Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e.exe
Resource
win10v2004-20241007-en
General
-
Target
ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e.exe
-
Size
96KB
-
MD5
d1f9b3cd8ef3223d59b651b7654ae5c0
-
SHA1
0b9d6d19e1d1dc1b64179b8d7a7ee2fcdc981b61
-
SHA256
ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e
-
SHA512
9f65e249f796522ca26ef5d8c17baae8ba20a7527c81c02ef0d319bd8f97e8334b94b8f2f9869c31446a236ee64348cb3888d2b0f8a6cf02c893c78b2082489e
-
SSDEEP
1536:x8M+kpVNZ0/AxsPAv2+aDafDQzVm2LO7RZObZUUWaegPYA:xckpVNCXufEpOClUUWae
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dhpqkk32.exeObefjo32.exeBagknkcj.exeMlpjhn32.exeMpmeknkb.exeCacbadnb.exeMknopcnd.exeBomhmo32.exeEdifna32.exeMjkhkdal.exeNhdiko32.exeJcfeajig.exeAhkddlek.exeIefnaa32.exeLnkkkj32.exeNpkmkncj.exeCgbphp32.exeDbafkg32.exeJfihplma.exeFgcjmfna.exeLhgbfa32.exeMegjcohp.exeJdhnqm32.exeLckqha32.exeGljmah32.exeQmfllo32.exeGfnkdh32.exeIepiokni.exeOlleglmk.exeNcpcjnak.exeMklbjcpf.exeIlpfnlil.exeGmcjebho.exeNjnnha32.exeIpqbdpqk.exeMjpafc32.exeJgcofe32.exeBcdblaje.exeIbgbefbk.exeKjjgni32.exeLgnideip.exeBkkfla32.exeHkiakapm.exeKdjkfmmd.exeCoigim32.exeCjjjej32.exeMmjkbedl.exeEfbcalel.exeIndcndoe.exeCfdgpn32.exeHpmfmlme.exeQhnmnhkl.exeIgiefq32.exePalife32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhpqkk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obefjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bagknkcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlpjhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpmeknkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cacbadnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mknopcnd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bomhmo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edifna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjkhkdal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhdiko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcfeajig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahkddlek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iefnaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnkkkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npkmkncj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgbphp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbafkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfihplma.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgcjmfna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhgbfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Megjcohp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdhnqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lckqha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gljmah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmfllo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfnkdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iepiokni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olleglmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncpcjnak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mklbjcpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilpfnlil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmcjebho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njnnha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipqbdpqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjpafc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njnnha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgcofe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcdblaje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibgbefbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjjgni32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgnideip.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkkfla32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkiakapm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdjkfmmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coigim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjjjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmjkbedl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efbcalel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Indcndoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfdgpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpmfmlme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhnmnhkl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igiefq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Palife32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Gajnlb32.exeGhdfhm32.exeGonnegbj.exeHfhfba32.exeHgiciipe.exeHnckfc32.exeHdmccmno.exeHkglpgfk.exeHbadla32.exeHhklilde.exeHkihegdi.exeHbcqba32.exeHhmiokbb.exeHklekg32.exeHnjagb32.exeHfaihp32.exeHknapf32.exeHbhjmqgp.exeIgebegeg.exeIoljfe32.exeIbjgbp32.exeIidoojlj.exeInaggaka.exeIiglejjg.exeIoadadbd.exeIbopnpah.exeIglhffop.exeInfabq32.exeIepiokni.exeIgnekfmm.exeJbdiio32.exeJklnadcc.exeJipnkibm.exeJgcofe32.exeJnmgcpqd.exeJibkqh32.exeJeileifo.exeJghhaeeb.exeJnapno32.exeJfihplma.exeJigdlhle.exeJleahcki.exeKbpidm32.exeKfkeelko.exeKglamd32.exeKpcina32.exeKbbfjm32.exeKepbfh32.exeKljjcb32.exeKbdbpmop.exeKinklg32.exeKphcianj.exeKbgoelmm.exeKiqgbf32.exeKlocnbcn.exeKnmpjmba.exeKfdhkkcd.exeKlapcaak.exeLbkhpl32.exeLieamfpe.exeLlcmia32.exeLbnefkfe.exeLihnbe32.exeLlfjoa32.exepid process 2124 Gajnlb32.exe 3408 Ghdfhm32.exe 4512 Gonnegbj.exe 3412 Hfhfba32.exe 1492 Hgiciipe.exe 3660 Hnckfc32.exe 3364 Hdmccmno.exe 2104 Hkglpgfk.exe 4828 Hbadla32.exe 2348 Hhklilde.exe 4552 Hkihegdi.exe 4028 Hbcqba32.exe 1476 Hhmiokbb.exe 4812 Hklekg32.exe 3144 Hnjagb32.exe 1920 Hfaihp32.exe 212 Hknapf32.exe 3076 Hbhjmqgp.exe 4948 Igebegeg.exe 5020 Ioljfe32.exe 4956 Ibjgbp32.exe 3516 Iidoojlj.exe 1756 Inaggaka.exe 4876 Iiglejjg.exe 1452 Ioadadbd.exe 4644 Ibopnpah.exe 4608 Iglhffop.exe 1140 Infabq32.exe 4384 Iepiokni.exe 2920 Ignekfmm.exe 1940 Jbdiio32.exe 2536 Jklnadcc.exe 2672 Jipnkibm.exe 3668 Jgcofe32.exe 2748 Jnmgcpqd.exe 2960 Jibkqh32.exe 4252 Jeileifo.exe 5004 Jghhaeeb.exe 2164 Jnapno32.exe 2792 Jfihplma.exe 2780 Jigdlhle.exe 3096 Jleahcki.exe 3164 Kbpidm32.exe 3032 Kfkeelko.exe 264 Kglamd32.exe 4168 Kpcina32.exe 2444 Kbbfjm32.exe 3856 Kepbfh32.exe 3560 Kljjcb32.exe 792 Kbdbpmop.exe 2608 Kinklg32.exe 1632 Kphcianj.exe 4852 Kbgoelmm.exe 1480 Kiqgbf32.exe 4728 Klocnbcn.exe 4744 Knmpjmba.exe 904 Kfdhkkcd.exe 3424 Klapcaak.exe 5108 Lbkhpl32.exe 4796 Lieamfpe.exe 1028 Llcmia32.exe 2784 Lbnefkfe.exe 1388 Lihnbe32.exe 2980 Llfjoa32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dkehcdko.exeKgfcbb32.exeMniglhko.exeDqdggddg.exeHeenpm32.exeJigdlhle.exeAbdohhog.exeKgofhq32.exeNmljdmpk.exeNbedmhbk.exePalife32.exeAaqlhb32.exeNpkmkncj.exeNeadddca.exeLbkafe32.exeIinfbj32.exeOgcfjd32.exeKgnghn32.exeQlkgdc32.exeMjehfoqi.exeHphfhgla.exeIphoodol.exePhgogl32.exeIcjeel32.exeLcikmh32.exeIiqcgj32.exeAokbqa32.exeDjlpag32.exeHgboeado.exeDhdpainm.exeHbnoog32.exeNngdmfoo.exeAjdhcm32.exePjcgddbk.exeOnepod32.exeGabqqmfl.exeFphckopm.exeGlhgfo32.exeBdadimjo.exeDgifho32.exeIpqbdpqk.exeKjgcnckl.exePdlkmj32.exeNbbllddj.exePlpobk32.exeHfgnjf32.exeDppeco32.exeFidboakb.exeGbcfno32.exeMmmobl32.exeAnglmc32.exedescription ioc process File created C:\Windows\SysWOW64\Dmqabm32.dll Dkehcdko.exe File created C:\Windows\SysWOW64\Kljdilma.dll Kgfcbb32.exe File opened for modification C:\Windows\SysWOW64\Mokddq32.exe Mniglhko.exe File created C:\Windows\SysWOW64\Hdngkmjb.dll Dqdggddg.exe File created C:\Windows\SysWOW64\Jeddjgjm.dll Heenpm32.exe File created C:\Windows\SysWOW64\Jleahcki.exe Jigdlhle.exe File created C:\Windows\SysWOW64\Ajkgiepi.exe Abdohhog.exe File created C:\Windows\SysWOW64\Kfbfdmio.exe Kgofhq32.exe File created C:\Windows\SysWOW64\Mfeeia32.dll Nmljdmpk.exe File opened for modification C:\Windows\SysWOW64\Necqicao.exe Nbedmhbk.exe File created C:\Windows\SysWOW64\Bgeecc32.dll Palife32.exe File created C:\Windows\SysWOW64\Ahkddlek.exe Aaqlhb32.exe File opened for modification C:\Windows\SysWOW64\Ngbellcl.exe Npkmkncj.exe File created C:\Windows\SysWOW64\Mmefclen.dll Neadddca.exe File created C:\Windows\SysWOW64\Cpfpil32.dll Lbkafe32.exe File opened for modification C:\Windows\SysWOW64\Iphoodol.exe Iinfbj32.exe File created C:\Windows\SysWOW64\Ndnnhobo.dll File created C:\Windows\SysWOW64\Jknfmaaa.dll Ogcfjd32.exe File created C:\Windows\SysWOW64\Kkjchlcg.exe Kgnghn32.exe File opened for modification C:\Windows\SysWOW64\Qojcpnjq.exe Qlkgdc32.exe File created C:\Windows\SysWOW64\Mekmdhpo.exe Mjehfoqi.exe File created C:\Windows\SysWOW64\Hgboeado.exe Hphfhgla.exe File created C:\Windows\SysWOW64\Iqqcij32.dll Iphoodol.exe File opened for modification C:\Windows\SysWOW64\Ppngii32.exe Phgogl32.exe File opened for modification C:\Windows\SysWOW64\Ppbehekd.exe File opened for modification C:\Windows\SysWOW64\Ijdnbfka.exe Icjeel32.exe File created C:\Windows\SysWOW64\Ggbhbmep.dll Lcikmh32.exe File opened for modification C:\Windows\SysWOW64\Ipkkdd32.exe Iiqcgj32.exe File opened for modification C:\Windows\SysWOW64\Ochoff32.exe File created C:\Windows\SysWOW64\Ohfggd32.dll File opened for modification C:\Windows\SysWOW64\Ejpnpbcg.exe File created C:\Windows\SysWOW64\Poanilli.dll Aokbqa32.exe File created C:\Windows\SysWOW64\Dhpqkk32.exe Djlpag32.exe File created C:\Windows\SysWOW64\Ijpkamcb.exe Hgboeado.exe File opened for modification C:\Windows\SysWOW64\Doohnc32.exe Dhdpainm.exe File opened for modification C:\Windows\SysWOW64\Helkkc32.exe Hbnoog32.exe File created C:\Windows\SysWOW64\Hfkffdbb.dll Nngdmfoo.exe File created C:\Windows\SysWOW64\Ieqhjp32.dll Ajdhcm32.exe File opened for modification C:\Windows\SysWOW64\Pnocec32.exe Pjcgddbk.exe File opened for modification C:\Windows\SysWOW64\Aihfbhed.exe File created C:\Windows\SysWOW64\Ihkenm32.dll File created C:\Windows\SysWOW64\Dgjbah32.dll Onepod32.exe File opened for modification C:\Windows\SysWOW64\Bpbnobma.exe File opened for modification C:\Windows\SysWOW64\Ghlimg32.exe Gabqqmfl.exe File opened for modification C:\Windows\SysWOW64\Ffblhi32.exe Fphckopm.exe File opened for modification C:\Windows\SysWOW64\Gfnkdh32.exe Glhgfo32.exe File opened for modification C:\Windows\SysWOW64\Blimkkka.exe Bdadimjo.exe File created C:\Windows\SysWOW64\Dopnil32.exe Dgifho32.exe File opened for modification C:\Windows\SysWOW64\Pamhfh32.exe File opened for modification C:\Windows\SysWOW64\Icoopkpo.exe Ipqbdpqk.exe File created C:\Windows\SysWOW64\Kqakkn32.exe Kjgcnckl.exe File created C:\Windows\SysWOW64\Glqdei32.dll File created C:\Windows\SysWOW64\Bpaapojn.dll File created C:\Windows\SysWOW64\Pjfcjdqh.exe Pdlkmj32.exe File created C:\Windows\SysWOW64\Maagbe32.dll Nbbllddj.exe File created C:\Windows\SysWOW64\Dpqcgnbo.exe File created C:\Windows\SysWOW64\Fimjpg32.dll Plpobk32.exe File opened for modification C:\Windows\SysWOW64\Hmafgqlo.exe Hfgnjf32.exe File created C:\Windows\SysWOW64\Biqlkgdg.dll Dppeco32.exe File created C:\Windows\SysWOW64\Lkhpaplc.dll Fidboakb.exe File created C:\Windows\SysWOW64\Ggcadg32.dll Gbcfno32.exe File created C:\Windows\SysWOW64\Gnleljko.dll Mmmobl32.exe File created C:\Windows\SysWOW64\Gqqigmbp.dll Anglmc32.exe File created C:\Windows\SysWOW64\Inmddcnn.dll -
Program crash 1 IoCs
Processes:
pid pid_target process target process 10884 11196 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Jbdiio32.exeGmiaen32.exeEfgcga32.exeAhjmjfao.exeMoofdj32.exeAjlnclce.exeNmmgiigb.exePdlkmj32.exeBfeknmgf.exeMgdijn32.exeNjkaba32.exeAqoppgqj.exeDjilaaef.exeQhnmnhkl.exeEkekpk32.exeFinkoe32.exeOnepod32.exeBnnlclio.exeJhmfiedl.exeJqfcje32.exeMjfoae32.exeBlnmpp32.exeLgkfdo32.exeGadidp32.exeIhdhedio.exeAkenpokp.exeNlgafaei.exeBdadimjo.exeBajnna32.exeMomqip32.exeDkgnnmfp.exeFbimmjmn.exeJlpoei32.exeHnckfc32.exeMejnce32.exeFlbhpfgj.exeHlighc32.exeHflhefql.exeAohekb32.exeIhfpif32.exePanfke32.exeOccqof32.exeJjbjcd32.exeHmafgqlo.exeDkphnn32.exeKglamd32.exeLggjnl32.exeOlknmeip.exeIcfljmhj.exeIcjeel32.exeLihnbe32.exeLgnideip.exeBkhifapc.exeIhhmnf32.exeHfaihp32.exeKgcqcmgi.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbdiio32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmiaen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efgcga32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahjmjfao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moofdj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajlnclce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmmgiigb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdlkmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfeknmgf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mgdijn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njkaba32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqoppgqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djilaaef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qhnmnhkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekekpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Finkoe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onepod32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnnlclio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jhmfiedl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jqfcje32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjfoae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blnmpp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgkfdo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gadidp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihdhedio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akenpokp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlgafaei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdadimjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bajnna32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Momqip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkgnnmfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fbimmjmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlpoei32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnckfc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mejnce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flbhpfgj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hlighc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hflhefql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aohekb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihfpif32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Panfke32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Occqof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjbjcd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmafgqlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkphnn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kglamd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lggjnl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olknmeip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icfljmhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icjeel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lihnbe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgnideip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkhifapc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihhmnf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hfaihp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgcqcmgi.exe -
Modifies registry class 64 IoCs
Processes:
Ignekfmm.exeEbmfgfcp.exeNolebiho.exeIajkfl32.exeCcfanh32.exePamoao32.exeBgfpla32.exeJnmgcpqd.exeNhpppobe.exeCjlgjieb.exeNopgcbpn.exeCjcmkh32.exeAdjninqg.exeJnkbdmfa.exeLiohpe32.exeKqakkn32.exeEonjkjdl.exeKcccmlfp.exeHhklilde.exeOhaobfod.exeQafcfj32.exeAolpenhn.exeCiqmap32.exeApqhci32.exeKjdpnm32.exeCcdkco32.exeOilbajjl.exeIcfljmhj.exeEfbcalel.exeNilijl32.exeFphckopm.exeIpnodj32.exeKbbfjm32.exeGgafndba.exeGeeejd32.exeEnlqkhol.exeMfielj32.exeHalcglnb.exeKkjchlcg.exeIpjlca32.exeMefcihdd.exeFmkedpgq.exeHpnmhbaq.exeLgkmoelc.exeHflhefql.exeDadkhapo.exeFpmmfo32.exeLcojcppn.exeMccldi32.exeIbjgbp32.exeJljpoqdm.exeIefnaa32.exeAkdpkb32.exeFbfimdke.exeLhiolall.exePkdnokff.exeJbpnanfe.exeFaddoo32.exeBkkfla32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ignekfmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bijnpnqf.dll" Ebmfgfcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nolebiho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iiaqpl32.dll" Iajkfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hoibal32.dll" Ccfanh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pamoao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgfpla32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnmgcpqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhpppobe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjlgjieb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eommoddd.dll" Nopgcbpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjcmkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eiehbn32.dll" Adjninqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdiddp32.dll" Jnkbdmfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbjejfkc.dll" Liohpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kqakkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfjocqaj.dll" Eonjkjdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcccmlfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Baaken32.dll" Hhklilde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ohaobfod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qafcfj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aolpenhn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ciqmap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcemda32.dll" Apqhci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbhmmpba.dll" Kjdpnm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccdkco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oilbajjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijdfib32.dll" Icfljmhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apbcei32.dll" Efbcalel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nilijl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogmbdpdp.dll" Fphckopm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipnodj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbbfjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lolpecdd.dll" Ggafndba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Geeejd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enlqkhol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mepbcjcm.dll" Mfielj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afacfi32.dll" Halcglnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkjchlcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipjlca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mefcihdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmkedpgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnkojp32.dll" Hpnmhbaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgkmoelc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecmnagfp.dll" Hflhefql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dadkhapo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpmmfo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcojcppn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mccldi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibjgbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dplpah32.dll" Jljpoqdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iefnaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akdpkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbfimdke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocdjlqpm.dll" Lhiolall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pkdnokff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbpnanfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdnmgi32.dll" Faddoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkkfla32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e.exeGajnlb32.exeGhdfhm32.exeGonnegbj.exeHfhfba32.exeHgiciipe.exeHnckfc32.exeHdmccmno.exeHkglpgfk.exeHbadla32.exeHhklilde.exeHkihegdi.exeHbcqba32.exeHhmiokbb.exeHklekg32.exeHnjagb32.exeHfaihp32.exeHknapf32.exeHbhjmqgp.exeIgebegeg.exeIoljfe32.exeIbjgbp32.exedescription pid process target process PID 512 wrote to memory of 2124 512 ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e.exe Gajnlb32.exe PID 512 wrote to memory of 2124 512 ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e.exe Gajnlb32.exe PID 512 wrote to memory of 2124 512 ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e.exe Gajnlb32.exe PID 2124 wrote to memory of 3408 2124 Gajnlb32.exe Ghdfhm32.exe PID 2124 wrote to memory of 3408 2124 Gajnlb32.exe Ghdfhm32.exe PID 2124 wrote to memory of 3408 2124 Gajnlb32.exe Ghdfhm32.exe PID 3408 wrote to memory of 4512 3408 Ghdfhm32.exe Gonnegbj.exe PID 3408 wrote to memory of 4512 3408 Ghdfhm32.exe Gonnegbj.exe PID 3408 wrote to memory of 4512 3408 Ghdfhm32.exe Gonnegbj.exe PID 4512 wrote to memory of 3412 4512 Gonnegbj.exe Hfhfba32.exe PID 4512 wrote to memory of 3412 4512 Gonnegbj.exe Hfhfba32.exe PID 4512 wrote to memory of 3412 4512 Gonnegbj.exe Hfhfba32.exe PID 3412 wrote to memory of 1492 3412 Hfhfba32.exe Hgiciipe.exe PID 3412 wrote to memory of 1492 3412 Hfhfba32.exe Hgiciipe.exe PID 3412 wrote to memory of 1492 3412 Hfhfba32.exe Hgiciipe.exe PID 1492 wrote to memory of 3660 1492 Hgiciipe.exe Hnckfc32.exe PID 1492 wrote to memory of 3660 1492 Hgiciipe.exe Hnckfc32.exe PID 1492 wrote to memory of 3660 1492 Hgiciipe.exe Hnckfc32.exe PID 3660 wrote to memory of 3364 3660 Hnckfc32.exe Hdmccmno.exe PID 3660 wrote to memory of 3364 3660 Hnckfc32.exe Hdmccmno.exe PID 3660 wrote to memory of 3364 3660 Hnckfc32.exe Hdmccmno.exe PID 3364 wrote to memory of 2104 3364 Hdmccmno.exe Hkglpgfk.exe PID 3364 wrote to memory of 2104 3364 Hdmccmno.exe Hkglpgfk.exe PID 3364 wrote to memory of 2104 3364 Hdmccmno.exe Hkglpgfk.exe PID 2104 wrote to memory of 4828 2104 Hkglpgfk.exe Hbadla32.exe PID 2104 wrote to memory of 4828 2104 Hkglpgfk.exe Hbadla32.exe PID 2104 wrote to memory of 4828 2104 Hkglpgfk.exe Hbadla32.exe PID 4828 wrote to memory of 2348 4828 Hbadla32.exe Hhklilde.exe PID 4828 wrote to memory of 2348 4828 Hbadla32.exe Hhklilde.exe PID 4828 wrote to memory of 2348 4828 Hbadla32.exe Hhklilde.exe PID 2348 wrote to memory of 4552 2348 Hhklilde.exe Hkihegdi.exe PID 2348 wrote to memory of 4552 2348 Hhklilde.exe Hkihegdi.exe PID 2348 wrote to memory of 4552 2348 Hhklilde.exe Hkihegdi.exe PID 4552 wrote to memory of 4028 4552 Hkihegdi.exe Hbcqba32.exe PID 4552 wrote to memory of 4028 4552 Hkihegdi.exe Hbcqba32.exe PID 4552 wrote to memory of 4028 4552 Hkihegdi.exe Hbcqba32.exe PID 4028 wrote to memory of 1476 4028 Hbcqba32.exe Hhmiokbb.exe PID 4028 wrote to memory of 1476 4028 Hbcqba32.exe Hhmiokbb.exe PID 4028 wrote to memory of 1476 4028 Hbcqba32.exe Hhmiokbb.exe PID 1476 wrote to memory of 4812 1476 Hhmiokbb.exe Hklekg32.exe PID 1476 wrote to memory of 4812 1476 Hhmiokbb.exe Hklekg32.exe PID 1476 wrote to memory of 4812 1476 Hhmiokbb.exe Hklekg32.exe PID 4812 wrote to memory of 3144 4812 Hklekg32.exe Hnjagb32.exe PID 4812 wrote to memory of 3144 4812 Hklekg32.exe Hnjagb32.exe PID 4812 wrote to memory of 3144 4812 Hklekg32.exe Hnjagb32.exe PID 3144 wrote to memory of 1920 3144 Hnjagb32.exe Hfaihp32.exe PID 3144 wrote to memory of 1920 3144 Hnjagb32.exe Hfaihp32.exe PID 3144 wrote to memory of 1920 3144 Hnjagb32.exe Hfaihp32.exe PID 1920 wrote to memory of 212 1920 Hfaihp32.exe Hknapf32.exe PID 1920 wrote to memory of 212 1920 Hfaihp32.exe Hknapf32.exe PID 1920 wrote to memory of 212 1920 Hfaihp32.exe Hknapf32.exe PID 212 wrote to memory of 3076 212 Hknapf32.exe Hbhjmqgp.exe PID 212 wrote to memory of 3076 212 Hknapf32.exe Hbhjmqgp.exe PID 212 wrote to memory of 3076 212 Hknapf32.exe Hbhjmqgp.exe PID 3076 wrote to memory of 4948 3076 Hbhjmqgp.exe Igebegeg.exe PID 3076 wrote to memory of 4948 3076 Hbhjmqgp.exe Igebegeg.exe PID 3076 wrote to memory of 4948 3076 Hbhjmqgp.exe Igebegeg.exe PID 4948 wrote to memory of 5020 4948 Igebegeg.exe Ioljfe32.exe PID 4948 wrote to memory of 5020 4948 Igebegeg.exe Ioljfe32.exe PID 4948 wrote to memory of 5020 4948 Igebegeg.exe Ioljfe32.exe PID 5020 wrote to memory of 4956 5020 Ioljfe32.exe Ibjgbp32.exe PID 5020 wrote to memory of 4956 5020 Ioljfe32.exe Ibjgbp32.exe PID 5020 wrote to memory of 4956 5020 Ioljfe32.exe Ibjgbp32.exe PID 4956 wrote to memory of 3516 4956 Ibjgbp32.exe Iidoojlj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e.exe"C:\Users\Admin\AppData\Local\Temp\ac673b1c809632a3c9a18ff3e9b9795d9c889e4a563e15a4947e8d2d5003579e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\Gajnlb32.exeC:\Windows\system32\Gajnlb32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Ghdfhm32.exeC:\Windows\system32\Ghdfhm32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\Gonnegbj.exeC:\Windows\system32\Gonnegbj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\Hfhfba32.exeC:\Windows\system32\Hfhfba32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\Hgiciipe.exeC:\Windows\system32\Hgiciipe.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\Hnckfc32.exeC:\Windows\system32\Hnckfc32.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\Hdmccmno.exeC:\Windows\system32\Hdmccmno.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\Hkglpgfk.exeC:\Windows\system32\Hkglpgfk.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Hbadla32.exeC:\Windows\system32\Hbadla32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\Hhklilde.exeC:\Windows\system32\Hhklilde.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\Hkihegdi.exeC:\Windows\system32\Hkihegdi.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\Hbcqba32.exeC:\Windows\system32\Hbcqba32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\Hhmiokbb.exeC:\Windows\system32\Hhmiokbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\Hklekg32.exeC:\Windows\system32\Hklekg32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Hnjagb32.exeC:\Windows\system32\Hnjagb32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\Hfaihp32.exeC:\Windows\system32\Hfaihp32.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\Hknapf32.exeC:\Windows\system32\Hknapf32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\Hbhjmqgp.exeC:\Windows\system32\Hbhjmqgp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\Igebegeg.exeC:\Windows\system32\Igebegeg.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\Ioljfe32.exeC:\Windows\system32\Ioljfe32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\Ibjgbp32.exeC:\Windows\system32\Ibjgbp32.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\Iidoojlj.exeC:\Windows\system32\Iidoojlj.exe23⤵
- Executes dropped EXE
PID:3516 -
C:\Windows\SysWOW64\Inaggaka.exeC:\Windows\system32\Inaggaka.exe24⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\SysWOW64\Iiglejjg.exeC:\Windows\system32\Iiglejjg.exe25⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\Ioadadbd.exeC:\Windows\system32\Ioadadbd.exe26⤵
- Executes dropped EXE
PID:1452 -
C:\Windows\SysWOW64\Ibopnpah.exeC:\Windows\system32\Ibopnpah.exe27⤵
- Executes dropped EXE
PID:4644 -
C:\Windows\SysWOW64\Iglhffop.exeC:\Windows\system32\Iglhffop.exe28⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\Infabq32.exeC:\Windows\system32\Infabq32.exe29⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\Iepiokni.exeC:\Windows\system32\Iepiokni.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Ignekfmm.exeC:\Windows\system32\Ignekfmm.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Jbdiio32.exeC:\Windows\system32\Jbdiio32.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\Jklnadcc.exeC:\Windows\system32\Jklnadcc.exe33⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\Jipnkibm.exeC:\Windows\system32\Jipnkibm.exe34⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\Jgcofe32.exeC:\Windows\system32\Jgcofe32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3668 -
C:\Windows\SysWOW64\Jnmgcpqd.exeC:\Windows\system32\Jnmgcpqd.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2748 -
C:\Windows\SysWOW64\Jibkqh32.exeC:\Windows\system32\Jibkqh32.exe37⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\Jeileifo.exeC:\Windows\system32\Jeileifo.exe38⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\SysWOW64\Jghhaeeb.exeC:\Windows\system32\Jghhaeeb.exe39⤵
- Executes dropped EXE
PID:5004 -
C:\Windows\SysWOW64\Jnapno32.exeC:\Windows\system32\Jnapno32.exe40⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\Jfihplma.exeC:\Windows\system32\Jfihplma.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Jigdlhle.exeC:\Windows\system32\Jigdlhle.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Jleahcki.exeC:\Windows\system32\Jleahcki.exe43⤵
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\Kbpidm32.exeC:\Windows\system32\Kbpidm32.exe44⤵
- Executes dropped EXE
PID:3164 -
C:\Windows\SysWOW64\Kfkeelko.exeC:\Windows\system32\Kfkeelko.exe45⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\Kglamd32.exeC:\Windows\system32\Kglamd32.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\SysWOW64\Kpcina32.exeC:\Windows\system32\Kpcina32.exe47⤵
- Executes dropped EXE
PID:4168 -
C:\Windows\SysWOW64\Kbbfjm32.exeC:\Windows\system32\Kbbfjm32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:2444 -
C:\Windows\SysWOW64\Kepbfh32.exeC:\Windows\system32\Kepbfh32.exe49⤵
- Executes dropped EXE
PID:3856 -
C:\Windows\SysWOW64\Kljjcb32.exeC:\Windows\system32\Kljjcb32.exe50⤵
- Executes dropped EXE
PID:3560 -
C:\Windows\SysWOW64\Kbdbpmop.exeC:\Windows\system32\Kbdbpmop.exe51⤵
- Executes dropped EXE
PID:792 -
C:\Windows\SysWOW64\Kinklg32.exeC:\Windows\system32\Kinklg32.exe52⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\Kphcianj.exeC:\Windows\system32\Kphcianj.exe53⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\Kbgoelmm.exeC:\Windows\system32\Kbgoelmm.exe54⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\Kiqgbf32.exeC:\Windows\system32\Kiqgbf32.exe55⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\Klocnbcn.exeC:\Windows\system32\Klocnbcn.exe56⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\Knmpjmba.exeC:\Windows\system32\Knmpjmba.exe57⤵
- Executes dropped EXE
PID:4744 -
C:\Windows\SysWOW64\Kfdhkkcd.exeC:\Windows\system32\Kfdhkkcd.exe58⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Klapcaak.exeC:\Windows\system32\Klapcaak.exe59⤵
- Executes dropped EXE
PID:3424 -
C:\Windows\SysWOW64\Lbkhpl32.exeC:\Windows\system32\Lbkhpl32.exe60⤵
- Executes dropped EXE
PID:5108 -
C:\Windows\SysWOW64\Lieamfpe.exeC:\Windows\system32\Lieamfpe.exe61⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\Llcmia32.exeC:\Windows\system32\Llcmia32.exe62⤵
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\Lbnefkfe.exeC:\Windows\system32\Lbnefkfe.exe63⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\Lihnbe32.exeC:\Windows\system32\Lihnbe32.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\Llfjoa32.exeC:\Windows\system32\Llfjoa32.exe65⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Lndfkl32.exeC:\Windows\system32\Lndfkl32.exe66⤵PID:220
-
C:\Windows\SysWOW64\Lflnlj32.exeC:\Windows\system32\Lflnlj32.exe67⤵PID:4952
-
C:\Windows\SysWOW64\Llhfdq32.exeC:\Windows\system32\Llhfdq32.exe68⤵PID:2864
-
C:\Windows\SysWOW64\Lpfojo32.exeC:\Windows\system32\Lpfojo32.exe69⤵PID:4024
-
C:\Windows\SysWOW64\Lfpggiif.exeC:\Windows\system32\Lfpggiif.exe70⤵PID:1208
-
C:\Windows\SysWOW64\Lechbf32.exeC:\Windows\system32\Lechbf32.exe71⤵PID:1448
-
C:\Windows\SysWOW64\Mpilpo32.exeC:\Windows\system32\Mpilpo32.exe72⤵PID:2220
-
C:\Windows\SysWOW64\Mbghljok.exeC:\Windows\system32\Mbghljok.exe73⤵PID:2328
-
C:\Windows\SysWOW64\Meedheno.exeC:\Windows\system32\Meedheno.exe74⤵PID:4152
-
C:\Windows\SysWOW64\Miapid32.exeC:\Windows\system32\Miapid32.exe75⤵PID:2640
-
C:\Windows\SysWOW64\Mpkhenmd.exeC:\Windows\system32\Mpkhenmd.exe76⤵PID:3996
-
C:\Windows\SysWOW64\Mbieajlh.exeC:\Windows\system32\Mbieajlh.exe77⤵PID:4844
-
C:\Windows\SysWOW64\Mehanell.exeC:\Windows\system32\Mehanell.exe78⤵PID:2004
-
C:\Windows\SysWOW64\Mhfmjqkp.exeC:\Windows\system32\Mhfmjqkp.exe79⤵PID:2196
-
C:\Windows\SysWOW64\Mpmeknkb.exeC:\Windows\system32\Mpmeknkb.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2612 -
C:\Windows\SysWOW64\Mblagi32.exeC:\Windows\system32\Mblagi32.exe81⤵PID:2488
-
C:\Windows\SysWOW64\Mejnce32.exeC:\Windows\system32\Mejnce32.exe82⤵
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Windows\SysWOW64\Mhhjop32.exeC:\Windows\system32\Mhhjop32.exe83⤵PID:4732
-
C:\Windows\SysWOW64\Mobbljpj.exeC:\Windows\system32\Mobbljpj.exe84⤵PID:4260
-
C:\Windows\SysWOW64\Mbnnmi32.exeC:\Windows\system32\Mbnnmi32.exe85⤵PID:2836
-
C:\Windows\SysWOW64\Mihficpp.exeC:\Windows\system32\Mihficpp.exe86⤵PID:208
-
C:\Windows\SysWOW64\Mlfbeooc.exeC:\Windows\system32\Mlfbeooc.exe87⤵PID:3952
-
C:\Windows\SysWOW64\Moeoajng.exeC:\Windows\system32\Moeoajng.exe88⤵PID:1836
-
C:\Windows\SysWOW64\Meognded.exeC:\Windows\system32\Meognded.exe89⤵PID:60
-
C:\Windows\SysWOW64\Mhmcjpdg.exeC:\Windows\system32\Mhmcjpdg.exe90⤵PID:4044
-
C:\Windows\SysWOW64\Nliokn32.exeC:\Windows\system32\Nliokn32.exe91⤵PID:3936
-
C:\Windows\SysWOW64\Noglgj32.exeC:\Windows\system32\Noglgj32.exe92⤵PID:1676
-
C:\Windows\SysWOW64\Neadddca.exeC:\Windows\system32\Neadddca.exe93⤵
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Nhpppobe.exeC:\Windows\system32\Nhpppobe.exe94⤵
- Modifies registry class
PID:4684 -
C:\Windows\SysWOW64\Npghamcg.exeC:\Windows\system32\Npghamcg.exe95⤵PID:3860
-
C:\Windows\SysWOW64\Nbedmhbk.exeC:\Windows\system32\Nbedmhbk.exe96⤵
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\Necqicao.exeC:\Windows\system32\Necqicao.exe97⤵PID:744
-
C:\Windows\SysWOW64\Nlmifnik.exeC:\Windows\system32\Nlmifnik.exe98⤵PID:5136
-
C:\Windows\SysWOW64\Nolebiho.exeC:\Windows\system32\Nolebiho.exe99⤵
- Modifies registry class
PID:5180 -
C:\Windows\SysWOW64\Nhdiko32.exeC:\Windows\system32\Nhdiko32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5224 -
C:\Windows\SysWOW64\Npkall32.exeC:\Windows\system32\Npkall32.exe101⤵PID:5268
-
C:\Windows\SysWOW64\Ncjnhg32.exeC:\Windows\system32\Ncjnhg32.exe102⤵PID:5312
-
C:\Windows\SysWOW64\Nehjdc32.exeC:\Windows\system32\Nehjdc32.exe103⤵PID:5356
-
C:\Windows\SysWOW64\Nlbbam32.exeC:\Windows\system32\Nlbbam32.exe104⤵PID:5400
-
C:\Windows\SysWOW64\Noqomh32.exeC:\Windows\system32\Noqomh32.exe105⤵PID:5444
-
C:\Windows\SysWOW64\Ncljnglc.exeC:\Windows\system32\Ncljnglc.exe106⤵PID:5488
-
C:\Windows\SysWOW64\Nifbka32.exeC:\Windows\system32\Nifbka32.exe107⤵PID:5532
-
C:\Windows\SysWOW64\Ocogcgjp.exeC:\Windows\system32\Ocogcgjp.exe108⤵PID:5576
-
C:\Windows\SysWOW64\Oemcpbid.exeC:\Windows\system32\Oemcpbid.exe109⤵PID:5620
-
C:\Windows\SysWOW64\Oihopa32.exeC:\Windows\system32\Oihopa32.exe110⤵PID:5664
-
C:\Windows\SysWOW64\Ooehhhpd.exeC:\Windows\system32\Ooehhhpd.exe111⤵PID:5708
-
C:\Windows\SysWOW64\Oeopeb32.exeC:\Windows\system32\Oeopeb32.exe112⤵PID:5752
-
C:\Windows\SysWOW64\Ohnlam32.exeC:\Windows\system32\Ohnlam32.exe113⤵PID:5796
-
C:\Windows\SysWOW64\Oogdngna.exeC:\Windows\system32\Oogdngna.exe114⤵PID:5844
-
C:\Windows\SysWOW64\Occqof32.exeC:\Windows\system32\Occqof32.exe115⤵
- System Location Discovery: System Language Discovery
PID:5888 -
C:\Windows\SysWOW64\Oimikpng.exeC:\Windows\system32\Oimikpng.exe116⤵PID:5932
-
C:\Windows\SysWOW64\Olleglmk.exeC:\Windows\system32\Olleglmk.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5976 -
C:\Windows\SysWOW64\Ocemdfdh.exeC:\Windows\system32\Ocemdfdh.exe118⤵PID:6020
-
C:\Windows\SysWOW64\Ohbflmbp.exeC:\Windows\system32\Ohbflmbp.exe119⤵PID:6064
-
C:\Windows\SysWOW64\Opinnjcb.exeC:\Windows\system32\Opinnjcb.exe120⤵PID:6136
-
C:\Windows\SysWOW64\Ogcfjd32.exeC:\Windows\system32\Ogcfjd32.exe121⤵
- Drops file in System32 directory
PID:5196 -
C:\Windows\SysWOW64\Pjbbfp32.exeC:\Windows\system32\Pjbbfp32.exe122⤵PID:5264
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-