Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe
Resource
win10v2004-20241007-en
General
-
Target
67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe
-
Size
428KB
-
MD5
8bf0741b0ebad1ef81e9787d61977e78
-
SHA1
2d7fb5fba6b953b3c69c8e21a467252c12c1d97c
-
SHA256
67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270
-
SHA512
a81996552248ab62639df76416f38878de0bbe987fa21b0c4b15d034cb8c976ea6ce46524c1b3aa178c1791e5f26348254e62a39e4c21ad736ecec9136298dcd
-
SSDEEP
3072:naFjwCFYlVWCZ8mnaoPav8Wz24ho1mtye3lFDrFDHZtO8jJkiUi8ChpBhx5Zd42r:ttlYC5ba4sFj5tPNki9HZd1sFj5tw
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dilchhgg.exeIqapnjli.exeCnabffeo.exeDnqhkcdo.exeNcloha32.exePpkjac32.exeGpggei32.exeQdofep32.exeBceeqi32.exeCcgnelll.exeFipbhd32.exeAeenapck.exeJgppmpjp.exeHkolakkb.exeFihfnp32.exeIcncgf32.exePjahakgb.exeLonlkcho.exeLlkbcl32.exeKeiqlihp.exeHbekojlp.exeCbblda32.exeEfedga32.exeEikfdl32.exeLpiacp32.exeLjeoimeg.exeFhljkm32.exeFkqlgc32.exeKjmoeo32.exeNgpcohbm.exeBhkghqpb.exeDqfabdaf.exeBodhjdcc.exeDgiaefgg.exeFdkmeiei.exeBfgdmjlp.exeKflafbak.exeLhfpdi32.exeHkjnenbp.exeBeldao32.exeBnapnm32.exeOninhgae.exeFiqibj32.exeEhaolpke.exeFiakkcma.exeLffmpp32.exeLpoaheja.exeMgmdapml.exeCqaiph32.exeOmbddbah.exeFodgkp32.exeDkgldm32.exeKcginj32.exeBhonjg32.exeFfbmfo32.exeNmjmekan.exeGbhcpmkm.exeAljmbknm.exeMgmoob32.exeNikkkn32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dilchhgg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iqapnjli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnabffeo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnqhkcdo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncloha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppkjac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpggei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdofep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncloha32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bceeqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccgnelll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fipbhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aeenapck.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgppmpjp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkolakkb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fihfnp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icncgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjahakgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lonlkcho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llkbcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Keiqlihp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbekojlp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbblda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efedga32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eikfdl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpiacp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljeoimeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhljkm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkqlgc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjmoeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngpcohbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhkghqpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dqfabdaf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bodhjdcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgiaefgg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdkmeiei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfgdmjlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iqapnjli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kflafbak.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhfpdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkjnenbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beldao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnapnm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oninhgae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiqibj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehaolpke.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiakkcma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbekojlp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lffmpp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpoaheja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgmdapml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cqaiph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ombddbah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fodgkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkgldm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcginj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhonjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffbmfo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmjmekan.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbhcpmkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aljmbknm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeenapck.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgmoob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nikkkn32.exe -
Executes dropped EXE 64 IoCs
Processes:
Aoagccfn.exeBkhhhd32.exeCfkloq32.exeCbblda32.exeCkjamgmk.exeDpeiligo.exeEheglk32.exeElcpbigl.exeEgmabg32.exeFapeic32.exeFhljkm32.exeGgfpgi32.exeGfkmie32.exeHcdgmimg.exeHkolakkb.exeImjkpb32.exeIpjdameg.exeInbnhihl.exeJoggci32.exeJlkglm32.exeJpmmfp32.exeKmcjedcg.exeKijkje32.exeKpfplo32.exeKcginj32.exeLlomfpag.exeLhhkapeh.exeLpflkb32.exeMjqmig32.exeMfgnnhkc.exeMhhgpc32.exeMgmdapml.exeNqhepeai.exeNdfnecgp.exeNggggoda.exeNcmglp32.exeOimmjffj.exeOniebmda.exeOjbbmnhc.exeOdkgec32.exeOnqkclni.exeOjglhm32.exePfbfhm32.exePpkjac32.exeQejpoi32.exeQhilkege.exeQemldifo.exeAdaiee32.exeAnjnnk32.exeAgbbgqhh.exeAgeompfe.exeBjjaikoa.exeBhonjg32.exeBnlgbnbp.exeBdfooh32.exeBolcma32.exeBqmpdioa.exeBnapnm32.exeCgidfcdk.exeCqaiph32.exeCnejim32.exeCcbbachm.exeCfanmogq.exeCceogcfj.exepid process 3028 Aoagccfn.exe 1700 Bkhhhd32.exe 2424 Cfkloq32.exe 2784 Cbblda32.exe 2928 Ckjamgmk.exe 2744 Dpeiligo.exe 2132 Eheglk32.exe 1104 Elcpbigl.exe 1196 Egmabg32.exe 2692 Fapeic32.exe 2732 Fhljkm32.exe 2996 Ggfpgi32.exe 3000 Gfkmie32.exe 2220 Hcdgmimg.exe 1252 Hkolakkb.exe 2672 Imjkpb32.exe 1160 Ipjdameg.exe 1476 Inbnhihl.exe 880 Joggci32.exe 1536 Jlkglm32.exe 1980 Jpmmfp32.exe 1592 Kmcjedcg.exe 2216 Kijkje32.exe 2484 Kpfplo32.exe 2320 Kcginj32.exe 2344 Llomfpag.exe 596 Lhhkapeh.exe 2852 Lpflkb32.exe 2872 Mjqmig32.exe 2492 Mfgnnhkc.exe 1232 Mhhgpc32.exe 2704 Mgmdapml.exe 2280 Nqhepeai.exe 1144 Ndfnecgp.exe 2524 Nggggoda.exe 2924 Ncmglp32.exe 1296 Oimmjffj.exe 1480 Oniebmda.exe 1900 Ojbbmnhc.exe 2388 Odkgec32.exe 2080 Onqkclni.exe 1944 Ojglhm32.exe 944 Pfbfhm32.exe 960 Ppkjac32.exe 900 Qejpoi32.exe 1968 Qhilkege.exe 1116 Qemldifo.exe 2236 Adaiee32.exe 2284 Anjnnk32.exe 2548 Agbbgqhh.exe 1976 Ageompfe.exe 3052 Bjjaikoa.exe 2864 Bhonjg32.exe 2684 Bnlgbnbp.exe 2980 Bdfooh32.exe 672 Bolcma32.exe 1416 Bqmpdioa.exe 2808 Bnapnm32.exe 2400 Cgidfcdk.exe 2144 Cqaiph32.exe 2152 Cnejim32.exe 1796 Ccbbachm.exe 1656 Cfanmogq.exe 3068 Cceogcfj.exe -
Loads dropped DLL 64 IoCs
Processes:
67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exeAoagccfn.exeBkhhhd32.exeCfkloq32.exeCbblda32.exeCkjamgmk.exeDpeiligo.exeEheglk32.exeElcpbigl.exeEgmabg32.exeFapeic32.exeFhljkm32.exeGgfpgi32.exeGfkmie32.exeHcdgmimg.exeHkolakkb.exeImjkpb32.exeIpjdameg.exeInbnhihl.exeJoggci32.exeJlkglm32.exeJpmmfp32.exeKmcjedcg.exeKijkje32.exeKpfplo32.exeKcginj32.exeLlomfpag.exeLhhkapeh.exeLpflkb32.exeMjqmig32.exeMfgnnhkc.exeMhhgpc32.exepid process 516 67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe 516 67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe 3028 Aoagccfn.exe 3028 Aoagccfn.exe 1700 Bkhhhd32.exe 1700 Bkhhhd32.exe 2424 Cfkloq32.exe 2424 Cfkloq32.exe 2784 Cbblda32.exe 2784 Cbblda32.exe 2928 Ckjamgmk.exe 2928 Ckjamgmk.exe 2744 Dpeiligo.exe 2744 Dpeiligo.exe 2132 Eheglk32.exe 2132 Eheglk32.exe 1104 Elcpbigl.exe 1104 Elcpbigl.exe 1196 Egmabg32.exe 1196 Egmabg32.exe 2692 Fapeic32.exe 2692 Fapeic32.exe 2732 Fhljkm32.exe 2732 Fhljkm32.exe 2996 Ggfpgi32.exe 2996 Ggfpgi32.exe 3000 Gfkmie32.exe 3000 Gfkmie32.exe 2220 Hcdgmimg.exe 2220 Hcdgmimg.exe 1252 Hkolakkb.exe 1252 Hkolakkb.exe 2672 Imjkpb32.exe 2672 Imjkpb32.exe 1160 Ipjdameg.exe 1160 Ipjdameg.exe 1476 Inbnhihl.exe 1476 Inbnhihl.exe 880 Joggci32.exe 880 Joggci32.exe 1536 Jlkglm32.exe 1536 Jlkglm32.exe 1980 Jpmmfp32.exe 1980 Jpmmfp32.exe 1592 Kmcjedcg.exe 1592 Kmcjedcg.exe 2216 Kijkje32.exe 2216 Kijkje32.exe 2484 Kpfplo32.exe 2484 Kpfplo32.exe 2320 Kcginj32.exe 2320 Kcginj32.exe 2344 Llomfpag.exe 2344 Llomfpag.exe 596 Lhhkapeh.exe 596 Lhhkapeh.exe 2852 Lpflkb32.exe 2852 Lpflkb32.exe 2872 Mjqmig32.exe 2872 Mjqmig32.exe 2492 Mfgnnhkc.exe 2492 Mfgnnhkc.exe 1232 Mhhgpc32.exe 1232 Mhhgpc32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fodgkp32.exeOggeokoq.exeQekbgbpf.exeAbjeejep.exeNinhamne.exePecelm32.exeMfgnnhkc.exeMalmllfb.exeBinikb32.exeGhbljk32.exeLemdncoa.exeDfkclf32.exeDgnminke.exeAnkedf32.exeMgmoob32.exeJhkclc32.exeEfedga32.exeEfppqoil.exeImjmhkpj.exeLijiaabk.exePfnhkq32.exeBlaobmkq.exeKijkje32.exeHjaeba32.exeIamfdo32.exeJjnjqb32.exeKflafbak.exeJdidmf32.exeLlomfpag.exeCcbbachm.exeCbpbgk32.exeCglcek32.exeJmgfgham.exeLpoaheja.exeNggggoda.exePmmqmpdm.exePehebbbh.exeAljmbknm.exeBodhjdcc.exeElcpbigl.exeOimmjffj.exeOqkpmaif.exeFjaoplho.exeAdaiee32.exeEpbbkf32.exePaggce32.exeOiokholk.exeClilmbhd.exeEpnhpglg.exeLofifi32.exeNgoleb32.exeIdmnga32.exeJpmmfp32.exeAanibhoh.exeLpiacp32.exeCfkloq32.exeBdfooh32.exeGgfbpaeo.exedescription ioc process File created C:\Windows\SysWOW64\Gmidlmcd.exe Fodgkp32.exe File opened for modification C:\Windows\SysWOW64\Pncjad32.exe Oggeokoq.exe File created C:\Windows\SysWOW64\Qdpohodn.exe Qekbgbpf.exe File created C:\Windows\SysWOW64\Qedehamj.dll Abjeejep.exe File created C:\Windows\SysWOW64\Iinalc32.dll Ninhamne.exe File created C:\Windows\SysWOW64\Pjpmdd32.exe Pecelm32.exe File opened for modification C:\Windows\SysWOW64\Mhhgpc32.exe Mfgnnhkc.exe File created C:\Windows\SysWOW64\Manjaldo.exe Malmllfb.exe File created C:\Windows\SysWOW64\Cfjjagic.dll Binikb32.exe File created C:\Windows\SysWOW64\Gcgqgd32.exe Ghbljk32.exe File created C:\Windows\SysWOW64\Oopqjabc.dll Lemdncoa.exe File created C:\Windows\SysWOW64\Malbbh32.dll Dfkclf32.exe File opened for modification C:\Windows\SysWOW64\Dqfabdaf.exe Dgnminke.exe File created C:\Windows\SysWOW64\Aeenapck.exe Ankedf32.exe File created C:\Windows\SysWOW64\Nikkkn32.exe Mgmoob32.exe File created C:\Windows\SysWOW64\Neccdc32.dll Jhkclc32.exe File opened for modification C:\Windows\SysWOW64\Epnhpglg.exe Efedga32.exe File created C:\Windows\SysWOW64\Ffbmfo32.exe Efppqoil.exe File opened for modification C:\Windows\SysWOW64\Iianmlfn.exe Imjmhkpj.exe File created C:\Windows\SysWOW64\Aopbmapo.dll Lijiaabk.exe File created C:\Windows\SysWOW64\Dhkqcl32.dll Pfnhkq32.exe File created C:\Windows\SysWOW64\Bongfjgo.dll Blaobmkq.exe File created C:\Windows\SysWOW64\Kqmidcdi.dll Kijkje32.exe File created C:\Windows\SysWOW64\Hjcaha32.exe Hjaeba32.exe File created C:\Windows\SysWOW64\Bcbonpco.dll Iamfdo32.exe File created C:\Windows\SysWOW64\Jecnnk32.exe Jjnjqb32.exe File opened for modification C:\Windows\SysWOW64\Klhioioc.exe Kflafbak.exe File opened for modification C:\Windows\SysWOW64\Jnbifl32.exe Jdidmf32.exe File created C:\Windows\SysWOW64\Lhhkapeh.exe Llomfpag.exe File opened for modification C:\Windows\SysWOW64\Cfanmogq.exe Ccbbachm.exe File created C:\Windows\SysWOW64\Clefdcog.exe Cbpbgk32.exe File created C:\Windows\SysWOW64\Doejph32.dll Cglcek32.exe File created C:\Windows\SysWOW64\Qfldmeci.dll Jmgfgham.exe File created C:\Windows\SysWOW64\Colldggd.dll Lpoaheja.exe File created C:\Windows\SysWOW64\Fchopn32.dll Nggggoda.exe File opened for modification C:\Windows\SysWOW64\Pehebbbh.exe Pmmqmpdm.exe File created C:\Windows\SysWOW64\Qekbgbpf.exe Pehebbbh.exe File created C:\Windows\SysWOW64\Amjiln32.exe Aljmbknm.exe File created C:\Windows\SysWOW64\Kpfdhgca.dll Bodhjdcc.exe File opened for modification C:\Windows\SysWOW64\Egmabg32.exe Elcpbigl.exe File created C:\Windows\SysWOW64\Oniebmda.exe Oimmjffj.exe File opened for modification C:\Windows\SysWOW64\Oggeokoq.exe Oqkpmaif.exe File created C:\Windows\SysWOW64\Feipbefb.exe Fjaoplho.exe File created C:\Windows\SysWOW64\Domfmiic.dll Malmllfb.exe File created C:\Windows\SysWOW64\Anjnnk32.exe Adaiee32.exe File opened for modification C:\Windows\SysWOW64\Eikfdl32.exe Epbbkf32.exe File created C:\Windows\SysWOW64\Bamdfpok.dll Paggce32.exe File created C:\Windows\SysWOW64\Cdokfc32.dll Oiokholk.exe File created C:\Windows\SysWOW64\Cnhhge32.exe Clilmbhd.exe File opened for modification C:\Windows\SysWOW64\Emaijk32.exe Epnhpglg.exe File opened for modification C:\Windows\SysWOW64\Lohelidp.exe Lofifi32.exe File created C:\Windows\SysWOW64\Ninhamne.exe Ngoleb32.exe File created C:\Windows\SysWOW64\Kndlek32.dll Idmnga32.exe File created C:\Windows\SysWOW64\Kmcjedcg.exe Jpmmfp32.exe File created C:\Windows\SysWOW64\Glcgij32.dll Epnhpglg.exe File opened for modification C:\Windows\SysWOW64\Aoaill32.exe Aanibhoh.exe File opened for modification C:\Windows\SysWOW64\Qdpohodn.exe Qekbgbpf.exe File opened for modification C:\Windows\SysWOW64\Aeenapck.exe Ankedf32.exe File created C:\Windows\SysWOW64\Bbbmhm32.dll Lpiacp32.exe File opened for modification C:\Windows\SysWOW64\Cbblda32.exe Cfkloq32.exe File opened for modification C:\Windows\SysWOW64\Oniebmda.exe Oimmjffj.exe File created C:\Windows\SysWOW64\Lqhkjacc.dll Bdfooh32.exe File created C:\Windows\SysWOW64\Aoaill32.exe Aanibhoh.exe File opened for modification C:\Windows\SysWOW64\Gpogiglp.exe Ggfbpaeo.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 836 1056 WerFault.exe Opblgehg.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Kijkje32.exeFliook32.exeLofifi32.exeEcogodlk.exeJfekec32.exePcdldknm.exeHganjo32.exeLhhkapeh.exeOjglhm32.exeQejpoi32.exeEhaolpke.exeDpeiligo.exeFihfnp32.exeMjkibehc.exeNgcanq32.exeHdkaabnh.exeCkjamgmk.exeKmkihbho.exeAedlhg32.exeDmjlof32.exePehebbbh.exeAblbjj32.exeJmgfgham.exeBphooc32.exeCglcek32.exeJibpghbk.exeApclnj32.exeAkdafn32.exeAjldkhjh.exeChggdoee.exeHkjnenbp.exeIfbkgj32.exeBlaobmkq.exeClefdcog.exeHeqimm32.exeQdpohodn.exeCeickb32.exeFlfnhnfm.exeEheglk32.exeEpnhpglg.exeIickckcl.exeMioeeifi.exeDfpfke32.exeImjkpb32.exeAgeompfe.exeDnhbmpkn.exeIgceej32.exeMdgkjopd.exeEnhaeldn.exeOfdeeb32.exeLcppgbjd.exeIpjdameg.exeKmcjedcg.exeOimmjffj.exeDcbnpgkh.exeOjblbgdg.exeDilchhgg.exeLffmpp32.exeJjnjqb32.exeHdeoccgn.exePecelm32.exeBinikb32.exeGpafgp32.exeInhoegqc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kijkje32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fliook32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lofifi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ecogodlk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfekec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcdldknm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hganjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhhkapeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojglhm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qejpoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehaolpke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpeiligo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fihfnp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjkibehc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ngcanq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdkaabnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckjamgmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmkihbho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aedlhg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjlof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pehebbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ablbjj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmgfgham.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bphooc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cglcek32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jibpghbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apclnj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akdafn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajldkhjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chggdoee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkjnenbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifbkgj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blaobmkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clefdcog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Heqimm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qdpohodn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceickb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flfnhnfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eheglk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Epnhpglg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iickckcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mioeeifi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpfke32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imjkpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ageompfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnhbmpkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igceej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdgkjopd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enhaeldn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofdeeb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcppgbjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ipjdameg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmcjedcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oimmjffj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcbnpgkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojblbgdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dilchhgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lffmpp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjnjqb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdeoccgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pecelm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Binikb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpafgp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inhoegqc.exe -
Modifies registry class 64 IoCs
Processes:
67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exeGjjafkpe.exeHlbpme32.exeFqhclqnc.exeFejifdab.exeFlfnhnfm.exeFhljkm32.exeMkofaj32.exeOmbddbah.exeDoabjbci.exeGgdekbgb.exeCnabffeo.exeKbmafngi.exeKbpnkm32.exeDpeiligo.exeCcbbachm.exeFihfnp32.exeHoqjqhjf.exeNnokahip.exeIhbdhepp.exeFkqlgc32.exeHjohmbpd.exeDfpfke32.exeEpbbkf32.exeHijhhl32.exeEgmabg32.exeLhhkapeh.exeQekbgbpf.exeLffmpp32.exeEnngdgim.exeLlomfpag.exeNgjlpmnn.exeJfjhbo32.exeHdeoccgn.exeJmgfgham.exeMioeeifi.exeFapeic32.exeJpmmfp32.exeJnbpqb32.exeDkgldm32.exeLjplkonl.exeLefikg32.exeNggggoda.exeHmdkjmip.exeAedlhg32.exeBceeqi32.exeBkqiek32.exeIdbnmgll.exeCeickb32.exeBnapnm32.exeDmebcgbb.exeGpogiglp.exeMiclhpjp.exeQfikod32.exeOimmjffj.exeAanibhoh.exeDilchhgg.exePimkbbpi.exeFakdcnhh.exeIickckcl.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjjafkpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlbpme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqhclqnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fejifdab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flfnhnfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fhljkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkofaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olnmgo32.dll" Ombddbah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Doabjbci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggdekbgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnabffeo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbmafngi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nfhkkc32.dll" Kbpnkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpeiligo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccbbachm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnebcm32.dll" Fihfnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hoqjqhjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnokahip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjhoogoe.dll" Ihbdhepp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fkqlgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjcijlpq.dll" Hjohmbpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfpfke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdbampij.dll" Epbbkf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hijhhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbmafngi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egmabg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhhkapeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qekbgbpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lffmpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enngdgim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llomfpag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngjlpmnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glmmpgoa.dll" Jfjhbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdeoccgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qfldmeci.dll" Jmgfgham.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mioeeifi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nfnidhlj.dll" Fapeic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chlojnpb.dll" Jpmmfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbbofa32.dll" Llomfpag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oebblmoe.dll" Hijhhl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnbpqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kabgha32.dll" Dkgldm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljplkonl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lefikg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nggggoda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmdkjmip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbdmdd32.dll" Aedlhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bceeqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkqiek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idbnmgll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfapgnji.dll" Ceickb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnapnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocpbal32.dll" Mkofaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmebcgbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpogiglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqnablhp.dll" Miclhpjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okfimp32.dll" Qfikod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oimmjffj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aanibhoh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dilchhgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pimkbbpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nidjhoea.dll" Fakdcnhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iickckcl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exeAoagccfn.exeBkhhhd32.exeCfkloq32.exeCbblda32.exeCkjamgmk.exeDpeiligo.exeEheglk32.exeElcpbigl.exeEgmabg32.exeFapeic32.exeFhljkm32.exeGgfpgi32.exeGfkmie32.exeHcdgmimg.exeHkolakkb.exedescription pid process target process PID 516 wrote to memory of 3028 516 67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe Aoagccfn.exe PID 516 wrote to memory of 3028 516 67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe Aoagccfn.exe PID 516 wrote to memory of 3028 516 67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe Aoagccfn.exe PID 516 wrote to memory of 3028 516 67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe Aoagccfn.exe PID 3028 wrote to memory of 1700 3028 Aoagccfn.exe Bkhhhd32.exe PID 3028 wrote to memory of 1700 3028 Aoagccfn.exe Bkhhhd32.exe PID 3028 wrote to memory of 1700 3028 Aoagccfn.exe Bkhhhd32.exe PID 3028 wrote to memory of 1700 3028 Aoagccfn.exe Bkhhhd32.exe PID 1700 wrote to memory of 2424 1700 Bkhhhd32.exe Cfkloq32.exe PID 1700 wrote to memory of 2424 1700 Bkhhhd32.exe Cfkloq32.exe PID 1700 wrote to memory of 2424 1700 Bkhhhd32.exe Cfkloq32.exe PID 1700 wrote to memory of 2424 1700 Bkhhhd32.exe Cfkloq32.exe PID 2424 wrote to memory of 2784 2424 Cfkloq32.exe Cbblda32.exe PID 2424 wrote to memory of 2784 2424 Cfkloq32.exe Cbblda32.exe PID 2424 wrote to memory of 2784 2424 Cfkloq32.exe Cbblda32.exe PID 2424 wrote to memory of 2784 2424 Cfkloq32.exe Cbblda32.exe PID 2784 wrote to memory of 2928 2784 Cbblda32.exe Ckjamgmk.exe PID 2784 wrote to memory of 2928 2784 Cbblda32.exe Ckjamgmk.exe PID 2784 wrote to memory of 2928 2784 Cbblda32.exe Ckjamgmk.exe PID 2784 wrote to memory of 2928 2784 Cbblda32.exe Ckjamgmk.exe PID 2928 wrote to memory of 2744 2928 Ckjamgmk.exe Dpeiligo.exe PID 2928 wrote to memory of 2744 2928 Ckjamgmk.exe Dpeiligo.exe PID 2928 wrote to memory of 2744 2928 Ckjamgmk.exe Dpeiligo.exe PID 2928 wrote to memory of 2744 2928 Ckjamgmk.exe Dpeiligo.exe PID 2744 wrote to memory of 2132 2744 Dpeiligo.exe Eheglk32.exe PID 2744 wrote to memory of 2132 2744 Dpeiligo.exe Eheglk32.exe PID 2744 wrote to memory of 2132 2744 Dpeiligo.exe Eheglk32.exe PID 2744 wrote to memory of 2132 2744 Dpeiligo.exe Eheglk32.exe PID 2132 wrote to memory of 1104 2132 Eheglk32.exe Elcpbigl.exe PID 2132 wrote to memory of 1104 2132 Eheglk32.exe Elcpbigl.exe PID 2132 wrote to memory of 1104 2132 Eheglk32.exe Elcpbigl.exe PID 2132 wrote to memory of 1104 2132 Eheglk32.exe Elcpbigl.exe PID 1104 wrote to memory of 1196 1104 Elcpbigl.exe Egmabg32.exe PID 1104 wrote to memory of 1196 1104 Elcpbigl.exe Egmabg32.exe PID 1104 wrote to memory of 1196 1104 Elcpbigl.exe Egmabg32.exe PID 1104 wrote to memory of 1196 1104 Elcpbigl.exe Egmabg32.exe PID 1196 wrote to memory of 2692 1196 Egmabg32.exe Fapeic32.exe PID 1196 wrote to memory of 2692 1196 Egmabg32.exe Fapeic32.exe PID 1196 wrote to memory of 2692 1196 Egmabg32.exe Fapeic32.exe PID 1196 wrote to memory of 2692 1196 Egmabg32.exe Fapeic32.exe PID 2692 wrote to memory of 2732 2692 Fapeic32.exe Fhljkm32.exe PID 2692 wrote to memory of 2732 2692 Fapeic32.exe Fhljkm32.exe PID 2692 wrote to memory of 2732 2692 Fapeic32.exe Fhljkm32.exe PID 2692 wrote to memory of 2732 2692 Fapeic32.exe Fhljkm32.exe PID 2732 wrote to memory of 2996 2732 Fhljkm32.exe Ggfpgi32.exe PID 2732 wrote to memory of 2996 2732 Fhljkm32.exe Ggfpgi32.exe PID 2732 wrote to memory of 2996 2732 Fhljkm32.exe Ggfpgi32.exe PID 2732 wrote to memory of 2996 2732 Fhljkm32.exe Ggfpgi32.exe PID 2996 wrote to memory of 3000 2996 Ggfpgi32.exe Gfkmie32.exe PID 2996 wrote to memory of 3000 2996 Ggfpgi32.exe Gfkmie32.exe PID 2996 wrote to memory of 3000 2996 Ggfpgi32.exe Gfkmie32.exe PID 2996 wrote to memory of 3000 2996 Ggfpgi32.exe Gfkmie32.exe PID 3000 wrote to memory of 2220 3000 Gfkmie32.exe Hcdgmimg.exe PID 3000 wrote to memory of 2220 3000 Gfkmie32.exe Hcdgmimg.exe PID 3000 wrote to memory of 2220 3000 Gfkmie32.exe Hcdgmimg.exe PID 3000 wrote to memory of 2220 3000 Gfkmie32.exe Hcdgmimg.exe PID 2220 wrote to memory of 1252 2220 Hcdgmimg.exe Hkolakkb.exe PID 2220 wrote to memory of 1252 2220 Hcdgmimg.exe Hkolakkb.exe PID 2220 wrote to memory of 1252 2220 Hcdgmimg.exe Hkolakkb.exe PID 2220 wrote to memory of 1252 2220 Hcdgmimg.exe Hkolakkb.exe PID 1252 wrote to memory of 2672 1252 Hkolakkb.exe Imjkpb32.exe PID 1252 wrote to memory of 2672 1252 Hkolakkb.exe Imjkpb32.exe PID 1252 wrote to memory of 2672 1252 Hkolakkb.exe Imjkpb32.exe PID 1252 wrote to memory of 2672 1252 Hkolakkb.exe Imjkpb32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe"C:\Users\Admin\AppData\Local\Temp\67db83146172b184d515791fb5c52f98b94d79e45375cb9ffd7a1cee44d28270.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\Aoagccfn.exeC:\Windows\system32\Aoagccfn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Bkhhhd32.exeC:\Windows\system32\Bkhhhd32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\Cfkloq32.exeC:\Windows\system32\Cfkloq32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\Cbblda32.exeC:\Windows\system32\Cbblda32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Ckjamgmk.exeC:\Windows\system32\Ckjamgmk.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\Dpeiligo.exeC:\Windows\system32\Dpeiligo.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Eheglk32.exeC:\Windows\system32\Eheglk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Elcpbigl.exeC:\Windows\system32\Elcpbigl.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\Egmabg32.exeC:\Windows\system32\Egmabg32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Fapeic32.exeC:\Windows\system32\Fapeic32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\Fhljkm32.exeC:\Windows\system32\Fhljkm32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Ggfpgi32.exeC:\Windows\system32\Ggfpgi32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Gfkmie32.exeC:\Windows\system32\Gfkmie32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\Hcdgmimg.exeC:\Windows\system32\Hcdgmimg.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Hkolakkb.exeC:\Windows\system32\Hkolakkb.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\Imjkpb32.exeC:\Windows\system32\Imjkpb32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\Ipjdameg.exeC:\Windows\system32\Ipjdameg.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\SysWOW64\Inbnhihl.exeC:\Windows\system32\Inbnhihl.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1476 -
C:\Windows\SysWOW64\Joggci32.exeC:\Windows\system32\Joggci32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:880 -
C:\Windows\SysWOW64\Jlkglm32.exeC:\Windows\system32\Jlkglm32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1536 -
C:\Windows\SysWOW64\Jpmmfp32.exeC:\Windows\system32\Jpmmfp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1980 -
C:\Windows\SysWOW64\Kmcjedcg.exeC:\Windows\system32\Kmcjedcg.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\Kijkje32.exeC:\Windows\system32\Kijkje32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\Kpfplo32.exeC:\Windows\system32\Kpfplo32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2484 -
C:\Windows\SysWOW64\Kcginj32.exeC:\Windows\system32\Kcginj32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2320 -
C:\Windows\SysWOW64\Llomfpag.exeC:\Windows\system32\Llomfpag.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Lhhkapeh.exeC:\Windows\system32\Lhhkapeh.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:596 -
C:\Windows\SysWOW64\Lpflkb32.exeC:\Windows\system32\Lpflkb32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Windows\SysWOW64\Mjqmig32.exeC:\Windows\system32\Mjqmig32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2872 -
C:\Windows\SysWOW64\Mfgnnhkc.exeC:\Windows\system32\Mfgnnhkc.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Mhhgpc32.exeC:\Windows\system32\Mhhgpc32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1232 -
C:\Windows\SysWOW64\Mgmdapml.exeC:\Windows\system32\Mgmdapml.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\Nqhepeai.exeC:\Windows\system32\Nqhepeai.exe34⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\Ndfnecgp.exeC:\Windows\system32\Ndfnecgp.exe35⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\Nggggoda.exeC:\Windows\system32\Nggggoda.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Ncmglp32.exeC:\Windows\system32\Ncmglp32.exe37⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\SysWOW64\Oimmjffj.exeC:\Windows\system32\Oimmjffj.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1296 -
C:\Windows\SysWOW64\Oniebmda.exeC:\Windows\system32\Oniebmda.exe39⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\Ojbbmnhc.exeC:\Windows\system32\Ojbbmnhc.exe40⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\Odkgec32.exeC:\Windows\system32\Odkgec32.exe41⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\Onqkclni.exeC:\Windows\system32\Onqkclni.exe42⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\SysWOW64\Ojglhm32.exeC:\Windows\system32\Ojglhm32.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\Pfbfhm32.exeC:\Windows\system32\Pfbfhm32.exe44⤵
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\Ppkjac32.exeC:\Windows\system32\Ppkjac32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:960 -
C:\Windows\SysWOW64\Qejpoi32.exeC:\Windows\system32\Qejpoi32.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\SysWOW64\Qhilkege.exeC:\Windows\system32\Qhilkege.exe47⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Qemldifo.exeC:\Windows\system32\Qemldifo.exe48⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\Adaiee32.exeC:\Windows\system32\Adaiee32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2236 -
C:\Windows\SysWOW64\Anjnnk32.exeC:\Windows\system32\Anjnnk32.exe50⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Agbbgqhh.exeC:\Windows\system32\Agbbgqhh.exe51⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Ageompfe.exeC:\Windows\system32\Ageompfe.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\Bjjaikoa.exeC:\Windows\system32\Bjjaikoa.exe53⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\Bhonjg32.exeC:\Windows\system32\Bhonjg32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\Bnlgbnbp.exeC:\Windows\system32\Bnlgbnbp.exe55⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\Bdfooh32.exeC:\Windows\system32\Bdfooh32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\Bolcma32.exeC:\Windows\system32\Bolcma32.exe57⤵
- Executes dropped EXE
PID:672 -
C:\Windows\SysWOW64\Bqmpdioa.exeC:\Windows\system32\Bqmpdioa.exe58⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Bnapnm32.exeC:\Windows\system32\Bnapnm32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Cgidfcdk.exeC:\Windows\system32\Cgidfcdk.exe60⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Cqaiph32.exeC:\Windows\system32\Cqaiph32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2144 -
C:\Windows\SysWOW64\Cnejim32.exeC:\Windows\system32\Cnejim32.exe62⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\Ccbbachm.exeC:\Windows\system32\Ccbbachm.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Cfanmogq.exeC:\Windows\system32\Cfanmogq.exe64⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Cceogcfj.exeC:\Windows\system32\Cceogcfj.exe65⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\Cmmcpi32.exeC:\Windows\system32\Cmmcpi32.exe66⤵PID:2288
-
C:\Windows\SysWOW64\Cidddj32.exeC:\Windows\system32\Cidddj32.exe67⤵PID:2364
-
C:\Windows\SysWOW64\Dnqlmq32.exeC:\Windows\system32\Dnqlmq32.exe68⤵PID:2540
-
C:\Windows\SysWOW64\Dgiaefgg.exeC:\Windows\system32\Dgiaefgg.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2568 -
C:\Windows\SysWOW64\Daaenlng.exeC:\Windows\system32\Daaenlng.exe70⤵PID:2724
-
C:\Windows\SysWOW64\Dnefhpma.exeC:\Windows\system32\Dnefhpma.exe71⤵PID:2880
-
C:\Windows\SysWOW64\Dcbnpgkh.exeC:\Windows\system32\Dcbnpgkh.exe72⤵
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\Dnhbmpkn.exeC:\Windows\system32\Dnhbmpkn.exe73⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\Deakjjbk.exeC:\Windows\system32\Deakjjbk.exe74⤵PID:2612
-
C:\Windows\SysWOW64\Dahkok32.exeC:\Windows\system32\Dahkok32.exe75⤵PID:536
-
C:\Windows\SysWOW64\Efedga32.exeC:\Windows\system32\Efedga32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2836 -
C:\Windows\SysWOW64\Epnhpglg.exeC:\Windows\system32\Epnhpglg.exe77⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\Emaijk32.exeC:\Windows\system32\Emaijk32.exe78⤵PID:1828
-
C:\Windows\SysWOW64\Efjmbaba.exeC:\Windows\system32\Efjmbaba.exe79⤵PID:1824
-
C:\Windows\SysWOW64\Epbbkf32.exeC:\Windows\system32\Epbbkf32.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:976 -
C:\Windows\SysWOW64\Eikfdl32.exeC:\Windows\system32\Eikfdl32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1320 -
C:\Windows\SysWOW64\Epeoaffo.exeC:\Windows\system32\Epeoaffo.exe82⤵PID:2180
-
C:\Windows\SysWOW64\Ehpcehcj.exeC:\Windows\system32\Ehpcehcj.exe83⤵PID:2716
-
C:\Windows\SysWOW64\Fkqlgc32.exeC:\Windows\system32\Fkqlgc32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Fakdcnhh.exeC:\Windows\system32\Fakdcnhh.exe85⤵
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Fkcilc32.exeC:\Windows\system32\Fkcilc32.exe86⤵PID:2052
-
C:\Windows\SysWOW64\Fdkmeiei.exeC:\Windows\system32\Fdkmeiei.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2500 -
C:\Windows\SysWOW64\Fihfnp32.exeC:\Windows\system32\Fihfnp32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2908 -
C:\Windows\SysWOW64\Fdnjkh32.exeC:\Windows\system32\Fdnjkh32.exe89⤵PID:2652
-
C:\Windows\SysWOW64\Fliook32.exeC:\Windows\system32\Fliook32.exe90⤵
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\SysWOW64\Feachqgb.exeC:\Windows\system32\Feachqgb.exe91⤵PID:2804
-
C:\Windows\SysWOW64\Gpggei32.exeC:\Windows\system32\Gpggei32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1992 -
C:\Windows\SysWOW64\Ghbljk32.exeC:\Windows\system32\Ghbljk32.exe93⤵
- Drops file in System32 directory
PID:1176 -
C:\Windows\SysWOW64\Gcgqgd32.exeC:\Windows\system32\Gcgqgd32.exe94⤵PID:1884
-
C:\Windows\SysWOW64\Gonale32.exeC:\Windows\system32\Gonale32.exe95⤵PID:3012
-
C:\Windows\SysWOW64\Glbaei32.exeC:\Windows\system32\Glbaei32.exe96⤵PID:2196
-
C:\Windows\SysWOW64\Gglbfg32.exeC:\Windows\system32\Gglbfg32.exe97⤵PID:2004
-
C:\Windows\SysWOW64\Hdbpekam.exeC:\Windows\system32\Hdbpekam.exe98⤵PID:1152
-
C:\Windows\SysWOW64\Hjohmbpd.exeC:\Windows\system32\Hjohmbpd.exe99⤵
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\Hjaeba32.exeC:\Windows\system32\Hjaeba32.exe100⤵
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\Hjcaha32.exeC:\Windows\system32\Hjcaha32.exe101⤵PID:1404
-
C:\Windows\SysWOW64\Hoqjqhjf.exeC:\Windows\system32\Hoqjqhjf.exe102⤵
- Modifies registry class
PID:1716 -
C:\Windows\SysWOW64\Hmdkjmip.exeC:\Windows\system32\Hmdkjmip.exe103⤵
- Modifies registry class
PID:2580 -
C:\Windows\SysWOW64\Icncgf32.exeC:\Windows\system32\Icncgf32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1376 -
C:\Windows\SysWOW64\Iinhdmma.exeC:\Windows\system32\Iinhdmma.exe105⤵PID:2736
-
C:\Windows\SysWOW64\Igceej32.exeC:\Windows\system32\Igceej32.exe106⤵
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\Iamfdo32.exeC:\Windows\system32\Iamfdo32.exe107⤵
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\Jjhgbd32.exeC:\Windows\system32\Jjhgbd32.exe108⤵PID:1624
-
C:\Windows\SysWOW64\Jfohgepi.exeC:\Windows\system32\Jfohgepi.exe109⤵PID:2920
-
C:\Windows\SysWOW64\Jmkmjoec.exeC:\Windows\system32\Jmkmjoec.exe110⤵PID:2472
-
C:\Windows\SysWOW64\Kmkihbho.exeC:\Windows\system32\Kmkihbho.exe111⤵
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\Llpfjomf.exeC:\Windows\system32\Llpfjomf.exe112⤵PID:2212
-
C:\Windows\SysWOW64\Lifcib32.exeC:\Windows\system32\Lifcib32.exe113⤵PID:2840
-
C:\Windows\SysWOW64\Lemdncoa.exeC:\Windows\system32\Lemdncoa.exe114⤵
- Drops file in System32 directory
PID:2600 -
C:\Windows\SysWOW64\Lofifi32.exeC:\Windows\system32\Lofifi32.exe115⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:560 -
C:\Windows\SysWOW64\Lohelidp.exeC:\Windows\system32\Lohelidp.exe116⤵PID:1912
-
C:\Windows\SysWOW64\Mkofaj32.exeC:\Windows\system32\Mkofaj32.exe117⤵
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Mdgkjopd.exeC:\Windows\system32\Mdgkjopd.exe118⤵
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\Mnblhddb.exeC:\Windows\system32\Mnblhddb.exe119⤵PID:1668
-
C:\Windows\SysWOW64\Mfmqmgbm.exeC:\Windows\system32\Mfmqmgbm.exe120⤵PID:2644
-
C:\Windows\SysWOW64\Mjkibehc.exeC:\Windows\system32\Mjkibehc.exe121⤵
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\Nllbdp32.exeC:\Windows\system32\Nllbdp32.exe122⤵PID:1660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-