Analysis
-
max time kernel
38s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe
Resource
win10v2004-20241007-en
General
-
Target
40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe
-
Size
163KB
-
MD5
b76f7afb67ad2327214da779ea4c5778
-
SHA1
d4090a4e06eb04f6ef6dbec1bc4192f071e4b2a5
-
SHA256
40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75
-
SHA512
4a43e93283720469c55d9db9575ef72cbd2ef9fea0fd1f83de24d9891b208ec8c3b15daf51c4b7cd2dfa2ddfb20799fc8cfe8f7e25459aa03aaf70f8ace54a12
-
SSDEEP
1536:PN83A0wgPSckeARD+olWGurWI5lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:FH5KSRe21lWGu95ltOrWKDBr+yJb
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Hfdbji32.exeIjegeg32.exeMoikinib.exeJpcfih32.exeIiodliep.exeDapnfb32.exeDhmchljg.exeAbnbccia.exeHlijan32.exeHfanjcke.exeOhmljj32.exePldknmhd.exeJdbhcfjd.exeGpfggeai.exeFbbcdh32.exeFhfbmn32.exeMdnffpif.exeGqcaoghl.exeKabobo32.exeGhkbccdn.exeNgiiip32.exePhphgf32.exeCbokoa32.exeHcllmi32.exeLpqnpacp.exeGcgpiq32.exeKiamql32.exeBhjngnod.exeEibbqmhd.exeIpgpcc32.exeCconcjae.exeCobkhe32.exeGeeekf32.exeLinfpi32.exeFoqadnpq.exeDpbgghhl.exeKfccmini.exeIbpjaagi.exePkihpi32.exeDbqajk32.exeMnilfc32.exeGhihfl32.exeIceiibef.exeGpfpmonn.exeEleliepj.exeMdahnmck.exeMcknjidn.exeLodoefed.exeOpennf32.exeGfdcbmbn.exeCjkcedgp.exeFoacmg32.exeLkffohon.exeMflgkd32.exeHdolga32.exeDlfbck32.exePnjpdphd.exeBcdbjl32.exeLkoidcaj.exeBbolge32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfdbji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijegeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Moikinib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpcfih32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiodliep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dapnfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhmchljg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abnbccia.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlijan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfanjcke.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohmljj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pldknmhd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdbhcfjd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpfggeai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbbcdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhfbmn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdnffpif.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqcaoghl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kabobo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghkbccdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngiiip32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phphgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbokoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcllmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpqnpacp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcgpiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kiamql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhjngnod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eibbqmhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipgpcc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cconcjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cobkhe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Geeekf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Linfpi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Foqadnpq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpbgghhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfccmini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibpjaagi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkihpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbqajk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnilfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghihfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iceiibef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpfpmonn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moikinib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eleliepj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdahnmck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcknjidn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpcfih32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lodoefed.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opennf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfdcbmbn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjkcedgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Foacmg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkffohon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mflgkd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdolga32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlfbck32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhfbmn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnjpdphd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibpjaagi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcdbjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkoidcaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbolge32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Cnacbj32.exeCfmhfm32.exeCjkamk32.exeCmimif32.exeDpjfjalp.exeDhekodik.exeDidgig32.exeDaplmimi.exeDodlfmlb.exeDgoakpjn.exeDadehh32.exeEagbnh32.exeEplood32.exeEoalpaaa.exeEleliepj.exeEenabkfk.exeFofekp32.exeFnkblm32.exeFdggofgn.exeFkapkq32.exeFdjddf32.exeFnbhmlkk.exeGqcaoghl.exeGmjbchnq.exeGfdcbmbn.exeGkaljdaf.exeGkchpcoc.exeHelmiiec.exeHngngo32.exeHgobpd32.exeHcfceeff.exeHmnhnk32.exeHiehbl32.exeIfiilp32.exeIbpjaagi.exeInfjfblm.exeIilocklc.exeIniglajj.exeIhaldgak.exeIaipmm32.exeJonqfq32.exeJkdalb32.exeJdmfdgbj.exeJpcfih32.exeKgknpfdi.exeKhjkiikl.exeKabobo32.exeLkkckdhm.exeLcfhpf32.exeLnlmmo32.exeLcieef32.exeLlainlje.exeLbnbfb32.exeLkffohon.exeLbpolb32.exeLhjghlng.exeLodoefed.exeMdahnmck.exeMnilfc32.exeMhopcl32.exeMnlilb32.exeMdeaim32.exeMjbiac32.exeMcknjidn.exepid process 2236 Cnacbj32.exe 2096 Cfmhfm32.exe 2136 Cjkamk32.exe 2740 Cmimif32.exe 2712 Dpjfjalp.exe 2560 Dhekodik.exe 3048 Didgig32.exe 2688 Daplmimi.exe 2816 Dodlfmlb.exe 2280 Dgoakpjn.exe 2944 Dadehh32.exe 1796 Eagbnh32.exe 468 Eplood32.exe 2084 Eoalpaaa.exe 1944 Eleliepj.exe 2616 Eenabkfk.exe 1300 Fofekp32.exe 2540 Fnkblm32.exe 764 Fdggofgn.exe 1660 Fkapkq32.exe 2164 Fdjddf32.exe 2340 Fnbhmlkk.exe 2796 Gqcaoghl.exe 2240 Gmjbchnq.exe 2424 Gfdcbmbn.exe 2460 Gkaljdaf.exe 1572 Gkchpcoc.exe 1528 Helmiiec.exe 2888 Hngngo32.exe 1184 Hgobpd32.exe 2748 Hcfceeff.exe 1580 Hmnhnk32.exe 1748 Hiehbl32.exe 3056 Ifiilp32.exe 1788 Ibpjaagi.exe 2132 Infjfblm.exe 2464 Iilocklc.exe 2452 Iniglajj.exe 2556 Ihaldgak.exe 2596 Iaipmm32.exe 1148 Jonqfq32.exe 2404 Jkdalb32.exe 2604 Jdmfdgbj.exe 748 Jpcfih32.exe 996 Kgknpfdi.exe 1548 Khjkiikl.exe 2592 Kabobo32.exe 1776 Lkkckdhm.exe 2124 Lcfhpf32.exe 3024 Lnlmmo32.exe 1088 Lcieef32.exe 2620 Llainlje.exe 2836 Lbnbfb32.exe 2268 Lkffohon.exe 1128 Lbpolb32.exe 1812 Lhjghlng.exe 1032 Lodoefed.exe 1756 Mdahnmck.exe 3068 Mnilfc32.exe 1480 Mhopcl32.exe 1392 Mnlilb32.exe 580 Mdeaim32.exe 1768 Mjbiac32.exe 1012 Mcknjidn.exe -
Loads dropped DLL 64 IoCs
Processes:
40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exeCnacbj32.exeCfmhfm32.exeCjkamk32.exeCmimif32.exeDpjfjalp.exeDhekodik.exeDidgig32.exeDaplmimi.exeDodlfmlb.exeDgoakpjn.exeDadehh32.exeEagbnh32.exeEplood32.exeEoalpaaa.exeEleliepj.exeEenabkfk.exeFofekp32.exeFnkblm32.exeFdggofgn.exeFkapkq32.exeFdjddf32.exeFnbhmlkk.exeGqcaoghl.exeGmjbchnq.exeGfdcbmbn.exeGkaljdaf.exeGkchpcoc.exeHelmiiec.exeHngngo32.exeHgobpd32.exeHcfceeff.exepid process 2536 40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe 2536 40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe 2236 Cnacbj32.exe 2236 Cnacbj32.exe 2096 Cfmhfm32.exe 2096 Cfmhfm32.exe 2136 Cjkamk32.exe 2136 Cjkamk32.exe 2740 Cmimif32.exe 2740 Cmimif32.exe 2712 Dpjfjalp.exe 2712 Dpjfjalp.exe 2560 Dhekodik.exe 2560 Dhekodik.exe 3048 Didgig32.exe 3048 Didgig32.exe 2688 Daplmimi.exe 2688 Daplmimi.exe 2816 Dodlfmlb.exe 2816 Dodlfmlb.exe 2280 Dgoakpjn.exe 2280 Dgoakpjn.exe 2944 Dadehh32.exe 2944 Dadehh32.exe 1796 Eagbnh32.exe 1796 Eagbnh32.exe 468 Eplood32.exe 468 Eplood32.exe 2084 Eoalpaaa.exe 2084 Eoalpaaa.exe 1944 Eleliepj.exe 1944 Eleliepj.exe 2616 Eenabkfk.exe 2616 Eenabkfk.exe 1300 Fofekp32.exe 1300 Fofekp32.exe 2540 Fnkblm32.exe 2540 Fnkblm32.exe 764 Fdggofgn.exe 764 Fdggofgn.exe 1660 Fkapkq32.exe 1660 Fkapkq32.exe 2164 Fdjddf32.exe 2164 Fdjddf32.exe 2340 Fnbhmlkk.exe 2340 Fnbhmlkk.exe 2796 Gqcaoghl.exe 2796 Gqcaoghl.exe 2240 Gmjbchnq.exe 2240 Gmjbchnq.exe 2424 Gfdcbmbn.exe 2424 Gfdcbmbn.exe 2460 Gkaljdaf.exe 2460 Gkaljdaf.exe 1572 Gkchpcoc.exe 1572 Gkchpcoc.exe 1528 Helmiiec.exe 1528 Helmiiec.exe 2888 Hngngo32.exe 2888 Hngngo32.exe 1184 Hgobpd32.exe 1184 Hgobpd32.exe 2748 Hcfceeff.exe 2748 Hcfceeff.exe -
Drops file in System32 directory 64 IoCs
Processes:
Infjfblm.exeJbooen32.exeDhmchljg.exeAbehcbci.exeCobkhe32.exeFdjddf32.exeCfmceomm.exeKbmahjbk.exePopkeh32.exeIjegeg32.exeCfemdp32.exeDpbgghhl.exeFoacmg32.exeHlijan32.exeJnaihhgf.exePkihpi32.exeAfcbgd32.exeGjcekj32.exeLcnhcdkp.exeEoanij32.exeFbbcdh32.exeBjdqfajl.exeIojoalda.exeHelmiiec.exeConpdm32.exeNfqbol32.exeIdnako32.exeBcgoolln.exeOhqbbi32.exeKlocba32.exeLkoidcaj.exeBofbih32.exePmoqfi32.exeAogpmcmb.exeFangfcki.exeOhmljj32.exeAkbgdkgm.exeDhekodik.exeFnbhmlkk.exeMflgkd32.exeKplfmfmf.exeLcieef32.exeBfnnpbnn.exeDgjfbllj.exeGegbpe32.exeGhihfl32.exeHhbgkn32.exeFdggofgn.exeDgoakpjn.exeLkkckdhm.exeLbpolb32.exeGpfggeai.exeLkafib32.exeHfdbji32.exeMdahnmck.exeMcknjidn.exeKblooa32.exeNjjbjk32.exeDidgig32.exeNpfhjifm.exeBqopmbed.exeHobcok32.exeNodnmb32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Iilocklc.exe Infjfblm.exe File created C:\Windows\SysWOW64\Eelgce32.dll Jbooen32.exe File opened for modification C:\Windows\SysWOW64\Ephhmn32.exe Dhmchljg.exe File opened for modification C:\Windows\SysWOW64\Akpmhdqd.exe Abehcbci.exe File created C:\Windows\SysWOW64\Cfmceomm.exe Cobkhe32.exe File opened for modification C:\Windows\SysWOW64\Fnbhmlkk.exe Fdjddf32.exe File opened for modification C:\Windows\SysWOW64\Coehnecn.exe Cfmceomm.exe File created C:\Windows\SysWOW64\Mpfogm32.dll Kbmahjbk.exe File created C:\Windows\SysWOW64\Pldknmhd.exe Popkeh32.exe File created C:\Windows\SysWOW64\Fnhpam32.dll Ijegeg32.exe File created C:\Windows\SysWOW64\Lqicio32.dll Cfemdp32.exe File opened for modification C:\Windows\SysWOW64\Djhldahb.exe Dpbgghhl.exe File created C:\Windows\SysWOW64\Beoanjep.dll Foacmg32.exe File opened for modification C:\Windows\SysWOW64\Hfanjcke.exe Hlijan32.exe File created C:\Windows\SysWOW64\Facfgahm.dll Jnaihhgf.exe File opened for modification C:\Windows\SysWOW64\Pdamhocm.exe Pkihpi32.exe File opened for modification C:\Windows\SysWOW64\Aokfpjai.exe Afcbgd32.exe File created C:\Windows\SysWOW64\Eegdfb32.dll Gjcekj32.exe File created C:\Windows\SysWOW64\Llgllj32.exe Lcnhcdkp.exe File created C:\Windows\SysWOW64\Jnbbgfli.dll Eoanij32.exe File opened for modification C:\Windows\SysWOW64\Faljqcmk.exe Fbbcdh32.exe File opened for modification C:\Windows\SysWOW64\Bcmeogam.exe Bjdqfajl.exe File created C:\Windows\SysWOW64\Mhfdgf32.dll Iojoalda.exe File opened for modification C:\Windows\SysWOW64\Hngngo32.exe Helmiiec.exe File opened for modification C:\Windows\SysWOW64\Cmapna32.exe Conpdm32.exe File created C:\Windows\SysWOW64\Nkmkgc32.exe Nfqbol32.exe File opened for modification C:\Windows\SysWOW64\Iccnmk32.exe Idnako32.exe File created C:\Windows\SysWOW64\Kimhhpgd.dll Bcgoolln.exe File created C:\Windows\SysWOW64\Obffpa32.exe Ohqbbi32.exe File opened for modification C:\Windows\SysWOW64\Kehgkgha.exe Klocba32.exe File opened for modification C:\Windows\SysWOW64\Lkafib32.exe Lkoidcaj.exe File created C:\Windows\SysWOW64\Bhngbm32.exe Bofbih32.exe File created C:\Windows\SysWOW64\Pfgeoo32.exe Pmoqfi32.exe File created C:\Windows\SysWOW64\Ahpdficc.exe Aogpmcmb.exe File opened for modification C:\Windows\SysWOW64\Gmegkd32.exe Fangfcki.exe File created C:\Windows\SysWOW64\Ophanl32.exe Ohmljj32.exe File opened for modification C:\Windows\SysWOW64\Bqopmbed.exe Akbgdkgm.exe File created C:\Windows\SysWOW64\Didgig32.exe Dhekodik.exe File opened for modification C:\Windows\SysWOW64\Gqcaoghl.exe Fnbhmlkk.exe File created C:\Windows\SysWOW64\Nqakim32.exe Mflgkd32.exe File created C:\Windows\SysWOW64\Kblooa32.exe Kplfmfmf.exe File created C:\Windows\SysWOW64\Llainlje.exe Lcieef32.exe File opened for modification C:\Windows\SysWOW64\Bofbih32.exe Bfnnpbnn.exe File opened for modification C:\Windows\SysWOW64\Dlfbck32.exe Dgjfbllj.exe File opened for modification C:\Windows\SysWOW64\Hdloab32.exe Gegbpe32.exe File created C:\Windows\SysWOW64\Gemhpq32.exe Ghihfl32.exe File created C:\Windows\SysWOW64\Iolohhpc.exe Hhbgkn32.exe File created C:\Windows\SysWOW64\Fkapkq32.exe Fdggofgn.exe File created C:\Windows\SysWOW64\Icmlnmgb.exe Ijegeg32.exe File opened for modification C:\Windows\SysWOW64\Dadehh32.exe Dgoakpjn.exe File opened for modification C:\Windows\SysWOW64\Lcfhpf32.exe Lkkckdhm.exe File opened for modification C:\Windows\SysWOW64\Lhjghlng.exe Lbpolb32.exe File created C:\Windows\SysWOW64\Ejjglk32.dll Gpfggeai.exe File opened for modification C:\Windows\SysWOW64\Lpnobi32.exe Lkafib32.exe File created C:\Windows\SysWOW64\Hqjfgb32.exe Hfdbji32.exe File created C:\Windows\SysWOW64\Nmhpeo32.dll Mdahnmck.exe File created C:\Windows\SysWOW64\Mnpbgbdd.exe Mcknjidn.exe File created C:\Windows\SysWOW64\Gmpoce32.dll Kblooa32.exe File created C:\Windows\SysWOW64\Nfqbol32.exe Njjbjk32.exe File created C:\Windows\SysWOW64\Kqkdjkoi.dll Didgig32.exe File created C:\Windows\SysWOW64\Niadmlcg.dll Npfhjifm.exe File created C:\Windows\SysWOW64\Bkddjkej.exe Bqopmbed.exe File created C:\Windows\SysWOW64\Hdolga32.exe Hobcok32.exe File opened for modification C:\Windows\SysWOW64\Njjbjk32.exe Nodnmb32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Infjfblm.exePkihpi32.exeBpfhfjgq.exeFkapkq32.exeMnilfc32.exeMjcljlea.exeQfganb32.exeEbjfiboe.exeKfccmini.exeMlikkbga.exeOaaghp32.exeHhhblgim.exeJmmmbg32.exeCfmceomm.exeLhjghlng.exeIceiibef.exeObffpa32.exeEfdmohmm.exePfgeoo32.exeDggcbf32.exeMjbiac32.exeDajlhc32.exeHkidclbb.exeDpbgghhl.exeEfolib32.exeGklnmgic.exeIccnmk32.exeEoalpaaa.exeIfiilp32.exeLcfhpf32.exeAfcbgd32.exeGhkbccdn.exeKplfmfmf.exeJijqeg32.exeOfbikf32.exeGmegkd32.exeIjegeg32.exeKlocba32.exeLpfagd32.exeMdfcaegj.exeCoehnecn.exeJgnflmia.exeDaplmimi.exeIfloeo32.exeQdlialfb.exeHdolga32.exeKdoaackf.exeGcgpiq32.exeCjbpoeoj.exeFangfcki.exeIoochn32.exeLmlofhmb.exePhknlfem.exeIdnako32.exeApdminod.exeJjbgok32.exeGmhmdc32.exeObijpgcf.exeBqopmbed.exeJfigdl32.exeNjjbjk32.exeQhbdmeoe.exeCcinnd32.exeJnaihhgf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Infjfblm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkihpi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpfhfjgq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkapkq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnilfc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjcljlea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qfganb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ebjfiboe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfccmini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlikkbga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oaaghp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhhblgim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmmmbg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfmceomm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhjghlng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iceiibef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obffpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efdmohmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfgeoo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dggcbf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjbiac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dajlhc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkidclbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpbgghhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efolib32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gklnmgic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iccnmk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eoalpaaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifiilp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcfhpf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afcbgd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghkbccdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kplfmfmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jijqeg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofbikf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmegkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijegeg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klocba32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpfagd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdfcaegj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coehnecn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgnflmia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daplmimi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifloeo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qdlialfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdolga32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdoaackf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gcgpiq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjbpoeoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fangfcki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ioochn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmlofhmb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phknlfem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idnako32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apdminod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjbgok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmhmdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obijpgcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bqopmbed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfigdl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njjbjk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qhbdmeoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccinnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnaihhgf.exe -
Modifies registry class 64 IoCs
Processes:
Gpfpmonn.exeFoacmg32.exeLdgpea32.exeNeemgp32.exeBcmeogam.exeGeeekf32.exePhphgf32.exeInfjfblm.exeHqjfgb32.exePldknmhd.exeGngdadoj.exeHcllmi32.exeGnjhaj32.exeBjdqfajl.exeKplfmfmf.exeCjbpoeoj.exeDjcbib32.exeMcknjidn.exeElpldp32.exeIfiilp32.exeIcponb32.exeIccnmk32.exeGqcaoghl.exeHngngo32.exeNdbjgjqh.exePhknlfem.exeKjalch32.exeAfcbgd32.exeLkoidcaj.exeDabkla32.exeGegbpe32.exeEibbqmhd.exeDodlfmlb.exeAlfdcp32.exePopkeh32.exeJmmmbg32.exeHdloab32.exeIoochn32.exeKhhpmbeb.exeMnqdpj32.exeHiehbl32.exeObijpgcf.exeJeidob32.exeLhqpqp32.exeNqakim32.exeGpfggeai.exePpejmj32.exeIiekkdjo.exeAkpmhdqd.exeCobkhe32.exeLkffohon.exeJdbhcfjd.exeKbgnil32.exeMoikinib.exeFdbibjok.exeKfccmini.exeEleliepj.exeIekbmfdc.exeGddbfm32.exeKldchgag.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkocglhl.dll" Gpfpmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Foacmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldgpea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gqemkl32.dll" Neemgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bcmeogam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alnfeemk.dll" Geeekf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phphgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agboqe32.dll" Infjfblm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Geeekf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oeckdc32.dll" Hqjfgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pldknmhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpoghg32.dll" Gngdadoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajepcffg.dll" Hcllmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gnjhaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbflok32.dll" Bjdqfajl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lggndgpg.dll" Kplfmfmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijolpgjc.dll" Cjbpoeoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hqjfgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djcbib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcknjidn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elpldp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aheaagpi.dll" Ifiilp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icponb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iccnmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgjgpkgn.dll" Gqcaoghl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hngngo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndbjgjqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phknlfem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhfpbaoe.dll" Kjalch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afcbgd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkoidcaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dabkla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gegbpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eibbqmhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dodlfmlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Alfdcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Popkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahjldnpp.dll" Jmmmbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdloab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ioochn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecgllj32.dll" Khhpmbeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnqdpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgofgcik.dll" Hiehbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nqcgln32.dll" Obijpgcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jeidob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhqpqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Joeido32.dll" Nqakim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejjglk32.dll" Gpfggeai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njhhcj32.dll" Ppejmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iiekkdjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akpmhdqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cobkhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Infjfblm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flingf32.dll" Lkffohon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdbhcfjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klpdie32.dll" Kbgnil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Foinej32.dll" Moikinib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdbibjok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kfccmini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epfbbghh.dll" Eleliepj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iekbmfdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gddbfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Neemgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kldchgag.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exeCnacbj32.exeCfmhfm32.exeCjkamk32.exeCmimif32.exeDpjfjalp.exeDhekodik.exeDidgig32.exeDaplmimi.exeDodlfmlb.exeDgoakpjn.exeDadehh32.exeEagbnh32.exeEplood32.exeEoalpaaa.exeEleliepj.exedescription pid process target process PID 2536 wrote to memory of 2236 2536 40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe Cnacbj32.exe PID 2536 wrote to memory of 2236 2536 40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe Cnacbj32.exe PID 2536 wrote to memory of 2236 2536 40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe Cnacbj32.exe PID 2536 wrote to memory of 2236 2536 40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe Cnacbj32.exe PID 2236 wrote to memory of 2096 2236 Cnacbj32.exe Cfmhfm32.exe PID 2236 wrote to memory of 2096 2236 Cnacbj32.exe Cfmhfm32.exe PID 2236 wrote to memory of 2096 2236 Cnacbj32.exe Cfmhfm32.exe PID 2236 wrote to memory of 2096 2236 Cnacbj32.exe Cfmhfm32.exe PID 2096 wrote to memory of 2136 2096 Cfmhfm32.exe Cjkamk32.exe PID 2096 wrote to memory of 2136 2096 Cfmhfm32.exe Cjkamk32.exe PID 2096 wrote to memory of 2136 2096 Cfmhfm32.exe Cjkamk32.exe PID 2096 wrote to memory of 2136 2096 Cfmhfm32.exe Cjkamk32.exe PID 2136 wrote to memory of 2740 2136 Cjkamk32.exe Cmimif32.exe PID 2136 wrote to memory of 2740 2136 Cjkamk32.exe Cmimif32.exe PID 2136 wrote to memory of 2740 2136 Cjkamk32.exe Cmimif32.exe PID 2136 wrote to memory of 2740 2136 Cjkamk32.exe Cmimif32.exe PID 2740 wrote to memory of 2712 2740 Cmimif32.exe Dpjfjalp.exe PID 2740 wrote to memory of 2712 2740 Cmimif32.exe Dpjfjalp.exe PID 2740 wrote to memory of 2712 2740 Cmimif32.exe Dpjfjalp.exe PID 2740 wrote to memory of 2712 2740 Cmimif32.exe Dpjfjalp.exe PID 2712 wrote to memory of 2560 2712 Dpjfjalp.exe Dhekodik.exe PID 2712 wrote to memory of 2560 2712 Dpjfjalp.exe Dhekodik.exe PID 2712 wrote to memory of 2560 2712 Dpjfjalp.exe Dhekodik.exe PID 2712 wrote to memory of 2560 2712 Dpjfjalp.exe Dhekodik.exe PID 2560 wrote to memory of 3048 2560 Dhekodik.exe Didgig32.exe PID 2560 wrote to memory of 3048 2560 Dhekodik.exe Didgig32.exe PID 2560 wrote to memory of 3048 2560 Dhekodik.exe Didgig32.exe PID 2560 wrote to memory of 3048 2560 Dhekodik.exe Didgig32.exe PID 3048 wrote to memory of 2688 3048 Didgig32.exe Daplmimi.exe PID 3048 wrote to memory of 2688 3048 Didgig32.exe Daplmimi.exe PID 3048 wrote to memory of 2688 3048 Didgig32.exe Daplmimi.exe PID 3048 wrote to memory of 2688 3048 Didgig32.exe Daplmimi.exe PID 2688 wrote to memory of 2816 2688 Daplmimi.exe Dodlfmlb.exe PID 2688 wrote to memory of 2816 2688 Daplmimi.exe Dodlfmlb.exe PID 2688 wrote to memory of 2816 2688 Daplmimi.exe Dodlfmlb.exe PID 2688 wrote to memory of 2816 2688 Daplmimi.exe Dodlfmlb.exe PID 2816 wrote to memory of 2280 2816 Dodlfmlb.exe Dgoakpjn.exe PID 2816 wrote to memory of 2280 2816 Dodlfmlb.exe Dgoakpjn.exe PID 2816 wrote to memory of 2280 2816 Dodlfmlb.exe Dgoakpjn.exe PID 2816 wrote to memory of 2280 2816 Dodlfmlb.exe Dgoakpjn.exe PID 2280 wrote to memory of 2944 2280 Dgoakpjn.exe Dadehh32.exe PID 2280 wrote to memory of 2944 2280 Dgoakpjn.exe Dadehh32.exe PID 2280 wrote to memory of 2944 2280 Dgoakpjn.exe Dadehh32.exe PID 2280 wrote to memory of 2944 2280 Dgoakpjn.exe Dadehh32.exe PID 2944 wrote to memory of 1796 2944 Dadehh32.exe Eagbnh32.exe PID 2944 wrote to memory of 1796 2944 Dadehh32.exe Eagbnh32.exe PID 2944 wrote to memory of 1796 2944 Dadehh32.exe Eagbnh32.exe PID 2944 wrote to memory of 1796 2944 Dadehh32.exe Eagbnh32.exe PID 1796 wrote to memory of 468 1796 Eagbnh32.exe Eplood32.exe PID 1796 wrote to memory of 468 1796 Eagbnh32.exe Eplood32.exe PID 1796 wrote to memory of 468 1796 Eagbnh32.exe Eplood32.exe PID 1796 wrote to memory of 468 1796 Eagbnh32.exe Eplood32.exe PID 468 wrote to memory of 2084 468 Eplood32.exe Eoalpaaa.exe PID 468 wrote to memory of 2084 468 Eplood32.exe Eoalpaaa.exe PID 468 wrote to memory of 2084 468 Eplood32.exe Eoalpaaa.exe PID 468 wrote to memory of 2084 468 Eplood32.exe Eoalpaaa.exe PID 2084 wrote to memory of 1944 2084 Eoalpaaa.exe Eleliepj.exe PID 2084 wrote to memory of 1944 2084 Eoalpaaa.exe Eleliepj.exe PID 2084 wrote to memory of 1944 2084 Eoalpaaa.exe Eleliepj.exe PID 2084 wrote to memory of 1944 2084 Eoalpaaa.exe Eleliepj.exe PID 1944 wrote to memory of 2616 1944 Eleliepj.exe Eenabkfk.exe PID 1944 wrote to memory of 2616 1944 Eleliepj.exe Eenabkfk.exe PID 1944 wrote to memory of 2616 1944 Eleliepj.exe Eenabkfk.exe PID 1944 wrote to memory of 2616 1944 Eleliepj.exe Eenabkfk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe"C:\Users\Admin\AppData\Local\Temp\40a1bcbef9efa32b3511be6f45b4825fd83dac8e254df4eab58e77850349dd75.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Cnacbj32.exeC:\Windows\system32\Cnacbj32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Cfmhfm32.exeC:\Windows\system32\Cfmhfm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\Cjkamk32.exeC:\Windows\system32\Cjkamk32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\Cmimif32.exeC:\Windows\system32\Cmimif32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Dpjfjalp.exeC:\Windows\system32\Dpjfjalp.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Dhekodik.exeC:\Windows\system32\Dhekodik.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Didgig32.exeC:\Windows\system32\Didgig32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Daplmimi.exeC:\Windows\system32\Daplmimi.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Dodlfmlb.exeC:\Windows\system32\Dodlfmlb.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Dgoakpjn.exeC:\Windows\system32\Dgoakpjn.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\Dadehh32.exeC:\Windows\system32\Dadehh32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Eagbnh32.exeC:\Windows\system32\Eagbnh32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\Eplood32.exeC:\Windows\system32\Eplood32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\Eoalpaaa.exeC:\Windows\system32\Eoalpaaa.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\Eleliepj.exeC:\Windows\system32\Eleliepj.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Eenabkfk.exeC:\Windows\system32\Eenabkfk.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616 -
C:\Windows\SysWOW64\Fofekp32.exeC:\Windows\system32\Fofekp32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300 -
C:\Windows\SysWOW64\Fnkblm32.exeC:\Windows\system32\Fnkblm32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2540 -
C:\Windows\SysWOW64\Fdggofgn.exeC:\Windows\system32\Fdggofgn.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:764 -
C:\Windows\SysWOW64\Fkapkq32.exeC:\Windows\system32\Fkapkq32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\Fdjddf32.exeC:\Windows\system32\Fdjddf32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2164 -
C:\Windows\SysWOW64\Fnbhmlkk.exeC:\Windows\system32\Fnbhmlkk.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2340 -
C:\Windows\SysWOW64\Gqcaoghl.exeC:\Windows\system32\Gqcaoghl.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Gmjbchnq.exeC:\Windows\system32\Gmjbchnq.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Windows\SysWOW64\Gfdcbmbn.exeC:\Windows\system32\Gfdcbmbn.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Windows\SysWOW64\Gkaljdaf.exeC:\Windows\system32\Gkaljdaf.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2460 -
C:\Windows\SysWOW64\Gkchpcoc.exeC:\Windows\system32\Gkchpcoc.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Windows\SysWOW64\Helmiiec.exeC:\Windows\system32\Helmiiec.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\Hngngo32.exeC:\Windows\system32\Hngngo32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Hgobpd32.exeC:\Windows\system32\Hgobpd32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1184 -
C:\Windows\SysWOW64\Hcfceeff.exeC:\Windows\system32\Hcfceeff.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748 -
C:\Windows\SysWOW64\Hmnhnk32.exeC:\Windows\system32\Hmnhnk32.exe33⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\Hiehbl32.exeC:\Windows\system32\Hiehbl32.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:1748 -
C:\Windows\SysWOW64\Ifiilp32.exeC:\Windows\system32\Ifiilp32.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3056 -
C:\Windows\SysWOW64\Ibpjaagi.exeC:\Windows\system32\Ibpjaagi.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\Infjfblm.exeC:\Windows\system32\Infjfblm.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2132 -
C:\Windows\SysWOW64\Iilocklc.exeC:\Windows\system32\Iilocklc.exe38⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Iniglajj.exeC:\Windows\system32\Iniglajj.exe39⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Ihaldgak.exeC:\Windows\system32\Ihaldgak.exe40⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\Iaipmm32.exeC:\Windows\system32\Iaipmm32.exe41⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\Jonqfq32.exeC:\Windows\system32\Jonqfq32.exe42⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Jkdalb32.exeC:\Windows\system32\Jkdalb32.exe43⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\Jdmfdgbj.exeC:\Windows\system32\Jdmfdgbj.exe44⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\Jpcfih32.exeC:\Windows\system32\Jpcfih32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\Kgknpfdi.exeC:\Windows\system32\Kgknpfdi.exe46⤵
- Executes dropped EXE
PID:996 -
C:\Windows\SysWOW64\Khjkiikl.exeC:\Windows\system32\Khjkiikl.exe47⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\Kabobo32.exeC:\Windows\system32\Kabobo32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\Lkkckdhm.exeC:\Windows\system32\Lkkckdhm.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\Lcfhpf32.exeC:\Windows\system32\Lcfhpf32.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\Lnlmmo32.exeC:\Windows\system32\Lnlmmo32.exe51⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Lcieef32.exeC:\Windows\system32\Lcieef32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\Llainlje.exeC:\Windows\system32\Llainlje.exe53⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\Lbnbfb32.exeC:\Windows\system32\Lbnbfb32.exe54⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Lkffohon.exeC:\Windows\system32\Lkffohon.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2268 -
C:\Windows\SysWOW64\Lbpolb32.exeC:\Windows\system32\Lbpolb32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1128 -
C:\Windows\SysWOW64\Lhjghlng.exeC:\Windows\system32\Lhjghlng.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\Lodoefed.exeC:\Windows\system32\Lodoefed.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\Mdahnmck.exeC:\Windows\system32\Mdahnmck.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\Mnilfc32.exeC:\Windows\system32\Mnilfc32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\Mhopcl32.exeC:\Windows\system32\Mhopcl32.exe61⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\Mnlilb32.exeC:\Windows\system32\Mnlilb32.exe62⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\Mdeaim32.exeC:\Windows\system32\Mdeaim32.exe63⤵
- Executes dropped EXE
PID:580 -
C:\Windows\SysWOW64\Mjbiac32.exeC:\Windows\system32\Mjbiac32.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\Mcknjidn.exeC:\Windows\system32\Mcknjidn.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1012 -
C:\Windows\SysWOW64\Mnpbgbdd.exeC:\Windows\system32\Mnpbgbdd.exe66⤵PID:692
-
C:\Windows\SysWOW64\Mflgkd32.exeC:\Windows\system32\Mflgkd32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\Nqakim32.exeC:\Windows\system32\Nqakim32.exe68⤵
- Modifies registry class
PID:2040 -
C:\Windows\SysWOW64\Njipabhe.exeC:\Windows\system32\Njipabhe.exe69⤵PID:2388
-
C:\Windows\SysWOW64\Npfhjifm.exeC:\Windows\system32\Npfhjifm.exe70⤵
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\Niombolm.exeC:\Windows\system32\Niombolm.exe71⤵PID:2832
-
C:\Windows\SysWOW64\Neemgp32.exeC:\Windows\system32\Neemgp32.exe72⤵
- Modifies registry class
PID:2860 -
C:\Windows\SysWOW64\Nicfnn32.exeC:\Windows\system32\Nicfnn32.exe73⤵PID:2912
-
C:\Windows\SysWOW64\Nbljfdoh.exeC:\Windows\system32\Nbljfdoh.exe74⤵PID:2368
-
C:\Windows\SysWOW64\Oldooi32.exeC:\Windows\system32\Oldooi32.exe75⤵PID:2892
-
C:\Windows\SysWOW64\Oaaghp32.exeC:\Windows\system32\Oaaghp32.exe76⤵
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\Ojilqf32.exeC:\Windows\system32\Ojilqf32.exe77⤵PID:828
-
C:\Windows\SysWOW64\Ohmljj32.exeC:\Windows\system32\Ohmljj32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:632 -
C:\Windows\SysWOW64\Ophanl32.exeC:\Windows\system32\Ophanl32.exe79⤵PID:600
-
C:\Windows\SysWOW64\Ofbikf32.exeC:\Windows\system32\Ofbikf32.exe80⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\Obijpgcf.exeC:\Windows\system32\Obijpgcf.exe81⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Omonmpcm.exeC:\Windows\system32\Omonmpcm.exe82⤵PID:1832
-
C:\Windows\SysWOW64\Popkeh32.exeC:\Windows\system32\Popkeh32.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:1048 -
C:\Windows\SysWOW64\Pldknmhd.exeC:\Windows\system32\Pldknmhd.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1092 -
C:\Windows\SysWOW64\Pihlhagn.exeC:\Windows\system32\Pihlhagn.exe85⤵PID:772
-
C:\Windows\SysWOW64\Pkihpi32.exeC:\Windows\system32\Pkihpi32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:964 -
C:\Windows\SysWOW64\Pdamhocm.exeC:\Windows\system32\Pdamhocm.exe87⤵PID:900
-
C:\Windows\SysWOW64\Pmjaadjm.exeC:\Windows\system32\Pmjaadjm.exe88⤵PID:264
-
C:\Windows\SysWOW64\Poinkg32.exeC:\Windows\system32\Poinkg32.exe89⤵PID:2868
-
C:\Windows\SysWOW64\Pdffcn32.exeC:\Windows\system32\Pdffcn32.exe90⤵PID:1240
-
C:\Windows\SysWOW64\Qnoklc32.exeC:\Windows\system32\Qnoklc32.exe91⤵PID:2212
-
C:\Windows\SysWOW64\Qajfmbna.exeC:\Windows\system32\Qajfmbna.exe92⤵PID:268
-
C:\Windows\SysWOW64\Qlcgmpkp.exeC:\Windows\system32\Qlcgmpkp.exe93⤵PID:1728
-
C:\Windows\SysWOW64\Acnpjj32.exeC:\Windows\system32\Acnpjj32.exe94⤵PID:1956
-
C:\Windows\SysWOW64\Alfdcp32.exeC:\Windows\system32\Alfdcp32.exe95⤵
- Modifies registry class
PID:2528 -
C:\Windows\SysWOW64\Acplpjpj.exeC:\Windows\system32\Acplpjpj.exe96⤵PID:1792
-
C:\Windows\SysWOW64\Apdminod.exeC:\Windows\system32\Apdminod.exe97⤵
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\Aaeiqf32.exeC:\Windows\system32\Aaeiqf32.exe98⤵PID:2940
-
C:\Windows\SysWOW64\Alknnodh.exeC:\Windows\system32\Alknnodh.exe99⤵PID:3044
-
C:\Windows\SysWOW64\Afcbgd32.exeC:\Windows\system32\Afcbgd32.exe100⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2984 -
C:\Windows\SysWOW64\Aokfpjai.exeC:\Windows\system32\Aokfpjai.exe101⤵PID:2928
-
C:\Windows\SysWOW64\Anngkg32.exeC:\Windows\system32\Anngkg32.exe102⤵PID:968
-
C:\Windows\SysWOW64\Akbgdkgm.exeC:\Windows\system32\Akbgdkgm.exe103⤵
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\Bqopmbed.exeC:\Windows\system32\Bqopmbed.exe104⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\Bkddjkej.exeC:\Windows\system32\Bkddjkej.exe105⤵PID:2232
-
C:\Windows\SysWOW64\Bbolge32.exeC:\Windows\system32\Bbolge32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2336 -
C:\Windows\SysWOW64\Bnemlf32.exeC:\Windows\system32\Bnemlf32.exe107⤵PID:2200
-
C:\Windows\SysWOW64\Bmjjmbgc.exeC:\Windows\system32\Bmjjmbgc.exe108⤵PID:2520
-
C:\Windows\SysWOW64\Bcdbjl32.exeC:\Windows\system32\Bcdbjl32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2644 -
C:\Windows\SysWOW64\Bcgoolln.exeC:\Windows\system32\Bcgoolln.exe110⤵
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\Conpdm32.exeC:\Windows\system32\Conpdm32.exe111⤵
- Drops file in System32 directory
PID:2348 -
C:\Windows\SysWOW64\Cmapna32.exeC:\Windows\system32\Cmapna32.exe112⤵PID:2324
-
C:\Windows\SysWOW64\Ckgmon32.exeC:\Windows\system32\Ckgmon32.exe113⤵PID:1656
-
C:\Windows\SysWOW64\Dajlhc32.exeC:\Windows\system32\Dajlhc32.exe114⤵
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\SysWOW64\Dbqajk32.exeC:\Windows\system32\Dbqajk32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2572 -
C:\Windows\SysWOW64\Ebekej32.exeC:\Windows\system32\Ebekej32.exe116⤵PID:3032
-
C:\Windows\SysWOW64\Ebghkjjc.exeC:\Windows\system32\Ebghkjjc.exe117⤵PID:3020
-
C:\Windows\SysWOW64\Elpldp32.exeC:\Windows\system32\Elpldp32.exe118⤵
- Modifies registry class
PID:1252 -
C:\Windows\SysWOW64\Ehgmiq32.exeC:\Windows\system32\Ehgmiq32.exe119⤵PID:2764
-
C:\Windows\SysWOW64\Eoqeekme.exeC:\Windows\system32\Eoqeekme.exe120⤵PID:808
-
C:\Windows\SysWOW64\Ehiiop32.exeC:\Windows\system32\Ehiiop32.exe121⤵PID:1188
-
C:\Windows\SysWOW64\Emfbgg32.exeC:\Windows\system32\Emfbgg32.exe122⤵PID:796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-