Analysis
-
max time kernel
93s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exe
Resource
win10v2004-20241007-en
General
-
Target
0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exe
-
Size
400KB
-
MD5
b93d3c204d8405317751ec3fc6d10671
-
SHA1
5ac857b7caf4b8e9fcdf7e4e236a8b9840489132
-
SHA256
0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0
-
SHA512
d52b9c5259b75ca8db83689f80b210b5ab23fecc449dd1dd47c28a10804e73f896d55438a064358cfee20bf7f4ec3e6fff66135899f2fd303e30e7b3968d2ee3
-
SSDEEP
12288:3QkFDCuItzZhtoa+bCgRrgryg426RQagrkj:3QkFDfItzZhtoa+bCsrgryvQa2kj
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fddqjc32.exeLlkcgenf.exeOqakfdek.exeBnkfhcdj.exeGhklfq32.exeOekpnebi.exePcbdgo32.exeHbfmdfnh.exeKbnecplk.exeLpnehb32.exeNhdjhcce.exeNlgliaef.exeHhdoloap.exeJinkikkb.exeAmodhkci.exeNpabof32.exeCjfqhcei.exeKbgoba32.exeKlfjlebk.exeMeogkiji.exeBcnljkjl.exeBhqnki32.exeKhhaegle.exeLlemgj32.exePnakkf32.exeDkdmia32.exeKejeilma.exeAmhngl32.exeEaghljhk.exeGoqkhk32.exeNdoked32.exeFgkgepqj.exeGkjhbl32.exePhneep32.exeDhokmgpm.exeDdonhf32.exeJbpiab32.exeAhonlmoe.exeGdkgjb32.exeKihnpj32.exeMfocelal.exeAohfig32.exeAjlekg32.exeOheboa32.exeAfghqa32.exeIbffkcpe.exeKgchjh32.exeMlqlch32.exeBfmhff32.exeBepeinol.exeBagfooep.exeHdkpapgd.exeHkehnj32.exeOhiljpam.exeAfboeano.exeLiapfi32.exeAgkeoeki.exeNljoig32.exeFemgcg32.exeJkjjpg32.exeLiocpi32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fddqjc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llkcgenf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oqakfdek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnkfhcdj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghklfq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oekpnebi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcbdgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbfmdfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbnecplk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpnehb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhdjhcce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlgliaef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhdoloap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jinkikkb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amodhkci.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npabof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjfqhcei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbgoba32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klfjlebk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Meogkiji.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcnljkjl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhqnki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khhaegle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llemgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnakkf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkdmia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kejeilma.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amhngl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaghljhk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goqkhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghklfq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndoked32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgkgepqj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkjhbl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phneep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhokmgpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonhf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbpiab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahonlmoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gdkgjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kihnpj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfocelal.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aohfig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajlekg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oheboa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afghqa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibffkcpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgchjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlqlch32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfmhff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bepeinol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bagfooep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdkpapgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkehnj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohiljpam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afboeano.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liapfi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agkeoeki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndoked32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nljoig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Femgcg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkjjpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbgoba32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liocpi32.exe -
Executes dropped EXE 64 IoCs
Processes:
Lfckdcoe.exeLmmcqn32.exeLlpcljnl.exeLbmhod32.exeLlemgj32.exeMboeddad.exeMdnang32.exeMpebch32.exeMinglmdk.exeMedgan32.exeMdehof32.exeMlqlch32.exeNidmml32.exeNpoeif32.exeNpabof32.exeNconka32.exeNdoked32.exeNljoig32.exeNcdgfaol.exeOfeqhl32.exeOfgmml32.exeOjefcj32.exeOqakfdek.exeOjjooilk.exePcbdgo32.exePdapabjo.exePnjejgpo.exePnlapgnl.exePgdfim32.exePqmjab32.exePnakkf32.exeQflpoi32.exeQdmpmp32.exeQcppimfl.exeAnedfffb.exeAqdqbaee.exeAjlekg32.exeAqfmhacc.exeAgpedkjp.exeAedfnoii.exeAfebeg32.exeAakfcp32.exeAfhokgme.exeAnogldng.exeAclpdklo.exeBmddma32.exeBcnljkjl.exeBfmhff32.exeBmfqcqql.exeBenidnao.exeBmimhpoj.exeBepeinol.exeBfabaf32.exeBagfooep.exeBhqnki32.exeBnkfhcdj.exeCffkleae.exeCnmcnb32.exeChehfhhh.exeCmbpoofo.exeCdlhki32.exeCjfqhcei.exeCeleel32.exeChjaag32.exepid process 1536 Lfckdcoe.exe 1624 Lmmcqn32.exe 1268 Llpcljnl.exe 640 Lbmhod32.exe 3972 Llemgj32.exe 3768 Mboeddad.exe 2772 Mdnang32.exe 3732 Mpebch32.exe 4716 Minglmdk.exe 4444 Medgan32.exe 4000 Mdehof32.exe 2260 Mlqlch32.exe 1328 Nidmml32.exe 2636 Npoeif32.exe 4952 Npabof32.exe 4972 Nconka32.exe 3316 Ndoked32.exe 1984 Nljoig32.exe 3800 Ncdgfaol.exe 4844 Ofeqhl32.exe 3916 Ofgmml32.exe 1128 Ojefcj32.exe 4276 Oqakfdek.exe 908 Ojjooilk.exe 3960 Pcbdgo32.exe 1540 Pdapabjo.exe 2024 Pnjejgpo.exe 4268 Pnlapgnl.exe 2196 Pgdfim32.exe 4440 Pqmjab32.exe 3984 Pnakkf32.exe 1400 Qflpoi32.exe 4784 Qdmpmp32.exe 4800 Qcppimfl.exe 688 Anedfffb.exe 3460 Aqdqbaee.exe 4836 Ajlekg32.exe 3928 Aqfmhacc.exe 4436 Agpedkjp.exe 3220 Aedfnoii.exe 3616 Afebeg32.exe 476 Aakfcp32.exe 884 Afhokgme.exe 4120 Anogldng.exe 4484 Aclpdklo.exe 3080 Bmddma32.exe 3540 Bcnljkjl.exe 1368 Bfmhff32.exe 4580 Bmfqcqql.exe 1696 Benidnao.exe 764 Bmimhpoj.exe 2120 Bepeinol.exe 3896 Bfabaf32.exe 2648 Bagfooep.exe 3952 Bhqnki32.exe 4888 Bnkfhcdj.exe 2096 Cffkleae.exe 4996 Cnmcnb32.exe 3956 Chehfhhh.exe 1512 Cmbpoofo.exe 3476 Cdlhki32.exe 3872 Cjfqhcei.exe 1232 Celeel32.exe 1156 Chjaag32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Acilde32.exeHnagdf32.exeIbffkcpe.exeKlfjlebk.exeMinglmdk.exeIilemnkh.exeAhonlmoe.exeAclpdklo.exeBqoicigl.exeCdabfhjf.exeEaghljhk.exeMfocelal.exeOfgmml32.exeHoljci32.exeDkdmia32.exeNohdkl32.exeOhpidaig.exeAqdqbaee.exeEmqegkll.exeGkpelm32.exeEkkcjp32.exePcammi32.exeAgdhedco.exeNpabof32.exePnakkf32.exeBepeinol.exeFnlebibo.exeOgcfgiod.exeAiedml32.exeBhqnki32.exeFdknce32.exeLechpjdf.exeBijnhleg.exeLbmhod32.exeNcdgfaol.exeFgkgepqj.exeGochmk32.exeMdehof32.exeNpoeif32.exeNconka32.exeJgjedi32.exeBgiapc32.exeHhpeapee.exeIdnlgpea.exeIgekijlj.exeAfboeano.exeBcpbed32.exeOcfmajin.exeEhmgne32.exeHojnnj32.exeJbbfgafh.exeNekgggpl.exeOpqdknbo.exeGdkgjb32.exeMhmcgdim.exeHdkpapgd.exeKbgoba32.exeNehjagbo.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Agdhedco.exe Acilde32.exe File created C:\Windows\SysWOW64\Knejbf32.dll Hnagdf32.exe File created C:\Windows\SysWOW64\Gelenh32.dll Ibffkcpe.exe File created C:\Windows\SysWOW64\Kbpbhp32.exe Klfjlebk.exe File created C:\Windows\SysWOW64\Lnneah32.dll Minglmdk.exe File created C:\Windows\SysWOW64\Bmijki32.dll Iilemnkh.exe File created C:\Windows\SysWOW64\Aohfig32.exe Ahonlmoe.exe File created C:\Windows\SysWOW64\Peodfhjp.dll Aclpdklo.exe File created C:\Windows\SysWOW64\Cfkkid32.dll Bqoicigl.exe File created C:\Windows\SysWOW64\Cjkjcb32.exe Cdabfhjf.exe File opened for modification C:\Windows\SysWOW64\Eokhfn32.exe Eaghljhk.exe File created C:\Windows\SysWOW64\Mlklnbpc.exe Mfocelal.exe File created C:\Windows\SysWOW64\Ojefcj32.exe Ofgmml32.exe File opened for modification C:\Windows\SysWOW64\Hnokofaj.exe Holjci32.exe File created C:\Windows\SysWOW64\Dejafj32.exe Dkdmia32.exe File created C:\Windows\SysWOW64\Kohlodkf.dll Nohdkl32.exe File opened for modification C:\Windows\SysWOW64\Opgaeojj.exe Ohpidaig.exe File created C:\Windows\SysWOW64\Nhobfi32.dll Aqdqbaee.exe File created C:\Windows\SysWOW64\Fdknce32.exe Emqegkll.exe File opened for modification C:\Windows\SysWOW64\Gnoahi32.exe Gkpelm32.exe File created C:\Windows\SysWOW64\Eoilpoig.exe Ekkcjp32.exe File created C:\Windows\SysWOW64\Hkgbpgil.dll Pcammi32.exe File opened for modification C:\Windows\SysWOW64\Afghqa32.exe Agdhedco.exe File created C:\Windows\SysWOW64\Nconka32.exe Npabof32.exe File opened for modification C:\Windows\SysWOW64\Qflpoi32.exe Pnakkf32.exe File created C:\Windows\SysWOW64\Ccnnnm32.dll Bepeinol.exe File created C:\Windows\SysWOW64\Gdfmocil.exe Fnlebibo.exe File created C:\Windows\SysWOW64\Glfkpfnl.dll Ogcfgiod.exe File created C:\Windows\SysWOW64\Kdogolkf.dll Aiedml32.exe File created C:\Windows\SysWOW64\Bnkfhcdj.exe Bhqnki32.exe File opened for modification C:\Windows\SysWOW64\Fopbqnco.exe Fdknce32.exe File created C:\Windows\SysWOW64\Bgcnegoj.dll Lechpjdf.exe File created C:\Windows\SysWOW64\Bcpbed32.exe Bijnhleg.exe File created C:\Windows\SysWOW64\Bemjjfpc.dll Lbmhod32.exe File created C:\Windows\SysWOW64\Bfabaf32.exe Bepeinol.exe File opened for modification C:\Windows\SysWOW64\Ngomli32.exe Nohdkl32.exe File created C:\Windows\SysWOW64\Ofeqhl32.exe Ncdgfaol.exe File opened for modification C:\Windows\SysWOW64\Fobofmal.exe Fgkgepqj.exe File created C:\Windows\SysWOW64\Jhphocbp.dll Gochmk32.exe File created C:\Windows\SysWOW64\Hnichmjj.dll Mdehof32.exe File created C:\Windows\SysWOW64\Pjnjhf32.dll Npoeif32.exe File created C:\Windows\SysWOW64\Koiclk32.dll Nconka32.exe File created C:\Windows\SysWOW64\Jbpiab32.exe Jgjedi32.exe File created C:\Windows\SysWOW64\Bijnhleg.exe Bgiapc32.exe File created C:\Windows\SysWOW64\Bpjfhemc.dll Npabof32.exe File created C:\Windows\SysWOW64\Ddnddfjh.dll Hhpeapee.exe File opened for modification C:\Windows\SysWOW64\Iglhckde.exe Idnlgpea.exe File opened for modification C:\Windows\SysWOW64\Iomcjgml.exe Igekijlj.exe File created C:\Windows\SysWOW64\Mdnkbgfn.dll Afboeano.exe File created C:\Windows\SysWOW64\Ehaidj32.dll Bcpbed32.exe File created C:\Windows\SysWOW64\Opgaeojj.exe Ohpidaig.exe File opened for modification C:\Windows\SysWOW64\Olnbjp32.exe Ocfmajin.exe File opened for modification C:\Windows\SysWOW64\Ekkcjp32.exe Ehmgne32.exe File opened for modification C:\Windows\SysWOW64\Hdgffq32.exe Hojnnj32.exe File opened for modification C:\Windows\SysWOW64\Jilndl32.exe Jbbfgafh.exe File created C:\Windows\SysWOW64\Ibbljhbc.dll Nekgggpl.exe File opened for modification C:\Windows\SysWOW64\Pemlcdpf.exe Opqdknbo.exe File created C:\Windows\SysWOW64\Ndoked32.exe Nconka32.exe File created C:\Windows\SysWOW64\Ggicfn32.exe Gdkgjb32.exe File created C:\Windows\SysWOW64\Bdokfa32.dll Mhmcgdim.exe File created C:\Windows\SysWOW64\Hkehnj32.exe Hdkpapgd.exe File created C:\Windows\SysWOW64\Dadqfhla.dll Kbgoba32.exe File created C:\Windows\SysWOW64\Fhkgni32.dll Nehjagbo.exe File opened for modification C:\Windows\SysWOW64\Nconka32.exe Npabof32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8224 8068 WerFault.exe Cakiohmo.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Kihnpj32.exeKeondk32.exeLlhfaepi.exeNpoeif32.exePcbdgo32.exeQcppimfl.exeGfmpjejf.exeHhnilp32.exeJilndl32.exeNlgliaef.exeOpngfn32.exePnlapgnl.exePqmjab32.exeQflpoi32.exePnjejgpo.exeJlmgegjf.exeOhiljpam.exePoodbi32.exeAhonlmoe.exeNljoig32.exeLifjahgh.exeNekgggpl.exeMedgan32.exeQgfldf32.exeOcjglj32.exeAedfnoii.exeHkehnj32.exeIojgegoo.exeNcdgfaol.exeFddqjc32.exeGhklfq32.exeKbnecplk.exeOpqdknbo.exeAakfcp32.exeHhpeapee.exeJbpiab32.exeOcfmajin.exeAnedfffb.exeDmefklfj.exeLechpjdf.exeNgomli32.exeOlnbjp32.exeEmqegkll.exeMemjfill.exeAfpbpbpa.exeJgjedi32.exeQhjean32.exe0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exeBmimhpoj.exeEokhfn32.exeJghhoi32.exeLpnehb32.exeMhijle32.exePhlippoj.exePjpoeb32.exeGgicfn32.exeHddiqaml.exeIocqdh32.exeAqdqbaee.exeEaghljhk.exePgdonf32.exeJgmajifb.exeKbgoba32.exeKicddk32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kihnpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keondk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llhfaepi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npoeif32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcbdgo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qcppimfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfmpjejf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhnilp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jilndl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlgliaef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opngfn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnlapgnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqmjab32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qflpoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnjejgpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlmgegjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohiljpam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Poodbi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahonlmoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nljoig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lifjahgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nekgggpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Medgan32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qgfldf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocjglj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aedfnoii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkehnj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iojgegoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncdgfaol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fddqjc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghklfq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbnecplk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opqdknbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aakfcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhpeapee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbpiab32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocfmajin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anedfffb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmefklfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lechpjdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ngomli32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olnbjp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emqegkll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Memjfill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afpbpbpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgjedi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qhjean32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmimhpoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eokhfn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jghhoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpnehb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhijle32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phlippoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjpoeb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggicfn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hddiqaml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iocqdh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqdqbaee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eaghljhk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgdonf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgmajifb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbgoba32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kicddk32.exe -
Modifies registry class 64 IoCs
Processes:
Lmmcqn32.exeIomcjgml.exeAhonlmoe.exeAmmgblek.exeIojgegoo.exeOcfmajin.exeGekcdeli.exeLnllhp32.exeChehfhhh.exePjbkjb32.exeAmhngl32.exePqmjab32.exeGkjhbl32.exeMhbmbc32.exeBggdkd32.exeBmimhpoj.exeJenenmgo.exeKeondk32.exeOcmcbice.exeAjnkfp32.exeBopmif32.exeCmgjjn32.exeDkdmia32.exeKeeknl32.exeBhqnki32.exeNeopbf32.exeOpqdknbo.exeAfghqa32.exePpemfm32.exeAjiaka32.exePdapabjo.exeJniflb32.exeKihnpj32.exeMlklnbpc.exeNoehelej.exeLfgndmhd.exeOjjooilk.exePgdfim32.exeNhiccb32.exeAgkeoeki.exeJgmajifb.exeNidmml32.exeInddje32.exeLechpjdf.exePoodbi32.exeQflpoi32.exeBmddma32.exeBfabaf32.exeIkjaiijk.exeOfgmml32.exeAgbkpdea.exeBcbokd32.exeBagfooep.exeEkkcjp32.exeFnjhmida.exeNbljklah.exePgdonf32.exeHklehl32.exeIbdifc32.exeBijnhleg.exeQleaamkc.exeHdgffq32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cllnlemd.dll" Lmmcqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iomcjgml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahonlmoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ammgblek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iojgegoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocfmajin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gekcdeli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iomcjgml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ippnjnpd.dll" Lnllhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chehfhhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjbkjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amhngl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqmjab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gkjhbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhbmbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmbheh32.dll" Bggdkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmohdknn.dll" Bmimhpoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jenenmgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Keondk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocmcbice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajnkfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bopmif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmgjjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkdmia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jljhoemf.dll" Keeknl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhqnki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bopmif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Honfne32.dll" Neopbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Opqdknbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afghqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppemfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kffhgpmh.dll" Ajiaka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdapabjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jniflb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kihnpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlklnbpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojdgmgll.dll" Noehelej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfgndmhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enfamfpn.dll" Ojjooilk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pgdfim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhiccb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agddhb32.dll" Agkeoeki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgmajifb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nidmml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Inddje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgcnegoj.dll" Lechpjdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Poodbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qflpoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmddma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dchgoldk.dll" Bfabaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikjaiijk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgdcjo32.dll" Ofgmml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Joednoci.dll" Agbkpdea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bcbokd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bagfooep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ekkcjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opbdanco.dll" Fnjhmida.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbljklah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Allooh32.dll" Pgdonf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hklehl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jokjjbno.dll" Ibdifc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bijnhleg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qleaamkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdgffq32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exeLfckdcoe.exeLmmcqn32.exeLlpcljnl.exeLbmhod32.exeLlemgj32.exeMboeddad.exeMdnang32.exeMpebch32.exeMinglmdk.exeMedgan32.exeMdehof32.exeMlqlch32.exeNidmml32.exeNpoeif32.exeNpabof32.exeNconka32.exeNdoked32.exeNljoig32.exeNcdgfaol.exeOfeqhl32.exeOfgmml32.exedescription pid process target process PID 1728 wrote to memory of 1536 1728 0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exe Lfckdcoe.exe PID 1728 wrote to memory of 1536 1728 0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exe Lfckdcoe.exe PID 1728 wrote to memory of 1536 1728 0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exe Lfckdcoe.exe PID 1536 wrote to memory of 1624 1536 Lfckdcoe.exe Lmmcqn32.exe PID 1536 wrote to memory of 1624 1536 Lfckdcoe.exe Lmmcqn32.exe PID 1536 wrote to memory of 1624 1536 Lfckdcoe.exe Lmmcqn32.exe PID 1624 wrote to memory of 1268 1624 Lmmcqn32.exe Llpcljnl.exe PID 1624 wrote to memory of 1268 1624 Lmmcqn32.exe Llpcljnl.exe PID 1624 wrote to memory of 1268 1624 Lmmcqn32.exe Llpcljnl.exe PID 1268 wrote to memory of 640 1268 Llpcljnl.exe Lbmhod32.exe PID 1268 wrote to memory of 640 1268 Llpcljnl.exe Lbmhod32.exe PID 1268 wrote to memory of 640 1268 Llpcljnl.exe Lbmhod32.exe PID 640 wrote to memory of 3972 640 Lbmhod32.exe Llemgj32.exe PID 640 wrote to memory of 3972 640 Lbmhod32.exe Llemgj32.exe PID 640 wrote to memory of 3972 640 Lbmhod32.exe Llemgj32.exe PID 3972 wrote to memory of 3768 3972 Llemgj32.exe Mboeddad.exe PID 3972 wrote to memory of 3768 3972 Llemgj32.exe Mboeddad.exe PID 3972 wrote to memory of 3768 3972 Llemgj32.exe Mboeddad.exe PID 3768 wrote to memory of 2772 3768 Mboeddad.exe Mdnang32.exe PID 3768 wrote to memory of 2772 3768 Mboeddad.exe Mdnang32.exe PID 3768 wrote to memory of 2772 3768 Mboeddad.exe Mdnang32.exe PID 2772 wrote to memory of 3732 2772 Mdnang32.exe Mpebch32.exe PID 2772 wrote to memory of 3732 2772 Mdnang32.exe Mpebch32.exe PID 2772 wrote to memory of 3732 2772 Mdnang32.exe Mpebch32.exe PID 3732 wrote to memory of 4716 3732 Mpebch32.exe Minglmdk.exe PID 3732 wrote to memory of 4716 3732 Mpebch32.exe Minglmdk.exe PID 3732 wrote to memory of 4716 3732 Mpebch32.exe Minglmdk.exe PID 4716 wrote to memory of 4444 4716 Minglmdk.exe Medgan32.exe PID 4716 wrote to memory of 4444 4716 Minglmdk.exe Medgan32.exe PID 4716 wrote to memory of 4444 4716 Minglmdk.exe Medgan32.exe PID 4444 wrote to memory of 4000 4444 Medgan32.exe Mdehof32.exe PID 4444 wrote to memory of 4000 4444 Medgan32.exe Mdehof32.exe PID 4444 wrote to memory of 4000 4444 Medgan32.exe Mdehof32.exe PID 4000 wrote to memory of 2260 4000 Mdehof32.exe Mlqlch32.exe PID 4000 wrote to memory of 2260 4000 Mdehof32.exe Mlqlch32.exe PID 4000 wrote to memory of 2260 4000 Mdehof32.exe Mlqlch32.exe PID 2260 wrote to memory of 1328 2260 Mlqlch32.exe Nidmml32.exe PID 2260 wrote to memory of 1328 2260 Mlqlch32.exe Nidmml32.exe PID 2260 wrote to memory of 1328 2260 Mlqlch32.exe Nidmml32.exe PID 1328 wrote to memory of 2636 1328 Nidmml32.exe Npoeif32.exe PID 1328 wrote to memory of 2636 1328 Nidmml32.exe Npoeif32.exe PID 1328 wrote to memory of 2636 1328 Nidmml32.exe Npoeif32.exe PID 2636 wrote to memory of 4952 2636 Npoeif32.exe Npabof32.exe PID 2636 wrote to memory of 4952 2636 Npoeif32.exe Npabof32.exe PID 2636 wrote to memory of 4952 2636 Npoeif32.exe Npabof32.exe PID 4952 wrote to memory of 4972 4952 Npabof32.exe Nconka32.exe PID 4952 wrote to memory of 4972 4952 Npabof32.exe Nconka32.exe PID 4952 wrote to memory of 4972 4952 Npabof32.exe Nconka32.exe PID 4972 wrote to memory of 3316 4972 Nconka32.exe Ndoked32.exe PID 4972 wrote to memory of 3316 4972 Nconka32.exe Ndoked32.exe PID 4972 wrote to memory of 3316 4972 Nconka32.exe Ndoked32.exe PID 3316 wrote to memory of 1984 3316 Ndoked32.exe Nljoig32.exe PID 3316 wrote to memory of 1984 3316 Ndoked32.exe Nljoig32.exe PID 3316 wrote to memory of 1984 3316 Ndoked32.exe Nljoig32.exe PID 1984 wrote to memory of 3800 1984 Nljoig32.exe Ncdgfaol.exe PID 1984 wrote to memory of 3800 1984 Nljoig32.exe Ncdgfaol.exe PID 1984 wrote to memory of 3800 1984 Nljoig32.exe Ncdgfaol.exe PID 3800 wrote to memory of 4844 3800 Ncdgfaol.exe Ofeqhl32.exe PID 3800 wrote to memory of 4844 3800 Ncdgfaol.exe Ofeqhl32.exe PID 3800 wrote to memory of 4844 3800 Ncdgfaol.exe Ofeqhl32.exe PID 4844 wrote to memory of 3916 4844 Ofeqhl32.exe Ofgmml32.exe PID 4844 wrote to memory of 3916 4844 Ofeqhl32.exe Ofgmml32.exe PID 4844 wrote to memory of 3916 4844 Ofeqhl32.exe Ofgmml32.exe PID 3916 wrote to memory of 1128 3916 Ofgmml32.exe Ojefcj32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exe"C:\Users\Admin\AppData\Local\Temp\0ea0baac72f4b7598ac127b6306dd1763c4cdea65b439efc72e123b887053ab0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\Lfckdcoe.exeC:\Windows\system32\Lfckdcoe.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\Lmmcqn32.exeC:\Windows\system32\Lmmcqn32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\Llpcljnl.exeC:\Windows\system32\Llpcljnl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Lbmhod32.exeC:\Windows\system32\Lbmhod32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\Llemgj32.exeC:\Windows\system32\Llemgj32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\Mboeddad.exeC:\Windows\system32\Mboeddad.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\Mdnang32.exeC:\Windows\system32\Mdnang32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\Mpebch32.exeC:\Windows\system32\Mpebch32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\Minglmdk.exeC:\Windows\system32\Minglmdk.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\Medgan32.exeC:\Windows\system32\Medgan32.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\Mdehof32.exeC:\Windows\system32\Mdehof32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\Mlqlch32.exeC:\Windows\system32\Mlqlch32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Nidmml32.exeC:\Windows\system32\Nidmml32.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\Npoeif32.exeC:\Windows\system32\Npoeif32.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Npabof32.exeC:\Windows\system32\Npabof32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\Nconka32.exeC:\Windows\system32\Nconka32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\Ndoked32.exeC:\Windows\system32\Ndoked32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\Nljoig32.exeC:\Windows\system32\Nljoig32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Ncdgfaol.exeC:\Windows\system32\Ncdgfaol.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\Ofeqhl32.exeC:\Windows\system32\Ofeqhl32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\Ofgmml32.exeC:\Windows\system32\Ofgmml32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\Ojefcj32.exeC:\Windows\system32\Ojefcj32.exe23⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\SysWOW64\Oqakfdek.exeC:\Windows\system32\Oqakfdek.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\Ojjooilk.exeC:\Windows\system32\Ojjooilk.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:908 -
C:\Windows\SysWOW64\Pcbdgo32.exeC:\Windows\system32\Pcbdgo32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\SysWOW64\Pdapabjo.exeC:\Windows\system32\Pdapabjo.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1540 -
C:\Windows\SysWOW64\Pnjejgpo.exeC:\Windows\system32\Pnjejgpo.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\Pnlapgnl.exeC:\Windows\system32\Pnlapgnl.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Windows\SysWOW64\Pgdfim32.exeC:\Windows\system32\Pgdfim32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:2196 -
C:\Windows\SysWOW64\Pqmjab32.exeC:\Windows\system32\Pqmjab32.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4440 -
C:\Windows\SysWOW64\Pnakkf32.exeC:\Windows\system32\Pnakkf32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3984 -
C:\Windows\SysWOW64\Qflpoi32.exeC:\Windows\system32\Qflpoi32.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1400 -
C:\Windows\SysWOW64\Qdmpmp32.exeC:\Windows\system32\Qdmpmp32.exe34⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\Qcppimfl.exeC:\Windows\system32\Qcppimfl.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\SysWOW64\Anedfffb.exeC:\Windows\system32\Anedfffb.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:688 -
C:\Windows\SysWOW64\Aqdqbaee.exeC:\Windows\system32\Aqdqbaee.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Windows\SysWOW64\Ajlekg32.exeC:\Windows\system32\Ajlekg32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4836 -
C:\Windows\SysWOW64\Aqfmhacc.exeC:\Windows\system32\Aqfmhacc.exe39⤵
- Executes dropped EXE
PID:3928 -
C:\Windows\SysWOW64\Agpedkjp.exeC:\Windows\system32\Agpedkjp.exe40⤵
- Executes dropped EXE
PID:4436 -
C:\Windows\SysWOW64\Aedfnoii.exeC:\Windows\system32\Aedfnoii.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Windows\SysWOW64\Afebeg32.exeC:\Windows\system32\Afebeg32.exe42⤵
- Executes dropped EXE
PID:3616 -
C:\Windows\SysWOW64\Aakfcp32.exeC:\Windows\system32\Aakfcp32.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:476 -
C:\Windows\SysWOW64\Afhokgme.exeC:\Windows\system32\Afhokgme.exe44⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Anogldng.exeC:\Windows\system32\Anogldng.exe45⤵
- Executes dropped EXE
PID:4120 -
C:\Windows\SysWOW64\Aclpdklo.exeC:\Windows\system32\Aclpdklo.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4484 -
C:\Windows\SysWOW64\Bmddma32.exeC:\Windows\system32\Bmddma32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:3080 -
C:\Windows\SysWOW64\Bcnljkjl.exeC:\Windows\system32\Bcnljkjl.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\Bfmhff32.exeC:\Windows\system32\Bfmhff32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\Bmfqcqql.exeC:\Windows\system32\Bmfqcqql.exe50⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\Benidnao.exeC:\Windows\system32\Benidnao.exe51⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\Bmimhpoj.exeC:\Windows\system32\Bmimhpoj.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:764 -
C:\Windows\SysWOW64\Bepeinol.exeC:\Windows\system32\Bepeinol.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2120 -
C:\Windows\SysWOW64\Bfabaf32.exeC:\Windows\system32\Bfabaf32.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:3896 -
C:\Windows\SysWOW64\Bagfooep.exeC:\Windows\system32\Bagfooep.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2648 -
C:\Windows\SysWOW64\Bhqnki32.exeC:\Windows\system32\Bhqnki32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3952 -
C:\Windows\SysWOW64\Bnkfhcdj.exeC:\Windows\system32\Bnkfhcdj.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4888 -
C:\Windows\SysWOW64\Cffkleae.exeC:\Windows\system32\Cffkleae.exe58⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\Cnmcnb32.exeC:\Windows\system32\Cnmcnb32.exe59⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\SysWOW64\Chehfhhh.exeC:\Windows\system32\Chehfhhh.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:3956 -
C:\Windows\SysWOW64\Cmbpoofo.exeC:\Windows\system32\Cmbpoofo.exe61⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\Cdlhki32.exeC:\Windows\system32\Cdlhki32.exe62⤵
- Executes dropped EXE
PID:3476 -
C:\Windows\SysWOW64\Cjfqhcei.exeC:\Windows\system32\Cjfqhcei.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3872 -
C:\Windows\SysWOW64\Celeel32.exeC:\Windows\system32\Celeel32.exe64⤵
- Executes dropped EXE
PID:1232 -
C:\Windows\SysWOW64\Chjaag32.exeC:\Windows\system32\Chjaag32.exe65⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\SysWOW64\Cmgjjn32.exeC:\Windows\system32\Cmgjjn32.exe66⤵
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Cabfjmkc.exeC:\Windows\system32\Cabfjmkc.exe67⤵PID:4328
-
C:\Windows\SysWOW64\Cdabfhjf.exeC:\Windows\system32\Cdabfhjf.exe68⤵
- Drops file in System32 directory
PID:3656 -
C:\Windows\SysWOW64\Cjkjcb32.exeC:\Windows\system32\Cjkjcb32.exe69⤵PID:4520
-
C:\Windows\SysWOW64\Dhokmgpm.exeC:\Windows\system32\Dhokmgpm.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4408 -
C:\Windows\SysWOW64\Dhagbfnj.exeC:\Windows\system32\Dhagbfnj.exe71⤵PID:984
-
C:\Windows\SysWOW64\Dokpoq32.exeC:\Windows\system32\Dokpoq32.exe72⤵PID:4280
-
C:\Windows\SysWOW64\Deehkk32.exeC:\Windows\system32\Deehkk32.exe73⤵PID:3236
-
C:\Windows\SysWOW64\Dkbpda32.exeC:\Windows\system32\Dkbpda32.exe74⤵PID:444
-
C:\Windows\SysWOW64\Dhfqmf32.exeC:\Windows\system32\Dhfqmf32.exe75⤵PID:1016
-
C:\Windows\SysWOW64\Dkdmia32.exeC:\Windows\system32\Dkdmia32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4900 -
C:\Windows\SysWOW64\Dejafj32.exeC:\Windows\system32\Dejafj32.exe77⤵PID:944
-
C:\Windows\SysWOW64\Dobfpp32.exeC:\Windows\system32\Dobfpp32.exe78⤵PID:2140
-
C:\Windows\SysWOW64\Dmefklfj.exeC:\Windows\system32\Dmefklfj.exe79⤵
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Windows\SysWOW64\Ddonhf32.exeC:\Windows\system32\Ddonhf32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2812 -
C:\Windows\SysWOW64\Eeokaiei.exeC:\Windows\system32\Eeokaiei.exe81⤵PID:3568
-
C:\Windows\SysWOW64\Ehmgne32.exeC:\Windows\system32\Ehmgne32.exe82⤵
- Drops file in System32 directory
PID:3976 -
C:\Windows\SysWOW64\Ekkcjp32.exeC:\Windows\system32\Ekkcjp32.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:5012 -
C:\Windows\SysWOW64\Eoilpoig.exeC:\Windows\system32\Eoilpoig.exe84⤵PID:3288
-
C:\Windows\SysWOW64\Eaghljhk.exeC:\Windows\system32\Eaghljhk.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4164 -
C:\Windows\SysWOW64\Eokhfn32.exeC:\Windows\system32\Eokhfn32.exe86⤵
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\SysWOW64\Emniakno.exeC:\Windows\system32\Emniakno.exe87⤵PID:180
-
C:\Windows\SysWOW64\Emqegkll.exeC:\Windows\system32\Emqegkll.exe88⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Windows\SysWOW64\Fdknce32.exeC:\Windows\system32\Fdknce32.exe89⤵
- Drops file in System32 directory
PID:3612 -
C:\Windows\SysWOW64\Fopbqnco.exeC:\Windows\system32\Fopbqnco.exe90⤵PID:2508
-
C:\Windows\SysWOW64\Fgkgepqj.exeC:\Windows\system32\Fgkgepqj.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4728 -
C:\Windows\SysWOW64\Fobofmal.exeC:\Windows\system32\Fobofmal.exe92⤵PID:4748
-
C:\Windows\SysWOW64\Femgcg32.exeC:\Windows\system32\Femgcg32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2236 -
C:\Windows\SysWOW64\Fkiokn32.exeC:\Windows\system32\Fkiokn32.exe94⤵PID:4964
-
C:\Windows\SysWOW64\Facghh32.exeC:\Windows\system32\Facghh32.exe95⤵PID:3592
-
C:\Windows\SysWOW64\Feochgff.exeC:\Windows\system32\Feochgff.exe96⤵PID:2956
-
C:\Windows\SysWOW64\Fgpppo32.exeC:\Windows\system32\Fgpppo32.exe97⤵PID:1592
-
C:\Windows\SysWOW64\Fnjhmida.exeC:\Windows\system32\Fnjhmida.exe98⤵
- Modifies registry class
PID:4564 -
C:\Windows\SysWOW64\Fddqjc32.exeC:\Windows\system32\Fddqjc32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\SysWOW64\Fgbmfo32.exeC:\Windows\system32\Fgbmfo32.exe100⤵PID:3004
-
C:\Windows\SysWOW64\Fnlebibo.exeC:\Windows\system32\Fnlebibo.exe101⤵
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\Gdfmocil.exeC:\Windows\system32\Gdfmocil.exe102⤵PID:2892
-
C:\Windows\SysWOW64\Gkpelm32.exeC:\Windows\system32\Gkpelm32.exe103⤵
- Drops file in System32 directory
PID:4696 -
C:\Windows\SysWOW64\Gnoahi32.exeC:\Windows\system32\Gnoahi32.exe104⤵PID:924
-
C:\Windows\SysWOW64\Gdijecgi.exeC:\Windows\system32\Gdijecgi.exe105⤵PID:5124
-
C:\Windows\SysWOW64\Gggfanfm.exeC:\Windows\system32\Gggfanfm.exe106⤵PID:5172
-
C:\Windows\SysWOW64\Gkbbam32.exeC:\Windows\system32\Gkbbam32.exe107⤵PID:5208
-
C:\Windows\SysWOW64\Gamjngfc.exeC:\Windows\system32\Gamjngfc.exe108⤵PID:5252
-
C:\Windows\SysWOW64\Gdkgjb32.exeC:\Windows\system32\Gdkgjb32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5296 -
C:\Windows\SysWOW64\Ggicfn32.exeC:\Windows\system32\Ggicfn32.exe110⤵
- System Location Discovery: System Language Discovery
PID:5332 -
C:\Windows\SysWOW64\Goqkhk32.exeC:\Windows\system32\Goqkhk32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5380 -
C:\Windows\SysWOW64\Gekcdeli.exeC:\Windows\system32\Gekcdeli.exe112⤵
- Modifies registry class
PID:5420 -
C:\Windows\SysWOW64\Gglpln32.exeC:\Windows\system32\Gglpln32.exe113⤵PID:5464
-
C:\Windows\SysWOW64\Gochmk32.exeC:\Windows\system32\Gochmk32.exe114⤵
- Drops file in System32 directory
PID:5504 -
C:\Windows\SysWOW64\Gfmpjejf.exeC:\Windows\system32\Gfmpjejf.exe115⤵
- System Location Discovery: System Language Discovery
PID:5548 -
C:\Windows\SysWOW64\Ghklfq32.exeC:\Windows\system32\Ghklfq32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:5588 -
C:\Windows\SysWOW64\Gkjhbl32.exeC:\Windows\system32\Gkjhbl32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5624 -
C:\Windows\SysWOW64\Hacqofpk.exeC:\Windows\system32\Hacqofpk.exe118⤵PID:5672
-
C:\Windows\SysWOW64\Hhnilp32.exeC:\Windows\system32\Hhnilp32.exe119⤵
- System Location Discovery: System Language Discovery
PID:5708 -
C:\Windows\SysWOW64\Hklehl32.exeC:\Windows\system32\Hklehl32.exe120⤵
- Modifies registry class
PID:5760 -
C:\Windows\SysWOW64\Hbfmdfnh.exeC:\Windows\system32\Hbfmdfnh.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5800 -
C:\Windows\SysWOW64\Hddiqaml.exeC:\Windows\system32\Hddiqaml.exe122⤵
- System Location Discovery: System Language Discovery
PID:5864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-