Analysis
-
max time kernel
34s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe
Resource
win10v2004-20241007-en
General
-
Target
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe
-
Size
320KB
-
MD5
eb8f8ea3eaf332e1b70e050557fae2de
-
SHA1
f96e7294815405824793a172da6b48aa9c585492
-
SHA256
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924
-
SHA512
2706c9be8fc9227b271715ce56065da5befe4f67a36e7187879dc5949023166b090154c4a1f0cb08098bca9e2b18a44a42fe63fb9bfe897b36a2d102babfae5e
-
SSDEEP
6144:HNYe8uIgw6/eKxSlKKZ74ueKxff0qjwszeX9z6/ojw7:t+u6lr54ujjgjk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fgfckbfa.exeHpmdjf32.exeInfjfblm.exeJonqfq32.exeEajhgg32.exeJekoljgo.exeCmgblphf.exeCmdcngbd.exeHhhkbqea.exeMfngbq32.exeGfhikl32.exeNmnoll32.exeLpmeojbo.exeJjbdfbnl.exeKaliaphd.exeLkhcdhmk.exeJhndcd32.exeAmdmkb32.exeFdemap32.exeEibgbj32.exeNbinad32.exeNehjmppo.exeEfdmohmm.exeNdiaem32.exeFcbjon32.exeMpaoojjb.exeGgppdpif.exeDpjhcj32.exeMfijfdca.exeFehmlh32.exeOiniaboi.exeCkamihfm.exeJdobjgqg.exeMbmgkp32.exeMdkcgk32.exeDapnfb32.exeFomndhng.exeHkkaik32.exeAhancp32.exeHobjia32.exeHklhca32.exeBdehgnqc.exeLcpbpk32.exeKfcadq32.exeGcocnk32.exeHbnqln32.exeLgphke32.exeEabeal32.exeOmonmpcm.exeQkpnph32.exeBgihjl32.exeDcihdo32.exeIjhkembk.exeHqcpfcbl.exeJmggcmgg.exeKphpdhdh.exeLdchdjom.exePldknmhd.exeBjdqfajl.exeCkopch32.exeFjfllm32.exeIiekkdjo.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgfckbfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpmdjf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Infjfblm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jonqfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eajhgg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jekoljgo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmgblphf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmdcngbd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhhkbqea.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfngbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfhikl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmnoll32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpmeojbo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjbdfbnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaliaphd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkhcdhmk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhndcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amdmkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdemap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eibgbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jonqfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbinad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nehjmppo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efdmohmm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndiaem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcbjon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpaoojjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggppdpif.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpjhcj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfijfdca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fehmlh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oiniaboi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckamihfm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdobjgqg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eajhgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbmgkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdkcgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dapnfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fomndhng.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkkaik32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahancp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hobjia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hklhca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdehgnqc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcpbpk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfcadq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcocnk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbnqln32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgphke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eabeal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omonmpcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qkpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgihjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcihdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijhkembk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqcpfcbl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmggcmgg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kphpdhdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldchdjom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pldknmhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjdqfajl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckopch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjfllm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iiekkdjo.exe -
Executes dropped EXE 64 IoCs
Processes:
Ldfldpqf.exeLkqdajhc.exeLhddjngm.exeLjeabf32.exeLcpbpk32.exeMmmpdp32.exeMeidib32.exeMekanbol.exeMpqekkob.exeNlgfqldf.exeNfcdfiob.exeNfeqli32.exeNdiaem32.exeOepghe32.exeOllljo32.exeOojhfj32.exeOheieo32.exePapkcd32.exePnfkheap.exePpiapp32.exeQchmll32.exeQdkfic32.exeQlbnja32.exeAbachg32.exeAdppdckh.exeAjmhljip.exeAdeiobgc.exeBmbkid32.exeBoqgep32.exeBfmlgi32.exeBmgddcnf.exeBoeppomj.exeBedene32.exeBgcbja32.exeCgeopqfp.exeCnogmk32.exeCmdcngbd.exeCfmhfm32.exeCabldeik.exeCfoellgb.exeDlnjjc32.exeDfdngl32.exeDanohi32.exeDhggdcgh.exeDbmlal32.exeDdnhidmm.exeDmgmbj32.exeDgoakpjn.exeDadehh32.exeEhonebqq.exeEmkfmioh.exeEdenjc32.exeEibgbj32.exeEdhkpcdb.exeEidchjbi.exeEpnldd32.exeEekdmk32.exeEhjqif32.exeEabeal32.exeElgioe32.exeFcaaloed.exeFdcncg32.exeFagnmkjm.exeFdekigip.exepid process 2432 Ldfldpqf.exe 2220 Lkqdajhc.exe 2948 Lhddjngm.exe 2868 Ljeabf32.exe 2660 Lcpbpk32.exe 2888 Mmmpdp32.exe 2744 Meidib32.exe 2696 Mekanbol.exe 2012 Mpqekkob.exe 1632 Nlgfqldf.exe 1532 Nfcdfiob.exe 964 Nfeqli32.exe 1784 Ndiaem32.exe 1788 Oepghe32.exe 1964 Ollljo32.exe 264 Oojhfj32.exe 1980 Oheieo32.exe 1620 Papkcd32.exe 2188 Pnfkheap.exe 1988 Ppiapp32.exe 940 Qchmll32.exe 1396 Qdkfic32.exe 376 Qlbnja32.exe 1940 Abachg32.exe 2248 Adppdckh.exe 1740 Ajmhljip.exe 788 Adeiobgc.exe 3000 Bmbkid32.exe 2924 Boqgep32.exe 2716 Bfmlgi32.exe 2892 Bmgddcnf.exe 2336 Boeppomj.exe 3008 Bedene32.exe 2548 Bgcbja32.exe 1796 Cgeopqfp.exe 2068 Cnogmk32.exe 1208 Cmdcngbd.exe 1336 Cfmhfm32.exe 112 Cabldeik.exe 1000 Cfoellgb.exe 2132 Dlnjjc32.exe 2836 Dfdngl32.exe 2268 Danohi32.exe 960 Dhggdcgh.exe 1656 Dbmlal32.exe 2288 Ddnhidmm.exe 2168 Dmgmbj32.exe 1036 Dgoakpjn.exe 1388 Dadehh32.exe 2056 Ehonebqq.exe 1612 Emkfmioh.exe 1136 Edenjc32.exe 1968 Eibgbj32.exe 2712 Edhkpcdb.exe 2512 Eidchjbi.exe 2624 Epnldd32.exe 1328 Eekdmk32.exe 2816 Ehjqif32.exe 1836 Eabeal32.exe 2800 Elgioe32.exe 2956 Fcaaloed.exe 2020 Fdcncg32.exe 2076 Fagnmkjm.exe 1344 Fdekigip.exe -
Loads dropped DLL 64 IoCs
Processes:
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exeLdfldpqf.exeLkqdajhc.exeLhddjngm.exeLjeabf32.exeLcpbpk32.exeMmmpdp32.exeMeidib32.exeMekanbol.exeMpqekkob.exeNlgfqldf.exeNfcdfiob.exeNfeqli32.exeNdiaem32.exeOepghe32.exeOllljo32.exeOojhfj32.exeOheieo32.exePapkcd32.exePnfkheap.exePpiapp32.exeQchmll32.exeQdkfic32.exeQlbnja32.exeAbachg32.exeAdppdckh.exeAjmhljip.exeAdeiobgc.exeBmbkid32.exeBoqgep32.exeBfmlgi32.exeBmgddcnf.exepid process 1148 bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe 1148 bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe 2432 Ldfldpqf.exe 2432 Ldfldpqf.exe 2220 Lkqdajhc.exe 2220 Lkqdajhc.exe 2948 Lhddjngm.exe 2948 Lhddjngm.exe 2868 Ljeabf32.exe 2868 Ljeabf32.exe 2660 Lcpbpk32.exe 2660 Lcpbpk32.exe 2888 Mmmpdp32.exe 2888 Mmmpdp32.exe 2744 Meidib32.exe 2744 Meidib32.exe 2696 Mekanbol.exe 2696 Mekanbol.exe 2012 Mpqekkob.exe 2012 Mpqekkob.exe 1632 Nlgfqldf.exe 1632 Nlgfqldf.exe 1532 Nfcdfiob.exe 1532 Nfcdfiob.exe 964 Nfeqli32.exe 964 Nfeqli32.exe 1784 Ndiaem32.exe 1784 Ndiaem32.exe 1788 Oepghe32.exe 1788 Oepghe32.exe 1964 Ollljo32.exe 1964 Ollljo32.exe 264 Oojhfj32.exe 264 Oojhfj32.exe 1980 Oheieo32.exe 1980 Oheieo32.exe 1620 Papkcd32.exe 1620 Papkcd32.exe 2188 Pnfkheap.exe 2188 Pnfkheap.exe 1988 Ppiapp32.exe 1988 Ppiapp32.exe 940 Qchmll32.exe 940 Qchmll32.exe 1396 Qdkfic32.exe 1396 Qdkfic32.exe 376 Qlbnja32.exe 376 Qlbnja32.exe 1940 Abachg32.exe 1940 Abachg32.exe 2248 Adppdckh.exe 2248 Adppdckh.exe 1740 Ajmhljip.exe 1740 Ajmhljip.exe 788 Adeiobgc.exe 788 Adeiobgc.exe 3000 Bmbkid32.exe 3000 Bmbkid32.exe 2924 Boqgep32.exe 2924 Boqgep32.exe 2716 Bfmlgi32.exe 2716 Bfmlgi32.exe 2892 Bmgddcnf.exe 2892 Bmgddcnf.exe -
Drops file in System32 directory 64 IoCs
Processes:
Moflkfca.exeNglmifca.exeBedene32.exeLgphke32.exeIapfmg32.exeKldchgag.exeNglmifca.exeOhqbbi32.exeBhjngnod.exeOpcaiggo.exeNehjmppo.exePaemac32.exeAhancp32.exeEfdmohmm.exeIbpjaagi.exeMfngbq32.exeNnpofe32.exeHfalaj32.exeKommediq.exeMgdmeh32.exeAgilkijf.exeCeanmc32.exeAkmgoehg.exeDcihdo32.exeJaoblk32.exeOhmljj32.exeOfklpa32.exeFgffck32.exeLhbjmg32.exeFeeilbhg.exeLnlmmo32.exeFpojlp32.exeHgbanlfc.exeDmopge32.exeFomndhng.exeDbqajk32.exeGnjhaj32.exeImidgh32.exeKdooij32.exeLobbpg32.exeNgafdepl.exeEenckc32.exeJmggcmgg.exePobgjhgh.exeHnjdpm32.exeIfahpnfl.exeKekkkm32.exeCabldeik.exeKhcdijac.exeDdnaonia.exeJmmmbg32.exeGpagbp32.exeGicpnhbb.exePhmiimlf.exeNqdaal32.exeCfknjfbl.exeDanaqbgp.exeHkfeec32.exeAjlabc32.exeBdehgnqc.exeMmmpdp32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Mqhhbn32.exe Moflkfca.exe File opened for modification C:\Windows\SysWOW64\Nnfeep32.exe Nglmifca.exe File opened for modification C:\Windows\SysWOW64\Bgcbja32.exe Bedene32.exe File opened for modification C:\Windows\SysWOW64\Lkkckdhm.exe Lgphke32.exe File opened for modification C:\Windows\SysWOW64\Ifloeo32.exe Iapfmg32.exe File created C:\Windows\SysWOW64\Kppohf32.exe Kldchgag.exe File opened for modification C:\Windows\SysWOW64\Ceahlg32.dll Nglmifca.exe File created C:\Windows\SysWOW64\Giemhaee.dll Ohqbbi32.exe File created C:\Windows\SysWOW64\Bcobdgoj.exe Bhjngnod.exe File created C:\Windows\SysWOW64\Obamebfc.exe Opcaiggo.exe File created C:\Windows\SysWOW64\Mkndijfb.dll Nehjmppo.exe File created C:\Windows\SysWOW64\Pgbejj32.exe Paemac32.exe File created C:\Windows\SysWOW64\Aokfpjai.exe Ahancp32.exe File created C:\Windows\SysWOW64\Gngcgmgi.dll Efdmohmm.exe File created C:\Windows\SysWOW64\Ihlbih32.exe Ibpjaagi.exe File created C:\Windows\SysWOW64\Mhlcnl32.exe Mfngbq32.exe File opened for modification C:\Windows\SysWOW64\Nbljfdoh.exe Nnpofe32.exe File opened for modification C:\Windows\SysWOW64\Hkndiabh.exe Hfalaj32.exe File opened for modification C:\Windows\SysWOW64\Kaliaphd.exe Kommediq.exe File created C:\Windows\SysWOW64\Mnneabff.exe Mgdmeh32.exe File opened for modification C:\Windows\SysWOW64\Ancdgcab.exe Agilkijf.exe File opened for modification C:\Windows\SysWOW64\Cjngej32.exe Ceanmc32.exe File created C:\Windows\SysWOW64\Klnleckl.dll Akmgoehg.exe File opened for modification C:\Windows\SysWOW64\Difplf32.exe Dcihdo32.exe File created C:\Windows\SysWOW64\Ldnakeah.dll Jaoblk32.exe File opened for modification C:\Windows\SysWOW64\Oiniaboi.exe Ohmljj32.exe File opened for modification C:\Windows\SysWOW64\Opcaiggo.exe Ofklpa32.exe File created C:\Windows\SysWOW64\Hibgakob.dll Fgffck32.exe File created C:\Windows\SysWOW64\Lecjaf32.dll Ceanmc32.exe File opened for modification C:\Windows\SysWOW64\Lnobfn32.exe Lhbjmg32.exe File opened for modification C:\Windows\SysWOW64\Fgffck32.exe Feeilbhg.exe File opened for modification C:\Windows\SysWOW64\Lcieef32.exe Lnlmmo32.exe File created C:\Windows\SysWOW64\Clangg32.dll Fpojlp32.exe File created C:\Windows\SysWOW64\Cejnde32.dll Hgbanlfc.exe File created C:\Windows\SysWOW64\Dcihdo32.exe Dmopge32.exe File created C:\Windows\SysWOW64\Fpojlp32.exe Fomndhng.exe File created C:\Windows\SysWOW64\Dlifcqfl.exe Dbqajk32.exe File created C:\Windows\SysWOW64\Dhoeadlm.dll Gnjhaj32.exe File opened for modification C:\Windows\SysWOW64\Ifahpnfl.exe Imidgh32.exe File created C:\Windows\SysWOW64\Cmeimblp.dll Kdooij32.exe File opened for modification C:\Windows\SysWOW64\Lbpolb32.exe Lobbpg32.exe File created C:\Windows\SysWOW64\Lbinkahf.dll Ngafdepl.exe File opened for modification C:\Windows\SysWOW64\Flhkhnel.exe Eenckc32.exe File opened for modification C:\Windows\SysWOW64\Jbdokceo.exe Jmggcmgg.exe File created C:\Windows\SysWOW64\Ncnbqeoe.dll Lgphke32.exe File opened for modification C:\Windows\SysWOW64\Paqdgcfl.exe Pobgjhgh.exe File created C:\Windows\SysWOW64\Elkicala.dll Hnjdpm32.exe File created C:\Windows\SysWOW64\Jgkjfeka.dll Ifahpnfl.exe File opened for modification C:\Windows\SysWOW64\Kldchgag.exe Kekkkm32.exe File opened for modification C:\Windows\SysWOW64\Cfoellgb.exe Cabldeik.exe File created C:\Windows\SysWOW64\Beokkc32.dll Khcdijac.exe File opened for modification C:\Windows\SysWOW64\Pgbejj32.exe Paemac32.exe File opened for modification C:\Windows\SysWOW64\Dbqajk32.exe Ddnaonia.exe File created C:\Windows\SysWOW64\Jbjejojn.exe Jmmmbg32.exe File opened for modification C:\Windows\SysWOW64\Gcocnk32.exe Gpagbp32.exe File created C:\Windows\SysWOW64\Gomhkb32.exe Gicpnhbb.exe File opened for modification C:\Windows\SysWOW64\Pkkeeikj.exe Phmiimlf.exe File opened for modification C:\Windows\SysWOW64\Nkjeod32.exe Nqdaal32.exe File opened for modification C:\Windows\SysWOW64\Cnbfkccn.exe Cfknjfbl.exe File created C:\Windows\SysWOW64\Dieiap32.exe Danaqbgp.exe File opened for modification C:\Windows\SysWOW64\Hjieapck.exe Hkfeec32.exe File opened for modification C:\Windows\SysWOW64\Aoijjjcl.exe Ajlabc32.exe File created C:\Windows\SysWOW64\Oacqge32.dll Bdehgnqc.exe File created C:\Windows\SysWOW64\Jgnbfdao.dll Mmmpdp32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5216 5196 WerFault.exe Iqmcmaja.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Mmmpdp32.exeIhlbih32.exeKhhndi32.exeLpmeojbo.exeOmekgakg.exePopkeh32.exeGmbagf32.exeJaoblk32.exeBfmlgi32.exeDdnaonia.exeEkeiel32.exeGkchpcoc.exeInfjfblm.exePahjgb32.exePpiapp32.exeCmdcngbd.exeHnlqemal.exeIbhieo32.exeAjmhljip.exeEajhgg32.exeFdbgia32.exeIbjikk32.exeIjhkembk.exeFagnmkjm.exeIfahpnfl.exePhckglbq.exeDfpcdh32.exeKdooij32.exeMqhhbn32.exeOaeacppk.exePgbejj32.exeIfloeo32.exeBjdqfajl.exeCgfqii32.exeHiblmldn.exeQpmgho32.exeNgafdepl.exeGinefe32.exeBmbkid32.exeKhcdijac.exeHefibg32.exeDippfplg.exeKpeonkig.exeOelcho32.exeHimkgf32.exeDieiap32.exeLfgaaa32.exeAogmdk32.exeHnecjgch.exeKpcbhlki.exeGacgli32.exeHhhblgim.exeJoepjokm.exeCcakij32.exeOikeal32.exeEfdmohmm.exeLobbpg32.exeGpccgppq.exePdnihiad.exeBbdoec32.exeIjmkkc32.exeFcbjon32.exeGlpdbfek.exeLojeda32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmmpdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihlbih32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khhndi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpmeojbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omekgakg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Popkeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmbagf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jaoblk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfmlgi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddnaonia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekeiel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkchpcoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Infjfblm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pahjgb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppiapp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmdcngbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnlqemal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ibhieo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajmhljip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eajhgg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdbgia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ibjikk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijhkembk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fagnmkjm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifahpnfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phckglbq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpcdh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdooij32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mqhhbn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oaeacppk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgbejj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifloeo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjdqfajl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgfqii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hiblmldn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qpmgho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ngafdepl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ginefe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmbkid32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khcdijac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hefibg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dippfplg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpeonkig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oelcho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Himkgf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dieiap32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfgaaa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aogmdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnecjgch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpcbhlki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gacgli32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhhblgim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Joepjokm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccakij32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oikeal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efdmohmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lobbpg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpccgppq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdnihiad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbdoec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijmkkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcbjon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glpdbfek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lojeda32.exe -
Modifies registry class 64 IoCs
Processes:
Khcdijac.exeEkeiel32.exeAadbfp32.exeNqakim32.exeIjjgkmqh.exeOhqbbi32.exeDanaqbgp.exeGiikkehc.exeIgdndl32.exeAbjcleqm.exeCjqglf32.exeEkblplgo.exeFdbgia32.exeGqidme32.exeAhlnmjkf.exeEpnldd32.exeNjipabhe.exePopkeh32.exeEamdlf32.exeGlpdbfek.exeApgcbmha.exeOepghe32.exeMjpmkdpp.exeJmhpfl32.exeLafekm32.exeCmjoaofc.exeDlnjjc32.exeGcankb32.exeKoelibnh.exeDfegjknm.exeGgppdpif.exeBmgddcnf.exeKiqdmm32.exePobgjhgh.exeJjhgdqef.exeDdnhidmm.exeEffidg32.exeIapfmg32.exeEolljk32.exeGgbljogc.exeDfpcdh32.exeAbachg32.exeHoegoqng.exeHhhkbqea.exeCiknhb32.exeHefibg32.exeLllihf32.exePdjpmi32.exeAnnpaq32.exeDmalmdcg.exeMfamko32.exeCkopch32.exeEidchjbi.exeNffcebdd.exeNqkgbkdj.exePljnmkoo.exeBfqaph32.exeCnjbfhqa.exeAchlch32.exeDmgokcja.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khcdijac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ekeiel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Didlinpd.dll" Aadbfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfjccdpc.dll" Nqakim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckifmh32.dll" Ijjgkmqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Giemhaee.dll" Ohqbbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlqgnc32.dll" Danaqbgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Giikkehc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oeckdc32.dll" Igdndl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abjcleqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjqglf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ekblplgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdbgia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gqidme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahlnmjkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Epnldd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njipabhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Popkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eamdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khmebeij.dll" Glpdbfek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caldepec.dll" Apgcbmha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oepghe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjpmkdpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jmhpfl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lafekm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmjoaofc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlnjjc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gcankb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gqidme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nekofg32.dll" Koelibnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfegjknm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggppdpif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poeepl32.dll" Bmgddcnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kiqdmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pobgjhgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpmggm32.dll" Jjhgdqef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddnhidmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ligdgc32.dll" Pobgjhgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikcoomeg.dll" Effidg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Koiohb32.dll" Iapfmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eolljk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggbljogc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffmijgfa.dll" Dfpcdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcpmbgfg.dll" Abachg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hoegoqng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhhkbqea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ciknhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hefibg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdbabndd.dll" Lllihf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdjpmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Annpaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmalmdcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpmmdfgc.dll" Mfamko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cofdbh32.dll" Ckopch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnflkl32.dll" Eidchjbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pncemobj.dll" Nffcebdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqkgbkdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggbljogc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pljnmkoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lakfgi32.dll" Oepghe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfqaph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnjbfhqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Achlch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmgokcja.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exeLdfldpqf.exeLkqdajhc.exeLhddjngm.exeLjeabf32.exeLcpbpk32.exeMmmpdp32.exeMeidib32.exeMekanbol.exeMpqekkob.exeNlgfqldf.exeNfcdfiob.exeNfeqli32.exeNdiaem32.exeOepghe32.exeOllljo32.exedescription pid process target process PID 1148 wrote to memory of 2432 1148 bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe Ldfldpqf.exe PID 1148 wrote to memory of 2432 1148 bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe Ldfldpqf.exe PID 1148 wrote to memory of 2432 1148 bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe Ldfldpqf.exe PID 1148 wrote to memory of 2432 1148 bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe Ldfldpqf.exe PID 2432 wrote to memory of 2220 2432 Ldfldpqf.exe Lkqdajhc.exe PID 2432 wrote to memory of 2220 2432 Ldfldpqf.exe Lkqdajhc.exe PID 2432 wrote to memory of 2220 2432 Ldfldpqf.exe Lkqdajhc.exe PID 2432 wrote to memory of 2220 2432 Ldfldpqf.exe Lkqdajhc.exe PID 2220 wrote to memory of 2948 2220 Lkqdajhc.exe Lhddjngm.exe PID 2220 wrote to memory of 2948 2220 Lkqdajhc.exe Lhddjngm.exe PID 2220 wrote to memory of 2948 2220 Lkqdajhc.exe Lhddjngm.exe PID 2220 wrote to memory of 2948 2220 Lkqdajhc.exe Lhddjngm.exe PID 2948 wrote to memory of 2868 2948 Lhddjngm.exe Ljeabf32.exe PID 2948 wrote to memory of 2868 2948 Lhddjngm.exe Ljeabf32.exe PID 2948 wrote to memory of 2868 2948 Lhddjngm.exe Ljeabf32.exe PID 2948 wrote to memory of 2868 2948 Lhddjngm.exe Ljeabf32.exe PID 2868 wrote to memory of 2660 2868 Ljeabf32.exe Lcpbpk32.exe PID 2868 wrote to memory of 2660 2868 Ljeabf32.exe Lcpbpk32.exe PID 2868 wrote to memory of 2660 2868 Ljeabf32.exe Lcpbpk32.exe PID 2868 wrote to memory of 2660 2868 Ljeabf32.exe Lcpbpk32.exe PID 2660 wrote to memory of 2888 2660 Lcpbpk32.exe Mmmpdp32.exe PID 2660 wrote to memory of 2888 2660 Lcpbpk32.exe Mmmpdp32.exe PID 2660 wrote to memory of 2888 2660 Lcpbpk32.exe Mmmpdp32.exe PID 2660 wrote to memory of 2888 2660 Lcpbpk32.exe Mmmpdp32.exe PID 2888 wrote to memory of 2744 2888 Mmmpdp32.exe Meidib32.exe PID 2888 wrote to memory of 2744 2888 Mmmpdp32.exe Meidib32.exe PID 2888 wrote to memory of 2744 2888 Mmmpdp32.exe Meidib32.exe PID 2888 wrote to memory of 2744 2888 Mmmpdp32.exe Meidib32.exe PID 2744 wrote to memory of 2696 2744 Meidib32.exe Mekanbol.exe PID 2744 wrote to memory of 2696 2744 Meidib32.exe Mekanbol.exe PID 2744 wrote to memory of 2696 2744 Meidib32.exe Mekanbol.exe PID 2744 wrote to memory of 2696 2744 Meidib32.exe Mekanbol.exe PID 2696 wrote to memory of 2012 2696 Mekanbol.exe Mpqekkob.exe PID 2696 wrote to memory of 2012 2696 Mekanbol.exe Mpqekkob.exe PID 2696 wrote to memory of 2012 2696 Mekanbol.exe Mpqekkob.exe PID 2696 wrote to memory of 2012 2696 Mekanbol.exe Mpqekkob.exe PID 2012 wrote to memory of 1632 2012 Mpqekkob.exe Nlgfqldf.exe PID 2012 wrote to memory of 1632 2012 Mpqekkob.exe Nlgfqldf.exe PID 2012 wrote to memory of 1632 2012 Mpqekkob.exe Nlgfqldf.exe PID 2012 wrote to memory of 1632 2012 Mpqekkob.exe Nlgfqldf.exe PID 1632 wrote to memory of 1532 1632 Nlgfqldf.exe Nfcdfiob.exe PID 1632 wrote to memory of 1532 1632 Nlgfqldf.exe Nfcdfiob.exe PID 1632 wrote to memory of 1532 1632 Nlgfqldf.exe Nfcdfiob.exe PID 1632 wrote to memory of 1532 1632 Nlgfqldf.exe Nfcdfiob.exe PID 1532 wrote to memory of 964 1532 Nfcdfiob.exe Nfeqli32.exe PID 1532 wrote to memory of 964 1532 Nfcdfiob.exe Nfeqli32.exe PID 1532 wrote to memory of 964 1532 Nfcdfiob.exe Nfeqli32.exe PID 1532 wrote to memory of 964 1532 Nfcdfiob.exe Nfeqli32.exe PID 964 wrote to memory of 1784 964 Nfeqli32.exe Ndiaem32.exe PID 964 wrote to memory of 1784 964 Nfeqli32.exe Ndiaem32.exe PID 964 wrote to memory of 1784 964 Nfeqli32.exe Ndiaem32.exe PID 964 wrote to memory of 1784 964 Nfeqli32.exe Ndiaem32.exe PID 1784 wrote to memory of 1788 1784 Ndiaem32.exe Oepghe32.exe PID 1784 wrote to memory of 1788 1784 Ndiaem32.exe Oepghe32.exe PID 1784 wrote to memory of 1788 1784 Ndiaem32.exe Oepghe32.exe PID 1784 wrote to memory of 1788 1784 Ndiaem32.exe Oepghe32.exe PID 1788 wrote to memory of 1964 1788 Oepghe32.exe Ollljo32.exe PID 1788 wrote to memory of 1964 1788 Oepghe32.exe Ollljo32.exe PID 1788 wrote to memory of 1964 1788 Oepghe32.exe Ollljo32.exe PID 1788 wrote to memory of 1964 1788 Oepghe32.exe Ollljo32.exe PID 1964 wrote to memory of 264 1964 Ollljo32.exe Oojhfj32.exe PID 1964 wrote to memory of 264 1964 Ollljo32.exe Oojhfj32.exe PID 1964 wrote to memory of 264 1964 Ollljo32.exe Oojhfj32.exe PID 1964 wrote to memory of 264 1964 Ollljo32.exe Oojhfj32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe"C:\Users\Admin\AppData\Local\Temp\bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\Ldfldpqf.exeC:\Windows\system32\Ldfldpqf.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Lkqdajhc.exeC:\Windows\system32\Lkqdajhc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Lhddjngm.exeC:\Windows\system32\Lhddjngm.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\Ljeabf32.exeC:\Windows\system32\Ljeabf32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Lcpbpk32.exeC:\Windows\system32\Lcpbpk32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Mmmpdp32.exeC:\Windows\system32\Mmmpdp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Meidib32.exeC:\Windows\system32\Meidib32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Mekanbol.exeC:\Windows\system32\Mekanbol.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Mpqekkob.exeC:\Windows\system32\Mpqekkob.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\Nlgfqldf.exeC:\Windows\system32\Nlgfqldf.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\Nfcdfiob.exeC:\Windows\system32\Nfcdfiob.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\Nfeqli32.exeC:\Windows\system32\Nfeqli32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\Ndiaem32.exeC:\Windows\system32\Ndiaem32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\Oepghe32.exeC:\Windows\system32\Oepghe32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\Ollljo32.exeC:\Windows\system32\Ollljo32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\Oojhfj32.exeC:\Windows\system32\Oojhfj32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:264 -
C:\Windows\SysWOW64\Oheieo32.exeC:\Windows\system32\Oheieo32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1980 -
C:\Windows\SysWOW64\Papkcd32.exeC:\Windows\system32\Papkcd32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Windows\SysWOW64\Pnfkheap.exeC:\Windows\system32\Pnfkheap.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2188 -
C:\Windows\SysWOW64\Ppiapp32.exeC:\Windows\system32\Ppiapp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\Qchmll32.exeC:\Windows\system32\Qchmll32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Windows\SysWOW64\Qdkfic32.exeC:\Windows\system32\Qdkfic32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1396 -
C:\Windows\SysWOW64\Qlbnja32.exeC:\Windows\system32\Qlbnja32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:376 -
C:\Windows\SysWOW64\Abachg32.exeC:\Windows\system32\Abachg32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\Adppdckh.exeC:\Windows\system32\Adppdckh.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2248 -
C:\Windows\SysWOW64\Ajmhljip.exeC:\Windows\system32\Ajmhljip.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\Adeiobgc.exeC:\Windows\system32\Adeiobgc.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788 -
C:\Windows\SysWOW64\Bmbkid32.exeC:\Windows\system32\Bmbkid32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\Boqgep32.exeC:\Windows\system32\Boqgep32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924 -
C:\Windows\SysWOW64\Bfmlgi32.exeC:\Windows\system32\Bfmlgi32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\Bmgddcnf.exeC:\Windows\system32\Bmgddcnf.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Boeppomj.exeC:\Windows\system32\Boeppomj.exe33⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Bedene32.exeC:\Windows\system32\Bedene32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3008 -
C:\Windows\SysWOW64\Bgcbja32.exeC:\Windows\system32\Bgcbja32.exe35⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Cgeopqfp.exeC:\Windows\system32\Cgeopqfp.exe36⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Cnogmk32.exeC:\Windows\system32\Cnogmk32.exe37⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Cmdcngbd.exeC:\Windows\system32\Cmdcngbd.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\Cfmhfm32.exeC:\Windows\system32\Cfmhfm32.exe39⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\Cabldeik.exeC:\Windows\system32\Cabldeik.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:112 -
C:\Windows\SysWOW64\Cfoellgb.exeC:\Windows\system32\Cfoellgb.exe41⤵
- Executes dropped EXE
PID:1000 -
C:\Windows\SysWOW64\Dlnjjc32.exeC:\Windows\system32\Dlnjjc32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:2132 -
C:\Windows\SysWOW64\Dfdngl32.exeC:\Windows\system32\Dfdngl32.exe43⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Danohi32.exeC:\Windows\system32\Danohi32.exe44⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\Dhggdcgh.exeC:\Windows\system32\Dhggdcgh.exe45⤵
- Executes dropped EXE
PID:960 -
C:\Windows\SysWOW64\Dbmlal32.exeC:\Windows\system32\Dbmlal32.exe46⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Ddnhidmm.exeC:\Windows\system32\Ddnhidmm.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Dmgmbj32.exeC:\Windows\system32\Dmgmbj32.exe48⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\Dgoakpjn.exeC:\Windows\system32\Dgoakpjn.exe49⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\Dadehh32.exeC:\Windows\system32\Dadehh32.exe50⤵
- Executes dropped EXE
PID:1388 -
C:\Windows\SysWOW64\Ehonebqq.exeC:\Windows\system32\Ehonebqq.exe51⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Emkfmioh.exeC:\Windows\system32\Emkfmioh.exe52⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Edenjc32.exeC:\Windows\system32\Edenjc32.exe53⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\Eibgbj32.exeC:\Windows\system32\Eibgbj32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Edhkpcdb.exeC:\Windows\system32\Edhkpcdb.exe55⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\Eidchjbi.exeC:\Windows\system32\Eidchjbi.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2512 -
C:\Windows\SysWOW64\Epnldd32.exeC:\Windows\system32\Epnldd32.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:2624 -
C:\Windows\SysWOW64\Eekdmk32.exeC:\Windows\system32\Eekdmk32.exe58⤵
- Executes dropped EXE
PID:1328 -
C:\Windows\SysWOW64\Ehjqif32.exeC:\Windows\system32\Ehjqif32.exe59⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\Eabeal32.exeC:\Windows\system32\Eabeal32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\Elgioe32.exeC:\Windows\system32\Elgioe32.exe61⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Fcaaloed.exeC:\Windows\system32\Fcaaloed.exe62⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\Fdcncg32.exeC:\Windows\system32\Fdcncg32.exe63⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Fagnmkjm.exeC:\Windows\system32\Fagnmkjm.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\Fdekigip.exeC:\Windows\system32\Fdekigip.exe65⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Fnnobl32.exeC:\Windows\system32\Fnnobl32.exe66⤵PID:1696
-
C:\Windows\SysWOW64\Fgfckbfa.exeC:\Windows\system32\Fgfckbfa.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1780 -
C:\Windows\SysWOW64\Fnplgl32.exeC:\Windows\system32\Fnplgl32.exe68⤵PID:2112
-
C:\Windows\SysWOW64\Fdjddf32.exeC:\Windows\system32\Fdjddf32.exe69⤵PID:2380
-
C:\Windows\SysWOW64\Fjfllm32.exeC:\Windows\system32\Fjfllm32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1588 -
C:\Windows\SysWOW64\Fleihi32.exeC:\Windows\system32\Fleihi32.exe71⤵PID:1808
-
C:\Windows\SysWOW64\Fcoaebjc.exeC:\Windows\system32\Fcoaebjc.exe72⤵PID:2928
-
C:\Windows\SysWOW64\Gmgenh32.exeC:\Windows\system32\Gmgenh32.exe73⤵PID:2748
-
C:\Windows\SysWOW64\Gcankb32.exeC:\Windows\system32\Gcankb32.exe74⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Gfpjgn32.exeC:\Windows\system32\Gfpjgn32.exe75⤵PID:2500
-
C:\Windows\SysWOW64\Gqendf32.exeC:\Windows\system32\Gqendf32.exe76⤵PID:2724
-
C:\Windows\SysWOW64\Gfbfln32.exeC:\Windows\system32\Gfbfln32.exe77⤵PID:2508
-
C:\Windows\SysWOW64\Ghqchi32.exeC:\Windows\system32\Ghqchi32.exe78⤵PID:2604
-
C:\Windows\SysWOW64\Gfdcbmbn.exeC:\Windows\system32\Gfdcbmbn.exe79⤵PID:2040
-
C:\Windows\SysWOW64\Gicpnhbb.exeC:\Windows\system32\Gicpnhbb.exe80⤵
- Drops file in System32 directory
PID:2776 -
C:\Windows\SysWOW64\Gomhkb32.exeC:\Windows\system32\Gomhkb32.exe81⤵PID:2564
-
C:\Windows\SysWOW64\Gbkdgn32.exeC:\Windows\system32\Gbkdgn32.exe82⤵PID:2944
-
C:\Windows\SysWOW64\Gkchpcoc.exeC:\Windows\system32\Gkchpcoc.exe83⤵
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\Hbnqln32.exeC:\Windows\system32\Hbnqln32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2124 -
C:\Windows\SysWOW64\Hkfeec32.exeC:\Windows\system32\Hkfeec32.exe85⤵
- Drops file in System32 directory
PID:2900 -
C:\Windows\SysWOW64\Hjieapck.exeC:\Windows\system32\Hjieapck.exe86⤵PID:1976
-
C:\Windows\SysWOW64\Henjnica.exeC:\Windows\system32\Henjnica.exe87⤵PID:1664
-
C:\Windows\SysWOW64\Hgmfjdbe.exeC:\Windows\system32\Hgmfjdbe.exe88⤵PID:1684
-
C:\Windows\SysWOW64\Hminbkql.exeC:\Windows\system32\Hminbkql.exe89⤵PID:1756
-
C:\Windows\SysWOW64\Heqfdh32.exeC:\Windows\system32\Heqfdh32.exe90⤵PID:876
-
C:\Windows\SysWOW64\Hjmolp32.exeC:\Windows\system32\Hjmolp32.exe91⤵PID:1452
-
C:\Windows\SysWOW64\Hmlkhk32.exeC:\Windows\system32\Hmlkhk32.exe92⤵PID:2216
-
C:\Windows\SysWOW64\Hgaoec32.exeC:\Windows\system32\Hgaoec32.exe93⤵PID:2876
-
C:\Windows\SysWOW64\Hfdpaqej.exeC:\Windows\system32\Hfdpaqej.exe94⤵PID:2984
-
C:\Windows\SysWOW64\Hiblmldn.exeC:\Windows\system32\Hiblmldn.exe95⤵
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\Hpmdjf32.exeC:\Windows\system32\Hpmdjf32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2376 -
C:\Windows\SysWOW64\Ipoqofjh.exeC:\Windows\system32\Ipoqofjh.exe97⤵PID:2668
-
C:\Windows\SysWOW64\Ibmmkaik.exeC:\Windows\system32\Ibmmkaik.exe98⤵PID:2468
-
C:\Windows\SysWOW64\Ilfadg32.exeC:\Windows\system32\Ilfadg32.exe99⤵PID:2536
-
C:\Windows\SysWOW64\Ibpjaagi.exeC:\Windows\system32\Ibpjaagi.exe100⤵
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\Ihlbih32.exeC:\Windows\system32\Ihlbih32.exe101⤵
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\SysWOW64\Infjfblm.exeC:\Windows\system32\Infjfblm.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\Ieqbbl32.exeC:\Windows\system32\Ieqbbl32.exe103⤵PID:2180
-
C:\Windows\SysWOW64\Ijmkkc32.exeC:\Windows\system32\Ijmkkc32.exe104⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\Iecohl32.exeC:\Windows\system32\Iecohl32.exe105⤵PID:2912
-
C:\Windows\SysWOW64\Ilmgef32.exeC:\Windows\system32\Ilmgef32.exe106⤵PID:2100
-
C:\Windows\SysWOW64\Imndmnob.exeC:\Windows\system32\Imndmnob.exe107⤵PID:2364
-
C:\Windows\SysWOW64\Jdhlih32.exeC:\Windows\system32\Jdhlih32.exe108⤵PID:1996
-
C:\Windows\SysWOW64\Jjbdfbnl.exeC:\Windows\system32\Jjbdfbnl.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1660 -
C:\Windows\SysWOW64\Jonqfq32.exeC:\Windows\system32\Jonqfq32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1272 -
C:\Windows\SysWOW64\Jhfepfme.exeC:\Windows\system32\Jhfepfme.exe111⤵PID:2324
-
C:\Windows\SysWOW64\Jfiekc32.exeC:\Windows\system32\Jfiekc32.exe112⤵PID:1960
-
C:\Windows\SysWOW64\Jmbnhm32.exeC:\Windows\system32\Jmbnhm32.exe113⤵PID:2444
-
C:\Windows\SysWOW64\Jpajdi32.exeC:\Windows\system32\Jpajdi32.exe114⤵PID:2656
-
C:\Windows\SysWOW64\Jfkbqcam.exeC:\Windows\system32\Jfkbqcam.exe115⤵PID:2616
-
C:\Windows\SysWOW64\Jiinmnaa.exeC:\Windows\system32\Jiinmnaa.exe116⤵PID:3040
-
C:\Windows\SysWOW64\Jmejmm32.exeC:\Windows\system32\Jmejmm32.exe117⤵PID:2976
-
C:\Windows\SysWOW64\Jdobjgqg.exeC:\Windows\system32\Jdobjgqg.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2848 -
C:\Windows\SysWOW64\Jepoao32.exeC:\Windows\system32\Jepoao32.exe119⤵PID:2572
-
C:\Windows\SysWOW64\Jmggcmgg.exeC:\Windows\system32\Jmggcmgg.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\Jbdokceo.exeC:\Windows\system32\Jbdokceo.exe121⤵PID:996
-
C:\Windows\SysWOW64\Jeblgodb.exeC:\Windows\system32\Jeblgodb.exe122⤵PID:1288
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-