Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 06:18
Behavioral task
behavioral1
Sample
d2b3c3194268d72c2ea8d15d671e3b6f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d2b3c3194268d72c2ea8d15d671e3b6f.exe
Resource
win10v2004-20240412-en
General
-
Target
d2b3c3194268d72c2ea8d15d671e3b6f.exe
-
Size
362KB
-
MD5
d2b3c3194268d72c2ea8d15d671e3b6f
-
SHA1
61617c6f2100302a135737beb7174d2d7ff773fe
-
SHA256
dc555e92429d71d3bfcee291d6404889bf2ea9fe084f3903b9f87ad8768d109b
-
SHA512
71a8faf6bfaad37cb5bcc1c66d2a2997751bd68b0b9a445493f1db4c8a2b767d737f4d29b2aeb85d9e7accd6e111d41398af1abf519a31f52df44731aa669288
-
SSDEEP
6144:XaipJnqfSPttGDuMEUrQVad7nG3mbDp2o+SsmiMyhtHEyr5psPc1aj8DOvlvuZxF:XaipJqaltmuMtrQ07nGWxWSsmiMyh95V
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Gbkgnfbd.exeHanlnp32.exeKjifhc32.exeLeljop32.exeIkkjbe32.exeKeoapb32.exeKpmlkp32.exeNondgn32.exeNaajoinb.exeQpgpkcpp.exeDfamcogo.exeEdnpej32.exeKeednado.exeOjcecjee.exeGmpgio32.exeGpejeihi.exeDcenlceh.exeHbfbgd32.exeLhpfqama.exeAdpkee32.exeMcegmm32.exeBaakhm32.exeGebbnpfp.exeMmneda32.exeMhhfdo32.exeAaaoij32.exeBdgafdfp.exed2b3c3194268d72c2ea8d15d671e3b6f.exeMlkopcge.exeCdgneh32.exeGdgcpi32.exeHgmalg32.exeCnaocmmi.exeDookgcij.exeMamddf32.exeCkoilb32.exeEchfaf32.exeHkcdafqb.exeHggomh32.exeKfegbj32.exeNoqamn32.exeKbfhbeek.exeHacmcfge.exePeiepfgg.exeJnemdecl.exeNcgdbmmp.exePgioaa32.exeChpmpg32.exeHiqbndpb.exeOcnfbo32.exePdaoog32.exeAjjcbpdd.exeBpleef32.exeAehboi32.exeBdbhke32.exeMoidahcn.exeMdpjlajk.exeAjejgp32.exeMaedhd32.exeGhoegl32.exeJnclnihj.exeQcpofbjl.exeBhigphio.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gbkgnfbd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hanlnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kjifhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Leljop32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikkjbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Keoapb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpmlkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nondgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Naajoinb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qpgpkcpp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfamcogo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ednpej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Keednado.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojcecjee.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmpgio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpejeihi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcenlceh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hbfbgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lhpfqama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Adpkee32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcegmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baakhm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gebbnpfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmneda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhhfdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aaaoij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bdgafdfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d2b3c3194268d72c2ea8d15d671e3b6f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlkopcge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdgneh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gdgcpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hgmalg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cnaocmmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dookgcij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mamddf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckoilb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Echfaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hkcdafqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hggomh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfegbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Noqamn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kbfhbeek.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hacmcfge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Peiepfgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jnemdecl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncgdbmmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pgioaa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chpmpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hiqbndpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ocnfbo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdaoog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajjcbpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bpleef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aehboi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bdbhke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgmalg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Moidahcn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdpjlajk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajejgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Maedhd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghoegl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnclnihj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcpofbjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bhigphio.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Gegfdb32.exe family_berbew \Windows\SysWOW64\Gbkgnfbd.exe family_berbew C:\Windows\SysWOW64\Gelppaof.exe family_berbew C:\Windows\SysWOW64\Ghoegl32.exe family_berbew C:\Windows\SysWOW64\Hiqbndpb.exe family_berbew C:\Windows\SysWOW64\Hggomh32.exe family_berbew \Windows\SysWOW64\Hjhhocjj.exe family_berbew \Windows\SysWOW64\Hacmcfge.exe family_berbew \Windows\SysWOW64\Ifcbodli.exe family_berbew \Windows\SysWOW64\Igdogl32.exe family_berbew \Windows\SysWOW64\Iblpjdpk.exe family_berbew C:\Windows\SysWOW64\Idmhkpml.exe family_berbew \Windows\SysWOW64\Jnemdecl.exe family_berbew C:\Windows\SysWOW64\Jiondcpk.exe family_berbew \Windows\SysWOW64\Jmmfkafa.exe family_berbew C:\Windows\SysWOW64\Jkbcln32.exe family_berbew C:\Windows\SysWOW64\Jnclnihj.exe family_berbew C:\Windows\SysWOW64\Kneicieh.exe family_berbew C:\Windows\SysWOW64\Keoapb32.exe family_berbew C:\Windows\SysWOW64\Kgpjanje.exe family_berbew C:\Windows\SysWOW64\Kmmcjehm.exe family_berbew C:\Windows\SysWOW64\Kfegbj32.exe family_berbew C:\Windows\SysWOW64\Kpmlkp32.exe family_berbew behavioral1/memory/928-301-0x0000000000260000-0x00000000002A1000-memory.dmp family_berbew C:\Windows\SysWOW64\Kifpdelo.exe family_berbew behavioral1/memory/928-305-0x0000000000260000-0x00000000002A1000-memory.dmp family_berbew C:\Windows\SysWOW64\Llfifq32.exe family_berbew C:\Windows\SysWOW64\Lflmci32.exe family_berbew C:\Windows\SysWOW64\Lbcnhjnj.exe family_berbew C:\Windows\SysWOW64\Lhpfqama.exe family_berbew C:\Windows\SysWOW64\Ldfgebbe.exe family_berbew C:\Windows\SysWOW64\Ldidkbpb.exe family_berbew C:\Windows\SysWOW64\Mamddf32.exe family_berbew C:\Windows\SysWOW64\Mhgmapfi.exe family_berbew C:\Windows\SysWOW64\Mihiih32.exe family_berbew C:\Windows\SysWOW64\Mbpnanch.exe family_berbew C:\Windows\SysWOW64\Mkgfckcj.exe family_berbew C:\Windows\SysWOW64\Mdpjlajk.exe family_berbew C:\Windows\SysWOW64\Mimbdhhb.exe family_berbew C:\Windows\SysWOW64\Mlkopcge.exe family_berbew C:\Windows\SysWOW64\Mcegmm32.exe family_berbew C:\Windows\SysWOW64\Miooigfo.exe family_berbew C:\Windows\SysWOW64\Ncgdbmmp.exe family_berbew C:\Windows\SysWOW64\Nhdlkdkg.exe family_berbew C:\Windows\SysWOW64\Nondgn32.exe family_berbew C:\Windows\SysWOW64\Namqci32.exe family_berbew C:\Windows\SysWOW64\Nkeelohh.exe family_berbew C:\Windows\SysWOW64\Noqamn32.exe family_berbew C:\Windows\SysWOW64\Nejiih32.exe family_berbew C:\Windows\SysWOW64\Nglfapnl.exe family_berbew C:\Windows\SysWOW64\Naajoinb.exe family_berbew C:\Windows\SysWOW64\Njlockkm.exe family_berbew C:\Windows\SysWOW64\Ndpfkdmf.exe family_berbew C:\Windows\SysWOW64\Nnhkcj32.exe family_berbew C:\Windows\SysWOW64\Ndbcpd32.exe family_berbew C:\Windows\SysWOW64\Ojolhk32.exe family_berbew C:\Windows\SysWOW64\Oqideepg.exe family_berbew C:\Windows\SysWOW64\Oddpfc32.exe family_berbew C:\Windows\SysWOW64\Ocimgp32.exe family_berbew C:\Windows\SysWOW64\Ojcecjee.exe family_berbew C:\Windows\SysWOW64\Ojfaijcc.exe family_berbew C:\Windows\SysWOW64\Okgnab32.exe family_berbew C:\Windows\SysWOW64\Ocnfbo32.exe family_berbew C:\Windows\SysWOW64\Oikojfgk.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Gegfdb32.exeGbkgnfbd.exeGelppaof.exeGhoegl32.exeHiqbndpb.exeHggomh32.exeHjhhocjj.exeHacmcfge.exeIfcbodli.exeIgdogl32.exeIblpjdpk.exeIdmhkpml.exeJnemdecl.exeJiondcpk.exeJmmfkafa.exeJkbcln32.exeJnclnihj.exeKneicieh.exeKeoapb32.exeKgpjanje.exeKmmcjehm.exeKfegbj32.exeKpmlkp32.exeKifpdelo.exeLlfifq32.exeLflmci32.exeLbcnhjnj.exeLhpfqama.exeLdfgebbe.exeLdidkbpb.exeMamddf32.exeMhgmapfi.exeMihiih32.exeMbpnanch.exeMkgfckcj.exeMdpjlajk.exeMimbdhhb.exeMlkopcge.exeMcegmm32.exeMiooigfo.exeNcgdbmmp.exeNhdlkdkg.exeNondgn32.exeNamqci32.exeNkeelohh.exeNoqamn32.exeNejiih32.exeNglfapnl.exeNaajoinb.exeNdpfkdmf.exeNjlockkm.exeNnhkcj32.exeNdbcpd32.exeOjolhk32.exeOqideepg.exeOddpfc32.exeOcimgp32.exeOjcecjee.exeOjfaijcc.exeOkgnab32.exeOcnfbo32.exeOikojfgk.exeObcccl32.exePdaoog32.exepid process 2428 Gegfdb32.exe 2600 Gbkgnfbd.exe 2588 Gelppaof.exe 2788 Ghoegl32.exe 2508 Hiqbndpb.exe 2532 Hggomh32.exe 2252 Hjhhocjj.exe 284 Hacmcfge.exe 2272 Ifcbodli.exe 1836 Igdogl32.exe 2688 Iblpjdpk.exe 536 Idmhkpml.exe 1656 Jnemdecl.exe 1528 Jiondcpk.exe 1156 Jmmfkafa.exe 2292 Jkbcln32.exe 1816 Jnclnihj.exe 960 Kneicieh.exe 2196 Keoapb32.exe 1364 Kgpjanje.exe 1880 Kmmcjehm.exe 1292 Kfegbj32.exe 928 Kpmlkp32.exe 1740 Kifpdelo.exe 1736 Llfifq32.exe 1820 Lflmci32.exe 1620 Lbcnhjnj.exe 2076 Lhpfqama.exe 2660 Ldfgebbe.exe 2468 Ldidkbpb.exe 2620 Mamddf32.exe 2488 Mhgmapfi.exe 3056 Mihiih32.exe 1744 Mbpnanch.exe 2796 Mkgfckcj.exe 1960 Mdpjlajk.exe 1696 Mimbdhhb.exe 324 Mlkopcge.exe 2680 Mcegmm32.exe 1152 Miooigfo.exe 360 Ncgdbmmp.exe 1636 Nhdlkdkg.exe 1508 Nondgn32.exe 3068 Namqci32.exe 620 Nkeelohh.exe 2984 Noqamn32.exe 2136 Nejiih32.exe 2156 Nglfapnl.exe 1356 Naajoinb.exe 2100 Ndpfkdmf.exe 1160 Njlockkm.exe 1764 Nnhkcj32.exe 2856 Ndbcpd32.exe 896 Ojolhk32.exe 1832 Oqideepg.exe 1840 Oddpfc32.exe 2648 Ocimgp32.exe 2564 Ojcecjee.exe 2864 Ojfaijcc.exe 2576 Okgnab32.exe 2812 Ocnfbo32.exe 2524 Oikojfgk.exe 2120 Obcccl32.exe 2712 Pdaoog32.exe -
Loads dropped DLL 64 IoCs
Processes:
d2b3c3194268d72c2ea8d15d671e3b6f.exeGegfdb32.exeGbkgnfbd.exeGelppaof.exeGhoegl32.exeHiqbndpb.exeHggomh32.exeHjhhocjj.exeHacmcfge.exeIfcbodli.exeIgdogl32.exeIblpjdpk.exeIdmhkpml.exeJnemdecl.exeJiondcpk.exeJmmfkafa.exeJkbcln32.exeJnclnihj.exeKneicieh.exeKeoapb32.exeKgpjanje.exeKmmcjehm.exeKfegbj32.exeKpmlkp32.exeKifpdelo.exeLlfifq32.exeLflmci32.exeLbcnhjnj.exeLhpfqama.exeLdfgebbe.exeLdidkbpb.exeMamddf32.exepid process 2208 d2b3c3194268d72c2ea8d15d671e3b6f.exe 2208 d2b3c3194268d72c2ea8d15d671e3b6f.exe 2428 Gegfdb32.exe 2428 Gegfdb32.exe 2600 Gbkgnfbd.exe 2600 Gbkgnfbd.exe 2588 Gelppaof.exe 2588 Gelppaof.exe 2788 Ghoegl32.exe 2788 Ghoegl32.exe 2508 Hiqbndpb.exe 2508 Hiqbndpb.exe 2532 Hggomh32.exe 2532 Hggomh32.exe 2252 Hjhhocjj.exe 2252 Hjhhocjj.exe 284 Hacmcfge.exe 284 Hacmcfge.exe 2272 Ifcbodli.exe 2272 Ifcbodli.exe 1836 Igdogl32.exe 1836 Igdogl32.exe 2688 Iblpjdpk.exe 2688 Iblpjdpk.exe 536 Idmhkpml.exe 536 Idmhkpml.exe 1656 Jnemdecl.exe 1656 Jnemdecl.exe 1528 Jiondcpk.exe 1528 Jiondcpk.exe 1156 Jmmfkafa.exe 1156 Jmmfkafa.exe 2292 Jkbcln32.exe 2292 Jkbcln32.exe 1816 Jnclnihj.exe 1816 Jnclnihj.exe 960 Kneicieh.exe 960 Kneicieh.exe 2196 Keoapb32.exe 2196 Keoapb32.exe 1364 Kgpjanje.exe 1364 Kgpjanje.exe 1880 Kmmcjehm.exe 1880 Kmmcjehm.exe 1292 Kfegbj32.exe 1292 Kfegbj32.exe 928 Kpmlkp32.exe 928 Kpmlkp32.exe 1740 Kifpdelo.exe 1740 Kifpdelo.exe 1736 Llfifq32.exe 1736 Llfifq32.exe 1820 Lflmci32.exe 1820 Lflmci32.exe 1620 Lbcnhjnj.exe 1620 Lbcnhjnj.exe 2076 Lhpfqama.exe 2076 Lhpfqama.exe 2660 Ldfgebbe.exe 2660 Ldfgebbe.exe 2468 Ldidkbpb.exe 2468 Ldidkbpb.exe 2620 Mamddf32.exe 2620 Mamddf32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ncpcfkbg.exeGbomfe32.exeHpgfki32.exeIlcmjl32.exeNigome32.exeGdgcpi32.exeAjejgp32.exeBdbhke32.exeBfadgq32.exeEmnndlod.exeKmjojo32.exeAehboi32.exeCldooj32.exeAibajhdn.exeIlqpdm32.exeLfpclh32.exeHacmcfge.exeIblpjdpk.exeLdfgebbe.exeNnhkcj32.exeObcccl32.exeQmfgjh32.exeQpgpkcpp.exeDfdjhndl.exeGelppaof.exeHiknhbcg.exeKjfjbdle.exeFadminnn.exeDjhphncm.exeHedocp32.exeLinphc32.exeLmlhnagm.exeHjhhocjj.exePjadmnic.exeKegqdqbl.exeMooaljkh.exeMhhfdo32.exeHggomh32.exeNcgdbmmp.exePnlqnl32.exeGinnnooi.exeIkkjbe32.exeIfkacb32.exePapfegmk.exeChpmpg32.exeFjaonpnn.exeJfiale32.exeKbfhbeek.exeLcagpl32.exeMponel32.exeMihiih32.exeMcegmm32.exeBhigphio.exeDliijipn.exeDhpiojfb.exeEjkima32.exeFekpnn32.exeIcmegf32.exeJiondcpk.exeOcimgp32.exePklhlael.exeDdigjkid.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Nenobfak.exe Ncpcfkbg.exe File created C:\Windows\SysWOW64\Jmianb32.dll Gbomfe32.exe File created C:\Windows\SysWOW64\Jmamaoln.dll Hpgfki32.exe File opened for modification C:\Windows\SysWOW64\Icmegf32.exe Ilcmjl32.exe File created C:\Windows\SysWOW64\Nlekia32.exe Nigome32.exe File opened for modification C:\Windows\SysWOW64\Gmpgio32.exe Gdgcpi32.exe File opened for modification C:\Windows\SysWOW64\Aaobdjof.exe Ajejgp32.exe File created C:\Windows\SysWOW64\Ilcbjpbn.dll Bdbhke32.exe File created C:\Windows\SysWOW64\Mbiaej32.dll Bfadgq32.exe File created C:\Windows\SysWOW64\Najgne32.dll Emnndlod.exe File created C:\Windows\SysWOW64\Kbfhbeek.exe Kmjojo32.exe File opened for modification C:\Windows\SysWOW64\Ajejgp32.exe Aehboi32.exe File opened for modification C:\Windows\SysWOW64\Cdlgpgef.exe Cldooj32.exe File created C:\Windows\SysWOW64\Alpmfdcb.exe Aibajhdn.exe File created C:\Windows\SysWOW64\Daiohhgh.dll Ilqpdm32.exe File created C:\Windows\SysWOW64\Aaebnq32.dll Lfpclh32.exe File opened for modification C:\Windows\SysWOW64\Ifcbodli.exe Hacmcfge.exe File created C:\Windows\SysWOW64\Idmhkpml.exe Iblpjdpk.exe File opened for modification C:\Windows\SysWOW64\Ldidkbpb.exe Ldfgebbe.exe File opened for modification C:\Windows\SysWOW64\Ndbcpd32.exe Nnhkcj32.exe File created C:\Windows\SysWOW64\Fjkhohik.dll Obcccl32.exe File created C:\Windows\SysWOW64\Hjkbhikj.dll Qmfgjh32.exe File created C:\Windows\SysWOW64\Qedhdjnh.exe Qpgpkcpp.exe File created C:\Windows\SysWOW64\Dlnbeh32.exe Dfdjhndl.exe File created C:\Windows\SysWOW64\Gpekfank.dll Gelppaof.exe File created C:\Windows\SysWOW64\Ikkjbe32.exe Hiknhbcg.exe File created C:\Windows\SysWOW64\Kqqboncb.exe Kjfjbdle.exe File created C:\Windows\SysWOW64\Fjmaaddo.exe Fadminnn.exe File created C:\Windows\SysWOW64\Dndlim32.exe Djhphncm.exe File created C:\Windows\SysWOW64\Hbhomd32.exe Hedocp32.exe File opened for modification C:\Windows\SysWOW64\Laegiq32.exe Linphc32.exe File created C:\Windows\SysWOW64\Lcfqkl32.exe Lmlhnagm.exe File created C:\Windows\SysWOW64\Hacmcfge.exe Hjhhocjj.exe File created C:\Windows\SysWOW64\Kolpjf32.dll Pjadmnic.exe File created C:\Windows\SysWOW64\Nnfbei32.dll Dfdjhndl.exe File created C:\Windows\SysWOW64\Deeieqod.dll Kegqdqbl.exe File created C:\Windows\SysWOW64\Mhhfdo32.exe Mooaljkh.exe File opened for modification C:\Windows\SysWOW64\Mponel32.exe Mhhfdo32.exe File opened for modification C:\Windows\SysWOW64\Hjhhocjj.exe Hggomh32.exe File created C:\Windows\SysWOW64\Nhdlkdkg.exe Ncgdbmmp.exe File opened for modification C:\Windows\SysWOW64\Peiepfgg.exe Pnlqnl32.exe File created C:\Windows\SysWOW64\Hpgfki32.exe Ginnnooi.exe File opened for modification C:\Windows\SysWOW64\Iimjmbae.exe Ikkjbe32.exe File created C:\Windows\SysWOW64\Kigbna32.dll Ifkacb32.exe File created C:\Windows\SysWOW64\Ghoegl32.exe Gelppaof.exe File created C:\Windows\SysWOW64\Ogdafiei.dll Papfegmk.exe File opened for modification C:\Windows\SysWOW64\Ckoilb32.exe Chpmpg32.exe File created C:\Windows\SysWOW64\Iohmol32.dll Fjaonpnn.exe File created C:\Windows\SysWOW64\Jnpinc32.exe Jfiale32.exe File created C:\Windows\SysWOW64\Keednado.exe Kbfhbeek.exe File created C:\Windows\SysWOW64\Lfpclh32.exe Lcagpl32.exe File opened for modification C:\Windows\SysWOW64\Mlfojn32.exe Mponel32.exe File created C:\Windows\SysWOW64\Mbpnanch.exe Mihiih32.exe File opened for modification C:\Windows\SysWOW64\Miooigfo.exe Mcegmm32.exe File created C:\Windows\SysWOW64\Bppoqeja.exe Bhigphio.exe File created C:\Windows\SysWOW64\Jchafg32.dll Dliijipn.exe File created C:\Windows\SysWOW64\Bjidgghp.dll Dhpiojfb.exe File opened for modification C:\Windows\SysWOW64\Emieil32.exe Ejkima32.exe File opened for modification C:\Windows\SysWOW64\Fenmdm32.exe Fekpnn32.exe File opened for modification C:\Windows\SysWOW64\Ifkacb32.exe Icmegf32.exe File opened for modification C:\Windows\SysWOW64\Jmmfkafa.exe Jiondcpk.exe File created C:\Windows\SysWOW64\Cbikjlnd.dll Ocimgp32.exe File created C:\Windows\SysWOW64\Pnjdhmdo.exe Pklhlael.exe File created C:\Windows\SysWOW64\Jkhgfq32.dll Ddigjkid.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3360 3328 WerFault.exe Nlhgoqhh.exe -
Modifies registry class 64 IoCs
Processes:
Nmpnhdfc.exeChpmpg32.exeIkkjbe32.exeMholen32.exeFadminnn.exeLclnemgd.exeNenobfak.exeJnemdecl.exeBhigphio.exeCdgneh32.exeDlnbeh32.exeGbomfe32.exeGpejeihi.exeLfmffhde.exeMbpgggol.exeKifpdelo.exeAdpkee32.exeDliijipn.exeAaaoij32.exeCnkicn32.exeHgjefg32.exeJfiale32.exeMdpjlajk.exeMimbdhhb.exeAfcenm32.exeMmneda32.exeDfffnn32.exeGpqpjj32.exeJbgkcb32.exeMooaljkh.exeLlfifq32.exePnjdhmdo.exeAjejgp32.exePggbla32.exeQmfgjh32.exeBpiipf32.exeGebbnpfp.exeIgdogl32.exeMcegmm32.exeNhdlkdkg.exeKjfjbdle.exeNigome32.exeEjobhppq.exeHanlnp32.exeKegqdqbl.exeFenmdm32.exeJkmcfhkc.exeLinphc32.exeNcgdbmmp.exeAlpmfdcb.exeQfokbnip.exeBdgafdfp.exeEqdajkkb.exeEnhacojl.exeKjifhc32.exeJiondcpk.exeLhpfqama.exeOjfaijcc.exeMlfojn32.exeQpgpkcpp.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nmpnhdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Chpmpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nldjnfaf.dll" Ikkjbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mholen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fadminnn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lclnemgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nmpnhdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" Nenobfak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jnemdecl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bhigphio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cdgneh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Focnmm32.dll" Dlnbeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmianb32.dll" Gbomfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gpejeihi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djmffb32.dll" Lfmffhde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mbpgggol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kifpdelo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Adpkee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jchafg32.dll" Dliijipn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aaaoij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cnkicn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dlnbeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkcggqfg.dll" Hgjefg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jfiale32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mdpjlajk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mimbdhhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onqamf32.dll" Afcenm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mmneda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dfffnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iqapllgh.dll" Gpqpjj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jbgkcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggfblnnh.dll" Mooaljkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnlilc32.dll" Llfifq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgmlpbdc.dll" Pnjdhmdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ippdhfji.dll" Ajejgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfkjnkib.dll" Pggbla32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qmfgjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Adpkee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bpiipf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gebbnpfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Igdogl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpjbaocl.dll" Mcegmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nhdlkdkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qocjhb32.dll" Kjfjbdle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phmkjbfe.dll" Nigome32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ejobhppq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hanlnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kegqdqbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoladf32.dll" Fenmdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpelbgel.dll" Jkmcfhkc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Linphc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eqmbdn32.dll" Kifpdelo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ncgdbmmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jifnmmhq.dll" Alpmfdcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcghbk32.dll" Qfokbnip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bdgafdfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eqdajkkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Enhacojl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmcipd32.dll" Kjifhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jiondcpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfnlkbne.dll" Lhpfqama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ojfaijcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mlfojn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qpgpkcpp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d2b3c3194268d72c2ea8d15d671e3b6f.exeGegfdb32.exeGbkgnfbd.exeGelppaof.exeGhoegl32.exeHiqbndpb.exeHggomh32.exeHjhhocjj.exeHacmcfge.exeIfcbodli.exeIgdogl32.exeIblpjdpk.exeIdmhkpml.exeJnemdecl.exeJiondcpk.exeJmmfkafa.exedescription pid process target process PID 2208 wrote to memory of 2428 2208 d2b3c3194268d72c2ea8d15d671e3b6f.exe Gegfdb32.exe PID 2208 wrote to memory of 2428 2208 d2b3c3194268d72c2ea8d15d671e3b6f.exe Gegfdb32.exe PID 2208 wrote to memory of 2428 2208 d2b3c3194268d72c2ea8d15d671e3b6f.exe Gegfdb32.exe PID 2208 wrote to memory of 2428 2208 d2b3c3194268d72c2ea8d15d671e3b6f.exe Gegfdb32.exe PID 2428 wrote to memory of 2600 2428 Gegfdb32.exe Gbkgnfbd.exe PID 2428 wrote to memory of 2600 2428 Gegfdb32.exe Gbkgnfbd.exe PID 2428 wrote to memory of 2600 2428 Gegfdb32.exe Gbkgnfbd.exe PID 2428 wrote to memory of 2600 2428 Gegfdb32.exe Gbkgnfbd.exe PID 2600 wrote to memory of 2588 2600 Gbkgnfbd.exe Gelppaof.exe PID 2600 wrote to memory of 2588 2600 Gbkgnfbd.exe Gelppaof.exe PID 2600 wrote to memory of 2588 2600 Gbkgnfbd.exe Gelppaof.exe PID 2600 wrote to memory of 2588 2600 Gbkgnfbd.exe Gelppaof.exe PID 2588 wrote to memory of 2788 2588 Gelppaof.exe Ghoegl32.exe PID 2588 wrote to memory of 2788 2588 Gelppaof.exe Ghoegl32.exe PID 2588 wrote to memory of 2788 2588 Gelppaof.exe Ghoegl32.exe PID 2588 wrote to memory of 2788 2588 Gelppaof.exe Ghoegl32.exe PID 2788 wrote to memory of 2508 2788 Ghoegl32.exe Hiqbndpb.exe PID 2788 wrote to memory of 2508 2788 Ghoegl32.exe Hiqbndpb.exe PID 2788 wrote to memory of 2508 2788 Ghoegl32.exe Hiqbndpb.exe PID 2788 wrote to memory of 2508 2788 Ghoegl32.exe Hiqbndpb.exe PID 2508 wrote to memory of 2532 2508 Hiqbndpb.exe Hggomh32.exe PID 2508 wrote to memory of 2532 2508 Hiqbndpb.exe Hggomh32.exe PID 2508 wrote to memory of 2532 2508 Hiqbndpb.exe Hggomh32.exe PID 2508 wrote to memory of 2532 2508 Hiqbndpb.exe Hggomh32.exe PID 2532 wrote to memory of 2252 2532 Hggomh32.exe Hjhhocjj.exe PID 2532 wrote to memory of 2252 2532 Hggomh32.exe Hjhhocjj.exe PID 2532 wrote to memory of 2252 2532 Hggomh32.exe Hjhhocjj.exe PID 2532 wrote to memory of 2252 2532 Hggomh32.exe Hjhhocjj.exe PID 2252 wrote to memory of 284 2252 Hjhhocjj.exe Hacmcfge.exe PID 2252 wrote to memory of 284 2252 Hjhhocjj.exe Hacmcfge.exe PID 2252 wrote to memory of 284 2252 Hjhhocjj.exe Hacmcfge.exe PID 2252 wrote to memory of 284 2252 Hjhhocjj.exe Hacmcfge.exe PID 284 wrote to memory of 2272 284 Hacmcfge.exe Ifcbodli.exe PID 284 wrote to memory of 2272 284 Hacmcfge.exe Ifcbodli.exe PID 284 wrote to memory of 2272 284 Hacmcfge.exe Ifcbodli.exe PID 284 wrote to memory of 2272 284 Hacmcfge.exe Ifcbodli.exe PID 2272 wrote to memory of 1836 2272 Ifcbodli.exe Igdogl32.exe PID 2272 wrote to memory of 1836 2272 Ifcbodli.exe Igdogl32.exe PID 2272 wrote to memory of 1836 2272 Ifcbodli.exe Igdogl32.exe PID 2272 wrote to memory of 1836 2272 Ifcbodli.exe Igdogl32.exe PID 1836 wrote to memory of 2688 1836 Igdogl32.exe Iblpjdpk.exe PID 1836 wrote to memory of 2688 1836 Igdogl32.exe Iblpjdpk.exe PID 1836 wrote to memory of 2688 1836 Igdogl32.exe Iblpjdpk.exe PID 1836 wrote to memory of 2688 1836 Igdogl32.exe Iblpjdpk.exe PID 2688 wrote to memory of 536 2688 Iblpjdpk.exe Idmhkpml.exe PID 2688 wrote to memory of 536 2688 Iblpjdpk.exe Idmhkpml.exe PID 2688 wrote to memory of 536 2688 Iblpjdpk.exe Idmhkpml.exe PID 2688 wrote to memory of 536 2688 Iblpjdpk.exe Idmhkpml.exe PID 536 wrote to memory of 1656 536 Idmhkpml.exe Jnemdecl.exe PID 536 wrote to memory of 1656 536 Idmhkpml.exe Jnemdecl.exe PID 536 wrote to memory of 1656 536 Idmhkpml.exe Jnemdecl.exe PID 536 wrote to memory of 1656 536 Idmhkpml.exe Jnemdecl.exe PID 1656 wrote to memory of 1528 1656 Jnemdecl.exe Jiondcpk.exe PID 1656 wrote to memory of 1528 1656 Jnemdecl.exe Jiondcpk.exe PID 1656 wrote to memory of 1528 1656 Jnemdecl.exe Jiondcpk.exe PID 1656 wrote to memory of 1528 1656 Jnemdecl.exe Jiondcpk.exe PID 1528 wrote to memory of 1156 1528 Jiondcpk.exe Jmmfkafa.exe PID 1528 wrote to memory of 1156 1528 Jiondcpk.exe Jmmfkafa.exe PID 1528 wrote to memory of 1156 1528 Jiondcpk.exe Jmmfkafa.exe PID 1528 wrote to memory of 1156 1528 Jiondcpk.exe Jmmfkafa.exe PID 1156 wrote to memory of 2292 1156 Jmmfkafa.exe Jkbcln32.exe PID 1156 wrote to memory of 2292 1156 Jmmfkafa.exe Jkbcln32.exe PID 1156 wrote to memory of 2292 1156 Jmmfkafa.exe Jkbcln32.exe PID 1156 wrote to memory of 2292 1156 Jmmfkafa.exe Jkbcln32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2b3c3194268d72c2ea8d15d671e3b6f.exe"C:\Users\Admin\AppData\Local\Temp\d2b3c3194268d72c2ea8d15d671e3b6f.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\Gegfdb32.exeC:\Windows\system32\Gegfdb32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\Gbkgnfbd.exeC:\Windows\system32\Gbkgnfbd.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Ghoegl32.exeC:\Windows\system32\Ghoegl32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Hiqbndpb.exeC:\Windows\system32\Hiqbndpb.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Hggomh32.exeC:\Windows\system32\Hggomh32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\Hjhhocjj.exeC:\Windows\system32\Hjhhocjj.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Hacmcfge.exeC:\Windows\system32\Hacmcfge.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\Ifcbodli.exeC:\Windows\system32\Ifcbodli.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\Igdogl32.exeC:\Windows\system32\Igdogl32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\Iblpjdpk.exeC:\Windows\system32\Iblpjdpk.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Idmhkpml.exeC:\Windows\system32\Idmhkpml.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\Jnemdecl.exeC:\Windows\system32\Jnemdecl.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\Jiondcpk.exeC:\Windows\system32\Jiondcpk.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\Jmmfkafa.exeC:\Windows\system32\Jmmfkafa.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\Jkbcln32.exeC:\Windows\system32\Jkbcln32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2292 -
C:\Windows\SysWOW64\Jnclnihj.exeC:\Windows\system32\Jnclnihj.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1816 -
C:\Windows\SysWOW64\Kneicieh.exeC:\Windows\system32\Kneicieh.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960 -
C:\Windows\SysWOW64\Keoapb32.exeC:\Windows\system32\Keoapb32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2196 -
C:\Windows\SysWOW64\Kgpjanje.exeC:\Windows\system32\Kgpjanje.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1364 -
C:\Windows\SysWOW64\Kmmcjehm.exeC:\Windows\system32\Kmmcjehm.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880 -
C:\Windows\SysWOW64\Kfegbj32.exeC:\Windows\system32\Kfegbj32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1292 -
C:\Windows\SysWOW64\Kpmlkp32.exeC:\Windows\system32\Kpmlkp32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Windows\SysWOW64\Kifpdelo.exeC:\Windows\system32\Kifpdelo.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1740 -
C:\Windows\SysWOW64\Llfifq32.exeC:\Windows\system32\Llfifq32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\Lflmci32.exeC:\Windows\system32\Lflmci32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1820 -
C:\Windows\SysWOW64\Lbcnhjnj.exeC:\Windows\system32\Lbcnhjnj.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Windows\SysWOW64\Lhpfqama.exeC:\Windows\system32\Lhpfqama.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2076 -
C:\Windows\SysWOW64\Ldfgebbe.exeC:\Windows\system32\Ldfgebbe.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2660 -
C:\Windows\SysWOW64\Ldidkbpb.exeC:\Windows\system32\Ldidkbpb.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468 -
C:\Windows\SysWOW64\Mamddf32.exeC:\Windows\system32\Mamddf32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2620 -
C:\Windows\SysWOW64\Mhgmapfi.exeC:\Windows\system32\Mhgmapfi.exe33⤵
- Executes dropped EXE
PID:2488 -
C:\Windows\SysWOW64\Mihiih32.exeC:\Windows\system32\Mihiih32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3056 -
C:\Windows\SysWOW64\Mbpnanch.exeC:\Windows\system32\Mbpnanch.exe35⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Mkgfckcj.exeC:\Windows\system32\Mkgfckcj.exe36⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\Mdpjlajk.exeC:\Windows\system32\Mdpjlajk.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\Mimbdhhb.exeC:\Windows\system32\Mimbdhhb.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\Mlkopcge.exeC:\Windows\system32\Mlkopcge.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:324 -
C:\Windows\SysWOW64\Mcegmm32.exeC:\Windows\system32\Mcegmm32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Miooigfo.exeC:\Windows\system32\Miooigfo.exe41⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\Ncgdbmmp.exeC:\Windows\system32\Ncgdbmmp.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:360 -
C:\Windows\SysWOW64\Nhdlkdkg.exeC:\Windows\system32\Nhdlkdkg.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Nondgn32.exeC:\Windows\system32\Nondgn32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\Namqci32.exeC:\Windows\system32\Namqci32.exe45⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\Nkeelohh.exeC:\Windows\system32\Nkeelohh.exe46⤵
- Executes dropped EXE
PID:620 -
C:\Windows\SysWOW64\Noqamn32.exeC:\Windows\system32\Noqamn32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\Nejiih32.exeC:\Windows\system32\Nejiih32.exe48⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\Nglfapnl.exeC:\Windows\system32\Nglfapnl.exe49⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\Naajoinb.exeC:\Windows\system32\Naajoinb.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\Ndpfkdmf.exeC:\Windows\system32\Ndpfkdmf.exe51⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\Njlockkm.exeC:\Windows\system32\Njlockkm.exe52⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\Nnhkcj32.exeC:\Windows\system32\Nnhkcj32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\Ndbcpd32.exeC:\Windows\system32\Ndbcpd32.exe54⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\Ojolhk32.exeC:\Windows\system32\Ojolhk32.exe55⤵
- Executes dropped EXE
PID:896 -
C:\Windows\SysWOW64\Oqideepg.exeC:\Windows\system32\Oqideepg.exe56⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\Oddpfc32.exeC:\Windows\system32\Oddpfc32.exe57⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\SysWOW64\Ocimgp32.exeC:\Windows\system32\Ocimgp32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2648 -
C:\Windows\SysWOW64\Ojcecjee.exeC:\Windows\system32\Ojcecjee.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\Ojfaijcc.exeC:\Windows\system32\Ojfaijcc.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:2864 -
C:\Windows\SysWOW64\Okgnab32.exeC:\Windows\system32\Okgnab32.exe61⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\Ocnfbo32.exeC:\Windows\system32\Ocnfbo32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\Oikojfgk.exeC:\Windows\system32\Oikojfgk.exe63⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\Obcccl32.exeC:\Windows\system32\Obcccl32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2120 -
C:\Windows\SysWOW64\Pdaoog32.exeC:\Windows\system32\Pdaoog32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\Pklhlael.exeC:\Windows\system32\Pklhlael.exe66⤵
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\Pnjdhmdo.exeC:\Windows\system32\Pnjdhmdo.exe67⤵
- Modifies registry class
PID:1304 -
C:\Windows\SysWOW64\Pbfpik32.exeC:\Windows\system32\Pbfpik32.exe68⤵PID:388
-
C:\Windows\SysWOW64\Pqhpdhcc.exeC:\Windows\system32\Pqhpdhcc.exe69⤵PID:2716
-
C:\Windows\SysWOW64\Pjadmnic.exeC:\Windows\system32\Pjadmnic.exe70⤵
- Drops file in System32 directory
PID:684 -
C:\Windows\SysWOW64\Pnlqnl32.exeC:\Windows\system32\Pnlqnl32.exe71⤵
- Drops file in System32 directory
PID:268 -
C:\Windows\SysWOW64\Peiepfgg.exeC:\Windows\system32\Peiepfgg.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1296 -
C:\Windows\SysWOW64\Pggbla32.exeC:\Windows\system32\Pggbla32.exe73⤵
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\Pjenhm32.exeC:\Windows\system32\Pjenhm32.exe74⤵PID:1780
-
C:\Windows\SysWOW64\Papfegmk.exeC:\Windows\system32\Papfegmk.exe75⤵
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\Pgioaa32.exeC:\Windows\system32\Pgioaa32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1872 -
C:\Windows\SysWOW64\Qmfgjh32.exeC:\Windows\system32\Qmfgjh32.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:456 -
C:\Windows\SysWOW64\Qcpofbjl.exeC:\Windows\system32\Qcpofbjl.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:852 -
C:\Windows\SysWOW64\Qfokbnip.exeC:\Windows\system32\Qfokbnip.exe79⤵
- Modifies registry class
PID:944 -
C:\Windows\SysWOW64\Qmicohqm.exeC:\Windows\system32\Qmicohqm.exe80⤵PID:1240
-
C:\Windows\SysWOW64\Qpgpkcpp.exeC:\Windows\system32\Qpgpkcpp.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2172 -
C:\Windows\SysWOW64\Qedhdjnh.exeC:\Windows\system32\Qedhdjnh.exe82⤵PID:1272
-
C:\Windows\SysWOW64\Alnqqd32.exeC:\Windows\system32\Alnqqd32.exe83⤵PID:1708
-
C:\Windows\SysWOW64\Afcenm32.exeC:\Windows\system32\Afcenm32.exe84⤵
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Aibajhdn.exeC:\Windows\system32\Aibajhdn.exe85⤵
- Drops file in System32 directory
PID:1308 -
C:\Windows\SysWOW64\Alpmfdcb.exeC:\Windows\system32\Alpmfdcb.exe86⤵
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Anojbobe.exeC:\Windows\system32\Anojbobe.exe87⤵PID:1752
-
C:\Windows\SysWOW64\Aehboi32.exeC:\Windows\system32\Aehboi32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\Ajejgp32.exeC:\Windows\system32\Ajejgp32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Aaobdjof.exeC:\Windows\system32\Aaobdjof.exe90⤵PID:2464
-
C:\Windows\SysWOW64\Adnopfoj.exeC:\Windows\system32\Adnopfoj.exe91⤵PID:2436
-
C:\Windows\SysWOW64\Alegac32.exeC:\Windows\system32\Alegac32.exe92⤵PID:2084
-
C:\Windows\SysWOW64\Aaaoij32.exeC:\Windows\system32\Aaaoij32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Adpkee32.exeC:\Windows\system32\Adpkee32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Ajjcbpdd.exeC:\Windows\system32\Ajjcbpdd.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:240 -
C:\Windows\SysWOW64\Aadloj32.exeC:\Windows\system32\Aadloj32.exe96⤵PID:1500
-
C:\Windows\SysWOW64\Bdbhke32.exeC:\Windows\system32\Bdbhke32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2560 -
C:\Windows\SysWOW64\Bfadgq32.exeC:\Windows\system32\Bfadgq32.exe98⤵
- Drops file in System32 directory
PID:1964 -
C:\Windows\SysWOW64\Bpiipf32.exeC:\Windows\system32\Bpiipf32.exe99⤵
- Modifies registry class
PID:908 -
C:\Windows\SysWOW64\Bkommo32.exeC:\Windows\system32\Bkommo32.exe100⤵PID:2556
-
C:\Windows\SysWOW64\Blpjegfm.exeC:\Windows\system32\Blpjegfm.exe101⤵PID:2344
-
C:\Windows\SysWOW64\Bpleef32.exeC:\Windows\system32\Bpleef32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:648 -
C:\Windows\SysWOW64\Bdgafdfp.exeC:\Windows\system32\Bdgafdfp.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1132 -
C:\Windows\SysWOW64\Bpnbkeld.exeC:\Windows\system32\Bpnbkeld.exe104⤵PID:1628
-
C:\Windows\SysWOW64\Bekkcljk.exeC:\Windows\system32\Bekkcljk.exe105⤵PID:2352
-
C:\Windows\SysWOW64\Bhigphio.exeC:\Windows\system32\Bhigphio.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1664 -
C:\Windows\SysWOW64\Bppoqeja.exeC:\Windows\system32\Bppoqeja.exe107⤵PID:1200
-
C:\Windows\SysWOW64\Baakhm32.exeC:\Windows\system32\Baakhm32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2116 -
C:\Windows\SysWOW64\Blgpef32.exeC:\Windows\system32\Blgpef32.exe109⤵PID:2392
-
C:\Windows\SysWOW64\Chnqkg32.exeC:\Windows\system32\Chnqkg32.exe110⤵PID:2060
-
C:\Windows\SysWOW64\Cnkicn32.exeC:\Windows\system32\Cnkicn32.exe111⤵
- Modifies registry class
PID:1096 -
C:\Windows\SysWOW64\Chpmpg32.exeC:\Windows\system32\Chpmpg32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2504 -
C:\Windows\SysWOW64\Ckoilb32.exeC:\Windows\system32\Ckoilb32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3028 -
C:\Windows\SysWOW64\Cdgneh32.exeC:\Windows\system32\Cdgneh32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2720 -
C:\Windows\SysWOW64\Cjdfmo32.exeC:\Windows\system32\Cjdfmo32.exe115⤵PID:1028
-
C:\Windows\SysWOW64\Cghggc32.exeC:\Windows\system32\Cghggc32.exe116⤵PID:1976
-
C:\Windows\SysWOW64\Cnaocmmi.exeC:\Windows\system32\Cnaocmmi.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:568 -
C:\Windows\SysWOW64\Cldooj32.exeC:\Windows\system32\Cldooj32.exe118⤵
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\Cdlgpgef.exeC:\Windows\system32\Cdlgpgef.exe119⤵PID:1040
-
C:\Windows\SysWOW64\Djhphncm.exeC:\Windows\system32\Djhphncm.exe120⤵
- Drops file in System32 directory
PID:1288 -
C:\Windows\SysWOW64\Dndlim32.exeC:\Windows\system32\Dndlim32.exe121⤵PID:2528
-
C:\Windows\SysWOW64\Doehqead.exeC:\Windows\system32\Doehqead.exe122⤵PID:3040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-