Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe
Resource
win10v2004-20241007-en
General
-
Target
71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe
-
Size
318KB
-
MD5
a4a26a3d74962a84f674f7b3519084a9
-
SHA1
06a99b50864b5fbc4395abc9b7c9bc51f8a0b673
-
SHA256
71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701
-
SHA512
a07fe3dd5358ae132e6a50f1ee0c793287b2d3a6bcaa5691543c56df201f0d0661ade49c27f5e4f5aa5ecbced3ce72237fb9eebcc070e4cb0642213c54e23768
-
SSDEEP
6144:BLLTE5V8cdxvyQRVEQHdMcm4FmowdHoS7c5cm4FmowdHoSrNF9xRVEQHd4:lTE5V8KR9O4wFHoS04wFHoSrZx8
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kpblne32.exeHffjng32.exeOebdndlp.exeLjndga32.exeFaonqiod.exeHfdbji32.exeAkpmhdqd.exeFehodaqd.exeLbbiii32.exeNphbfplf.exeJdbfjm32.exeCmimif32.exeFfcbce32.exeDapjdq32.exeKkhdml32.exeCngfqi32.exeEbhjdc32.exeCjcfjoil.exeDddmkkpb.exeHpgakh32.exeLbhphdab.exeCkbccnji.exeEolljk32.exeOafedmlb.exeIfkfap32.exeMgomoboc.exeGllabp32.exeLighjd32.exeLlainlje.exeMbehgabe.exeEgbffj32.exeEekpknlf.exeCppakj32.exeEekdmk32.exeHojqjp32.exeBhfjgh32.exeJdjioh32.exeFdjfmolo.exeEkipgb32.exeMqoocmcg.exeCnhhia32.exeHdqhambg.exePgamgken.exeFkocfa32.exeJmelfeqn.exeLfkhch32.exeLjejgp32.exePpjjcogn.exeGnmdfi32.exeGaiijgbi.exeCfmceomm.exeDjaedbnj.exeDcijmhdj.exeMqdbjp32.exeQoonqmqf.exeAbpohb32.exeHbnqln32.exeKdakoj32.exeGdophn32.exeIofiimkd.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpblne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hffjng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oebdndlp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljndga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Faonqiod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfdbji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akpmhdqd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fehodaqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbbiii32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nphbfplf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdbfjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmimif32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffcbce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dapjdq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkhdml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cngfqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebhjdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjcfjoil.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddmkkpb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpgakh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbhphdab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckbccnji.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eolljk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oafedmlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifkfap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgomoboc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gllabp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lighjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llainlje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbehgabe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egbffj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eekpknlf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cppakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eekdmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hojqjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhfjgh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdjioh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdjfmolo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekipgb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llainlje.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqoocmcg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnhhia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oafedmlb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdqhambg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgamgken.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkocfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmelfeqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfkhch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljejgp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppjjcogn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnmdfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gaiijgbi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfmceomm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djaedbnj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcijmhdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqdbjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qoonqmqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnmdfi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abpohb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbnqln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdakoj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdophn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iofiimkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdqhambg.exe -
Executes dropped EXE 64 IoCs
Processes:
Haleefoe.exeHhfmbq32.exeImcfjg32.exeIdmnga32.exeIpkema32.exeJhfjadim.exeJddqgdii.exeKjebjjck.exeKflcok32.exeLamjph32.exeLmckeidj.exeMpkjgckc.exeMlbkmdah.exeNeohqicc.exeNpiiafpa.exeOafedmlb.exeOolbcaij.exePamlel32.exePfando32.exeQoqhncgp.exeAkjfhdka.exeAmmoel32.exeBfjmia32.exeBepjjn32.exeBefpkmph.exeCppakj32.exeCmdaeo32.exeDchpnd32.exeDcjmcd32.exeDapjdq32.exeDnhgoa32.exeElpqemll.exeElejqm32.exeEnhcnd32.exeFipdqmje.exeFgeabi32.exeFgjkmijh.exeFmgcepio.exeGipqpplq.exeGplebjbk.exeGeinjapb.exeHhjgll32.exeHdqhambg.exeHadhjaaa.exeHjmmcgha.exeHdeall32.exeHlqfqo32.exeHffjng32.exeHlcbfnjk.exeIoaobjin.exeIiipeb32.exeIdgjqook.exeIgffmkno.exeJcmgal32.exeJgkphj32.exeJpcdqpqj.exeJjkiie32.exeJcdmbk32.exeJojnglco.exeKhcbpa32.exeKnpkhhhg.exeKghoan32.exeKhglkqfj.exeKkfhglen.exepid process 2192 Haleefoe.exe 3024 Hhfmbq32.exe 2488 Imcfjg32.exe 2296 Idmnga32.exe 2844 Ipkema32.exe 812 Jhfjadim.exe 1828 Jddqgdii.exe 2540 Kjebjjck.exe 2280 Kflcok32.exe 2344 Lamjph32.exe 1168 Lmckeidj.exe 2020 Mpkjgckc.exe 2292 Mlbkmdah.exe 2340 Neohqicc.exe 1256 Npiiafpa.exe 2568 Oafedmlb.exe 1128 Oolbcaij.exe 1524 Pamlel32.exe 2472 Pfando32.exe 1748 Qoqhncgp.exe 2744 Akjfhdka.exe 2624 Ammoel32.exe 1944 Bfjmia32.exe 2996 Bepjjn32.exe 2268 Befpkmph.exe 1720 Cppakj32.exe 2804 Cmdaeo32.exe 3064 Dchpnd32.exe 2832 Dcjmcd32.exe 3048 Dapjdq32.exe 320 Dnhgoa32.exe 2036 Elpqemll.exe 324 Elejqm32.exe 2856 Enhcnd32.exe 1624 Fipdqmje.exe 580 Fgeabi32.exe 940 Fgjkmijh.exe 1312 Fmgcepio.exe 1316 Gipqpplq.exe 2496 Gplebjbk.exe 2168 Geinjapb.exe 1148 Hhjgll32.exe 840 Hdqhambg.exe 1960 Hadhjaaa.exe 2404 Hjmmcgha.exe 2052 Hdeall32.exe 2012 Hlqfqo32.exe 2728 Hffjng32.exe 2528 Hlcbfnjk.exe 872 Ioaobjin.exe 2200 Iiipeb32.exe 2596 Idgjqook.exe 2796 Igffmkno.exe 2780 Jcmgal32.exe 2120 Jgkphj32.exe 1920 Jpcdqpqj.exe 1520 Jjkiie32.exe 2956 Jcdmbk32.exe 2240 Jojnglco.exe 1012 Khcbpa32.exe 472 Knpkhhhg.exe 2080 Kghoan32.exe 1764 Khglkqfj.exe 2072 Kkfhglen.exe -
Loads dropped DLL 64 IoCs
Processes:
71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exeHaleefoe.exeHhfmbq32.exeImcfjg32.exeIdmnga32.exeIpkema32.exeJhfjadim.exeJddqgdii.exeKjebjjck.exeKflcok32.exeLamjph32.exeLmckeidj.exeMpkjgckc.exeMlbkmdah.exeNeohqicc.exeNpiiafpa.exeOafedmlb.exeOolbcaij.exePamlel32.exePfando32.exeQoqhncgp.exeAkjfhdka.exeAmmoel32.exeBfjmia32.exeBepjjn32.exeBefpkmph.exeCppakj32.exeCmdaeo32.exeDchpnd32.exeDcjmcd32.exeDapjdq32.exeDnhgoa32.exepid process 2004 71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe 2004 71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe 2192 Haleefoe.exe 2192 Haleefoe.exe 3024 Hhfmbq32.exe 3024 Hhfmbq32.exe 2488 Imcfjg32.exe 2488 Imcfjg32.exe 2296 Idmnga32.exe 2296 Idmnga32.exe 2844 Ipkema32.exe 2844 Ipkema32.exe 812 Jhfjadim.exe 812 Jhfjadim.exe 1828 Jddqgdii.exe 1828 Jddqgdii.exe 2540 Kjebjjck.exe 2540 Kjebjjck.exe 2280 Kflcok32.exe 2280 Kflcok32.exe 2344 Lamjph32.exe 2344 Lamjph32.exe 1168 Lmckeidj.exe 1168 Lmckeidj.exe 2020 Mpkjgckc.exe 2020 Mpkjgckc.exe 2292 Mlbkmdah.exe 2292 Mlbkmdah.exe 2340 Neohqicc.exe 2340 Neohqicc.exe 1256 Npiiafpa.exe 1256 Npiiafpa.exe 2568 Oafedmlb.exe 2568 Oafedmlb.exe 1128 Oolbcaij.exe 1128 Oolbcaij.exe 1524 Pamlel32.exe 1524 Pamlel32.exe 2472 Pfando32.exe 2472 Pfando32.exe 1748 Qoqhncgp.exe 1748 Qoqhncgp.exe 2744 Akjfhdka.exe 2744 Akjfhdka.exe 2624 Ammoel32.exe 2624 Ammoel32.exe 1944 Bfjmia32.exe 1944 Bfjmia32.exe 2996 Bepjjn32.exe 2996 Bepjjn32.exe 2268 Befpkmph.exe 2268 Befpkmph.exe 1720 Cppakj32.exe 1720 Cppakj32.exe 2804 Cmdaeo32.exe 2804 Cmdaeo32.exe 3064 Dchpnd32.exe 3064 Dchpnd32.exe 2832 Dcjmcd32.exe 2832 Dcjmcd32.exe 3048 Dapjdq32.exe 3048 Dapjdq32.exe 320 Dnhgoa32.exe 320 Dnhgoa32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Hgjieedg.exeQckcdj32.exeDpbgghhl.exeJgkphj32.exeGdgcnj32.exeJaopcbga.exeFimclh32.exeKihcakpa.exeLcnhcdkp.exeEfifjg32.exeOahpahel.exeDchpnd32.exeIgffmkno.exeKaliaphd.exeKgknpfdi.exeEnhcnd32.exeKkfhglen.exeEkmjanpd.exeMgodjico.exeCgjhkpbj.exeCmimif32.exeEncchoml.exePojgnf32.exeBefpkmph.exeKnpkhhhg.exeOejgbonl.exeNjmejaqb.exeBgfdjfkh.exeEponmmaj.exeHbblpf32.exeFjlaod32.exeAfnfcl32.exeNebgoa32.exeGmaoomld.exeHliieioi.exeCakfcfoc.exeNmeohnil.exeCincaq32.exeIfndph32.exeNhhqfb32.exeCaqfiloi.exeFlpkll32.exePbnckg32.exeAimkeb32.exeBlmikkle.exeEcodfogg.exeFkocfa32.exeLmfjcajl.exeCngfqi32.exeEfbpihoo.exeFehodaqd.exeImcfjg32.exeCmjdcm32.exeDhlapc32.exeMbmgkp32.exeFgeabi32.exeJklnggjm.exeMcjlap32.exeLcieef32.exeFgcpkldh.exeHikobfgj.exeOaiglnih.exedescription ioc process File created C:\Windows\SysWOW64\Pheghenj.dll Hgjieedg.exe File created C:\Windows\SysWOW64\Aellfe32.exe Qckcdj32.exe File created C:\Windows\SysWOW64\Mkpaaa32.dll Dpbgghhl.exe File opened for modification C:\Windows\SysWOW64\Jpcdqpqj.exe Jgkphj32.exe File created C:\Windows\SysWOW64\Edicfeme.dll Gdgcnj32.exe File opened for modification C:\Windows\SysWOW64\Jkgelh32.exe Jaopcbga.exe File created C:\Windows\SysWOW64\Fefhnhpc.dll Fimclh32.exe File opened for modification C:\Windows\SysWOW64\Kpblne32.exe Kihcakpa.exe File created C:\Windows\SysWOW64\Pkoqijad.dll Lcnhcdkp.exe File opened for modification C:\Windows\SysWOW64\Epakcm32.exe Efifjg32.exe File created C:\Windows\SysWOW64\Dhkpjknd.dll Oahpahel.exe File opened for modification C:\Windows\SysWOW64\Dcjmcd32.exe Dchpnd32.exe File created C:\Windows\SysWOW64\Jcmgal32.exe Igffmkno.exe File created C:\Windows\SysWOW64\Kdjenkgh.exe Kaliaphd.exe File opened for modification C:\Windows\SysWOW64\Kapbmo32.exe Kgknpfdi.exe File opened for modification C:\Windows\SysWOW64\Fipdqmje.exe Enhcnd32.exe File created C:\Windows\SysWOW64\Alggph32.dll Kkfhglen.exe File created C:\Windows\SysWOW64\Edenjc32.exe Ekmjanpd.exe File opened for modification C:\Windows\SysWOW64\Mbehgabe.exe Mgodjico.exe File opened for modification C:\Windows\SysWOW64\Cmimif32.exe Cgjhkpbj.exe File created C:\Windows\SysWOW64\Egghdk32.dll Cmimif32.exe File opened for modification C:\Windows\SysWOW64\Enepnoji.exe Encchoml.exe File opened for modification C:\Windows\SysWOW64\Qlnghj32.exe Pojgnf32.exe File opened for modification C:\Windows\SysWOW64\Cppakj32.exe Befpkmph.exe File created C:\Windows\SysWOW64\Jhlidkdc.dll Knpkhhhg.exe File created C:\Windows\SysWOW64\Abdpfmcb.dll Oejgbonl.exe File created C:\Windows\SysWOW64\Nmnoll32.exe Njmejaqb.exe File created C:\Windows\SysWOW64\Bjaeambn.dll Bgfdjfkh.exe File created C:\Windows\SysWOW64\Mejojlab.dll Eponmmaj.exe File created C:\Windows\SysWOW64\Hnimeg32.exe Hbblpf32.exe File opened for modification C:\Windows\SysWOW64\Ffcbce32.exe Fjlaod32.exe File created C:\Windows\SysWOW64\Bemkkdbc.dll Afnfcl32.exe File created C:\Windows\SysWOW64\Naihdb32.exe Nebgoa32.exe File opened for modification C:\Windows\SysWOW64\Gggclfkj.exe Gmaoomld.exe File created C:\Windows\SysWOW64\Hpgakh32.exe Hliieioi.exe File created C:\Windows\SysWOW64\Cancif32.exe Cakfcfoc.exe File created C:\Windows\SysWOW64\Ecoobjme.dll Nmeohnil.exe File created C:\Windows\SysWOW64\Ifabli32.dll Cincaq32.exe File created C:\Windows\SysWOW64\Nogbpf32.dll Ifndph32.exe File created C:\Windows\SysWOW64\Oiljcj32.exe Nhhqfb32.exe File created C:\Windows\SysWOW64\Cbpcbo32.exe Caqfiloi.exe File opened for modification C:\Windows\SysWOW64\Fehodaqd.exe Flpkll32.exe File created C:\Windows\SysWOW64\Ihgmjcla.dll Pbnckg32.exe File created C:\Windows\SysWOW64\Adcobk32.exe Aimkeb32.exe File created C:\Windows\SysWOW64\Dcecef32.dll Aimkeb32.exe File created C:\Windows\SysWOW64\Cpkaai32.exe Blmikkle.exe File opened for modification C:\Windows\SysWOW64\Fofekp32.exe Ecodfogg.exe File opened for modification C:\Windows\SysWOW64\Fhccoe32.exe Fkocfa32.exe File created C:\Windows\SysWOW64\Mqdbjp32.exe Lmfjcajl.exe File created C:\Windows\SysWOW64\Cgpjin32.exe Cngfqi32.exe File opened for modification C:\Windows\SysWOW64\Cohlnkeg.exe Cincaq32.exe File opened for modification C:\Windows\SysWOW64\Ebhani32.exe Efbpihoo.exe File opened for modification C:\Windows\SysWOW64\Feklja32.exe Fehodaqd.exe File opened for modification C:\Windows\SysWOW64\Idmnga32.exe Imcfjg32.exe File created C:\Windows\SysWOW64\Hbfaod32.dll Cmjdcm32.exe File created C:\Windows\SysWOW64\Gqjiji32.dll Dhlapc32.exe File created C:\Windows\SysWOW64\Iiicgkof.dll Mbmgkp32.exe File created C:\Windows\SysWOW64\Igldicdf.dll Fgeabi32.exe File created C:\Windows\SysWOW64\Lbfcbdce.exe Jklnggjm.exe File created C:\Windows\SysWOW64\Gmeckg32.dll Mcjlap32.exe File created C:\Windows\SysWOW64\Ngobfm32.dll Lcieef32.exe File created C:\Windows\SysWOW64\Fpkdca32.exe Fgcpkldh.exe File created C:\Windows\SysWOW64\Koehka32.dll Hikobfgj.exe File opened for modification C:\Windows\SysWOW64\Oakcan32.exe Oaiglnih.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4304 4288 WerFault.exe Gmmgobfd.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Lpnobi32.exeNcdciq32.exePicdejbg.exeEagiho32.exeGggclfkj.exeCpkaai32.exeDkfcqo32.exeNgfhbd32.exeOdimdqne.exeKaliaphd.exeDcojbm32.exeCnhhia32.exeKkfhglen.exeNadoiccn.exeDfdngl32.exeGcankb32.exeIjpjik32.exeAkjfhdka.exeIadnon32.exeLnaokn32.exeQfedhb32.exePkebgj32.exeJpajdi32.exeCgpjin32.exePdnihiad.exeKkiiom32.exeJddqgdii.exeJgeobdkc.exeCngfqi32.exeKiafff32.exeKhcbpa32.exePcagkmaj.exePeakkj32.exeFjcfco32.exeJdjioh32.exeAfqeaemk.exeAapikqel.exeAnfjpa32.exeFehodaqd.exeKjebjjck.exePamlel32.exeQefihg32.exeGplebjbk.exeDmecokhm.exePgamgken.exeAppfggjm.exeQnoklc32.exeCincaq32.exeJaopcbga.exeHgjieedg.exeHdeall32.exeNlklik32.exeInfjfblm.exePacbel32.exeNpiiafpa.exeFlmidkmn.exeLhpmhgbf.exeQlnghj32.exeFfcbce32.exeOafedmlb.exeLnopmegg.exeLjndga32.exeOaiglnih.exeEkpmad32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpnobi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncdciq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Picdejbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eagiho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gggclfkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpkaai32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkfcqo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ngfhbd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odimdqne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kaliaphd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcojbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnhhia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkfhglen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nadoiccn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfdngl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gcankb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijpjik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akjfhdka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iadnon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lnaokn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qfedhb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkebgj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jpajdi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgpjin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdnihiad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkiiom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jddqgdii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgeobdkc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cngfqi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kiafff32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khcbpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcagkmaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Peakkj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fjcfco32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdjioh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afqeaemk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aapikqel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anfjpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fehodaqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjebjjck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pamlel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qefihg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gplebjbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmecokhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgamgken.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Appfggjm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnoklc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cincaq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jaopcbga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgjieedg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdeall32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlklik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Infjfblm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pacbel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npiiafpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flmidkmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhpmhgbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qlnghj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffcbce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oafedmlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lnopmegg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljndga32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oaiglnih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekpmad32.exe -
Modifies registry class 64 IoCs
Processes:
Bkgqpjch.exeOaiglnih.exeAapikqel.exeCppakj32.exeMnkfcjqe.exeDplbpaim.exePbkgegad.exeApdminod.exeAdekhkng.exeBgcdcjpf.exeEpakcm32.exeAoilcc32.exeCofohkgi.exeDcojbm32.exeJmcpqfba.exeDchpnd32.exeNhhqfb32.exeGggclfkj.exeKapbmo32.exeJidngh32.exeFehodaqd.exeBfppgohb.exeHiabjm32.exePccdqloh.exeQoonqmqf.exeBfcqoqeh.exeCincaq32.exeIihgadhl.exeJmelfeqn.exeJjkiie32.exePkifgpeh.exeDfgdpj32.exeMfoqephq.exeCghmni32.exeEnokidgl.exeIfloeo32.exeQbkljd32.exeKelqff32.exeHdeall32.exeJcdmbk32.exeOcdnloph.exeAhmehqna.exeFimclh32.exeOkdahbmm.exeOahpahel.exePblinp32.exeBocfch32.exeLddjmb32.exeFfcbce32.exeNpffaq32.exeHflpmb32.exeGomhkb32.exeJinghn32.exePjchjcmf.exeFhccoe32.exeIhaldgak.exeNmeohnil.exeHhfmbq32.exeJgkphj32.exeOiljcj32.exeJaamhb32.exeDekhnh32.exeKdgane32.exeAdcobk32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkgqpjch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phkdfgmp.dll" Oaiglnih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aapikqel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbobnp32.dll" Cppakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mnkfcjqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldfmlkmf.dll" Dplbpaim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbkgegad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apdminod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hneddmal.dll" Adekhkng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgcdcjpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Epakcm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aoilcc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cofohkgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcojbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmcpqfba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dchpnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opgcne32.dll" Nhhqfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhlapijf.dll" Gggclfkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kapbmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lckfbdjp.dll" Jidngh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fehodaqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfppgohb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hiabjm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pccdqloh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egkdkc32.dll" Qoonqmqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdhlhqbi.dll" Bfcqoqeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cincaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcpolmao.dll" Iihgadhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmelfeqn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjkiie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pkifgpeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knlekjqk.dll" Dfgdpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcgjllbn.dll" Mfoqephq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cghmni32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enokidgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifloeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fngplbcl.dll" Qbkljd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmeqilpj.dll" Kelqff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajmnmj32.dll" Hdeall32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcdmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocdnloph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahmehqna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fimclh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okdahbmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oahpahel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hllgeipk.dll" Pblinp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Affdii32.dll" Bocfch32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lddjmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffcbce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikmfgnde.dll" Npffaq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hflpmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gomhkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Biehgccp.dll" Jinghn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pagmmn32.dll" Pjchjcmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fhccoe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihaldgak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmeohnil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkpnjeha.dll" Hhfmbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfflopbf.dll" Jgkphj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oiljcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jaamhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akihojfo.dll" Dekhnh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdgane32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adcobk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exeHaleefoe.exeHhfmbq32.exeImcfjg32.exeIdmnga32.exeIpkema32.exeJhfjadim.exeJddqgdii.exeKjebjjck.exeKflcok32.exeLamjph32.exeLmckeidj.exeMpkjgckc.exeMlbkmdah.exeNeohqicc.exeNpiiafpa.exedescription pid process target process PID 2004 wrote to memory of 2192 2004 71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe Haleefoe.exe PID 2004 wrote to memory of 2192 2004 71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe Haleefoe.exe PID 2004 wrote to memory of 2192 2004 71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe Haleefoe.exe PID 2004 wrote to memory of 2192 2004 71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe Haleefoe.exe PID 2192 wrote to memory of 3024 2192 Haleefoe.exe Hhfmbq32.exe PID 2192 wrote to memory of 3024 2192 Haleefoe.exe Hhfmbq32.exe PID 2192 wrote to memory of 3024 2192 Haleefoe.exe Hhfmbq32.exe PID 2192 wrote to memory of 3024 2192 Haleefoe.exe Hhfmbq32.exe PID 3024 wrote to memory of 2488 3024 Hhfmbq32.exe Imcfjg32.exe PID 3024 wrote to memory of 2488 3024 Hhfmbq32.exe Imcfjg32.exe PID 3024 wrote to memory of 2488 3024 Hhfmbq32.exe Imcfjg32.exe PID 3024 wrote to memory of 2488 3024 Hhfmbq32.exe Imcfjg32.exe PID 2488 wrote to memory of 2296 2488 Imcfjg32.exe Idmnga32.exe PID 2488 wrote to memory of 2296 2488 Imcfjg32.exe Idmnga32.exe PID 2488 wrote to memory of 2296 2488 Imcfjg32.exe Idmnga32.exe PID 2488 wrote to memory of 2296 2488 Imcfjg32.exe Idmnga32.exe PID 2296 wrote to memory of 2844 2296 Idmnga32.exe Ipkema32.exe PID 2296 wrote to memory of 2844 2296 Idmnga32.exe Ipkema32.exe PID 2296 wrote to memory of 2844 2296 Idmnga32.exe Ipkema32.exe PID 2296 wrote to memory of 2844 2296 Idmnga32.exe Ipkema32.exe PID 2844 wrote to memory of 812 2844 Ipkema32.exe Jhfjadim.exe PID 2844 wrote to memory of 812 2844 Ipkema32.exe Jhfjadim.exe PID 2844 wrote to memory of 812 2844 Ipkema32.exe Jhfjadim.exe PID 2844 wrote to memory of 812 2844 Ipkema32.exe Jhfjadim.exe PID 812 wrote to memory of 1828 812 Jhfjadim.exe Jddqgdii.exe PID 812 wrote to memory of 1828 812 Jhfjadim.exe Jddqgdii.exe PID 812 wrote to memory of 1828 812 Jhfjadim.exe Jddqgdii.exe PID 812 wrote to memory of 1828 812 Jhfjadim.exe Jddqgdii.exe PID 1828 wrote to memory of 2540 1828 Jddqgdii.exe Kjebjjck.exe PID 1828 wrote to memory of 2540 1828 Jddqgdii.exe Kjebjjck.exe PID 1828 wrote to memory of 2540 1828 Jddqgdii.exe Kjebjjck.exe PID 1828 wrote to memory of 2540 1828 Jddqgdii.exe Kjebjjck.exe PID 2540 wrote to memory of 2280 2540 Kjebjjck.exe Kflcok32.exe PID 2540 wrote to memory of 2280 2540 Kjebjjck.exe Kflcok32.exe PID 2540 wrote to memory of 2280 2540 Kjebjjck.exe Kflcok32.exe PID 2540 wrote to memory of 2280 2540 Kjebjjck.exe Kflcok32.exe PID 2280 wrote to memory of 2344 2280 Kflcok32.exe Lamjph32.exe PID 2280 wrote to memory of 2344 2280 Kflcok32.exe Lamjph32.exe PID 2280 wrote to memory of 2344 2280 Kflcok32.exe Lamjph32.exe PID 2280 wrote to memory of 2344 2280 Kflcok32.exe Lamjph32.exe PID 2344 wrote to memory of 1168 2344 Lamjph32.exe Lmckeidj.exe PID 2344 wrote to memory of 1168 2344 Lamjph32.exe Lmckeidj.exe PID 2344 wrote to memory of 1168 2344 Lamjph32.exe Lmckeidj.exe PID 2344 wrote to memory of 1168 2344 Lamjph32.exe Lmckeidj.exe PID 1168 wrote to memory of 2020 1168 Lmckeidj.exe Mpkjgckc.exe PID 1168 wrote to memory of 2020 1168 Lmckeidj.exe Mpkjgckc.exe PID 1168 wrote to memory of 2020 1168 Lmckeidj.exe Mpkjgckc.exe PID 1168 wrote to memory of 2020 1168 Lmckeidj.exe Mpkjgckc.exe PID 2020 wrote to memory of 2292 2020 Mpkjgckc.exe Mlbkmdah.exe PID 2020 wrote to memory of 2292 2020 Mpkjgckc.exe Mlbkmdah.exe PID 2020 wrote to memory of 2292 2020 Mpkjgckc.exe Mlbkmdah.exe PID 2020 wrote to memory of 2292 2020 Mpkjgckc.exe Mlbkmdah.exe PID 2292 wrote to memory of 2340 2292 Mlbkmdah.exe Neohqicc.exe PID 2292 wrote to memory of 2340 2292 Mlbkmdah.exe Neohqicc.exe PID 2292 wrote to memory of 2340 2292 Mlbkmdah.exe Neohqicc.exe PID 2292 wrote to memory of 2340 2292 Mlbkmdah.exe Neohqicc.exe PID 2340 wrote to memory of 1256 2340 Neohqicc.exe Npiiafpa.exe PID 2340 wrote to memory of 1256 2340 Neohqicc.exe Npiiafpa.exe PID 2340 wrote to memory of 1256 2340 Neohqicc.exe Npiiafpa.exe PID 2340 wrote to memory of 1256 2340 Neohqicc.exe Npiiafpa.exe PID 1256 wrote to memory of 2568 1256 Npiiafpa.exe Oafedmlb.exe PID 1256 wrote to memory of 2568 1256 Npiiafpa.exe Oafedmlb.exe PID 1256 wrote to memory of 2568 1256 Npiiafpa.exe Oafedmlb.exe PID 1256 wrote to memory of 2568 1256 Npiiafpa.exe Oafedmlb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe"C:\Users\Admin\AppData\Local\Temp\71149fafa6ea26545d5c38e64d8c06f3667a388bdfcc0a751fe5efa19086e701.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\Haleefoe.exeC:\Windows\system32\Haleefoe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Hhfmbq32.exeC:\Windows\system32\Hhfmbq32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Imcfjg32.exeC:\Windows\system32\Imcfjg32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\Idmnga32.exeC:\Windows\system32\Idmnga32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Ipkema32.exeC:\Windows\system32\Ipkema32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Jhfjadim.exeC:\Windows\system32\Jhfjadim.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\Jddqgdii.exeC:\Windows\system32\Jddqgdii.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\Kjebjjck.exeC:\Windows\system32\Kjebjjck.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Kflcok32.exeC:\Windows\system32\Kflcok32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\Lamjph32.exeC:\Windows\system32\Lamjph32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Lmckeidj.exeC:\Windows\system32\Lmckeidj.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\Mpkjgckc.exeC:\Windows\system32\Mpkjgckc.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\Mlbkmdah.exeC:\Windows\system32\Mlbkmdah.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\Neohqicc.exeC:\Windows\system32\Neohqicc.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\Npiiafpa.exeC:\Windows\system32\Npiiafpa.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\Oafedmlb.exeC:\Windows\system32\Oafedmlb.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\Oolbcaij.exeC:\Windows\system32\Oolbcaij.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Windows\SysWOW64\Pamlel32.exeC:\Windows\system32\Pamlel32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1524 -
C:\Windows\SysWOW64\Pfando32.exeC:\Windows\system32\Pfando32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472 -
C:\Windows\SysWOW64\Qoqhncgp.exeC:\Windows\system32\Qoqhncgp.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Windows\SysWOW64\Akjfhdka.exeC:\Windows\system32\Akjfhdka.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\Ammoel32.exeC:\Windows\system32\Ammoel32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2624 -
C:\Windows\SysWOW64\Bfjmia32.exeC:\Windows\system32\Bfjmia32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Windows\SysWOW64\Bepjjn32.exeC:\Windows\system32\Bepjjn32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996 -
C:\Windows\SysWOW64\Befpkmph.exeC:\Windows\system32\Befpkmph.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\Cppakj32.exeC:\Windows\system32\Cppakj32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1720 -
C:\Windows\SysWOW64\Cmdaeo32.exeC:\Windows\system32\Cmdaeo32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2804 -
C:\Windows\SysWOW64\Dchpnd32.exeC:\Windows\system32\Dchpnd32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:3064 -
C:\Windows\SysWOW64\Dcjmcd32.exeC:\Windows\system32\Dcjmcd32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Windows\SysWOW64\Dapjdq32.exeC:\Windows\system32\Dapjdq32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3048 -
C:\Windows\SysWOW64\Dnhgoa32.exeC:\Windows\system32\Dnhgoa32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:320 -
C:\Windows\SysWOW64\Elpqemll.exeC:\Windows\system32\Elpqemll.exe33⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\Elejqm32.exeC:\Windows\system32\Elejqm32.exe34⤵
- Executes dropped EXE
PID:324 -
C:\Windows\SysWOW64\Enhcnd32.exeC:\Windows\system32\Enhcnd32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2856 -
C:\Windows\SysWOW64\Fipdqmje.exeC:\Windows\system32\Fipdqmje.exe36⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Fgeabi32.exeC:\Windows\system32\Fgeabi32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\Fgjkmijh.exeC:\Windows\system32\Fgjkmijh.exe38⤵
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\Fmgcepio.exeC:\Windows\system32\Fmgcepio.exe39⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\Gipqpplq.exeC:\Windows\system32\Gipqpplq.exe40⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\SysWOW64\Gplebjbk.exeC:\Windows\system32\Gplebjbk.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\Geinjapb.exeC:\Windows\system32\Geinjapb.exe42⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\Hhjgll32.exeC:\Windows\system32\Hhjgll32.exe43⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Hdqhambg.exeC:\Windows\system32\Hdqhambg.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\Hadhjaaa.exeC:\Windows\system32\Hadhjaaa.exe45⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Hjmmcgha.exeC:\Windows\system32\Hjmmcgha.exe46⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\Hdeall32.exeC:\Windows\system32\Hdeall32.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Hlqfqo32.exeC:\Windows\system32\Hlqfqo32.exe48⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\Hffjng32.exeC:\Windows\system32\Hffjng32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\Hlcbfnjk.exeC:\Windows\system32\Hlcbfnjk.exe50⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\Ioaobjin.exeC:\Windows\system32\Ioaobjin.exe51⤵
- Executes dropped EXE
PID:872 -
C:\Windows\SysWOW64\Iiipeb32.exeC:\Windows\system32\Iiipeb32.exe52⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\SysWOW64\Idgjqook.exeC:\Windows\system32\Idgjqook.exe53⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\Igffmkno.exeC:\Windows\system32\Igffmkno.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Jcmgal32.exeC:\Windows\system32\Jcmgal32.exe55⤵
- Executes dropped EXE
PID:2780 -
C:\Windows\SysWOW64\Jgkphj32.exeC:\Windows\system32\Jgkphj32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Jpcdqpqj.exeC:\Windows\system32\Jpcdqpqj.exe57⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\Jjkiie32.exeC:\Windows\system32\Jjkiie32.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:1520 -
C:\Windows\SysWOW64\Jcdmbk32.exeC:\Windows\system32\Jcdmbk32.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:2956 -
C:\Windows\SysWOW64\Jojnglco.exeC:\Windows\system32\Jojnglco.exe60⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\Khcbpa32.exeC:\Windows\system32\Khcbpa32.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Windows\SysWOW64\Knpkhhhg.exeC:\Windows\system32\Knpkhhhg.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:472 -
C:\Windows\SysWOW64\Kghoan32.exeC:\Windows\system32\Kghoan32.exe63⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\SysWOW64\Khglkqfj.exeC:\Windows\system32\Khglkqfj.exe64⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\Kkfhglen.exeC:\Windows\system32\Kkfhglen.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\Kkhdml32.exeC:\Windows\system32\Kkhdml32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2668 -
C:\Windows\SysWOW64\Kdqifajl.exeC:\Windows\system32\Kdqifajl.exe67⤵PID:2448
-
C:\Windows\SysWOW64\Kninog32.exeC:\Windows\system32\Kninog32.exe68⤵PID:1648
-
C:\Windows\SysWOW64\Lfdbcing.exeC:\Windows\system32\Lfdbcing.exe69⤵PID:868
-
C:\Windows\SysWOW64\Lbkchj32.exeC:\Windows\system32\Lbkchj32.exe70⤵PID:2144
-
C:\Windows\SysWOW64\Loocanbe.exeC:\Windows\system32\Loocanbe.exe71⤵PID:2556
-
C:\Windows\SysWOW64\Lighjd32.exeC:\Windows\system32\Lighjd32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2140 -
C:\Windows\SysWOW64\Lfkhch32.exeC:\Windows\system32\Lfkhch32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2764 -
C:\Windows\SysWOW64\Lbbiii32.exeC:\Windows\system32\Lbbiii32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2860 -
C:\Windows\SysWOW64\Mnijnjbh.exeC:\Windows\system32\Mnijnjbh.exe75⤵PID:2364
-
C:\Windows\SysWOW64\Mnkfcjqe.exeC:\Windows\system32\Mnkfcjqe.exe76⤵
- Modifies registry class
PID:1212 -
C:\Windows\SysWOW64\Mffkgl32.exeC:\Windows\system32\Mffkgl32.exe77⤵PID:264
-
C:\Windows\SysWOW64\Mcjlap32.exeC:\Windows\system32\Mcjlap32.exe78⤵
- Drops file in System32 directory
PID:1124 -
C:\Windows\SysWOW64\Nbbegl32.exeC:\Windows\system32\Nbbegl32.exe79⤵PID:2424
-
C:\Windows\SysWOW64\Npffaq32.exeC:\Windows\system32\Npffaq32.exe80⤵
- Modifies registry class
PID:2348 -
C:\Windows\SysWOW64\Nphbfplf.exeC:\Windows\system32\Nphbfplf.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2028 -
C:\Windows\SysWOW64\Nkbcgnie.exeC:\Windows\system32\Nkbcgnie.exe82⤵PID:1320
-
C:\Windows\SysWOW64\Nkdpmn32.exeC:\Windows\system32\Nkdpmn32.exe83⤵PID:1984
-
C:\Windows\SysWOW64\Nhhqfb32.exeC:\Windows\system32\Nhhqfb32.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:2600 -
C:\Windows\SysWOW64\Oiljcj32.exeC:\Windows\system32\Oiljcj32.exe85⤵
- Modifies registry class
PID:2024 -
C:\Windows\SysWOW64\Ocdnloph.exeC:\Windows\system32\Ocdnloph.exe86⤵
- Modifies registry class
PID:1668 -
C:\Windows\SysWOW64\Oipcnieb.exeC:\Windows\system32\Oipcnieb.exe87⤵PID:1512
-
C:\Windows\SysWOW64\Olalpdbc.exeC:\Windows\system32\Olalpdbc.exe88⤵PID:2820
-
C:\Windows\SysWOW64\Plcied32.exeC:\Windows\system32\Plcied32.exe89⤵PID:1064
-
C:\Windows\SysWOW64\Pkifgpeh.exeC:\Windows\system32\Pkifgpeh.exe90⤵
- Modifies registry class
PID:1836 -
C:\Windows\SysWOW64\Pgacaaij.exeC:\Windows\system32\Pgacaaij.exe91⤵PID:2544
-
C:\Windows\SysWOW64\Pchdfb32.exeC:\Windows\system32\Pchdfb32.exe92⤵PID:1820
-
C:\Windows\SysWOW64\Qgfmlp32.exeC:\Windows\system32\Qgfmlp32.exe93⤵PID:2628
-
C:\Windows\SysWOW64\Qoaaqb32.exeC:\Windows\system32\Qoaaqb32.exe94⤵PID:2016
-
C:\Windows\SysWOW64\Afnfcl32.exeC:\Windows\system32\Afnfcl32.exe95⤵
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\Akkokc32.exeC:\Windows\system32\Akkokc32.exe96⤵PID:3052
-
C:\Windows\SysWOW64\Akmlacdn.exeC:\Windows\system32\Akmlacdn.exe97⤵PID:2492
-
C:\Windows\SysWOW64\Bfppgohb.exeC:\Windows\system32\Bfppgohb.exe98⤵
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Biceoj32.exeC:\Windows\system32\Biceoj32.exe99⤵PID:2416
-
C:\Windows\SysWOW64\Cnpnga32.exeC:\Windows\system32\Cnpnga32.exe100⤵PID:1924
-
C:\Windows\SysWOW64\Caqfiloi.exeC:\Windows\system32\Caqfiloi.exe101⤵
- Drops file in System32 directory
PID:1076 -
C:\Windows\SysWOW64\Cbpcbo32.exeC:\Windows\system32\Cbpcbo32.exe102⤵PID:1000
-
C:\Windows\SysWOW64\Cdapjglj.exeC:\Windows\system32\Cdapjglj.exe103⤵PID:2360
-
C:\Windows\SysWOW64\Cmjdcm32.exeC:\Windows\system32\Cmjdcm32.exe104⤵
- Drops file in System32 directory
PID:956 -
C:\Windows\SysWOW64\Cpkmehol.exeC:\Windows\system32\Cpkmehol.exe105⤵PID:2704
-
C:\Windows\SysWOW64\Dkpabqoa.exeC:\Windows\system32\Dkpabqoa.exe106⤵PID:1444
-
C:\Windows\SysWOW64\Dmajdl32.exeC:\Windows\system32\Dmajdl32.exe107⤵PID:832
-
C:\Windows\SysWOW64\Dgiomabc.exeC:\Windows\system32\Dgiomabc.exe108⤵PID:1700
-
C:\Windows\SysWOW64\Dcpoab32.exeC:\Windows\system32\Dcpoab32.exe109⤵PID:1640
-
C:\Windows\SysWOW64\Dmecokhm.exeC:\Windows\system32\Dmecokhm.exe110⤵
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\Dilddl32.exeC:\Windows\system32\Dilddl32.exe111⤵PID:556
-
C:\Windows\SysWOW64\Eagiho32.exeC:\Windows\system32\Eagiho32.exe112⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\Ekpmad32.exeC:\Windows\system32\Ekpmad32.exe113⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\Eeeanm32.exeC:\Windows\system32\Eeeanm32.exe114⤵PID:804
-
C:\Windows\SysWOW64\Edkopifk.exeC:\Windows\system32\Edkopifk.exe115⤵PID:1540
-
C:\Windows\SysWOW64\Encchoml.exeC:\Windows\system32\Encchoml.exe116⤵
- Drops file in System32 directory
PID:1904 -
C:\Windows\SysWOW64\Enepnoji.exeC:\Windows\system32\Enepnoji.exe117⤵PID:2236
-
C:\Windows\SysWOW64\Ekipgb32.exeC:\Windows\system32\Ekipgb32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1644 -
C:\Windows\SysWOW64\Fgpalcog.exeC:\Windows\system32\Fgpalcog.exe119⤵PID:836
-
C:\Windows\SysWOW64\Flmidkmn.exeC:\Windows\system32\Flmidkmn.exe120⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\Fqkbkicd.exeC:\Windows\system32\Fqkbkicd.exe121⤵PID:3000
-
C:\Windows\SysWOW64\Fjcfco32.exeC:\Windows\system32\Fjcfco32.exe122⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-