32.dll Jllpmlqj.exe File opened for modification C:\Windows\SysWOW64\Apcfqd32.exe Afmack32.exe File created C:\Windows\SysWOW64\Fmpklm32.dll Pkkicfik.exe File opened for modification C:\Windows\SysWOW64\Ijdbffpl.exe Ilpblb32.exe File opened for modification C:\Windows\SysWOW64\Jbiqkmhh.exe Jmmhbfjq.exe File created C:\Windows\SysWOW64\Kfgfpoaj.exe Kmoagi32.exe File created C:\Windows\SysWOW64\Oenppk32.exe Oelcjkgk.exe File created C:\Windows\SysWOW64\Nlgeffnb.dll Eonhbg32.exe File opened for modification C:\Windows\SysWOW64\Ohglfa32.exe Onognkne.exe File opened for modification C:\Windows\SysWOW64\Bnmpcmpi.exe Bhpgkfab.exe File created C:\Windows\SysWOW64\Lpmlak32.dll Dgocadqk.exe File created C:\Windows\SysWOW64\Mdfljc32.dll Cqokoeig.exe File created C:\Windows\SysWOW64\Anpgdp32.exe Qhabfibb.exe File created C:\Windows\SysWOW64\Nblpbeob.exe Mmmkdo32.exe File created C:\Windows\SysWOW64\Enncqjna.exe Echoca32.exe File created C:\Windows\SysWOW64\Cldagoib.exe Cdilbl32.exe File created C:\Windows\SysWOW64\Bondii32.dll Dggenkmf.exe File created C:\Windows\SysWOW64\Gjolpb32.dll Lofafhck.exe File created C:\Windows\SysWOW64\Gifgml32.exe Gclopbjo.exe File created C:\Windows\SysWOW64\Cllaca32.exe Cngebd32.exe File created C:\Windows\SysWOW64\Gboidd32.dll Ijeiplcg.exe File created C:\Windows\SysWOW64\Aobmiidj.dll Njlqkpol.exe File opened for modification C:\Windows\SysWOW64\Cnjkkc32.exe Cacjebbl.exe File created C:\Windows\SysWOW64\Idbpbpej.exe Hdpcmpgl.exe File opened for modification C:\Windows\SysWOW64\Efakjgni.exe Eqdbapoa.exe File created C:\Windows\SysWOW64\Lonoamqo.exe Lcgnmlkk.exe File created C:\Windows\SysWOW64\Cqkikjfj.dll Bkabejfg.exe File created C:\Windows\SysWOW64\Mqecodji.dll Cllaca32.exe File created C:\Windows\SysWOW64\Clnnhq32.exe Cbijkh32.exe File created C:\Windows\SysWOW64\Kaoelf32.dll Hapaekng.exe File opened for modification C:\Windows\SysWOW64\Inbbfk32.exe Idjmnecm.exe File created C:\Windows\SysWOW64\Bfadkh32.dll Djaiho32.exe File created C:\Windows\SysWOW64\Cheoma32.exe Cchfek32.exe File created C:\Windows\SysWOW64\Lmomfm32.exe Lkpaja32.exe File created C:\Windows\SysWOW64\Mfngdmgb.exe Mjgfol32.exe File created C:\Windows\SysWOW64\Oichhc32.exe Nfbogh32.exe File created C:\Windows\SysWOW64\Dgeogdgj.dll Bkiopock.exe File created C:\Windows\SysWOW64\Qgkebidd.dll Fhpajd32.exe File created C:\Windows\SysWOW64\Abldpb32.exe Alponiga.exe File opened for modification C:\Windows\SysWOW64\Kebipf32.exe Koeqhp32.exe File opened for modification C:\Windows\SysWOW64\Glimdgmj.exe Gndpcj32.exe File opened for modification C:\Windows\SysWOW64\Oeibcnmf.exe Okamjh32.exe File created C:\Windows\SysWOW64\Djkepi32.exe Dqcqgc32.exe File opened for modification C:\Windows\SysWOW64\Lihoaj32.exe Kfgfpoaj.exe File created C:\Windows\SysWOW64\Dldnob32.dll Nhkdch32.exe File created C:\Windows\SysWOW64\Dolpaclp.dll Ohglfa32.exe File created C:\Windows\SysWOW64\Bhbdpf32.exe Bnmpcmpi.exe File created C:\Windows\SysWOW64\Jjcllq32.exe Jfecfb32.exe File opened for modification C:\Windows\SysWOW64\Ofohfeoo.exe Opepik32.exe File created C:\Windows\SysWOW64\Ojhbpa32.dll Ppoboj32.exe File created C:\Windows\SysWOW64\Cneiai32.dll Kjllpopk.exe File opened for modification C:\Windows\SysWOW64\Fbobog32.exe Fbmejg32.exe File created C:\Windows\SysWOW64\Iofgdqkl.dll Palgek32.exe File created C:\Windows\SysWOW64\Nimeje32.exe Ncqmbn32.exe File opened for modification C:\Windows\SysWOW64\Klaojm32.exe Khojqj32.exe File created C:\Windows\SysWOW64\Hcghnm32.dll Jfjmaapg.exe File created C:\Windows\SysWOW64\Fljkcbok.dll Kcopcofe.exe File created C:\Windows\SysWOW64\Laahjdib.exe Koaohila.exe File opened for modification C:\Windows\SysWOW64\Hcpejd32.exe Hbohblcg.exe File created C:\Windows\SysWOW64\Dhlgdedc.dll Bhecnndq.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpohplpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmabhfca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bngicb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aalemg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Damjhhne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Echoca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dggenkmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilekgamm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgmnhojl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njialh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iacojc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcdpld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hojhnkap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmfpjb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djnafi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Epcmdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Feglmd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbbfk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mphhbblp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmmhbfjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idbpbpej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihehbpel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emeoojfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mneancpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnlpmiog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffbjpfmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Diofenki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnjkkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmmkdo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dblgbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mihkqm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkenmidf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lelphbon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkdpdnfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfojhngl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbfalecf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkabejfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnbkgech.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Geghlg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbdpeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kebipf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpodbo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmlpjhlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qmilachg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gingqjgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbdhinmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hiohob32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nppgfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbeqalkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjeppb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjdkdmdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omqnfiip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edpnfjap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bflghh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fbobog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Holedjom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbggdf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdlefd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jhhcpkmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjjmgo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opepik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jihgdd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qpjecn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cchfek32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjolpb32.dll" Lofafhck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Igacia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmndmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dggenkmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Endpgmob.dll" Gbhpidak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Abldpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ilpblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kjdkdmdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hngpojbg.dll" Mdcaldhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lahmalgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jleneiio.dll" Gdanhchm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Floneh32.dll" Ijdbffpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kgcbbaga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kpohplpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olfgom32.dll" Hkenmidf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnpabbkg.dll" Apcfqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cbmann32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mihdjh32.dll" Kacenp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdlkmb32.dll" Mocjeedn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mgoojgai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nnmqbaeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lkmpcpak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcjefj32.dll" Ilnegb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lcgnmlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mblkeg32.dll" Dglfkebm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eheeqgmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfgfjhom.dll" Mmmkdo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aaaohfjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Coghfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Leflapab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Badcijhm.dll" Kiomec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gobijm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngifff32.dll" Efakjgni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Omipbpfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pigghpeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Geghlg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Penlon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ofghbgig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qfnkajfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojgckb32.dll" Aalemg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gclopbjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gndpcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fjddek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkcifn32.dll" Ofjgpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cpolli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diipha32.dll" Gfhniijm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcfnie32.dll" Anlodd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Edpnfjap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mnfhhicd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bqpejh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nakgibde.dll" Leflapab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mcmiqdnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qhoqolhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pijmanoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dolpaclp.dll" Ohglfa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Odcffafd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jfjmaapg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nigpej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Penlon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Johpcgap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jllpmlqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gngdcpjl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mocjeedn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2032 1568 51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe 29 PID 1568 wrote to memory of 2032 1568 51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe 29 PID 1568 wrote to memory of 2032 1568 51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe 29 PID 1568 wrote to memory of 2032 1568 51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe 29 PID 2032 wrote to memory of 2104 2032 Ffbjpfmg.exe 30 PID 2032 wrote to memory of 2104 2032 Ffbjpfmg.exe 30 PID 2032 wrote to memory of 2104 2032 Ffbjpfmg.exe 30 PID 2032 wrote to memory of 2104 2032 Ffbjpfmg.exe 30 PID 2104 wrote to memory of 2748 2104 Fcfjik32.exe 31 PID 2104 wrote to memory of 2748 2104 Fcfjik32.exe 31 PID 2104 wrote to memory of 2748 2104 Fcfjik32.exe 31 PID 2104 wrote to memory of 2748 2104 Fcfjik32.exe 31 PID 2748 wrote to memory of 2804 2748 Gplgmodq.exe 32 PID 2748 wrote to memory of 2804 2748 Gplgmodq.exe 32 PID 2748 wrote to memory of 2804 2748 Gplgmodq.exe 32 PID 2748 wrote to memory of 2804 2748 Gplgmodq.exe 32 PID 2804 wrote to memory of 2908 2804 Hpodbo32.exe 33 PID 2804 wrote to memory of 2908 2804 Hpodbo32.exe 33 PID 2804 wrote to memory of 2908 2804 Hpodbo32.exe 33 PID 2804 wrote to memory of 2908 2804 Hpodbo32.exe 33 PID 2908 wrote to memory of 2652 2908 Inkgdjqn.exe 34 PID 2908 wrote to memory of 2652 2908 Inkgdjqn.exe 34 PID 2908 wrote to memory of 2652 2908 Inkgdjqn.exe 34 PID 2908 wrote to memory of 2652 2908 Inkgdjqn.exe 34 PID 2652 wrote to memory of 3044 2652 Ihehbpel.exe 35 PID 2652 wrote to memory of 3044 2652 Ihehbpel.exe 35 PID 2652 wrote to memory of 3044 2652 Ihehbpel.exe 35 PID 2652 wrote to memory of 3044 2652 Ihehbpel.exe 35 PID 3044 wrote to memory of 2484 3044 Jdlefd32.exe 36 PID 3044 wrote to memory of 2484 3044 Jdlefd32.exe 36 PID 3044 wrote to memory of 2484 3044 Jdlefd32.exe 36 PID 3044 wrote to memory of 2484 3044 Jdlefd32.exe 36 PID 2484 wrote to memory of 2356 2484 Jgmnhojl.exe 37 PID 2484 wrote to memory of 2356 2484 Jgmnhojl.exe 37 PID 2484 wrote to memory of 2356 2484 Jgmnhojl.exe 37 PID 2484 wrote to memory of 2356 2484 Jgmnhojl.exe 37 PID 2356 wrote to memory of 2004 2356 Lkhfhaea.exe 38 PID 2356 wrote to memory of 2004 2356 Lkhfhaea.exe 38 PID 2356 wrote to memory of 2004 2356 Lkhfhaea.exe 38 PID 2356 wrote to memory of 2004 2356 Lkhfhaea.exe 38 PID 2004 wrote to memory of 2444 2004 Llhcad32.exe 39 PID 2004 wrote to memory of 2444 2004 Llhcad32.exe 39 PID 2004 wrote to memory of 2444 2004 Llhcad32.exe 39 PID 2004 wrote to memory of 2444 2004 Llhcad32.exe 39 PID 2444 wrote to memory of 1392 2444 Lkmpcpak.exe 40 PID 2444 wrote to memory of 1392 2444 Lkmpcpak.exe 40 PID 2444 wrote to memory of 1392 2444 Lkmpcpak.exe 40 PID 2444 wrote to memory of 1392 2444 Lkmpcpak.exe 40 PID 1392 wrote to memory of 2876 1392 Lnnidk32.exe 41 PID 1392 wrote to memory of 2876 1392 Lnnidk32.exe 41 PID 1392 wrote to memory of 2876 1392 Lnnidk32.exe 41 PID 1392 wrote to memory of 2876 1392 Lnnidk32.exe 41 PID 2876 wrote to memory of 964 2876 Lqnbffkn.exe 42 PID 2876 wrote to memory of 964 2876 Lqnbffkn.exe 42 PID 2876 wrote to memory of 964 2876 Lqnbffkn.exe 42 PID 2876 wrote to memory of 964 2876 Lqnbffkn.exe 42 PID 964 wrote to memory of 2968 964 Mjgfol32.exe 43 PID 964 wrote to memory of 2968 964 Mjgfol32.exe 43 PID 964 wrote to memory of 2968 964 Mjgfol32.exe 43 PID 964 wrote to memory of 2968 964 Mjgfol32.exe 43 PID 2968 wrote to memory of 2176 2968 Mfngdmgb.exe 44 PID 2968 wrote to memory of 2176 2968 Mfngdmgb.exe 44 PID 2968 wrote to memory of 2176 2968 Mfngdmgb.exe 44 PID 2968 wrote to memory of 2176 2968 Mfngdmgb.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe"C:\Users\Admin\AppData\Local\Temp\51b1d383809445a38d7c1df9593b79f24a0c4b8761502f1a819bc812ce8d2bbdN.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\Ffbjpfmg.exeC:\Windows\system32\Ffbjpfmg.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\Fcfjik32.exeC:\Windows\system32\Fcfjik32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Gplgmodq.exeC:\Windows\system32\Gplgmodq.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\Hpodbo32.exeC:\Windows\system32\Hpodbo32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Inkgdjqn.exeC:\Windows\system32\Inkgdjqn.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Ihehbpel.exeC:\Windows\system32\Ihehbpel.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Jdlefd32.exeC:\Windows\system32\Jdlefd32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Jgmnhojl.exeC:\Windows\system32\Jgmnhojl.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Lkhfhaea.exeC:\Windows\system32\Lkhfhaea.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\Llhcad32.exeC:\Windows\system32\Llhcad32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\Lkmpcpak.exeC:\Windows\system32\Lkmpcpak.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\Lnnidk32.exeC:\Windows\system32\Lnnidk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\Lqnbffkn.exeC:\Windows\system32\Lqnbffkn.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\Mjgfol32.exeC:\Windows\system32\Mjgfol32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\Mfngdmgb.exeC:\Windows\system32\Mfngdmgb.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Mbdhinmf.exeC:\Windows\system32\Mbdhinmf.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\Mphhbblp.exeC:\Windows\system32\Mphhbblp.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\Mpkehbjm.exeC:\Windows\system32\Mpkehbjm.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Windows\SysWOW64\Nagakhfn.exeC:\Windows\system32\Nagakhfn.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:976 -
C:\Windows\SysWOW64\Olablfbm.exeC:\Windows\system32\Olablfbm.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Windows\SysWOW64\Omqnfiip.exeC:\Windows\system32\Omqnfiip.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:932 -
C:\Windows\SysWOW64\Oelcjkgk.exeC:\Windows\system32\Oelcjkgk.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1256 -
C:\Windows\SysWOW64\Oenppk32.exeC:\Windows\system32\Oenppk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\Olkebejb.exeC:\Windows\system32\Olkebejb.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400 -
C:\Windows\SysWOW64\Pokndp32.exeC:\Windows\system32\Pokndp32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472 -
C:\Windows\SysWOW64\Palgek32.exeC:\Windows\system32\Palgek32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2096 -
C:\Windows\SysWOW64\Pncgjl32.exeC:\Windows\system32\Pncgjl32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064 -
C:\Windows\SysWOW64\Penlon32.exeC:\Windows\system32\Penlon32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2184 -
C:\Windows\SysWOW64\Pcbmhb32.exeC:\Windows\system32\Pcbmhb32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Windows\SysWOW64\Qhabfibb.exeC:\Windows\system32\Qhabfibb.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2392 -
C:\Windows\SysWOW64\Anpgdp32.exeC:\Windows\system32\Anpgdp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560 -
C:\Windows\SysWOW64\Abnpjnem.exeC:\Windows\system32\Abnpjnem.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\Acbigfii.exeC:\Windows\system32\Acbigfii.exe34⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\SysWOW64\Afbbiafj.exeC:\Windows\system32\Afbbiafj.exe35⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\Bickkl32.exeC:\Windows\system32\Bickkl32.exe36⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\Bmacqj32.exeC:\Windows\system32\Bmacqj32.exe37⤵
- Executes dropped EXE
PID:584 -
C:\Windows\SysWOW64\Bnemnbmm.exeC:\Windows\system32\Bnemnbmm.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1712 -
C:\Windows\SysWOW64\Bngicb32.exeC:\Windows\system32\Bngicb32.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\Ckkjmf32.exeC:\Windows\system32\Ckkjmf32.exe40⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\SysWOW64\Cgbjbgph.exeC:\Windows\system32\Cgbjbgph.exe41⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\Ccikghel.exeC:\Windows\system32\Ccikghel.exe42⤵
- Executes dropped EXE
PID:112 -
C:\Windows\SysWOW64\Cpolli32.exeC:\Windows\system32\Cpolli32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1516 -
C:\Windows\SysWOW64\Caohfl32.exeC:\Windows\system32\Caohfl32.exe44⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\Cpdeghgk.exeC:\Windows\system32\Cpdeghgk.exe45⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\Dmhfpmee.exeC:\Windows\system32\Dmhfpmee.exe46⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SysWOW64\Diofenki.exeC:\Windows\system32\Diofenki.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Windows\SysWOW64\Diackmif.exeC:\Windows\system32\Diackmif.exe48⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\Dhfpljnn.exeC:\Windows\system32\Dhfpljnn.exe49⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\Ddmaak32.exeC:\Windows\system32\Ddmaak32.exe50⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\Edpnfjap.exeC:\Windows\system32\Edpnfjap.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\Epfnkk32.exeC:\Windows\system32\Epfnkk32.exe52⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\Ephkak32.exeC:\Windows\system32\Ephkak32.exe53⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\SysWOW64\Eonhbg32.exeC:\Windows\system32\Eonhbg32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2284 -
C:\Windows\SysWOW64\Epmdljal.exeC:\Windows\system32\Epmdljal.exe55⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Fldeakgp.exeC:\Windows\system32\Fldeakgp.exe56⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Fdojendk.exeC:\Windows\system32\Fdojendk.exe57⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Feofpqkn.exeC:\Windows\system32\Feofpqkn.exe58⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Fhpoalho.exeC:\Windows\system32\Fhpoalho.exe59⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\Fcipaien.exeC:\Windows\system32\Fcipaien.exe60⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\Godjaj32.exeC:\Windows\system32\Godjaj32.exe61⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\Gcbchhmc.exeC:\Windows\system32\Gcbchhmc.exe62⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\Gbhpidak.exeC:\Windows\system32\Gbhpidak.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2824 -
C:\Windows\SysWOW64\Hqmmja32.exeC:\Windows\system32\Hqmmja32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\Hkenmidf.exeC:\Windows\system32\Hkenmidf.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2672 -
C:\Windows\SysWOW64\Hiohob32.exeC:\Windows\system32\Hiohob32.exe66⤵
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\Iacojc32.exeC:\Windows\system32\Iacojc32.exe67⤵
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\Johpcgap.exeC:\Windows\system32\Johpcgap.exe68⤵
- Modifies registry class
PID:1868 -
C:\Windows\SysWOW64\Jllpmlqj.exeC:\Windows\system32\Jllpmlqj.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:1380 -
C:\Windows\SysWOW64\Jhbaam32.exeC:\Windows\system32\Jhbaam32.exe70⤵PID:1972
-
C:\Windows\SysWOW64\Jfgnbi32.exeC:\Windows\system32\Jfgnbi32.exe71⤵PID:2880
-
C:\Windows\SysWOW64\Jihgdd32.exeC:\Windows\system32\Jihgdd32.exe72⤵
- System Location Discovery: System Language Discovery
PID:1312 -
C:\Windows\SysWOW64\Kmfpjb32.exeC:\Windows\system32\Kmfpjb32.exe73⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\Kpgiln32.exeC:\Windows\system32\Kpgiln32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1200 -
C:\Windows\SysWOW64\Kiomec32.exeC:\Windows\system32\Kiomec32.exe75⤵
- Modifies registry class
PID:1084 -
C:\Windows\SysWOW64\Kefnjdgc.exeC:\Windows\system32\Kefnjdgc.exe76⤵PID:2604
-
C:\Windows\SysWOW64\Koaohila.exeC:\Windows\system32\Koaohila.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\Laahjdib.exeC:\Windows\system32\Laahjdib.exe78⤵PID:2572
-
C:\Windows\SysWOW64\Ljmmng32.exeC:\Windows\system32\Ljmmng32.exe79⤵PID:2724
-
C:\Windows\SysWOW64\Lcgnmlkk.exeC:\Windows\system32\Lcgnmlkk.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Lonoamqo.exeC:\Windows\system32\Lonoamqo.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2040 -
C:\Windows\SysWOW64\Mhfckc32.exeC:\Windows\system32\Mhfckc32.exe82⤵PID:2956
-
C:\Windows\SysWOW64\Mdmdpd32.exeC:\Windows\system32\Mdmdpd32.exe83⤵PID:2940
-
C:\Windows\SysWOW64\Mnfhhicd.exeC:\Windows\system32\Mnfhhicd.exe84⤵
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Mhklfbcj.exeC:\Windows\system32\Mhklfbcj.exe85⤵PID:2544
-
C:\Windows\SysWOW64\Mqfajdpe.exeC:\Windows\system32\Mqfajdpe.exe86⤵PID:1056
-
C:\Windows\SysWOW64\Mddjpbgl.exeC:\Windows\system32\Mddjpbgl.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1872 -
C:\Windows\SysWOW64\Ngecbndm.exeC:\Windows\system32\Ngecbndm.exe88⤵PID:2812
-
C:\Windows\SysWOW64\Nppgfp32.exeC:\Windows\system32\Nppgfp32.exe89⤵
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\Nikide32.exeC:\Windows\system32\Nikide32.exe90⤵PID:800
-
C:\Windows\SysWOW64\Ncqmbn32.exeC:\Windows\system32\Ncqmbn32.exe91⤵
- Drops file in System32 directory
PID:1164 -
C:\Windows\SysWOW64\Nimeje32.exeC:\Windows\system32\Nimeje32.exe92⤵PID:2224
-
C:\Windows\SysWOW64\Nnjnbl32.exeC:\Windows\system32\Nnjnbl32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1596 -
C:\Windows\SysWOW64\Onognkne.exeC:\Windows\system32\Onognkne.exe94⤵
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\Ohglfa32.exeC:\Windows\system32\Ohglfa32.exe95⤵
- Drops file in System32 directory
- Modifies registry class
PID:2868 -
C:\Windows\SysWOW64\Ohjhlqbc.exeC:\Windows\system32\Ohjhlqbc.exe96⤵PID:2768
-
C:\Windows\SysWOW64\Omfadgqj.exeC:\Windows\system32\Omfadgqj.exe97⤵PID:2700
-
C:\Windows\SysWOW64\Ohleappp.exeC:\Windows\system32\Ohleappp.exe98⤵PID:2320
-
C:\Windows\SysWOW64\Odcffafd.exeC:\Windows\system32\Odcffafd.exe99⤵
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Pfcohlce.exeC:\Windows\system32\Pfcohlce.exe100⤵PID:3048
-
C:\Windows\SysWOW64\Pbjpmmij.exeC:\Windows\system32\Pbjpmmij.exe101⤵PID:2436
-
C:\Windows\SysWOW64\Poapbn32.exeC:\Windows\system32\Poapbn32.exe102⤵PID:1504
-
C:\Windows\SysWOW64\Phiekdeo.exeC:\Windows\system32\Phiekdeo.exe103⤵PID:2888
-
C:\Windows\SysWOW64\Phlaqc32.exeC:\Windows\system32\Phlaqc32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2820 -
C:\Windows\SysWOW64\Qhnnfc32.exeC:\Windows\system32\Qhnnfc32.exe105⤵PID:2020
-
C:\Windows\SysWOW64\Aekenl32.exeC:\Windows\system32\Aekenl32.exe106⤵PID:2756
-
C:\Windows\SysWOW64\Afmack32.exeC:\Windows\system32\Afmack32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\Apcfqd32.exeC:\Windows\system32\Apcfqd32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:924 -
C:\Windows\SysWOW64\Accobock.exeC:\Windows\system32\Accobock.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2384 -
C:\Windows\SysWOW64\Bhpgkfab.exeC:\Windows\system32\Bhpgkfab.exe110⤵
- Drops file in System32 directory
PID:2256 -
C:\Windows\SysWOW64\Bnmpcmpi.exeC:\Windows\system32\Bnmpcmpi.exe111⤵
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\Bhbdpf32.exeC:\Windows\system32\Bhbdpf32.exe112⤵PID:2552
-
C:\Windows\SysWOW64\Bqpejh32.exeC:\Windows\system32\Bqpejh32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:676 -
C:\Windows\SysWOW64\Bfojhngl.exeC:\Windows\system32\Bfojhngl.exe114⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\Cqeoegfb.exeC:\Windows\system32\Cqeoegfb.exe115⤵PID:2948
-
C:\Windows\SysWOW64\Cmlpjhlf.exeC:\Windows\system32\Cmlpjhlf.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:640 -
C:\Windows\SysWOW64\Cibpoi32.exeC:\Windows\system32\Cibpoi32.exe117⤵PID:2508
-
C:\Windows\SysWOW64\Cbmann32.exeC:\Windows\system32\Cbmann32.exe118⤵
- Modifies registry class
PID:1976 -
C:\Windows\SysWOW64\Ckeffdmi.exeC:\Windows\system32\Ckeffdmi.exe119⤵PID:2840
-
C:\Windows\SysWOW64\Dglfkebm.exeC:\Windows\system32\Dglfkebm.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2076 -
C:\Windows\SysWOW64\Dgocadqk.exeC:\Windows\system32\Dgocadqk.exe121⤵
- Drops file in System32 directory
PID:2364 -
C:\Windows\SysWOW64\Dcedfe32.exeC:\Windows\system32\Dcedfe32.exe122⤵PID:2208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-