Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe
Resource
win10v2004-20241007-en
General
-
Target
885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe
-
Size
391KB
-
MD5
e01ea6fb7af629fc1e674e14b80a169b
-
SHA1
bf030a9fe73630a68e15a610f7bb3aa3ce0bedf8
-
SHA256
885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a
-
SHA512
a1dd21da99cb4a9392fa258b21f4b7c81551be718108fafe9f80038a7701833d102326a14e394c5a8cb30de2bc90ebeebad30f7cda6513a052b5447ac866fb49
-
SSDEEP
6144:SKAS08WMJNgh+pTaAfbAfNtTAfMAfFAfNPUmKyIxLfYeOO9UmKyIxL4:B08WE4QmNtuhUNP3cOK3b
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Lmbabj32.exeLadgkmlj.exeEnkdda32.exeFjdnne32.exeJcocgkbp.exeBimbql32.exeDnhgoa32.exeIhpgce32.exeEkfaij32.exeEdofbpja.exeMfceom32.exeHmiljb32.exeGoocenaa.exeBlaobmkq.exeEjlnjg32.exeEngjkeab.exeNianjl32.exeFpcblkje.exeHlkcbp32.exeIgkjcm32.exeClinfk32.exeJjneoeeh.exeNkjdcp32.exeCimooo32.exeGibkmgcj.exeMomapqgn.exeApkbnibq.exeBldpiifb.exeEmhnqbjo.exeFfboohnm.exeEfkbdbai.exeEcobmg32.exeFjaqhe32.exeHhopgkin.exeJmlobg32.exeDnfjiali.exeKenjgi32.exeLmckeidj.exeJdjgfomh.exeLqgjkbop.exeNlapaapg.exeHlpchfdi.exeChjmmnnb.exeGlfjgaih.exeLflonn32.exeOkcchbnn.exeCcecheeb.exeJbhhkn32.exeOmqjgl32.exeJnbkodci.exe885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exeJndflk32.exeFbpfeh32.exeOajopl32.exeIkoehj32.exeGpgjnbnl.exeHmfmkjdf.exeMpcgbhig.exePalbgn32.exeFelekcop.exeKfaljjdj.exeNpiiafpa.exeDcepgh32.exeJcckibfg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmbabj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ladgkmlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Enkdda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjdnne32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcocgkbp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bimbql32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnhgoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ihpgce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekfaij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Edofbpja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfceom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hmiljb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goocenaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blaobmkq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejlnjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Engjkeab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nianjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpcblkje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hlkcbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Igkjcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Clinfk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjneoeeh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkjdcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cimooo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gibkmgcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Momapqgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apkbnibq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bldpiifb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Emhnqbjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ffboohnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Efkbdbai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecobmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjaqhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hhopgkin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmlobg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnfjiali.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kenjgi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmckeidj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdjgfomh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lqgjkbop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlapaapg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlpchfdi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chjmmnnb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glfjgaih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lflonn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okcchbnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccecheeb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbhhkn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omqjgl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnbkodci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jndflk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbpfeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oajopl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ikoehj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpgjnbnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmfmkjdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mpcgbhig.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Palbgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Felekcop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kfaljjdj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npiiafpa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcepgh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcckibfg.exe -
Executes dropped EXE 64 IoCs
Processes:
Boleejag.exeCamnge32.exeCdkkcp32.exeCjhckg32.exeCfcmlg32.exeCcgnelll.exeDhdfmbjc.exeDonojm32.exeDdkgbc32.exeDoqkpl32.exeDdmchcnd.exeDkgldm32.exeDqddmd32.exeDgnminke.exeDbdagg32.exeDcemnopj.exeDnjalhpp.exeEgcfdn32.exeFhjhdp32.exeGminbfoh.exeGpgjnbnl.exeGfcopl32.exeGibkmgcj.exeGoocenaa.exeGampaipe.exeHmfmkjdf.exeHememgdi.exeHipkfkgh.exeHpicbe32.exeHlpchfdi.exeHehhqk32.exeIcoepohq.exeIaaekl32.exeIlifndlo.exeIafofkkf.exeIhpgce32.exeIojopp32.exeJcleiclo.exeJkcmjpma.exeJndflk32.exeJoebccpp.exeJmibmhoj.exeJcckibfg.exeJmlobg32.exeJbhhkn32.exeJibpghbk.exeKnohpo32.exeKkciic32.exeKapaaj32.exeKndbko32.exeKenjgi32.exeKglfcd32.exeKnfopnkk.exeKaekljjo.exeKgocid32.exeKaggbihl.exeLcedne32.exeLfdpjp32.exeLmnhgjmp.exeLaidgi32.exeLffmpp32.exeLmpeljkm.exeLdjmidcj.exeLfhiepbn.exepid process 2656 Boleejag.exe 2676 Camnge32.exe 2176 Cdkkcp32.exe 2716 Cjhckg32.exe 2624 Cfcmlg32.exe 1212 Ccgnelll.exe 2648 Dhdfmbjc.exe 2536 Donojm32.exe 1708 Ddkgbc32.exe 2832 Doqkpl32.exe 2368 Ddmchcnd.exe 2316 Dkgldm32.exe 2816 Dqddmd32.exe 596 Dgnminke.exe 548 Dbdagg32.exe 264 Dcemnopj.exe 1348 Dnjalhpp.exe 2020 Egcfdn32.exe 1396 Fhjhdp32.exe 1972 Gminbfoh.exe 2984 Gpgjnbnl.exe 764 Gfcopl32.exe 1700 Gibkmgcj.exe 2800 Goocenaa.exe 1992 Gampaipe.exe 2340 Hmfmkjdf.exe 2768 Hememgdi.exe 1612 Hipkfkgh.exe 2848 Hpicbe32.exe 2688 Hlpchfdi.exe 1336 Hehhqk32.exe 2892 Icoepohq.exe 2412 Iaaekl32.exe 1160 Ilifndlo.exe 2868 Iafofkkf.exe 2336 Ihpgce32.exe 796 Iojopp32.exe 2192 Jcleiclo.exe 1492 Jkcmjpma.exe 1824 Jndflk32.exe 2900 Joebccpp.exe 2520 Jmibmhoj.exe 2016 Jcckibfg.exe 2132 Jmlobg32.exe 2976 Jbhhkn32.exe 1304 Jibpghbk.exe 1604 Knohpo32.exe 648 Kkciic32.exe 2304 Kapaaj32.exe 1064 Kndbko32.exe 2464 Kenjgi32.exe 2680 Kglfcd32.exe 2224 Knfopnkk.exe 2548 Kaekljjo.exe 2564 Kgocid32.exe 1908 Kaggbihl.exe 1488 Lcedne32.exe 2896 Lfdpjp32.exe 2424 Lmnhgjmp.exe 2400 Laidgi32.exe 2388 Lffmpp32.exe 2796 Lmpeljkm.exe 1100 Ldjmidcj.exe 2120 Lfhiepbn.exe -
Loads dropped DLL 64 IoCs
Processes:
885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exeBoleejag.exeCamnge32.exeCdkkcp32.exeCjhckg32.exeCfcmlg32.exeCcgnelll.exeDhdfmbjc.exeDonojm32.exeDdkgbc32.exeDoqkpl32.exeDdmchcnd.exeDkgldm32.exeDqddmd32.exeDgnminke.exeDbdagg32.exeDcemnopj.exeDnjalhpp.exeEgcfdn32.exeFhjhdp32.exeGminbfoh.exeGpgjnbnl.exeGfcopl32.exeGibkmgcj.exeGoocenaa.exeGampaipe.exeHmfmkjdf.exeHememgdi.exeHipkfkgh.exeHpicbe32.exeHlpchfdi.exeHehhqk32.exepid process 2644 885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe 2644 885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe 2656 Boleejag.exe 2656 Boleejag.exe 2676 Camnge32.exe 2676 Camnge32.exe 2176 Cdkkcp32.exe 2176 Cdkkcp32.exe 2716 Cjhckg32.exe 2716 Cjhckg32.exe 2624 Cfcmlg32.exe 2624 Cfcmlg32.exe 1212 Ccgnelll.exe 1212 Ccgnelll.exe 2648 Dhdfmbjc.exe 2648 Dhdfmbjc.exe 2536 Donojm32.exe 2536 Donojm32.exe 1708 Ddkgbc32.exe 1708 Ddkgbc32.exe 2832 Doqkpl32.exe 2832 Doqkpl32.exe 2368 Ddmchcnd.exe 2368 Ddmchcnd.exe 2316 Dkgldm32.exe 2316 Dkgldm32.exe 2816 Dqddmd32.exe 2816 Dqddmd32.exe 596 Dgnminke.exe 596 Dgnminke.exe 548 Dbdagg32.exe 548 Dbdagg32.exe 264 Dcemnopj.exe 264 Dcemnopj.exe 1348 Dnjalhpp.exe 1348 Dnjalhpp.exe 2020 Egcfdn32.exe 2020 Egcfdn32.exe 1396 Fhjhdp32.exe 1396 Fhjhdp32.exe 1972 Gminbfoh.exe 1972 Gminbfoh.exe 2984 Gpgjnbnl.exe 2984 Gpgjnbnl.exe 764 Gfcopl32.exe 764 Gfcopl32.exe 1700 Gibkmgcj.exe 1700 Gibkmgcj.exe 2800 Goocenaa.exe 2800 Goocenaa.exe 1992 Gampaipe.exe 1992 Gampaipe.exe 2340 Hmfmkjdf.exe 2340 Hmfmkjdf.exe 2768 Hememgdi.exe 2768 Hememgdi.exe 1612 Hipkfkgh.exe 1612 Hipkfkgh.exe 2848 Hpicbe32.exe 2848 Hpicbe32.exe 2688 Hlpchfdi.exe 2688 Hlpchfdi.exe 1336 Hehhqk32.exe 1336 Hehhqk32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Holldk32.exeMjlejl32.exeNgcanq32.exeMeeopdhb.exeMjgqcj32.exePkfghh32.exeQjgcecja.exeHbpbck32.exeCfcmlg32.exeHpicbe32.exeNoojdc32.exeNdlbmk32.exeOnipqp32.exeLpiacp32.exeMlbkmdah.exeOeoeplfn.exeKkckblgq.exeLmqgec32.exeLmnkpc32.exeHnflnfbm.exeGampaipe.exeOomjng32.exeHbboiknb.exeOkcchbnn.exeCcecheeb.exeEcobmg32.exeDdkgbc32.exeLcedne32.exeNlanhh32.exeFcdbcloi.exeIgkjcm32.exeBnhncclq.exeEpipql32.exeFpcblkje.exeMokdja32.exePecelm32.exeEbnmpemq.exeIhdmld32.exeKbeqjl32.exeNpcika32.exeOhjmlaci.exeOdckfb32.exeOpjlkc32.exeIafofkkf.exeKnoaeimg.exeNkjdcp32.exeKndbko32.exeKglfcd32.exeLimhpihl.exePqbifhjb.exeLfhiepbn.exeDgfpni32.exeMddibb32.exeNbfobllj.exeEnkdda32.exeFhjhdp32.exePigklmqc.exeNpnclf32.exeBlgeahoo.exeBbfgiabg.exeLfkhch32.exeMmpcdfem.exedescription ioc process File created C:\Windows\SysWOW64\Abjhjbbl.dll Holldk32.exe File created C:\Windows\SysWOW64\Dbcgao32.dll Mjlejl32.exe File opened for modification C:\Windows\SysWOW64\Nianjl32.exe Ngcanq32.exe File created C:\Windows\SysWOW64\Mnncii32.exe Meeopdhb.exe File opened for modification C:\Windows\SysWOW64\Npcika32.exe Mjgqcj32.exe File opened for modification C:\Windows\SysWOW64\Pcmoie32.exe Pkfghh32.exe File opened for modification C:\Windows\SysWOW64\Qmepanje.exe Qjgcecja.exe File created C:\Windows\SysWOW64\Hogcil32.exe Hbpbck32.exe File created C:\Windows\SysWOW64\Ihbldk32.dll Cfcmlg32.exe File created C:\Windows\SysWOW64\Hlpchfdi.exe Hpicbe32.exe File opened for modification C:\Windows\SysWOW64\Ndlbmk32.exe Noojdc32.exe File created C:\Windows\SysWOW64\Nkfkidmk.exe Ndlbmk32.exe File created C:\Windows\SysWOW64\Nkkndgbj.dll Onipqp32.exe File created C:\Windows\SysWOW64\Cfnmqjah.dll Lpiacp32.exe File created C:\Windows\SysWOW64\Maocekoo.exe Mlbkmdah.exe File created C:\Windows\SysWOW64\Ogdmkmgf.dll Oeoeplfn.exe File created C:\Windows\SysWOW64\Dhmbnh32.dll Kkckblgq.exe File opened for modification C:\Windows\SysWOW64\Lfilnh32.exe Lmqgec32.exe File created C:\Windows\SysWOW64\Lchclmla.exe Lmnkpc32.exe File created C:\Windows\SysWOW64\Hmiljb32.exe Hnflnfbm.exe File created C:\Windows\SysWOW64\Ekhfpeai.dll Lmqgec32.exe File created C:\Windows\SysWOW64\Hmfmkjdf.exe Gampaipe.exe File opened for modification C:\Windows\SysWOW64\Ogdaod32.exe Oomjng32.exe File created C:\Windows\SysWOW64\Hlkcbp32.exe Hbboiknb.exe File created C:\Windows\SysWOW64\Pdkhag32.exe Okcchbnn.exe File opened for modification C:\Windows\SysWOW64\Cgaoic32.exe Ccecheeb.exe File created C:\Windows\SysWOW64\Djakgb32.dll Ecobmg32.exe File created C:\Windows\SysWOW64\Doqkpl32.exe Ddkgbc32.exe File created C:\Windows\SysWOW64\Hginmm32.dll Lcedne32.exe File created C:\Windows\SysWOW64\Himocb32.dll Nlanhh32.exe File created C:\Windows\SysWOW64\Ffboohnm.exe Fcdbcloi.exe File created C:\Windows\SysWOW64\Iijfoh32.exe Igkjcm32.exe File created C:\Windows\SysWOW64\Piffca32.dll Bnhncclq.exe File created C:\Windows\SysWOW64\Ijjhkqme.dll Epipql32.exe File opened for modification C:\Windows\SysWOW64\Fjhgidjk.exe Fpcblkje.exe File opened for modification C:\Windows\SysWOW64\Maiqfl32.exe Mokdja32.exe File created C:\Windows\SysWOW64\Pchbmigj.exe Pecelm32.exe File opened for modification C:\Windows\SysWOW64\Ecoihm32.exe Ebnmpemq.exe File created C:\Windows\SysWOW64\Ialadj32.exe Ihdmld32.exe File opened for modification C:\Windows\SysWOW64\Kfaljjdj.exe Kbeqjl32.exe File opened for modification C:\Windows\SysWOW64\Nbbegl32.exe Npcika32.exe File opened for modification C:\Windows\SysWOW64\Omgfdhbq.exe Ohjmlaci.exe File created C:\Windows\SysWOW64\Dgjoqd32.dll Odckfb32.exe File created C:\Windows\SysWOW64\Iifedg32.dll Opjlkc32.exe File opened for modification C:\Windows\SysWOW64\Ihpgce32.exe Iafofkkf.exe File created C:\Windows\SysWOW64\Kggfnoch.exe Knoaeimg.exe File created C:\Windows\SysWOW64\Neohqicc.exe Nkjdcp32.exe File created C:\Windows\SysWOW64\Kenjgi32.exe Kndbko32.exe File created C:\Windows\SysWOW64\Knfopnkk.exe Kglfcd32.exe File created C:\Windows\SysWOW64\Ladpagin.exe Limhpihl.exe File created C:\Windows\SysWOW64\Pcqebd32.exe Pqbifhjb.exe File created C:\Windows\SysWOW64\Lmbabj32.exe Lfhiepbn.exe File created C:\Windows\SysWOW64\Dlchfp32.exe Dgfpni32.exe File created C:\Windows\SysWOW64\Agiidifg.dll Igkjcm32.exe File created C:\Windows\SysWOW64\Ieaikf32.dll Mddibb32.exe File created C:\Windows\SysWOW64\Ffngbf32.dll Nbfobllj.exe File opened for modification C:\Windows\SysWOW64\Epipql32.exe Enkdda32.exe File created C:\Windows\SysWOW64\Dqgchlio.dll Fhjhdp32.exe File created C:\Windows\SysWOW64\Kjknge32.dll Pigklmqc.exe File created C:\Windows\SysWOW64\Noplll32.dll Npnclf32.exe File opened for modification C:\Windows\SysWOW64\Bepjjn32.exe Blgeahoo.exe File created C:\Windows\SysWOW64\Blnkbg32.exe Bbfgiabg.exe File created C:\Windows\SysWOW64\Jqfcla32.dll Lfkhch32.exe File created C:\Windows\SysWOW64\Pbkkql32.dll Mmpcdfem.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5752 5632 WerFault.exe Ockdmn32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Pkfghh32.exeFmdfppkb.exeCkchcc32.exeKggfnoch.exeKhglkqfj.exeJmlobg32.exeMbdcepcm.exeLjgkom32.exeAkgibd32.exeBdcnhk32.exeFppmcmah.exeLfilnh32.exeBldpiifb.exeOemhjlha.exeNkqjdo32.exeOhmalgeb.exeHagepa32.exeKkckblgq.exeApkbnibq.exeEnpdjfgj.exeFcfohlmg.exeIgkjcm32.exePdkhag32.exeAnhbdpje.exeOmjbihpn.exeNphpng32.exeNdlbmk32.exeAgccbenc.exeIdbgbahq.exeJqfhqe32.exeNmjmekan.exeDleelp32.exeGieaef32.exeNepokogo.exeBpfebmia.exeEkhjlioa.exeGdflgo32.exeClnhajlc.exeKnoaeimg.exeKimlqfeq.exeIplnpq32.exeLiekddkh.exeKapaaj32.exeAlmihjlj.exeIkicikap.exeIlkpac32.exeAmmoel32.exeDekeeonn.exeJhqeka32.exeIojopp32.exeMalmllfb.exeBepjjn32.exeJdjgfomh.exeChmibmlo.exeCaenkc32.exeGplebjbk.exeMpqjmh32.exeBaqhapdj.exeKhcbpa32.exeEgcfdn32.exeIkoehj32.exeGibmep32.exeMljnaocd.exeHipkfkgh.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkfghh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmdfppkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckchcc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kggfnoch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khglkqfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmlobg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbdcepcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljgkom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akgibd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdcnhk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fppmcmah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfilnh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bldpiifb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oemhjlha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkqjdo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohmalgeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hagepa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkckblgq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apkbnibq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enpdjfgj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcfohlmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igkjcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdkhag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anhbdpje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omjbihpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nphpng32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndlbmk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agccbenc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idbgbahq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jqfhqe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmjmekan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dleelp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gieaef32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nepokogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpfebmia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekhjlioa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gdflgo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clnhajlc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knoaeimg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kimlqfeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iplnpq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Liekddkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kapaaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Almihjlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikicikap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilkpac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ammoel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dekeeonn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jhqeka32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iojopp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Malmllfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bepjjn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdjgfomh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chmibmlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caenkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gplebjbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpqjmh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baqhapdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khcbpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Egcfdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikoehj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gibmep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mljnaocd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hipkfkgh.exe -
Modifies registry class 64 IoCs
Processes:
Imkeneja.exeImcfjg32.exeNpnclf32.exeCmdaeo32.exeEclfhgaf.exeJcaqmkpn.exeGoocenaa.exeLkmldbcj.exeNokqidll.exeJcgqbq32.exeHengep32.exeJlghpa32.exeOpccallb.exeOnkmfofg.exeOgdaod32.exeChgimh32.exeGdkebolm.exeFcfohlmg.exeGecklbih.exeKgmilmkb.exeCamnge32.exeKaggbihl.exeLcedne32.exeEkddck32.exeMaocekoo.exeAkgibd32.exeDhlogjko.exeMajcoepi.exeCcgnelll.exeMokdja32.exeLjeoimeg.exeMlbkmdah.exeOgmkne32.exeKfaljjdj.exeIcoepohq.exeDkhnmfle.exeGminbfoh.exeDleelp32.exeLaackgka.exeLimhpihl.exeIkoehj32.exeOdckfb32.exeDbdagg32.exeNkaane32.exeBldpiifb.exeJqfhqe32.exeLehfafgp.exeQqbeel32.exeLndqbk32.exePchbmigj.exeCkchcc32.exeDammoahg.exeDhdfmbjc.exeIojopp32.exeMcofid32.exeNipefmkb.exeCjboeenh.exeAmplklmj.exeIkjlmjmp.exeLelljepm.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhdpfo32.dll" Imkeneja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icijhlgk.dll" Imcfjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Npnclf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cmdaeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckkika32.dll" Eclfhgaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jcaqmkpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Goocenaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmiplp32.dll" Lkmldbcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nokqidll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jcgqbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hengep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jlghpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iagiph32.dll" Opccallb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Onkmfofg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ogdaod32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Chgimh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjgdaoen.dll" Gdkebolm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jlghpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fcfohlmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gecklbih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gigpekfk.dll" Kgmilmkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Camnge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kaggbihl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lcedne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lncicbma.dll" Ekddck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Maocekoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Akgibd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhlogjko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glfiinip.dll" Majcoepi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ccgnelll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chbegkhg.dll" Mokdja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ljeoimeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mlbkmdah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpllfe32.dll" Ogmkne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcmodmbk.dll" Kfaljjdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Icoepohq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekddck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igchjiao.dll" Dkhnmfle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdgbdihl.dll" Gminbfoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Piipgfbo.dll" Dleelp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Laackgka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Limhpihl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ikoehj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Odckfb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dbdagg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nkaane32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anfdhfiq.dll" Bldpiifb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jqfhqe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gdkebolm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnhgnpbp.dll" Lehfafgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qqbeel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfigef32.dll" Lndqbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nckopjfk.dll" Pchbmigj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ckchcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebkilnbk.dll" Dammoahg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhdfmbjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iojopp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibaaeg32.dll" Mcofid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nipefmkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cjboeenh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Amplklmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ikjlmjmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lelljepm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Booqgija.dll" Ccgnelll.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exeBoleejag.exeCamnge32.exeCdkkcp32.exeCjhckg32.exeCfcmlg32.exeCcgnelll.exeDhdfmbjc.exeDonojm32.exeDdkgbc32.exeDoqkpl32.exeDdmchcnd.exeDkgldm32.exeDqddmd32.exeDgnminke.exeDbdagg32.exedescription pid process target process PID 2644 wrote to memory of 2656 2644 885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe Boleejag.exe PID 2644 wrote to memory of 2656 2644 885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe Boleejag.exe PID 2644 wrote to memory of 2656 2644 885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe Boleejag.exe PID 2644 wrote to memory of 2656 2644 885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe Boleejag.exe PID 2656 wrote to memory of 2676 2656 Boleejag.exe Camnge32.exe PID 2656 wrote to memory of 2676 2656 Boleejag.exe Camnge32.exe PID 2656 wrote to memory of 2676 2656 Boleejag.exe Camnge32.exe PID 2656 wrote to memory of 2676 2656 Boleejag.exe Camnge32.exe PID 2676 wrote to memory of 2176 2676 Camnge32.exe Cdkkcp32.exe PID 2676 wrote to memory of 2176 2676 Camnge32.exe Cdkkcp32.exe PID 2676 wrote to memory of 2176 2676 Camnge32.exe Cdkkcp32.exe PID 2676 wrote to memory of 2176 2676 Camnge32.exe Cdkkcp32.exe PID 2176 wrote to memory of 2716 2176 Cdkkcp32.exe Cjhckg32.exe PID 2176 wrote to memory of 2716 2176 Cdkkcp32.exe Cjhckg32.exe PID 2176 wrote to memory of 2716 2176 Cdkkcp32.exe Cjhckg32.exe PID 2176 wrote to memory of 2716 2176 Cdkkcp32.exe Cjhckg32.exe PID 2716 wrote to memory of 2624 2716 Cjhckg32.exe Cfcmlg32.exe PID 2716 wrote to memory of 2624 2716 Cjhckg32.exe Cfcmlg32.exe PID 2716 wrote to memory of 2624 2716 Cjhckg32.exe Cfcmlg32.exe PID 2716 wrote to memory of 2624 2716 Cjhckg32.exe Cfcmlg32.exe PID 2624 wrote to memory of 1212 2624 Cfcmlg32.exe Ccgnelll.exe PID 2624 wrote to memory of 1212 2624 Cfcmlg32.exe Ccgnelll.exe PID 2624 wrote to memory of 1212 2624 Cfcmlg32.exe Ccgnelll.exe PID 2624 wrote to memory of 1212 2624 Cfcmlg32.exe Ccgnelll.exe PID 1212 wrote to memory of 2648 1212 Ccgnelll.exe Dhdfmbjc.exe PID 1212 wrote to memory of 2648 1212 Ccgnelll.exe Dhdfmbjc.exe PID 1212 wrote to memory of 2648 1212 Ccgnelll.exe Dhdfmbjc.exe PID 1212 wrote to memory of 2648 1212 Ccgnelll.exe Dhdfmbjc.exe PID 2648 wrote to memory of 2536 2648 Dhdfmbjc.exe Donojm32.exe PID 2648 wrote to memory of 2536 2648 Dhdfmbjc.exe Donojm32.exe PID 2648 wrote to memory of 2536 2648 Dhdfmbjc.exe Donojm32.exe PID 2648 wrote to memory of 2536 2648 Dhdfmbjc.exe Donojm32.exe PID 2536 wrote to memory of 1708 2536 Donojm32.exe Ddkgbc32.exe PID 2536 wrote to memory of 1708 2536 Donojm32.exe Ddkgbc32.exe PID 2536 wrote to memory of 1708 2536 Donojm32.exe Ddkgbc32.exe PID 2536 wrote to memory of 1708 2536 Donojm32.exe Ddkgbc32.exe PID 1708 wrote to memory of 2832 1708 Ddkgbc32.exe Doqkpl32.exe PID 1708 wrote to memory of 2832 1708 Ddkgbc32.exe Doqkpl32.exe PID 1708 wrote to memory of 2832 1708 Ddkgbc32.exe Doqkpl32.exe PID 1708 wrote to memory of 2832 1708 Ddkgbc32.exe Doqkpl32.exe PID 2832 wrote to memory of 2368 2832 Doqkpl32.exe Ddmchcnd.exe PID 2832 wrote to memory of 2368 2832 Doqkpl32.exe Ddmchcnd.exe PID 2832 wrote to memory of 2368 2832 Doqkpl32.exe Ddmchcnd.exe PID 2832 wrote to memory of 2368 2832 Doqkpl32.exe Ddmchcnd.exe PID 2368 wrote to memory of 2316 2368 Ddmchcnd.exe Dkgldm32.exe PID 2368 wrote to memory of 2316 2368 Ddmchcnd.exe Dkgldm32.exe PID 2368 wrote to memory of 2316 2368 Ddmchcnd.exe Dkgldm32.exe PID 2368 wrote to memory of 2316 2368 Ddmchcnd.exe Dkgldm32.exe PID 2316 wrote to memory of 2816 2316 Dkgldm32.exe Dqddmd32.exe PID 2316 wrote to memory of 2816 2316 Dkgldm32.exe Dqddmd32.exe PID 2316 wrote to memory of 2816 2316 Dkgldm32.exe Dqddmd32.exe PID 2316 wrote to memory of 2816 2316 Dkgldm32.exe Dqddmd32.exe PID 2816 wrote to memory of 596 2816 Dqddmd32.exe Dgnminke.exe PID 2816 wrote to memory of 596 2816 Dqddmd32.exe Dgnminke.exe PID 2816 wrote to memory of 596 2816 Dqddmd32.exe Dgnminke.exe PID 2816 wrote to memory of 596 2816 Dqddmd32.exe Dgnminke.exe PID 596 wrote to memory of 548 596 Dgnminke.exe Dbdagg32.exe PID 596 wrote to memory of 548 596 Dgnminke.exe Dbdagg32.exe PID 596 wrote to memory of 548 596 Dgnminke.exe Dbdagg32.exe PID 596 wrote to memory of 548 596 Dgnminke.exe Dbdagg32.exe PID 548 wrote to memory of 264 548 Dbdagg32.exe Dcemnopj.exe PID 548 wrote to memory of 264 548 Dbdagg32.exe Dcemnopj.exe PID 548 wrote to memory of 264 548 Dbdagg32.exe Dcemnopj.exe PID 548 wrote to memory of 264 548 Dbdagg32.exe Dcemnopj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe"C:\Users\Admin\AppData\Local\Temp\885d5ff3a1e0eb3dd4c63171e21a6719b6438292ee9c9d35126f321e37a1034a.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Boleejag.exeC:\Windows\system32\Boleejag.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Camnge32.exeC:\Windows\system32\Camnge32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\Cdkkcp32.exeC:\Windows\system32\Cdkkcp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\Cjhckg32.exeC:\Windows\system32\Cjhckg32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Cfcmlg32.exeC:\Windows\system32\Cfcmlg32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Ccgnelll.exeC:\Windows\system32\Ccgnelll.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\Dhdfmbjc.exeC:\Windows\system32\Dhdfmbjc.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\Donojm32.exeC:\Windows\system32\Donojm32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Ddkgbc32.exeC:\Windows\system32\Ddkgbc32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\Doqkpl32.exeC:\Windows\system32\Doqkpl32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\Ddmchcnd.exeC:\Windows\system32\Ddmchcnd.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\Dkgldm32.exeC:\Windows\system32\Dkgldm32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\Dqddmd32.exeC:\Windows\system32\Dqddmd32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Dgnminke.exeC:\Windows\system32\Dgnminke.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\Dbdagg32.exeC:\Windows\system32\Dbdagg32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\Dcemnopj.exeC:\Windows\system32\Dcemnopj.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:264 -
C:\Windows\SysWOW64\Dnjalhpp.exeC:\Windows\system32\Dnjalhpp.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1348 -
C:\Windows\SysWOW64\Egcfdn32.exeC:\Windows\system32\Egcfdn32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\Fhjhdp32.exeC:\Windows\system32\Fhjhdp32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1396 -
C:\Windows\SysWOW64\Gminbfoh.exeC:\Windows\system32\Gminbfoh.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1972 -
C:\Windows\SysWOW64\Gpgjnbnl.exeC:\Windows\system32\Gpgjnbnl.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Windows\SysWOW64\Gfcopl32.exeC:\Windows\system32\Gfcopl32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:764 -
C:\Windows\SysWOW64\Gibkmgcj.exeC:\Windows\system32\Gibkmgcj.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Windows\SysWOW64\Goocenaa.exeC:\Windows\system32\Goocenaa.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2800 -
C:\Windows\SysWOW64\Gampaipe.exeC:\Windows\system32\Gampaipe.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Hmfmkjdf.exeC:\Windows\system32\Hmfmkjdf.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2340 -
C:\Windows\SysWOW64\Hememgdi.exeC:\Windows\system32\Hememgdi.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Windows\SysWOW64\Hipkfkgh.exeC:\Windows\system32\Hipkfkgh.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\Hpicbe32.exeC:\Windows\system32\Hpicbe32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Hlpchfdi.exeC:\Windows\system32\Hlpchfdi.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2688 -
C:\Windows\SysWOW64\Hehhqk32.exeC:\Windows\system32\Hehhqk32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1336 -
C:\Windows\SysWOW64\Icoepohq.exeC:\Windows\system32\Icoepohq.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Iaaekl32.exeC:\Windows\system32\Iaaekl32.exe34⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\Ilifndlo.exeC:\Windows\system32\Ilifndlo.exe35⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\Iafofkkf.exeC:\Windows\system32\Iafofkkf.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2868 -
C:\Windows\SysWOW64\Ihpgce32.exeC:\Windows\system32\Ihpgce32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Iojopp32.exeC:\Windows\system32\Iojopp32.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:796 -
C:\Windows\SysWOW64\Jcleiclo.exeC:\Windows\system32\Jcleiclo.exe39⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\Jkcmjpma.exeC:\Windows\system32\Jkcmjpma.exe40⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\Jndflk32.exeC:\Windows\system32\Jndflk32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\Joebccpp.exeC:\Windows\system32\Joebccpp.exe42⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\Jmibmhoj.exeC:\Windows\system32\Jmibmhoj.exe43⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\SysWOW64\Jcckibfg.exeC:\Windows\system32\Jcckibfg.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\Jmlobg32.exeC:\Windows\system32\Jmlobg32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\Jbhhkn32.exeC:\Windows\system32\Jbhhkn32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\Jibpghbk.exeC:\Windows\system32\Jibpghbk.exe47⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\Knohpo32.exeC:\Windows\system32\Knohpo32.exe48⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\SysWOW64\Kkciic32.exeC:\Windows\system32\Kkciic32.exe49⤵
- Executes dropped EXE
PID:648 -
C:\Windows\SysWOW64\Kapaaj32.exeC:\Windows\system32\Kapaaj32.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\Kndbko32.exeC:\Windows\system32\Kndbko32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\Kenjgi32.exeC:\Windows\system32\Kenjgi32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Kglfcd32.exeC:\Windows\system32\Kglfcd32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\Knfopnkk.exeC:\Windows\system32\Knfopnkk.exe54⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\Kaekljjo.exeC:\Windows\system32\Kaekljjo.exe55⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Kgocid32.exeC:\Windows\system32\Kgocid32.exe56⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\Kaggbihl.exeC:\Windows\system32\Kaggbihl.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\Lcedne32.exeC:\Windows\system32\Lcedne32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\Lfdpjp32.exeC:\Windows\system32\Lfdpjp32.exe59⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\Lmnhgjmp.exeC:\Windows\system32\Lmnhgjmp.exe60⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\Laidgi32.exeC:\Windows\system32\Laidgi32.exe61⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Lffmpp32.exeC:\Windows\system32\Lffmpp32.exe62⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\Lmpeljkm.exeC:\Windows\system32\Lmpeljkm.exe63⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\Ldjmidcj.exeC:\Windows\system32\Ldjmidcj.exe64⤵
- Executes dropped EXE
PID:1100 -
C:\Windows\SysWOW64\Lfhiepbn.exeC:\Windows\system32\Lfhiepbn.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2120 -
C:\Windows\SysWOW64\Lmbabj32.exeC:\Windows\system32\Lmbabj32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2000 -
C:\Windows\SysWOW64\Lodnjboi.exeC:\Windows\system32\Lodnjboi.exe67⤵PID:2028
-
C:\Windows\SysWOW64\Liibgkoo.exeC:\Windows\system32\Liibgkoo.exe68⤵PID:2728
-
C:\Windows\SysWOW64\Llhocfnb.exeC:\Windows\system32\Llhocfnb.exe69⤵PID:1296
-
C:\Windows\SysWOW64\Ladgkmlj.exeC:\Windows\system32\Ladgkmlj.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2060 -
C:\Windows\SysWOW64\Lilomj32.exeC:\Windows\system32\Lilomj32.exe71⤵PID:2684
-
C:\Windows\SysWOW64\Lkmldbcj.exeC:\Windows\system32\Lkmldbcj.exe72⤵
- Modifies registry class
PID:2668 -
C:\Windows\SysWOW64\Mbdcepcm.exeC:\Windows\system32\Mbdcepcm.exe73⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\Mhalngad.exeC:\Windows\system32\Mhalngad.exe74⤵PID:2928
-
C:\Windows\SysWOW64\Mokdja32.exeC:\Windows\system32\Mokdja32.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:1308 -
C:\Windows\SysWOW64\Maiqfl32.exeC:\Windows\system32\Maiqfl32.exe76⤵PID:2956
-
C:\Windows\SysWOW64\Mgfiocfl.exeC:\Windows\system32\Mgfiocfl.exe77⤵PID:2344
-
C:\Windows\SysWOW64\Momapqgn.exeC:\Windows\system32\Momapqgn.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:672 -
C:\Windows\SysWOW64\Malmllfb.exeC:\Windows\system32\Malmllfb.exe79⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\Mheeif32.exeC:\Windows\system32\Mheeif32.exe80⤵PID:1320
-
C:\Windows\SysWOW64\Mmbnam32.exeC:\Windows\system32\Mmbnam32.exe81⤵PID:2468
-
C:\Windows\SysWOW64\Mpqjmh32.exeC:\Windows\system32\Mpqjmh32.exe82⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\Mcofid32.exeC:\Windows\system32\Mcofid32.exe83⤵
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\Mmdkfmjc.exeC:\Windows\system32\Mmdkfmjc.exe84⤵PID:1392
-
C:\Windows\SysWOW64\Mpcgbhig.exeC:\Windows\system32\Mpcgbhig.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2204 -
C:\Windows\SysWOW64\Nepokogo.exeC:\Windows\system32\Nepokogo.exe86⤵
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\Npechhgd.exeC:\Windows\system32\Npechhgd.exe87⤵PID:1520
-
C:\Windows\SysWOW64\Ngoleb32.exeC:\Windows\system32\Ngoleb32.exe88⤵PID:1620
-
C:\Windows\SysWOW64\Neblqoel.exeC:\Windows\system32\Neblqoel.exe89⤵PID:2444
-
C:\Windows\SysWOW64\Nphpng32.exeC:\Windows\system32\Nphpng32.exe90⤵
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\Nokqidll.exeC:\Windows\system32\Nokqidll.exe91⤵
- Modifies registry class
PID:2788 -
C:\Windows\SysWOW64\Nipefmkb.exeC:\Windows\system32\Nipefmkb.exe92⤵
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Nkaane32.exeC:\Windows\system32\Nkaane32.exe93⤵
- Modifies registry class
PID:532 -
C:\Windows\SysWOW64\Negeln32.exeC:\Windows\system32\Negeln32.exe94⤵PID:1660
-
C:\Windows\SysWOW64\Nlanhh32.exeC:\Windows\system32\Nlanhh32.exe95⤵
- Drops file in System32 directory
PID:2156 -
C:\Windows\SysWOW64\Noojdc32.exeC:\Windows\system32\Noojdc32.exe96⤵
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\Ndlbmk32.exeC:\Windows\system32\Ndlbmk32.exe97⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\Nkfkidmk.exeC:\Windows\system32\Nkfkidmk.exe98⤵PID:2288
-
C:\Windows\SysWOW64\Opccallb.exeC:\Windows\system32\Opccallb.exe99⤵
- Modifies registry class
PID:1072 -
C:\Windows\SysWOW64\Ogmkne32.exeC:\Windows\system32\Ogmkne32.exe100⤵
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Ojkhjabc.exeC:\Windows\system32\Ojkhjabc.exe101⤵PID:2712
-
C:\Windows\SysWOW64\Oqepgk32.exeC:\Windows\system32\Oqepgk32.exe102⤵PID:2752
-
C:\Windows\SysWOW64\Occlcg32.exeC:\Windows\system32\Occlcg32.exe103⤵PID:2672
-
C:\Windows\SysWOW64\Onipqp32.exeC:\Windows\system32\Onipqp32.exe104⤵
- Drops file in System32 directory
PID:2568 -
C:\Windows\SysWOW64\Ogaeieoj.exeC:\Windows\system32\Ogaeieoj.exe105⤵PID:1768
-
C:\Windows\SysWOW64\Onkmfofg.exeC:\Windows\system32\Onkmfofg.exe106⤵
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Oqjibkek.exeC:\Windows\system32\Oqjibkek.exe107⤵PID:2184
-
C:\Windows\SysWOW64\Oomjng32.exeC:\Windows\system32\Oomjng32.exe108⤵
- Drops file in System32 directory
PID:560 -
C:\Windows\SysWOW64\Ogdaod32.exeC:\Windows\system32\Ogdaod32.exe109⤵
- Modifies registry class
PID:2296 -
C:\Windows\SysWOW64\Omqjgl32.exeC:\Windows\system32\Omqjgl32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1884 -
C:\Windows\SysWOW64\Ockbdebl.exeC:\Windows\system32\Ockbdebl.exe111⤵PID:2024
-
C:\Windows\SysWOW64\Pigklmqc.exeC:\Windows\system32\Pigklmqc.exe112⤵
- Drops file in System32 directory
PID:1904 -
C:\Windows\SysWOW64\Pkfghh32.exeC:\Windows\system32\Pkfghh32.exe113⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\Pcmoie32.exeC:\Windows\system32\Pcmoie32.exe114⤵PID:1008
-
C:\Windows\SysWOW64\Pijgbl32.exeC:\Windows\system32\Pijgbl32.exe115⤵PID:2836
-
C:\Windows\SysWOW64\Podpoffm.exeC:\Windows\system32\Podpoffm.exe116⤵PID:2580
-
C:\Windows\SysWOW64\Peqhgmdd.exeC:\Windows\system32\Peqhgmdd.exe117⤵PID:2960
-
C:\Windows\SysWOW64\Pgodcich.exeC:\Windows\system32\Pgodcich.exe118⤵PID:1568
-
C:\Windows\SysWOW64\Pnimpcke.exeC:\Windows\system32\Pnimpcke.exe119⤵PID:1956
-
C:\Windows\SysWOW64\Pecelm32.exeC:\Windows\system32\Pecelm32.exe120⤵
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\Pchbmigj.exeC:\Windows\system32\Pchbmigj.exe121⤵
- Modifies registry class
PID:1044 -
C:\Windows\SysWOW64\Pgcnnh32.exeC:\Windows\system32\Pgcnnh32.exe122⤵PID:3016
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-