Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe
Resource
win10v2004-20241007-en
General
-
Target
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe
-
Size
320KB
-
MD5
eb8f8ea3eaf332e1b70e050557fae2de
-
SHA1
f96e7294815405824793a172da6b48aa9c585492
-
SHA256
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924
-
SHA512
2706c9be8fc9227b271715ce56065da5befe4f67a36e7187879dc5949023166b090154c4a1f0cb08098bca9e2b18a44a42fe63fb9bfe897b36a2d102babfae5e
-
SSDEEP
6144:HNYe8uIgw6/eKxSlKKZ74ueKxff0qjwszeX9z6/ojw7:t+u6lr54ujjgjk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dpoiho32.exeAagdnn32.exeDhmgfm32.exeOpopdd32.exeCapkim32.exeHiipmhmk.exeOjcpdg32.exeQbngeadf.exeInfqklol.exeDgdgijhp.exeLjhchc32.exeMjdbda32.exeBphgeo32.exeAaiqcnhg.exeHgebnc32.exeHgmebnpd.exeCehlcikj.exeIcgbob32.exeLmkipncc.exeLcealh32.exeDfglfdkb.exeEfeihb32.exeMaaekg32.exeNbbnbemf.exeDbpjaeoc.exeOjqcnhkl.exeCppelkeb.exeEemgkpef.exeNjbgmjgl.exeImknli32.exeKdjhkp32.exePgllad32.exeDhclmp32.exeEnkdaepb.exeAhmjjoig.exeFnbcgn32.exeCpmifkgd.exeEfhjjcpo.exeQdihfq32.exeDamfao32.exePfpidk32.exeKfeagefd.exeDehgejep.exeIaifbg32.exeOgqmee32.exeKidben32.exeOjhiogdd.exeAmfobp32.exePeempn32.exeDdjmba32.exeMcpcdg32.exeAjhndgjj.exeJocnlg32.exeClffalkf.exeNncccnol.exeBkgeainn.exeLdkhlcnb.exeEbagdddp.exeEkljpm32.exeBjcmpepm.exeAbgcqjhp.exeQghlmbae.exeFngcmcfe.exeAmkabind.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpoiho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aagdnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhmgfm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opopdd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Capkim32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiipmhmk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojcpdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbngeadf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Infqklol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgdgijhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljhchc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjdbda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bphgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaiqcnhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgebnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgmebnpd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cehlcikj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icgbob32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmkipncc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcealh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfglfdkb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efeihb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maaekg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbbnbemf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbpjaeoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojqcnhkl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cppelkeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eemgkpef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imknli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdjhkp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgllad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhclmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enkdaepb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahmjjoig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnbcgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpmifkgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efhjjcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdihfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Damfao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfpidk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfeagefd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dehgejep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iaifbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogqmee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kidben32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojhiogdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amfobp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peempn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjmba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcpcdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajhndgjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jocnlg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clffalkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nncccnol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkgeainn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldkhlcnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebagdddp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekljpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjcmpepm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abgcqjhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qghlmbae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fngcmcfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amkabind.exe -
Executes dropped EXE 64 IoCs
Processes:
Cohkokgj.exeCfbcke32.exeDokgdkeh.exeDbicpfdk.exeDdgplado.exeDhclmp32.exeDkahilkl.exeDnpdegjp.exeDfglfdkb.exeDdjmba32.exeDmadco32.exeDkceokii.exeDnbakghm.exeDfiildio.exeDdligq32.exeDmcain32.exeDkfadkgf.exeDndnpf32.exeDbpjaeoc.exeDdnfmqng.exeDijbno32.exeDkhnjk32.exeDngjff32.exeDbbffdlq.exeDfnbgc32.exeEiloco32.exeEmhkdmlg.exeEofgpikj.exeEbdcld32.exeEiokinbk.exeEkmhejao.exeEnkdaepb.exeEfblbbqd.exeEiahnnph.exeEkodjiol.exeEnnqfenp.exeEfeihb32.exeEicedn32.exeEmoadlfo.exeEpmmqheb.exeEblimcdf.exeEejeiocj.exeEmanjldl.exeEppjfgcp.exeEbnfbcbc.exeFelbnn32.exeFlfkkhid.exeFbpchb32.exeFeoodn32.exeFmfgek32.exeFngcmcfe.exeFbbpmb32.exeFealin32.exeFmhdkknd.exeFpgpgfmh.exeFbelcblk.exeFechomko.exeFmkqpkla.exeFpimlfke.exeFbgihaji.exeFefedmil.exeFmmmfj32.exeFpkibf32.exeGfeaopqo.exepid process 3508 Cohkokgj.exe 776 Cfbcke32.exe 2212 Dokgdkeh.exe 5088 Dbicpfdk.exe 4968 Ddgplado.exe 1652 Dhclmp32.exe 3160 Dkahilkl.exe 2932 Dnpdegjp.exe 3940 Dfglfdkb.exe 4960 Ddjmba32.exe 4128 Dmadco32.exe 2600 Dkceokii.exe 4156 Dnbakghm.exe 4992 Dfiildio.exe 3648 Ddligq32.exe 2816 Dmcain32.exe 2760 Dkfadkgf.exe 792 Dndnpf32.exe 4312 Dbpjaeoc.exe 4120 Ddnfmqng.exe 3552 Dijbno32.exe 540 Dkhnjk32.exe 4428 Dngjff32.exe 2572 Dbbffdlq.exe 5100 Dfnbgc32.exe 552 Eiloco32.exe 2180 Emhkdmlg.exe 4040 Eofgpikj.exe 4704 Ebdcld32.exe 2508 Eiokinbk.exe 3936 Ekmhejao.exe 4116 Enkdaepb.exe 4164 Efblbbqd.exe 1840 Eiahnnph.exe 1132 Ekodjiol.exe 3116 Ennqfenp.exe 3708 Efeihb32.exe 784 Eicedn32.exe 5020 Emoadlfo.exe 1688 Epmmqheb.exe 1148 Eblimcdf.exe 4908 Eejeiocj.exe 3668 Emanjldl.exe 2956 Eppjfgcp.exe 4596 Ebnfbcbc.exe 2328 Felbnn32.exe 3868 Flfkkhid.exe 1636 Fbpchb32.exe 4396 Feoodn32.exe 3896 Fmfgek32.exe 2736 Fngcmcfe.exe 3600 Fbbpmb32.exe 3492 Fealin32.exe 220 Fmhdkknd.exe 3536 Fpgpgfmh.exe 3004 Fbelcblk.exe 4036 Fechomko.exe 2948 Fmkqpkla.exe 3084 Fpimlfke.exe 2924 Fbgihaji.exe 3628 Fefedmil.exe 3660 Fmmmfj32.exe 2468 Fpkibf32.exe 4352 Gfeaopqo.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ebdcld32.exeObnehj32.exeMdbnmbhj.exeNfpghccm.exeCbkfbcpb.exeJocefm32.exeEqiibjlj.exeCidgdg32.exeFnnimbaj.exeDdgplado.exeEdaaccbj.exeKajfdk32.exeFckaeioa.exeDngobghg.exeGiboijgb.exePaomog32.exePdbbfadn.exeCfbcke32.exeInebjihf.exeIencmm32.exeCepadh32.exeIgneda32.exeHqjcgbbo.exeMffjnc32.exeDinael32.exeEkljpm32.exePmoagk32.exeOdbpij32.exeImhjlb32.exeDjpfbahm.exeEicedn32.exeJghpbk32.exeQdoacabq.exeOjqcnhkl.exeGjcmngnj.exeQdflaa32.exeBoihcf32.exeGihpkd32.exeGqpapacd.exePkholi32.exeBpaikm32.exeIgfclkdj.exeDamfao32.exeEomffaag.exeCkbncapd.exeNfdfoala.exeOpfnne32.exeDhclmp32.exeLoighj32.exeCppelkeb.exeCfhhml32.exeJanpnfee.exeDhmgfm32.exeGjdknjep.exeHphfac32.exeLibido32.exeKabcopmg.exeAbpcja32.exeQkakhakq.exeNhfoocaa.exeKflide32.exeQjiipk32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Eiokinbk.exe Ebdcld32.exe File created C:\Windows\SysWOW64\Fljhbbae.dll Obnehj32.exe File created C:\Windows\SysWOW64\Jbkeki32.dll Mdbnmbhj.exe File created C:\Windows\SysWOW64\Cbpijjbj.dll Nfpghccm.exe File created C:\Windows\SysWOW64\Fdakcc32.dll Cbkfbcpb.exe File created C:\Windows\SysWOW64\Pmcckk32.dll Jocefm32.exe File opened for modification C:\Windows\SysWOW64\Ehpadhll.exe Eqiibjlj.exe File created C:\Windows\SysWOW64\Ngllodpm.dll Cidgdg32.exe File created C:\Windows\SysWOW64\Fenapa32.dll Fnnimbaj.exe File created C:\Windows\SysWOW64\Ppioondd.dll Ddgplado.exe File opened for modification C:\Windows\SysWOW64\Ecdbop32.exe Edaaccbj.exe File created C:\Windows\SysWOW64\Anjkcakk.dll Kajfdk32.exe File created C:\Windows\SysWOW64\Fmnfcojj.dll Fckaeioa.exe File created C:\Windows\SysWOW64\Mlipbfgc.dll Dngobghg.exe File opened for modification C:\Windows\SysWOW64\Glqkefff.exe Giboijgb.exe File created C:\Windows\SysWOW64\Cpiinc32.dll Paomog32.exe File created C:\Windows\SysWOW64\Pjoknhbe.exe Pdbbfadn.exe File created C:\Windows\SysWOW64\Kiljgf32.dll Cfbcke32.exe File opened for modification C:\Windows\SysWOW64\Iijfhbhl.exe Inebjihf.exe File opened for modification C:\Windows\SysWOW64\Iaedanal.exe Iencmm32.exe File created C:\Windows\SysWOW64\Dfonnk32.exe Cepadh32.exe File created C:\Windows\SysWOW64\Didhmpdm.dll Igneda32.exe File created C:\Windows\SysWOW64\Mkikgh32.dll Hqjcgbbo.exe File created C:\Windows\SysWOW64\Mmpbkm32.exe Mffjnc32.exe File opened for modification C:\Windows\SysWOW64\Dphiaffa.exe Dinael32.exe File created C:\Windows\SysWOW64\Enjfli32.exe Ekljpm32.exe File opened for modification C:\Windows\SysWOW64\Pcijce32.exe Pmoagk32.exe File created C:\Windows\SysWOW64\Ogqmee32.exe Odbpij32.exe File created C:\Windows\SysWOW64\Ofigcd32.dll Imhjlb32.exe File created C:\Windows\SysWOW64\Dajnol32.exe Djpfbahm.exe File created C:\Windows\SysWOW64\Ggpcfd32.dll Eicedn32.exe File created C:\Windows\SysWOW64\Jiglnf32.exe Jghpbk32.exe File opened for modification C:\Windows\SysWOW64\Qjiipk32.exe Qdoacabq.exe File created C:\Windows\SysWOW64\Omopjcjp.exe Ojqcnhkl.exe File opened for modification C:\Windows\SysWOW64\Gdiakp32.exe Gjcmngnj.exe File opened for modification C:\Windows\SysWOW64\Qjcdih32.exe Qdflaa32.exe File created C:\Windows\SysWOW64\Domdocba.dll Boihcf32.exe File created C:\Windows\SysWOW64\Glfmgp32.exe Gihpkd32.exe File created C:\Windows\SysWOW64\Bbfqflph.dll Gqpapacd.exe File opened for modification C:\Windows\SysWOW64\Pbbgicnd.exe Pkholi32.exe File created C:\Windows\SysWOW64\Beobcdoi.exe Bpaikm32.exe File created C:\Windows\SysWOW64\Iidphgcn.exe Igfclkdj.exe File opened for modification C:\Windows\SysWOW64\Doagjc32.exe Damfao32.exe File created C:\Windows\SysWOW64\Fgcpfdbd.dll Eomffaag.exe File created C:\Windows\SysWOW64\Ckdkhq32.exe Ckbncapd.exe File opened for modification C:\Windows\SysWOW64\Imknli32.exe Igneda32.exe File created C:\Windows\SysWOW64\Paiqjieh.dll Nfdfoala.exe File opened for modification C:\Windows\SysWOW64\Okkalnjm.exe Opfnne32.exe File opened for modification C:\Windows\SysWOW64\Dokgdkeh.exe Cfbcke32.exe File created C:\Windows\SysWOW64\Dkahilkl.exe Dhclmp32.exe File created C:\Windows\SysWOW64\Lgpoihnl.exe Loighj32.exe File created C:\Windows\SysWOW64\Cfjnhe32.exe Cppelkeb.exe File opened for modification C:\Windows\SysWOW64\Cmbpjfij.exe Cfhhml32.exe File created C:\Windows\SysWOW64\Dfcojl32.dll Janpnfee.exe File created C:\Windows\SysWOW64\Fnkcdoia.dll Dhmgfm32.exe File opened for modification C:\Windows\SysWOW64\Glchjedc.exe Gjdknjep.exe File created C:\Windows\SysWOW64\Cljmka32.dll Hphfac32.exe File created C:\Windows\SysWOW64\Ldgnbg32.exe Libido32.exe File created C:\Windows\SysWOW64\Ncjakdno.dll Kabcopmg.exe File opened for modification C:\Windows\SysWOW64\Amfhgj32.exe Abpcja32.exe File created C:\Windows\SysWOW64\Qffoejkg.exe Qkakhakq.exe File opened for modification C:\Windows\SysWOW64\Nmbhgjoi.exe Nhfoocaa.exe File created C:\Windows\SysWOW64\Kncaec32.exe Kflide32.exe File opened for modification C:\Windows\SysWOW64\Qacameaj.exe Qjiipk32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 10536 10448 WerFault.exe Eldlhckj.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Iidphgcn.exeKhbiello.exeDmadco32.exeDkhnjk32.exeHedafk32.exeNoppeaed.exeIcgbob32.exeNhicoi32.exeClbdpc32.exeHjjldpdf.exeJfmekm32.exeJphkkpbp.exeEkonpckp.exeIbegfglj.exeEjjaqk32.exeNoaeqjpe.exeLeqkeajd.exeDnienqbi.exeEfeihb32.exeJcfggkac.exeQacameaj.exeGihpkd32.exeNoblkqca.exebf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exeDfnbgc32.exeHclccd32.exeKebodc32.exeKeekjc32.exeGikdkj32.exeCepadh32.exeQdflaa32.exeImkbnf32.exePaiogf32.exePmmeak32.exeNnoefagj.exeFkjmlaac.exeDknnoofg.exeKdmlkfjb.exeLlmhaold.exeOanokhdb.exePmpolgoi.exeOjhiogdd.exeEebgqe32.exeMqdcnl32.exeIgjlibib.exeKcmmhj32.exeBogkmgba.exeFnglcqio.exeLmfodn32.exeIepaaico.exeKgflcifg.exeBoldhf32.exeChiblk32.exeImfmgcdn.exeDdligq32.exeFdadpk32.exePdbbfadn.exeCejjdlap.exeOjomcopk.exeFndpmndl.exeJekjcaef.exeGldglf32.exeKofdhd32.exeEkmhejao.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iidphgcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khbiello.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmadco32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkhnjk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hedafk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Noppeaed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icgbob32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhicoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clbdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjjldpdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfmekm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jphkkpbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekonpckp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ibegfglj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ejjaqk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Noaeqjpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Leqkeajd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnienqbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efeihb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcfggkac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qacameaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gihpkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Noblkqca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnbgc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hclccd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kebodc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keekjc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gikdkj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cepadh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qdflaa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imkbnf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Paiogf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmmeak32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nnoefagj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkjmlaac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknnoofg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdmlkfjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llmhaold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oanokhdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmpolgoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojhiogdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eebgqe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mqdcnl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igjlibib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcmmhj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bogkmgba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fnglcqio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmfodn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iepaaico.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgflcifg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boldhf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chiblk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imfmgcdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddligq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdadpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdbbfadn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cejjdlap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojomcopk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fndpmndl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jekjcaef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gldglf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kofdhd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekmhejao.exe -
Modifies registry class 64 IoCs
Processes:
Pgaelcgm.exeMcbpjg32.exeHhdcmp32.exeNcaklhdi.exeOfijnbkb.exeKjpgmj32.exeDngobghg.exeFbelcblk.exeAmfobp32.exeFlcfnn32.exeNaokbokn.exeEiokinbk.exeFkjmlaac.exeMaaekg32.exeOjomcopk.exeOfkgcobj.exeOoibkpmi.exeCbihmg32.exeFpqgjf32.exeNkghqo32.exeAmjbbfgo.exeAgimkk32.exeEhpadhll.exeDcnlnaom.exeNkhfek32.exeFefjanml.exeNjjdho32.exeHlmchoan.exeLklnconj.exeAinnhdbp.exeDabhomea.exeEnkdaepb.exeKmlgcf32.exeOhdbkh32.exeAjodef32.exeGflcnanp.exeDkfadkgf.exeDbbffdlq.exePjmjdm32.exeDkhgod32.exeFnbcgn32.exeOkailj32.exeOgmiepcf.exeFoonjd32.exeNnafno32.exeNjmqnobn.exePcegclgp.exeEjlnfjbd.exeIaedanal.exeDfonnk32.exeMffjnc32.exeHmbphg32.exeMqfpckhm.exeCefoni32.exeFajbjh32.exeMohidbkl.exeMdbnmbhj.exeNlgbon32.exeImfmgcdn.exeJcnbekok.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgaelcgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcbpjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhdcmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncaklhdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Miiepfpf.dll" Ofijnbkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjpgmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dngobghg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbelcblk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amfobp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flcfnn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Naokbokn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eiokinbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkjmlaac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lggfcd32.dll" Maaekg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Maaekg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojomcopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kibohd32.dll" Ofkgcobj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ooibkpmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbihmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpqgjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eifhac32.dll" Nkghqo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amjbbfgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agimkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlbkmokh.dll" Ehpadhll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iplfokdm.dll" Dcnlnaom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkhfek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhjabbic.dll" Fefjanml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnmodnoo.dll" Njjdho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofkgcobj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlmchoan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lklnconj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ainnhdbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dabhomea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akcaoeoo.dll" Enkdaepb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmlgcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ohdbkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fijbhpbc.dll" Ajodef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofijnbkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gflcnanp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oidalg32.dll" Dkfadkgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbbffdlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbdjofbi.dll" Pjmjdm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkhgod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnbcgn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okailj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogmiepcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeqgecof.dll" Ohdbkh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Foonjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcokoohi.dll" Nnafno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njmqnobn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcegclgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flpbbbdk.dll" Ejlnfjbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iaedanal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfonnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oedeli32.dll" Mffjnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmbphg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mqfpckhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Midbjmkg.dll" Cefoni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fajbjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfpqiega.dll" Mohidbkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdbnmbhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbdenofm.dll" Nlgbon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcdfimja.dll" Imfmgcdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcnbekok.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exeCohkokgj.exeCfbcke32.exeDokgdkeh.exeDbicpfdk.exeDdgplado.exeDhclmp32.exeDkahilkl.exeDnpdegjp.exeDfglfdkb.exeDdjmba32.exeDmadco32.exeDkceokii.exeDnbakghm.exeDfiildio.exeDdligq32.exeDmcain32.exeDkfadkgf.exeDndnpf32.exeDbpjaeoc.exeDdnfmqng.exeDijbno32.exedescription pid process target process PID 2156 wrote to memory of 3508 2156 bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe Cohkokgj.exe PID 2156 wrote to memory of 3508 2156 bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe Cohkokgj.exe PID 2156 wrote to memory of 3508 2156 bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe Cohkokgj.exe PID 3508 wrote to memory of 776 3508 Cohkokgj.exe Cfbcke32.exe PID 3508 wrote to memory of 776 3508 Cohkokgj.exe Cfbcke32.exe PID 3508 wrote to memory of 776 3508 Cohkokgj.exe Cfbcke32.exe PID 776 wrote to memory of 2212 776 Cfbcke32.exe Dokgdkeh.exe PID 776 wrote to memory of 2212 776 Cfbcke32.exe Dokgdkeh.exe PID 776 wrote to memory of 2212 776 Cfbcke32.exe Dokgdkeh.exe PID 2212 wrote to memory of 5088 2212 Dokgdkeh.exe Dbicpfdk.exe PID 2212 wrote to memory of 5088 2212 Dokgdkeh.exe Dbicpfdk.exe PID 2212 wrote to memory of 5088 2212 Dokgdkeh.exe Dbicpfdk.exe PID 5088 wrote to memory of 4968 5088 Dbicpfdk.exe Ddgplado.exe PID 5088 wrote to memory of 4968 5088 Dbicpfdk.exe Ddgplado.exe PID 5088 wrote to memory of 4968 5088 Dbicpfdk.exe Ddgplado.exe PID 4968 wrote to memory of 1652 4968 Ddgplado.exe Dhclmp32.exe PID 4968 wrote to memory of 1652 4968 Ddgplado.exe Dhclmp32.exe PID 4968 wrote to memory of 1652 4968 Ddgplado.exe Dhclmp32.exe PID 1652 wrote to memory of 3160 1652 Dhclmp32.exe Dkahilkl.exe PID 1652 wrote to memory of 3160 1652 Dhclmp32.exe Dkahilkl.exe PID 1652 wrote to memory of 3160 1652 Dhclmp32.exe Dkahilkl.exe PID 3160 wrote to memory of 2932 3160 Dkahilkl.exe Dnpdegjp.exe PID 3160 wrote to memory of 2932 3160 Dkahilkl.exe Dnpdegjp.exe PID 3160 wrote to memory of 2932 3160 Dkahilkl.exe Dnpdegjp.exe PID 2932 wrote to memory of 3940 2932 Dnpdegjp.exe Dfglfdkb.exe PID 2932 wrote to memory of 3940 2932 Dnpdegjp.exe Dfglfdkb.exe PID 2932 wrote to memory of 3940 2932 Dnpdegjp.exe Dfglfdkb.exe PID 3940 wrote to memory of 4960 3940 Dfglfdkb.exe Ddjmba32.exe PID 3940 wrote to memory of 4960 3940 Dfglfdkb.exe Ddjmba32.exe PID 3940 wrote to memory of 4960 3940 Dfglfdkb.exe Ddjmba32.exe PID 4960 wrote to memory of 4128 4960 Ddjmba32.exe Dmadco32.exe PID 4960 wrote to memory of 4128 4960 Ddjmba32.exe Dmadco32.exe PID 4960 wrote to memory of 4128 4960 Ddjmba32.exe Dmadco32.exe PID 4128 wrote to memory of 2600 4128 Dmadco32.exe Dkceokii.exe PID 4128 wrote to memory of 2600 4128 Dmadco32.exe Dkceokii.exe PID 4128 wrote to memory of 2600 4128 Dmadco32.exe Dkceokii.exe PID 2600 wrote to memory of 4156 2600 Dkceokii.exe Dnbakghm.exe PID 2600 wrote to memory of 4156 2600 Dkceokii.exe Dnbakghm.exe PID 2600 wrote to memory of 4156 2600 Dkceokii.exe Dnbakghm.exe PID 4156 wrote to memory of 4992 4156 Dnbakghm.exe Dfiildio.exe PID 4156 wrote to memory of 4992 4156 Dnbakghm.exe Dfiildio.exe PID 4156 wrote to memory of 4992 4156 Dnbakghm.exe Dfiildio.exe PID 4992 wrote to memory of 3648 4992 Dfiildio.exe Ddligq32.exe PID 4992 wrote to memory of 3648 4992 Dfiildio.exe Ddligq32.exe PID 4992 wrote to memory of 3648 4992 Dfiildio.exe Ddligq32.exe PID 3648 wrote to memory of 2816 3648 Ddligq32.exe Dmcain32.exe PID 3648 wrote to memory of 2816 3648 Ddligq32.exe Dmcain32.exe PID 3648 wrote to memory of 2816 3648 Ddligq32.exe Dmcain32.exe PID 2816 wrote to memory of 2760 2816 Dmcain32.exe Dkfadkgf.exe PID 2816 wrote to memory of 2760 2816 Dmcain32.exe Dkfadkgf.exe PID 2816 wrote to memory of 2760 2816 Dmcain32.exe Dkfadkgf.exe PID 2760 wrote to memory of 792 2760 Dkfadkgf.exe Dndnpf32.exe PID 2760 wrote to memory of 792 2760 Dkfadkgf.exe Dndnpf32.exe PID 2760 wrote to memory of 792 2760 Dkfadkgf.exe Dndnpf32.exe PID 792 wrote to memory of 4312 792 Dndnpf32.exe Dbpjaeoc.exe PID 792 wrote to memory of 4312 792 Dndnpf32.exe Dbpjaeoc.exe PID 792 wrote to memory of 4312 792 Dndnpf32.exe Dbpjaeoc.exe PID 4312 wrote to memory of 4120 4312 Dbpjaeoc.exe Ddnfmqng.exe PID 4312 wrote to memory of 4120 4312 Dbpjaeoc.exe Ddnfmqng.exe PID 4312 wrote to memory of 4120 4312 Dbpjaeoc.exe Ddnfmqng.exe PID 4120 wrote to memory of 3552 4120 Ddnfmqng.exe Dijbno32.exe PID 4120 wrote to memory of 3552 4120 Ddnfmqng.exe Dijbno32.exe PID 4120 wrote to memory of 3552 4120 Ddnfmqng.exe Dijbno32.exe PID 3552 wrote to memory of 540 3552 Dijbno32.exe Dkhnjk32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe"C:\Users\Admin\AppData\Local\Temp\bf426294169920c959009c5dafba77c4bd14571448dcadc1598e354b9a5fa924.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\Cohkokgj.exeC:\Windows\system32\Cohkokgj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\Cfbcke32.exeC:\Windows\system32\Cfbcke32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\Dokgdkeh.exeC:\Windows\system32\Dokgdkeh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\Dbicpfdk.exeC:\Windows\system32\Dbicpfdk.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\Ddgplado.exeC:\Windows\system32\Ddgplado.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\Dhclmp32.exeC:\Windows\system32\Dhclmp32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\Dkahilkl.exeC:\Windows\system32\Dkahilkl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\Dnpdegjp.exeC:\Windows\system32\Dnpdegjp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Dfglfdkb.exeC:\Windows\system32\Dfglfdkb.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\Ddjmba32.exeC:\Windows\system32\Ddjmba32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Dmadco32.exeC:\Windows\system32\Dmadco32.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\Dkceokii.exeC:\Windows\system32\Dkceokii.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Dnbakghm.exeC:\Windows\system32\Dnbakghm.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\Dfiildio.exeC:\Windows\system32\Dfiildio.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\Ddligq32.exeC:\Windows\system32\Ddligq32.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\Dmcain32.exeC:\Windows\system32\Dmcain32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Dkfadkgf.exeC:\Windows\system32\Dkfadkgf.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Dndnpf32.exeC:\Windows\system32\Dndnpf32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\Dbpjaeoc.exeC:\Windows\system32\Dbpjaeoc.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\Ddnfmqng.exeC:\Windows\system32\Ddnfmqng.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\Dijbno32.exeC:\Windows\system32\Dijbno32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\Dkhnjk32.exeC:\Windows\system32\Dkhnjk32.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\Dngjff32.exeC:\Windows\system32\Dngjff32.exe24⤵
- Executes dropped EXE
PID:4428 -
C:\Windows\SysWOW64\Dbbffdlq.exeC:\Windows\system32\Dbbffdlq.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:2572 -
C:\Windows\SysWOW64\Dfnbgc32.exeC:\Windows\system32\Dfnbgc32.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5100 -
C:\Windows\SysWOW64\Eiloco32.exeC:\Windows\system32\Eiloco32.exe27⤵
- Executes dropped EXE
PID:552 -
C:\Windows\SysWOW64\Emhkdmlg.exeC:\Windows\system32\Emhkdmlg.exe28⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\Eofgpikj.exeC:\Windows\system32\Eofgpikj.exe29⤵
- Executes dropped EXE
PID:4040 -
C:\Windows\SysWOW64\Ebdcld32.exeC:\Windows\system32\Ebdcld32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4704 -
C:\Windows\SysWOW64\Eiokinbk.exeC:\Windows\system32\Eiokinbk.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\Ekmhejao.exeC:\Windows\system32\Ekmhejao.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Windows\SysWOW64\Enkdaepb.exeC:\Windows\system32\Enkdaepb.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4116 -
C:\Windows\SysWOW64\Efblbbqd.exeC:\Windows\system32\Efblbbqd.exe34⤵
- Executes dropped EXE
PID:4164 -
C:\Windows\SysWOW64\Eiahnnph.exeC:\Windows\system32\Eiahnnph.exe35⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\SysWOW64\Ekodjiol.exeC:\Windows\system32\Ekodjiol.exe36⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Ennqfenp.exeC:\Windows\system32\Ennqfenp.exe37⤵
- Executes dropped EXE
PID:3116 -
C:\Windows\SysWOW64\Efeihb32.exeC:\Windows\system32\Efeihb32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3708 -
C:\Windows\SysWOW64\Eicedn32.exeC:\Windows\system32\Eicedn32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:784 -
C:\Windows\SysWOW64\Emoadlfo.exeC:\Windows\system32\Emoadlfo.exe40⤵
- Executes dropped EXE
PID:5020 -
C:\Windows\SysWOW64\Epmmqheb.exeC:\Windows\system32\Epmmqheb.exe41⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\Eblimcdf.exeC:\Windows\system32\Eblimcdf.exe42⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Eejeiocj.exeC:\Windows\system32\Eejeiocj.exe43⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\Emanjldl.exeC:\Windows\system32\Emanjldl.exe44⤵
- Executes dropped EXE
PID:3668 -
C:\Windows\SysWOW64\Eppjfgcp.exeC:\Windows\system32\Eppjfgcp.exe45⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\Ebnfbcbc.exeC:\Windows\system32\Ebnfbcbc.exe46⤵
- Executes dropped EXE
PID:4596 -
C:\Windows\SysWOW64\Felbnn32.exeC:\Windows\system32\Felbnn32.exe47⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\Flfkkhid.exeC:\Windows\system32\Flfkkhid.exe48⤵
- Executes dropped EXE
PID:3868 -
C:\Windows\SysWOW64\Fbpchb32.exeC:\Windows\system32\Fbpchb32.exe49⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\Feoodn32.exeC:\Windows\system32\Feoodn32.exe50⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\Fmfgek32.exeC:\Windows\system32\Fmfgek32.exe51⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\Fngcmcfe.exeC:\Windows\system32\Fngcmcfe.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\Fbbpmb32.exeC:\Windows\system32\Fbbpmb32.exe53⤵
- Executes dropped EXE
PID:3600 -
C:\Windows\SysWOW64\Fealin32.exeC:\Windows\system32\Fealin32.exe54⤵
- Executes dropped EXE
PID:3492 -
C:\Windows\SysWOW64\Fmhdkknd.exeC:\Windows\system32\Fmhdkknd.exe55⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Fpgpgfmh.exeC:\Windows\system32\Fpgpgfmh.exe56⤵
- Executes dropped EXE
PID:3536 -
C:\Windows\SysWOW64\Fbelcblk.exeC:\Windows\system32\Fbelcblk.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Fechomko.exeC:\Windows\system32\Fechomko.exe58⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\Fmkqpkla.exeC:\Windows\system32\Fmkqpkla.exe59⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\Fpimlfke.exeC:\Windows\system32\Fpimlfke.exe60⤵
- Executes dropped EXE
PID:3084 -
C:\Windows\SysWOW64\Fbgihaji.exeC:\Windows\system32\Fbgihaji.exe61⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\SysWOW64\Fefedmil.exeC:\Windows\system32\Fefedmil.exe62⤵
- Executes dropped EXE
PID:3628 -
C:\Windows\SysWOW64\Fmmmfj32.exeC:\Windows\system32\Fmmmfj32.exe63⤵
- Executes dropped EXE
PID:3660 -
C:\Windows\SysWOW64\Fpkibf32.exeC:\Windows\system32\Fpkibf32.exe64⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\Gfeaopqo.exeC:\Windows\system32\Gfeaopqo.exe65⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\Gidnkkpc.exeC:\Windows\system32\Gidnkkpc.exe66⤵PID:1328
-
C:\Windows\SysWOW64\Glbjggof.exeC:\Windows\system32\Glbjggof.exe67⤵PID:3044
-
C:\Windows\SysWOW64\Gnqfcbnj.exeC:\Windows\system32\Gnqfcbnj.exe68⤵PID:3644
-
C:\Windows\SysWOW64\Gfhndpol.exeC:\Windows\system32\Gfhndpol.exe69⤵PID:4648
-
C:\Windows\SysWOW64\Gifkpknp.exeC:\Windows\system32\Gifkpknp.exe70⤵PID:3740
-
C:\Windows\SysWOW64\Gldglf32.exeC:\Windows\system32\Gldglf32.exe71⤵
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Windows\SysWOW64\Gncchb32.exeC:\Windows\system32\Gncchb32.exe72⤵PID:4516
-
C:\Windows\SysWOW64\Gfjkjo32.exeC:\Windows\system32\Gfjkjo32.exe73⤵PID:372
-
C:\Windows\SysWOW64\Gmdcfidg.exeC:\Windows\system32\Gmdcfidg.exe74⤵PID:1896
-
C:\Windows\SysWOW64\Gpbpbecj.exeC:\Windows\system32\Gpbpbecj.exe75⤵PID:5124
-
C:\Windows\SysWOW64\Gbalopbn.exeC:\Windows\system32\Gbalopbn.exe76⤵PID:5164
-
C:\Windows\SysWOW64\Gikdkj32.exeC:\Windows\system32\Gikdkj32.exe77⤵
- System Location Discovery: System Language Discovery
PID:5204 -
C:\Windows\SysWOW64\Glipgf32.exeC:\Windows\system32\Glipgf32.exe78⤵PID:5244
-
C:\Windows\SysWOW64\Goglcahb.exeC:\Windows\system32\Goglcahb.exe79⤵PID:5284
-
C:\Windows\SysWOW64\Gfodeohd.exeC:\Windows\system32\Gfodeohd.exe80⤵PID:5324
-
C:\Windows\SysWOW64\Gimqajgh.exeC:\Windows\system32\Gimqajgh.exe81⤵PID:5364
-
C:\Windows\SysWOW64\Gpgind32.exeC:\Windows\system32\Gpgind32.exe82⤵PID:5408
-
C:\Windows\SysWOW64\Gbeejp32.exeC:\Windows\system32\Gbeejp32.exe83⤵PID:5444
-
C:\Windows\SysWOW64\Hedafk32.exeC:\Windows\system32\Hedafk32.exe84⤵
- System Location Discovery: System Language Discovery
PID:5484 -
C:\Windows\SysWOW64\Hmkigh32.exeC:\Windows\system32\Hmkigh32.exe85⤵PID:5524
-
C:\Windows\SysWOW64\Hpiecd32.exeC:\Windows\system32\Hpiecd32.exe86⤵PID:5564
-
C:\Windows\SysWOW64\Hbhboolf.exeC:\Windows\system32\Hbhboolf.exe87⤵PID:5604
-
C:\Windows\SysWOW64\Hefnkkkj.exeC:\Windows\system32\Hefnkkkj.exe88⤵PID:5648
-
C:\Windows\SysWOW64\Hmmfmhll.exeC:\Windows\system32\Hmmfmhll.exe89⤵PID:5696
-
C:\Windows\SysWOW64\Hplbickp.exeC:\Windows\system32\Hplbickp.exe90⤵PID:5728
-
C:\Windows\SysWOW64\Hffken32.exeC:\Windows\system32\Hffken32.exe91⤵PID:5776
-
C:\Windows\SysWOW64\Hidgai32.exeC:\Windows\system32\Hidgai32.exe92⤵PID:5812
-
C:\Windows\SysWOW64\Hlbcnd32.exeC:\Windows\system32\Hlbcnd32.exe93⤵PID:5856
-
C:\Windows\SysWOW64\Hblkjo32.exeC:\Windows\system32\Hblkjo32.exe94⤵PID:5892
-
C:\Windows\SysWOW64\Hekgfj32.exeC:\Windows\system32\Hekgfj32.exe95⤵PID:5936
-
C:\Windows\SysWOW64\Hmbphg32.exeC:\Windows\system32\Hmbphg32.exe96⤵
- Modifies registry class
PID:5972 -
C:\Windows\SysWOW64\Hpqldc32.exeC:\Windows\system32\Hpqldc32.exe97⤵PID:6012
-
C:\Windows\SysWOW64\Hfjdqmng.exeC:\Windows\system32\Hfjdqmng.exe98⤵PID:6056
-
C:\Windows\SysWOW64\Hiipmhmk.exeC:\Windows\system32\Hiipmhmk.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6092 -
C:\Windows\SysWOW64\Hlglidlo.exeC:\Windows\system32\Hlglidlo.exe100⤵PID:6136
-
C:\Windows\SysWOW64\Hoeieolb.exeC:\Windows\system32\Hoeieolb.exe101⤵PID:4088
-
C:\Windows\SysWOW64\Iepaaico.exeC:\Windows\system32\Iepaaico.exe102⤵
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\Imgicgca.exeC:\Windows\system32\Imgicgca.exe103⤵PID:4520
-
C:\Windows\SysWOW64\Iliinc32.exeC:\Windows\system32\Iliinc32.exe104⤵PID:2560
-
C:\Windows\SysWOW64\Iohejo32.exeC:\Windows\system32\Iohejo32.exe105⤵PID:2228
-
C:\Windows\SysWOW64\Ifomll32.exeC:\Windows\system32\Ifomll32.exe106⤵PID:1040
-
C:\Windows\SysWOW64\Iinjhh32.exeC:\Windows\system32\Iinjhh32.exe107⤵PID:4464
-
C:\Windows\SysWOW64\Illfdc32.exeC:\Windows\system32\Illfdc32.exe108⤵PID:1984
-
C:\Windows\SysWOW64\Iojbpo32.exeC:\Windows\system32\Iojbpo32.exe109⤵PID:336
-
C:\Windows\SysWOW64\Igajal32.exeC:\Windows\system32\Igajal32.exe110⤵PID:5148
-
C:\Windows\SysWOW64\Iipfmggc.exeC:\Windows\system32\Iipfmggc.exe111⤵PID:5220
-
C:\Windows\SysWOW64\Imkbnf32.exeC:\Windows\system32\Imkbnf32.exe112⤵
- System Location Discovery: System Language Discovery
PID:5280 -
C:\Windows\SysWOW64\Iomoenej.exeC:\Windows\system32\Iomoenej.exe113⤵PID:5352
-
C:\Windows\SysWOW64\Igdgglfl.exeC:\Windows\system32\Igdgglfl.exe114⤵PID:5404
-
C:\Windows\SysWOW64\Iibccgep.exeC:\Windows\system32\Iibccgep.exe115⤵PID:3316
-
C:\Windows\SysWOW64\Iplkpa32.exeC:\Windows\system32\Iplkpa32.exe116⤵PID:4976
-
C:\Windows\SysWOW64\Ioolkncg.exeC:\Windows\system32\Ioolkncg.exe117⤵PID:5600
-
C:\Windows\SysWOW64\Igfclkdj.exeC:\Windows\system32\Igfclkdj.exe118⤵
- Drops file in System32 directory
PID:228 -
C:\Windows\SysWOW64\Iidphgcn.exeC:\Windows\system32\Iidphgcn.exe119⤵
- System Location Discovery: System Language Discovery
PID:5724 -
C:\Windows\SysWOW64\Ilcldb32.exeC:\Windows\system32\Ilcldb32.exe120⤵PID:4628
-
C:\Windows\SysWOW64\Joahqn32.exeC:\Windows\system32\Joahqn32.exe121⤵PID:5840
-
C:\Windows\SysWOW64\Jghpbk32.exeC:\Windows\system32\Jghpbk32.exe122⤵
- Drops file in System32 directory
PID:5888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-