Analysis
-
max time kernel
35s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe
Resource
win10v2004-20241007-en
General
-
Target
746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe
-
Size
439KB
-
MD5
6966929e0bd94917051c1b42c903fdab
-
SHA1
781536a95c56504927d9ef8a2cba8f4eef6b90bb
-
SHA256
746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a
-
SHA512
0e76a73f132580a41cee7413f806a245d73c30f3ab69a41842bced44a586486e4f3714756227c53611ee88585523ae3f1edc75d5d175e375bd3da8d2e6e6a3fe
-
SSDEEP
12288:tQaFqfPeKm2OPeKm22Vtp90NtmVtp90NtXONtc:HFApEkpEYc
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Efdmohmm.exeDajlhc32.exeOnfadc32.exeQbhpddbf.exeQdlialfb.exeCbdkdffm.exeCklpml32.exeJdmfdgbj.exeDimfmeef.exeEkblplgo.exePhelnhnb.exeFaedpdcc.exeFhifmcfa.exePfjiod32.exeFkbadifn.exeNicfnn32.exeHibebeqb.exeEffidg32.exeFeeilbhg.exeGfpjgn32.exeIadphghe.exeHpmdjf32.exePbcfie32.exeBapejd32.exeDcaghm32.exeGcfioj32.exeOphanl32.exeCifdmbib.exeCnjbfhqa.exeIbhieo32.exeMlnbmikh.exeAdcobk32.exeCinahhff.exeGgppdpif.exeNccmng32.exeApllml32.exeLbpolb32.exeCkgmon32.exeBdehgnqc.exeCconcjae.exeDpdbdo32.exeFlbehbqm.exeBocfch32.exeDkkmln32.exeEocieq32.exeDjqcki32.exeEodknifb.exeHgkknm32.exePknakhig.exeAhoamplo.exeEponmmaj.exeGilhpe32.exeGkoodd32.exeGcimop32.exeKhnqbhdi.exeObopobhe.exeDnfkefad.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efdmohmm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dajlhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onfadc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbhpddbf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdlialfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbdkdffm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cklpml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdmfdgbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dimfmeef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekblplgo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phelnhnb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faedpdcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhifmcfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfjiod32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkbadifn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkbadifn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nicfnn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hibebeqb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Effidg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feeilbhg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfpjgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iadphghe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpmdjf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbcfie32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bapejd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbdkdffm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcaghm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcfioj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ophanl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cifdmbib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnjbfhqa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibhieo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlnbmikh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adcobk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cinahhff.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggppdpif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nccmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apllml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbpolb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckgmon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdehgnqc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cconcjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpdbdo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flbehbqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggppdpif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bocfch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkmln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eocieq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djqcki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpdbdo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eodknifb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgkknm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pknakhig.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahoamplo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eponmmaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gilhpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkoodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcimop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Faedpdcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkoodd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khnqbhdi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obopobhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obopobhe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnfkefad.exe -
Executes dropped EXE 64 IoCs
Processes:
Phbinc32.exeQkcbpn32.exeBbocak32.exeBbdmljln.exeCappnf32.exeCabldeik.exeCinahhff.exeDlnjjc32.exeDkkmln32.exeEocieq32.exeGfpjgn32.exeGkoodd32.exeHpmdjf32.exeIigehk32.exeJdmfdgbj.exeKommediq.exeLkkckdhm.exeLlomhllh.exeLbpolb32.exeMdahnmck.exeMkpieggc.exeMflgkd32.exeNloedjin.exeNicfnn32.exeOjgokflc.exeOphanl32.exeOegflcbj.exePoddphee.exePknakhig.exePhabdmgq.exeAhoamplo.exeAlmjcobe.exeAdhohapp.exeBdklnq32.exeBnemlf32.exeBokcom32.exeCifdmbib.exeCkgmon32.exeCkijdm32.exeCeanmc32.exeCnjbfhqa.exeDjqcki32.exeDajlhc32.exeDpphipbk.exeDfjaej32.exeDpbenpqh.exeDpdbdo32.exeDimfmeef.exeEahkag32.exeEdidcb32.exeEkblplgo.exeEoqeekme.exeEijffhjd.exeFgnfpm32.exeFcegdnna.exeFcgdjmlo.exeFlbehbqm.exeFhifmcfa.exeGhkbccdn.exeGgppdpif.exeGknhjn32.exeGcimop32.exeHqpjndio.exeHmfkbeoc.exepid process 2488 Phbinc32.exe 2964 Qkcbpn32.exe 2508 Bbocak32.exe 2864 Bbdmljln.exe 2768 Cappnf32.exe 2092 Cabldeik.exe 1724 Cinahhff.exe 884 Dlnjjc32.exe 3068 Dkkmln32.exe 2688 Eocieq32.exe 1012 Gfpjgn32.exe 1648 Gkoodd32.exe 2124 Hpmdjf32.exe 2208 Iigehk32.exe 916 Jdmfdgbj.exe 1796 Kommediq.exe 400 Lkkckdhm.exe 1688 Llomhllh.exe 1704 Lbpolb32.exe 1776 Mdahnmck.exe 2484 Mkpieggc.exe 2052 Mflgkd32.exe 2796 Nloedjin.exe 548 Nicfnn32.exe 1612 Ojgokflc.exe 2072 Ophanl32.exe 2424 Oegflcbj.exe 2752 Poddphee.exe 2920 Pknakhig.exe 2800 Phabdmgq.exe 2608 Ahoamplo.exe 2348 Almjcobe.exe 2228 Adhohapp.exe 2132 Bdklnq32.exe 2192 Bnemlf32.exe 1036 Bokcom32.exe 852 Cifdmbib.exe 1616 Ckgmon32.exe 2156 Ckijdm32.exe 2120 Ceanmc32.exe 2164 Cnjbfhqa.exe 524 Djqcki32.exe 1980 Dajlhc32.exe 1508 Dpphipbk.exe 2196 Dfjaej32.exe 2652 Dpbenpqh.exe 928 Dpdbdo32.exe 2340 Dimfmeef.exe 1516 Eahkag32.exe 1708 Edidcb32.exe 2976 Ekblplgo.exe 2984 Eoqeekme.exe 2592 Eijffhjd.exe 2708 Fgnfpm32.exe 1352 Fcegdnna.exe 968 Fcgdjmlo.exe 2816 Flbehbqm.exe 3040 Fhifmcfa.exe 2344 Ghkbccdn.exe 1788 Ggppdpif.exe 2280 Gknhjn32.exe 2176 Gcimop32.exe 2180 Hqpjndio.exe 1148 Hmfkbeoc.exe -
Loads dropped DLL 64 IoCs
Processes:
746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exePhbinc32.exeQkcbpn32.exeBbocak32.exeBbdmljln.exeCappnf32.exeCabldeik.exeCinahhff.exeDlnjjc32.exeDkkmln32.exeEocieq32.exeGfpjgn32.exeGkoodd32.exeHpmdjf32.exeIigehk32.exeJdmfdgbj.exeKommediq.exeLkkckdhm.exeLlomhllh.exeLbpolb32.exeMdahnmck.exeMkpieggc.exeMflgkd32.exeNloedjin.exeNicfnn32.exeOjgokflc.exeOphanl32.exeOegflcbj.exePoddphee.exePknakhig.exePhabdmgq.exeAhoamplo.exepid process 2328 746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe 2328 746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe 2488 Phbinc32.exe 2488 Phbinc32.exe 2964 Qkcbpn32.exe 2964 Qkcbpn32.exe 2508 Bbocak32.exe 2508 Bbocak32.exe 2864 Bbdmljln.exe 2864 Bbdmljln.exe 2768 Cappnf32.exe 2768 Cappnf32.exe 2092 Cabldeik.exe 2092 Cabldeik.exe 1724 Cinahhff.exe 1724 Cinahhff.exe 884 Dlnjjc32.exe 884 Dlnjjc32.exe 3068 Dkkmln32.exe 3068 Dkkmln32.exe 2688 Eocieq32.exe 2688 Eocieq32.exe 1012 Gfpjgn32.exe 1012 Gfpjgn32.exe 1648 Gkoodd32.exe 1648 Gkoodd32.exe 2124 Hpmdjf32.exe 2124 Hpmdjf32.exe 2208 Iigehk32.exe 2208 Iigehk32.exe 916 Jdmfdgbj.exe 916 Jdmfdgbj.exe 1796 Kommediq.exe 1796 Kommediq.exe 400 Lkkckdhm.exe 400 Lkkckdhm.exe 1688 Llomhllh.exe 1688 Llomhllh.exe 1704 Lbpolb32.exe 1704 Lbpolb32.exe 1776 Mdahnmck.exe 1776 Mdahnmck.exe 2484 Mkpieggc.exe 2484 Mkpieggc.exe 2052 Mflgkd32.exe 2052 Mflgkd32.exe 2796 Nloedjin.exe 2796 Nloedjin.exe 548 Nicfnn32.exe 548 Nicfnn32.exe 1612 Ojgokflc.exe 1612 Ojgokflc.exe 2072 Ophanl32.exe 2072 Ophanl32.exe 2424 Oegflcbj.exe 2424 Oegflcbj.exe 2752 Poddphee.exe 2752 Poddphee.exe 2920 Pknakhig.exe 2920 Pknakhig.exe 2800 Phabdmgq.exe 2800 Phabdmgq.exe 2608 Ahoamplo.exe 2608 Ahoamplo.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dajlhc32.exeDpphipbk.exeOllncgjq.exeQbhpddbf.exeBocfch32.exeOegflcbj.exeCkgmon32.exeFcegdnna.exeEodknifb.exeFeeilbhg.exePknakhig.exeHbepplkh.exeLgjcdc32.exeDeimaa32.exeCeanmc32.exeDpdbdo32.exePoddphee.exeEponmmaj.exeGkfkoi32.exeQkcbpn32.exeAdcobk32.exeBnemlf32.exeCnjbfhqa.exeFhifmcfa.exeKommediq.exeOjgokflc.exeKadhen32.exeApllml32.exeEocieq32.exeDkkmln32.exeCifdmbib.exeHqpjndio.exeBdehgnqc.exeMkpieggc.exeNloedjin.exeNicfnn32.exeHmfkbeoc.exeDcaghm32.exeEoqeekme.exeGknhjn32.exeAdhohapp.exeGohqhl32.exeOphanl32.exeGkoodd32.exeEahkag32.exeLlomhllh.exeHqjfgb32.exeIigehk32.exeGgppdpif.exePfjiod32.exePbcfie32.exeAgmacgcc.exeCabldeik.exeDfjaej32.exeBdklnq32.exeMfamko32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Dpphipbk.exe Dajlhc32.exe File created C:\Windows\SysWOW64\Fkncac32.dll Dpphipbk.exe File created C:\Windows\SysWOW64\Obffpa32.exe Ollncgjq.exe File opened for modification C:\Windows\SysWOW64\Qkcdigpa.exe Qbhpddbf.exe File created C:\Windows\SysWOW64\Fidfbpbc.dll Bocfch32.exe File opened for modification C:\Windows\SysWOW64\Poddphee.exe Oegflcbj.exe File opened for modification C:\Windows\SysWOW64\Ckijdm32.exe Ckgmon32.exe File opened for modification C:\Windows\SysWOW64\Fcgdjmlo.exe Fcegdnna.exe File opened for modification C:\Windows\SysWOW64\Fijolbfh.exe Eodknifb.exe File opened for modification C:\Windows\SysWOW64\Fkbadifn.exe Feeilbhg.exe File opened for modification C:\Windows\SysWOW64\Phabdmgq.exe Pknakhig.exe File opened for modification C:\Windows\SysWOW64\Hibebeqb.exe Hbepplkh.exe File created C:\Windows\SysWOW64\Oifbhdjc.dll Lgjcdc32.exe File opened for modification C:\Windows\SysWOW64\Dapnfb32.exe Deimaa32.exe File created C:\Windows\SysWOW64\Hnnpaali.dll Ceanmc32.exe File created C:\Windows\SysWOW64\Dimfmeef.exe Dpdbdo32.exe File created C:\Windows\SysWOW64\Geeqlobc.dll Poddphee.exe File created C:\Windows\SysWOW64\Okbkmi32.dll Eponmmaj.exe File opened for modification C:\Windows\SysWOW64\Gilhpe32.exe Gkfkoi32.exe File created C:\Windows\SysWOW64\Bbocak32.exe Qkcbpn32.exe File created C:\Windows\SysWOW64\Aledbn32.dll Ollncgjq.exe File created C:\Windows\SysWOW64\Khbcbcmo.dll Adcobk32.exe File created C:\Windows\SysWOW64\Bokcom32.exe Bnemlf32.exe File created C:\Windows\SysWOW64\Mcoinndc.dll Cnjbfhqa.exe File opened for modification C:\Windows\SysWOW64\Ghkbccdn.exe Fhifmcfa.exe File created C:\Windows\SysWOW64\Lkkckdhm.exe Kommediq.exe File created C:\Windows\SysWOW64\Ophanl32.exe Ojgokflc.exe File opened for modification C:\Windows\SysWOW64\Khnqbhdi.exe Kadhen32.exe File created C:\Windows\SysWOW64\Bapejd32.exe Apllml32.exe File created C:\Windows\SysWOW64\Gfpjgn32.exe Eocieq32.exe File created C:\Windows\SysWOW64\Eocieq32.exe Dkkmln32.exe File created C:\Windows\SysWOW64\Aenegl32.dll Cifdmbib.exe File created C:\Windows\SysWOW64\Pfmmge32.dll Hqpjndio.exe File opened for modification C:\Windows\SysWOW64\Cconcjae.exe Bdehgnqc.exe File created C:\Windows\SysWOW64\Moedaakj.dll Mkpieggc.exe File created C:\Windows\SysWOW64\Nicfnn32.exe Nloedjin.exe File created C:\Windows\SysWOW64\Lnbmgkoo.dll Nicfnn32.exe File opened for modification C:\Windows\SysWOW64\Hmfkbeoc.exe Hqpjndio.exe File opened for modification C:\Windows\SysWOW64\Hdapggln.exe Hmfkbeoc.exe File created C:\Windows\SysWOW64\Ncmjnjgd.dll Dcaghm32.exe File created C:\Windows\SysWOW64\Qncmki32.dll Eoqeekme.exe File created C:\Windows\SysWOW64\Gcimop32.exe Gknhjn32.exe File opened for modification C:\Windows\SysWOW64\Bdklnq32.exe Adhohapp.exe File created C:\Windows\SysWOW64\Gndjkkom.dll Qbhpddbf.exe File created C:\Windows\SysWOW64\Nfbgen32.dll Gohqhl32.exe File opened for modification C:\Windows\SysWOW64\Oegflcbj.exe Ophanl32.exe File opened for modification C:\Windows\SysWOW64\Hpmdjf32.exe Gkoodd32.exe File created C:\Windows\SysWOW64\Dacbha32.dll Bnemlf32.exe File opened for modification C:\Windows\SysWOW64\Edidcb32.exe Eahkag32.exe File created C:\Windows\SysWOW64\Adekhkng.exe Adcobk32.exe File created C:\Windows\SysWOW64\Flingf32.dll Llomhllh.exe File opened for modification C:\Windows\SysWOW64\Iqmcmaja.exe Hqjfgb32.exe File opened for modification C:\Windows\SysWOW64\Eocieq32.exe Dkkmln32.exe File opened for modification C:\Windows\SysWOW64\Jdmfdgbj.exe Iigehk32.exe File opened for modification C:\Windows\SysWOW64\Gknhjn32.exe Ggppdpif.exe File created C:\Windows\SysWOW64\Pbaide32.exe Pfjiod32.exe File created C:\Windows\SysWOW64\Dpphipbk.exe Dajlhc32.exe File created C:\Windows\SysWOW64\Hiegacgd.dll Pbcfie32.exe File created C:\Windows\SysWOW64\Adcobk32.exe Agmacgcc.exe File created C:\Windows\SysWOW64\Cinahhff.exe Cabldeik.exe File opened for modification C:\Windows\SysWOW64\Dpbenpqh.exe Dfjaej32.exe File opened for modification C:\Windows\SysWOW64\Bnemlf32.exe Bdklnq32.exe File created C:\Windows\SysWOW64\Mlnbmikh.exe Mfamko32.exe File created C:\Windows\SysWOW64\Dfjaej32.exe Dpphipbk.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2908 2212 WerFault.exe Iqmcmaja.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Dajlhc32.exeGhkbccdn.exeIadphghe.exeMfamko32.exeDeimaa32.exeHmlmacfn.exeDkkmln32.exePknakhig.exeJdmfdgbj.exeCifdmbib.exeEahkag32.exeFgnfpm32.exeHdapggln.exeKldchgag.exeQkcbpn32.exeCinahhff.exeCbdkdffm.exeCkijdm32.exeMbkkepio.exeCeanmc32.exeDfjaej32.exeHibebeqb.exeObffpa32.exeBdehgnqc.exeBbdmljln.exeOphanl32.exeEijffhjd.exeHngppgae.exeMlnbmikh.exePhelnhnb.exeCklpml32.exeDpmeij32.exeGkancm32.exeKommediq.exeKadhen32.exeNmkbfmpf.exeBapejd32.exeBdbkaoce.exeDcaghm32.exeMdahnmck.exeFcegdnna.exeIbhieo32.exeQbhpddbf.exeGknhjn32.exeIgioiacg.exeAlmjcobe.exeDjqcki32.exeGilhpe32.exeIigehk32.exeOjgokflc.exeObopobhe.exeApllml32.exeDnfkefad.exeEmlhfb32.exeCnjbfhqa.exeMglpjc32.exeKplfmfmf.exeFigoefkf.exeOegflcbj.exeAhoamplo.exeLgjcdc32.exeDapnfb32.exeNloedjin.exeNicfnn32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dajlhc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghkbccdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iadphghe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfamko32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deimaa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmlmacfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkmln32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pknakhig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdmfdgbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cifdmbib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eahkag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgnfpm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdapggln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kldchgag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qkcbpn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cinahhff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbdkdffm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckijdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbkkepio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceanmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfjaej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hibebeqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obffpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdehgnqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbdmljln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ophanl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eijffhjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hngppgae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlnbmikh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phelnhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cklpml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpmeij32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkancm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kommediq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kadhen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmkbfmpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bapejd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdbkaoce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcaghm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdahnmck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcegdnna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ibhieo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qbhpddbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gknhjn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igioiacg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Almjcobe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djqcki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gilhpe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iigehk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojgokflc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obopobhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apllml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnfkefad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emlhfb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnjbfhqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mglpjc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kplfmfmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Figoefkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oegflcbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahoamplo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgjcdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dapnfb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nloedjin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nicfnn32.exe -
Modifies registry class 64 IoCs
Processes:
Igioiacg.exeKbokda32.exeEfdmohmm.exeGcimop32.exePpgfciee.exeHqjfgb32.exeQkcdigpa.exeBdbkaoce.exeHmlmacfn.exeCnjbfhqa.exeJhgnbehe.exeOllncgjq.exeObffpa32.exeNicfnn32.exeFlbehbqm.exeHgkknm32.exeDlnjjc32.exeAdhohapp.exeFcegdnna.exePhabdmgq.exeKhnqbhdi.exeNmkbfmpf.exeDpphipbk.exeFijolbfh.exeGdjblboj.exeOegflcbj.exeFhifmcfa.exeBbocak32.exeHpmdjf32.exeAdcobk32.exeOepianef.exePhelnhnb.exeAdekhkng.exeQkcbpn32.exeEocieq32.exeLkkckdhm.exeMdahnmck.exeNmnoll32.exeFkbadifn.exeQbhpddbf.exeAgmacgcc.exeDapnfb32.exeNloedjin.exeEdidcb32.exeHmfkbeoc.exeDcaghm32.exeOphanl32.exeGkfkoi32.exeHqpjndio.exeObopobhe.exeCklpml32.exePhbinc32.exeDpmeij32.exeHdolga32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipapioii.dll" Igioiacg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbokda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efdmohmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gcimop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppgfciee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maonll32.dll" Hqjfgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qkcdigpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kggeijok.dll" Bdbkaoce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkficd32.dll" Hmlmacfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcoinndc.dll" Cnjbfhqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jhgnbehe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aledbn32.dll" Ollncgjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obffpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppgfciee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nicfnn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flbehbqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oclndk32.dll" Qkcdigpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hgkknm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlnjjc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nicfnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adhohapp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcegdnna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ollncgjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phabdmgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khnqbhdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbinkahf.dll" Nmkbfmpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpphipbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fijolbfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gdjblboj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oegflcbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfimpl32.dll" Fcegdnna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhifmcfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdaaokbn.dll" Bbocak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpmdjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khbcbcmo.dll" Adcobk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbihec32.dll" Oepianef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phelnhnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnolpa32.dll" Adekhkng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qkcbpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eocieq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkkckdhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdahnmck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfiffp32.dll" Nmnoll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkbadifn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qbhpddbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agmacgcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfpnifnh.dll" Dapnfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Addlbf32.dll" Fkbadifn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gqemkl32.dll" Nloedjin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edidcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inonmdda.dll" Hmfkbeoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcaghm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ophanl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdjblboj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkfkoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkedia32.dll" Eocieq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmpeai32.dll" Hpmdjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfmmge32.dll" Hqpjndio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgjgfacn.dll" Obopobhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jocnbj32.dll" Cklpml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phbinc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpmeij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdolga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oepianef.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exePhbinc32.exeQkcbpn32.exeBbocak32.exeBbdmljln.exeCappnf32.exeCabldeik.exeCinahhff.exeDlnjjc32.exeDkkmln32.exeEocieq32.exeGfpjgn32.exeGkoodd32.exeHpmdjf32.exeIigehk32.exeJdmfdgbj.exedescription pid process target process PID 2328 wrote to memory of 2488 2328 746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe Phbinc32.exe PID 2328 wrote to memory of 2488 2328 746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe Phbinc32.exe PID 2328 wrote to memory of 2488 2328 746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe Phbinc32.exe PID 2328 wrote to memory of 2488 2328 746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe Phbinc32.exe PID 2488 wrote to memory of 2964 2488 Phbinc32.exe Qkcbpn32.exe PID 2488 wrote to memory of 2964 2488 Phbinc32.exe Qkcbpn32.exe PID 2488 wrote to memory of 2964 2488 Phbinc32.exe Qkcbpn32.exe PID 2488 wrote to memory of 2964 2488 Phbinc32.exe Qkcbpn32.exe PID 2964 wrote to memory of 2508 2964 Qkcbpn32.exe Bbocak32.exe PID 2964 wrote to memory of 2508 2964 Qkcbpn32.exe Bbocak32.exe PID 2964 wrote to memory of 2508 2964 Qkcbpn32.exe Bbocak32.exe PID 2964 wrote to memory of 2508 2964 Qkcbpn32.exe Bbocak32.exe PID 2508 wrote to memory of 2864 2508 Bbocak32.exe Bbdmljln.exe PID 2508 wrote to memory of 2864 2508 Bbocak32.exe Bbdmljln.exe PID 2508 wrote to memory of 2864 2508 Bbocak32.exe Bbdmljln.exe PID 2508 wrote to memory of 2864 2508 Bbocak32.exe Bbdmljln.exe PID 2864 wrote to memory of 2768 2864 Bbdmljln.exe Cappnf32.exe PID 2864 wrote to memory of 2768 2864 Bbdmljln.exe Cappnf32.exe PID 2864 wrote to memory of 2768 2864 Bbdmljln.exe Cappnf32.exe PID 2864 wrote to memory of 2768 2864 Bbdmljln.exe Cappnf32.exe PID 2768 wrote to memory of 2092 2768 Cappnf32.exe Cabldeik.exe PID 2768 wrote to memory of 2092 2768 Cappnf32.exe Cabldeik.exe PID 2768 wrote to memory of 2092 2768 Cappnf32.exe Cabldeik.exe PID 2768 wrote to memory of 2092 2768 Cappnf32.exe Cabldeik.exe PID 2092 wrote to memory of 1724 2092 Cabldeik.exe Cinahhff.exe PID 2092 wrote to memory of 1724 2092 Cabldeik.exe Cinahhff.exe PID 2092 wrote to memory of 1724 2092 Cabldeik.exe Cinahhff.exe PID 2092 wrote to memory of 1724 2092 Cabldeik.exe Cinahhff.exe PID 1724 wrote to memory of 884 1724 Cinahhff.exe Dlnjjc32.exe PID 1724 wrote to memory of 884 1724 Cinahhff.exe Dlnjjc32.exe PID 1724 wrote to memory of 884 1724 Cinahhff.exe Dlnjjc32.exe PID 1724 wrote to memory of 884 1724 Cinahhff.exe Dlnjjc32.exe PID 884 wrote to memory of 3068 884 Dlnjjc32.exe Dkkmln32.exe PID 884 wrote to memory of 3068 884 Dlnjjc32.exe Dkkmln32.exe PID 884 wrote to memory of 3068 884 Dlnjjc32.exe Dkkmln32.exe PID 884 wrote to memory of 3068 884 Dlnjjc32.exe Dkkmln32.exe PID 3068 wrote to memory of 2688 3068 Dkkmln32.exe Eocieq32.exe PID 3068 wrote to memory of 2688 3068 Dkkmln32.exe Eocieq32.exe PID 3068 wrote to memory of 2688 3068 Dkkmln32.exe Eocieq32.exe PID 3068 wrote to memory of 2688 3068 Dkkmln32.exe Eocieq32.exe PID 2688 wrote to memory of 1012 2688 Eocieq32.exe Gfpjgn32.exe PID 2688 wrote to memory of 1012 2688 Eocieq32.exe Gfpjgn32.exe PID 2688 wrote to memory of 1012 2688 Eocieq32.exe Gfpjgn32.exe PID 2688 wrote to memory of 1012 2688 Eocieq32.exe Gfpjgn32.exe PID 1012 wrote to memory of 1648 1012 Gfpjgn32.exe Gkoodd32.exe PID 1012 wrote to memory of 1648 1012 Gfpjgn32.exe Gkoodd32.exe PID 1012 wrote to memory of 1648 1012 Gfpjgn32.exe Gkoodd32.exe PID 1012 wrote to memory of 1648 1012 Gfpjgn32.exe Gkoodd32.exe PID 1648 wrote to memory of 2124 1648 Gkoodd32.exe Hpmdjf32.exe PID 1648 wrote to memory of 2124 1648 Gkoodd32.exe Hpmdjf32.exe PID 1648 wrote to memory of 2124 1648 Gkoodd32.exe Hpmdjf32.exe PID 1648 wrote to memory of 2124 1648 Gkoodd32.exe Hpmdjf32.exe PID 2124 wrote to memory of 2208 2124 Hpmdjf32.exe Iigehk32.exe PID 2124 wrote to memory of 2208 2124 Hpmdjf32.exe Iigehk32.exe PID 2124 wrote to memory of 2208 2124 Hpmdjf32.exe Iigehk32.exe PID 2124 wrote to memory of 2208 2124 Hpmdjf32.exe Iigehk32.exe PID 2208 wrote to memory of 916 2208 Iigehk32.exe Jdmfdgbj.exe PID 2208 wrote to memory of 916 2208 Iigehk32.exe Jdmfdgbj.exe PID 2208 wrote to memory of 916 2208 Iigehk32.exe Jdmfdgbj.exe PID 2208 wrote to memory of 916 2208 Iigehk32.exe Jdmfdgbj.exe PID 916 wrote to memory of 1796 916 Jdmfdgbj.exe Kommediq.exe PID 916 wrote to memory of 1796 916 Jdmfdgbj.exe Kommediq.exe PID 916 wrote to memory of 1796 916 Jdmfdgbj.exe Kommediq.exe PID 916 wrote to memory of 1796 916 Jdmfdgbj.exe Kommediq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe"C:\Users\Admin\AppData\Local\Temp\746fc26d8ca11ef11f65d41b1680f9d1d518c0eb5296136aac90e8540fcf925a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Phbinc32.exeC:\Windows\system32\Phbinc32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\Qkcbpn32.exeC:\Windows\system32\Qkcbpn32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\Bbocak32.exeC:\Windows\system32\Bbocak32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Bbdmljln.exeC:\Windows\system32\Bbdmljln.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Cappnf32.exeC:\Windows\system32\Cappnf32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\Cabldeik.exeC:\Windows\system32\Cabldeik.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Cinahhff.exeC:\Windows\system32\Cinahhff.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\Dlnjjc32.exeC:\Windows\system32\Dlnjjc32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\Dkkmln32.exeC:\Windows\system32\Dkkmln32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\Eocieq32.exeC:\Windows\system32\Eocieq32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Gfpjgn32.exeC:\Windows\system32\Gfpjgn32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\Gkoodd32.exeC:\Windows\system32\Gkoodd32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\Hpmdjf32.exeC:\Windows\system32\Hpmdjf32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Iigehk32.exeC:\Windows\system32\Iigehk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\Jdmfdgbj.exeC:\Windows\system32\Jdmfdgbj.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\Kommediq.exeC:\Windows\system32\Kommediq.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\SysWOW64\Lkkckdhm.exeC:\Windows\system32\Lkkckdhm.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:400 -
C:\Windows\SysWOW64\Llomhllh.exeC:\Windows\system32\Llomhllh.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\Lbpolb32.exeC:\Windows\system32\Lbpolb32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Windows\SysWOW64\Mdahnmck.exeC:\Windows\system32\Mdahnmck.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1776 -
C:\Windows\SysWOW64\Mkpieggc.exeC:\Windows\system32\Mkpieggc.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2484 -
C:\Windows\SysWOW64\Mflgkd32.exeC:\Windows\system32\Mflgkd32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Windows\SysWOW64\Nloedjin.exeC:\Windows\system32\Nloedjin.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Nicfnn32.exeC:\Windows\system32\Nicfnn32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\Ojgokflc.exeC:\Windows\system32\Ojgokflc.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\Ophanl32.exeC:\Windows\system32\Ophanl32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\Oegflcbj.exeC:\Windows\system32\Oegflcbj.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2424 -
C:\Windows\SysWOW64\Poddphee.exeC:\Windows\system32\Poddphee.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\Pknakhig.exeC:\Windows\system32\Pknakhig.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\Phabdmgq.exeC:\Windows\system32\Phabdmgq.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2800 -
C:\Windows\SysWOW64\Ahoamplo.exeC:\Windows\system32\Ahoamplo.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\Almjcobe.exeC:\Windows\system32\Almjcobe.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\Adhohapp.exeC:\Windows\system32\Adhohapp.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2228 -
C:\Windows\SysWOW64\Bdklnq32.exeC:\Windows\system32\Bdklnq32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\Bnemlf32.exeC:\Windows\system32\Bnemlf32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\Bokcom32.exeC:\Windows\system32\Bokcom32.exe37⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\Cifdmbib.exeC:\Windows\system32\Cifdmbib.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:852 -
C:\Windows\SysWOW64\Ckgmon32.exeC:\Windows\system32\Ckgmon32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1616 -
C:\Windows\SysWOW64\Ckijdm32.exeC:\Windows\system32\Ckijdm32.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Windows\SysWOW64\Ceanmc32.exeC:\Windows\system32\Ceanmc32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\Cnjbfhqa.exeC:\Windows\system32\Cnjbfhqa.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Djqcki32.exeC:\Windows\system32\Djqcki32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:524 -
C:\Windows\SysWOW64\Dajlhc32.exeC:\Windows\system32\Dajlhc32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\SysWOW64\Dpphipbk.exeC:\Windows\system32\Dpphipbk.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1508 -
C:\Windows\SysWOW64\Dfjaej32.exeC:\Windows\system32\Dfjaej32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\Dpbenpqh.exeC:\Windows\system32\Dpbenpqh.exe47⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\Dpdbdo32.exeC:\Windows\system32\Dpdbdo32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:928 -
C:\Windows\SysWOW64\Dimfmeef.exeC:\Windows\system32\Dimfmeef.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2340 -
C:\Windows\SysWOW64\Eahkag32.exeC:\Windows\system32\Eahkag32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\Edidcb32.exeC:\Windows\system32\Edidcb32.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Ekblplgo.exeC:\Windows\system32\Ekblplgo.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\Eoqeekme.exeC:\Windows\system32\Eoqeekme.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2984 -
C:\Windows\SysWOW64\Eijffhjd.exeC:\Windows\system32\Eijffhjd.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\Fgnfpm32.exeC:\Windows\system32\Fgnfpm32.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\Fcegdnna.exeC:\Windows\system32\Fcegdnna.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\Fcgdjmlo.exeC:\Windows\system32\Fcgdjmlo.exe57⤵
- Executes dropped EXE
PID:968 -
C:\Windows\SysWOW64\Flbehbqm.exeC:\Windows\system32\Flbehbqm.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2816 -
C:\Windows\SysWOW64\Fhifmcfa.exeC:\Windows\system32\Fhifmcfa.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Ghkbccdn.exeC:\Windows\system32\Ghkbccdn.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\Ggppdpif.exeC:\Windows\system32\Ggppdpif.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1788 -
C:\Windows\SysWOW64\Gknhjn32.exeC:\Windows\system32\Gknhjn32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\Gcimop32.exeC:\Windows\system32\Gcimop32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2176 -
C:\Windows\SysWOW64\Hqpjndio.exeC:\Windows\system32\Hqpjndio.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Hmfkbeoc.exeC:\Windows\system32\Hmfkbeoc.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1148 -
C:\Windows\SysWOW64\Hdapggln.exeC:\Windows\system32\Hdapggln.exe66⤵
- System Location Discovery: System Language Discovery
PID:1004 -
C:\Windows\SysWOW64\Hbepplkh.exeC:\Windows\system32\Hbepplkh.exe67⤵
- Drops file in System32 directory
PID:948 -
C:\Windows\SysWOW64\Hibebeqb.exeC:\Windows\system32\Hibebeqb.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\Ibjikk32.exeC:\Windows\system32\Ibjikk32.exe69⤵PID:1732
-
C:\Windows\SysWOW64\Igioiacg.exeC:\Windows\system32\Igioiacg.exe70⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\Iabcbg32.exeC:\Windows\system32\Iabcbg32.exe71⤵PID:804
-
C:\Windows\SysWOW64\Iadphghe.exeC:\Windows\system32\Iadphghe.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\Ibhieo32.exeC:\Windows\system32\Ibhieo32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\Jhgnbehe.exeC:\Windows\system32\Jhgnbehe.exe74⤵
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Kplfmfmf.exeC:\Windows\system32\Kplfmfmf.exe75⤵
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\Kldchgag.exeC:\Windows\system32\Kldchgag.exe76⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\Kbokda32.exeC:\Windows\system32\Kbokda32.exe77⤵
- Modifies registry class
PID:2732 -
C:\Windows\SysWOW64\Kadhen32.exeC:\Windows\system32\Kadhen32.exe78⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\SysWOW64\Khnqbhdi.exeC:\Windows\system32\Khnqbhdi.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Lnmfpnqn.exeC:\Windows\system32\Lnmfpnqn.exe80⤵PID:2824
-
C:\Windows\SysWOW64\Lgejidgn.exeC:\Windows\system32\Lgejidgn.exe81⤵PID:1760
-
C:\Windows\SysWOW64\Lgjcdc32.exeC:\Windows\system32\Lgjcdc32.exe82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\Mglpjc32.exeC:\Windows\system32\Mglpjc32.exe83⤵
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Windows\SysWOW64\Mfamko32.exeC:\Windows\system32\Mfamko32.exe84⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Windows\SysWOW64\Mlnbmikh.exeC:\Windows\system32\Mlnbmikh.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:632 -
C:\Windows\SysWOW64\Mbkkepio.exeC:\Windows\system32\Mbkkepio.exe86⤵
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\Mookod32.exeC:\Windows\system32\Mookod32.exe87⤵PID:2088
-
C:\Windows\SysWOW64\Ndnplk32.exeC:\Windows\system32\Ndnplk32.exe88⤵PID:2112
-
C:\Windows\SysWOW64\Nccmng32.exeC:\Windows\system32\Nccmng32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1056 -
C:\Windows\SysWOW64\Nmkbfmpf.exeC:\Windows\system32\Nmkbfmpf.exe90⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1300 -
C:\Windows\SysWOW64\Nmnoll32.exeC:\Windows\system32\Nmnoll32.exe91⤵
- Modifies registry class
PID:2324 -
C:\Windows\SysWOW64\Nfhpjaba.exeC:\Windows\system32\Nfhpjaba.exe92⤵PID:1696
-
C:\Windows\SysWOW64\Obopobhe.exeC:\Windows\system32\Obopobhe.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1028 -
C:\Windows\SysWOW64\Onfadc32.exeC:\Windows\system32\Onfadc32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1480 -
C:\Windows\SysWOW64\Oepianef.exeC:\Windows\system32\Oepianef.exe95⤵
- Modifies registry class
PID:1720 -
C:\Windows\SysWOW64\Ollncgjq.exeC:\Windows\system32\Ollncgjq.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:2556 -
C:\Windows\SysWOW64\Obffpa32.exeC:\Windows\system32\Obffpa32.exe97⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\Phelnhnb.exeC:\Windows\system32\Phelnhnb.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\Pfjiod32.exeC:\Windows\system32\Pfjiod32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3000 -
C:\Windows\SysWOW64\Pbaide32.exeC:\Windows\system32\Pbaide32.exe100⤵PID:2784
-
C:\Windows\SysWOW64\Pbcfie32.exeC:\Windows\system32\Pbcfie32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\Ppgfciee.exeC:\Windows\system32\Ppgfciee.exe102⤵
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\Qbhpddbf.exeC:\Windows\system32\Qbhpddbf.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1384 -
C:\Windows\SysWOW64\Qkcdigpa.exeC:\Windows\system32\Qkcdigpa.exe104⤵
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\Qdlialfb.exeC:\Windows\system32\Qdlialfb.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3028 -
C:\Windows\SysWOW64\Agmacgcc.exeC:\Windows\system32\Agmacgcc.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:2836 -
C:\Windows\SysWOW64\Adcobk32.exeC:\Windows\system32\Adcobk32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\Adekhkng.exeC:\Windows\system32\Adekhkng.exe108⤵
- Modifies registry class
PID:1564 -
C:\Windows\SysWOW64\Apllml32.exeC:\Windows\system32\Apllml32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\Bapejd32.exeC:\Windows\system32\Bapejd32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\Bocfch32.exeC:\Windows\system32\Bocfch32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\Bofbih32.exeC:\Windows\system32\Bofbih32.exe112⤵PID:2008
-
C:\Windows\SysWOW64\Bdbkaoce.exeC:\Windows\system32\Bdbkaoce.exe113⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\Bdehgnqc.exeC:\Windows\system32\Bdehgnqc.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\Cconcjae.exeC:\Windows\system32\Cconcjae.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2332 -
C:\Windows\SysWOW64\Cbdkdffm.exeC:\Windows\system32\Cbdkdffm.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\Cklpml32.exeC:\Windows\system32\Cklpml32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2980 -
C:\Windows\SysWOW64\Dbidof32.exeC:\Windows\system32\Dbidof32.exe118⤵PID:2848
-
C:\Windows\SysWOW64\Dpmeij32.exeC:\Windows\system32\Dpmeij32.exe119⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2396 -
C:\Windows\SysWOW64\Deimaa32.exeC:\Windows\system32\Deimaa32.exe120⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\Dapnfb32.exeC:\Windows\system32\Dapnfb32.exe121⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2648 -
C:\Windows\SysWOW64\Dcaghm32.exeC:\Windows\system32\Dcaghm32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2664
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-