Analysis
-
max time kernel
48s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe
Resource
win10v2004-20241007-en
General
-
Target
7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe
-
Size
59KB
-
MD5
1ab14d92cb9def65853566ec771830d0
-
SHA1
2101a516ba6e40dbbc202ced1f495ebb7d5ef994
-
SHA256
7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7ac
-
SHA512
afec81a46396a49f13cd808caff7b6bc117ac0c1d370263fc3a0df759dbfd8b7c974c7f7b998b2d9b1d2af82b9ff23bff094969b6d74ce2fd8da74090c9c574a
-
SSDEEP
768:C251V1a0PQFWkVNcrFB8phzBkyevyfuWffEBAgn9NI6Z/1H5u5nf1fZMEBFELvkC:/5hayJ88B7X7xMQwNCyVs
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Hlpchfdi.exeJegdgj32.exeMfebdm32.exeOnqkclni.exeQpniokan.exeEfmlqigc.exeBahelebm.exeEifobe32.exePchbmigj.exeKjcedj32.exeDemaoj32.exeJbphgpfg.exePfchqf32.exeQpaohjkk.exeDpaqmnap.exeEokgij32.exeEkfaij32.exeLefikg32.exeGfnjne32.exeKbenacdm.exeLkifkdjm.exeJdogldmo.exeEqngcc32.exeFjfhkl32.exeBknfeege.exeFdiqpigl.exeDijfch32.exePlhaeofp.exeQlggjlep.exeKpoejbhe.exeLfhiepbn.exeBfcodkcb.exeDmkcil32.exeIegeonpc.exeElmkmo32.exeGpmllpef.exeDnqlmq32.exeDbmkfh32.exeEiilge32.exeHkbmil32.exeJclnnmic.exeCncolfcl.exeDnjalhpp.exeAhcjmkbo.exeHdpcokdo.exeJggoqimd.exeKjhfjpdd.exeGcmamj32.exePlbkfdba.exeDgnjqe32.exePmhgba32.exeOchenfdn.exeJfhmehji.exeQejpoi32.exeDfhdnn32.exeOoidei32.exeGaebfdba.exeHaleefoe.exeLdmopa32.exeKageia32.exeJpmooind.exeKdbepm32.exeNloachkf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlpchfdi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jegdgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfebdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onqkclni.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpniokan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efmlqigc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bahelebm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eifobe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pchbmigj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjcedj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Demaoj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbphgpfg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfchqf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpaohjkk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpaqmnap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eokgij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekfaij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lefikg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfnjne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbenacdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkifkdjm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdogldmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqngcc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjfhkl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bknfeege.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdiqpigl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dijfch32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plhaeofp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlggjlep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpoejbhe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfhiepbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfcodkcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmkcil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iegeonpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elmkmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpmllpef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnqlmq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbmkfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eiilge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkbmil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jclnnmic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cncolfcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnjalhpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahcjmkbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdpcokdo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jggoqimd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjhfjpdd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcmamj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plbkfdba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgnjqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmhgba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpoejbhe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ochenfdn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfhmehji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qejpoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfhdnn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ooidei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaebfdba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Haleefoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldmopa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpmooind.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nloachkf.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Bgoime32.exeBnknoogp.exeBgcbhd32.exeBcjcme32.exeBkegah32.exeCileqlmg.exeCinafkkd.exeCbffoabe.exeCjakccop.exeDmbcen32.exeDjfdob32.exeDilapopb.exeDfpaic32.exeDokfme32.exeDomccejd.exeEegkpo32.exeEopphehb.exeEkfpmf32.exeEeldkonl.exeEhlmljkm.exeEaebeoan.exeEgajnfoe.exeFeggob32.exeFplllkdc.exeFpohakbp.exeFhjmfnok.exeFkkfgi32.exeGagkjbaf.exeGkoobhhg.exeGgfpgi32.exeGlchpp32.exeGcmamj32.exeGqaafn32.exeGfnjne32.exeHjlbdc32.exeHcdgmimg.exeHdecea32.exeHokhbj32.exeHgflflqg.exeHkahgk32.exeHejmpqop.exeHghillnd.exeHnbaif32.exeHaqnea32.exeHcojam32.exeIngkdeak.exeIaegpaao.exeIgoomk32.exeIiqldc32.exeIpmqgmcd.exeJokqnhpa.exeJfgebjnm.exeKalipcmb.exeKbmfgk32.exeKbpbmkan.exeKenoifpb.exeKlhgfq32.exeKgnkci32.exeKljdkpfl.exeKcdlhj32.exeKokmmkcm.exeKeeeje32.exeLnqjnhge.exeLegaoehg.exepid process 1552 Bgoime32.exe 2440 Bnknoogp.exe 2768 Bgcbhd32.exe 2192 Bcjcme32.exe 2996 Bkegah32.exe 2668 Cileqlmg.exe 2664 Cinafkkd.exe 2952 Cbffoabe.exe 2720 Cjakccop.exe 1152 Dmbcen32.exe 1932 Djfdob32.exe 2476 Dilapopb.exe 940 Dfpaic32.exe 2056 Dokfme32.exe 1352 Domccejd.exe 2392 Eegkpo32.exe 1184 Eopphehb.exe 1716 Ekfpmf32.exe 1780 Eeldkonl.exe 2308 Ehlmljkm.exe 2580 Eaebeoan.exe 2372 Egajnfoe.exe 2500 Feggob32.exe 2408 Fplllkdc.exe 2332 Fpohakbp.exe 2512 Fhjmfnok.exe 2208 Fkkfgi32.exe 2760 Gagkjbaf.exe 2772 Gkoobhhg.exe 2956 Ggfpgi32.exe 3024 Glchpp32.exe 2616 Gcmamj32.exe 2640 Gqaafn32.exe 2604 Gfnjne32.exe 1916 Hjlbdc32.exe 2852 Hcdgmimg.exe 2516 Hdecea32.exe 1624 Hokhbj32.exe 1892 Hgflflqg.exe 2344 Hkahgk32.exe 936 Hejmpqop.exe 2252 Hghillnd.exe 432 Hnbaif32.exe 3052 Haqnea32.exe 2400 Hcojam32.exe 1744 Ingkdeak.exe 1688 Iaegpaao.exe 1588 Igoomk32.exe 536 Iiqldc32.exe 544 Ipmqgmcd.exe 1340 Jokqnhpa.exe 1408 Jfgebjnm.exe 3032 Kalipcmb.exe 2748 Kbmfgk32.exe 2888 Kbpbmkan.exe 2736 Kenoifpb.exe 1192 Klhgfq32.exe 2636 Kgnkci32.exe 2268 Kljdkpfl.exe 2916 Kcdlhj32.exe 1284 Kokmmkcm.exe 2404 Keeeje32.exe 2076 Lnqjnhge.exe 1180 Legaoehg.exe -
Loads dropped DLL 64 IoCs
Processes:
7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exeBgoime32.exeBnknoogp.exeBgcbhd32.exeBcjcme32.exeBkegah32.exeCileqlmg.exeCinafkkd.exeCbffoabe.exeCjakccop.exeDmbcen32.exeDjfdob32.exeDilapopb.exeDfpaic32.exeDokfme32.exeDomccejd.exeEegkpo32.exeEopphehb.exeEkfpmf32.exeEeldkonl.exeEhlmljkm.exeEaebeoan.exeEgajnfoe.exeFeggob32.exeFplllkdc.exeFpohakbp.exeFhjmfnok.exeFkkfgi32.exeGagkjbaf.exeGkoobhhg.exeGgfpgi32.exeGlchpp32.exepid process 2236 7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe 2236 7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe 1552 Bgoime32.exe 1552 Bgoime32.exe 2440 Bnknoogp.exe 2440 Bnknoogp.exe 2768 Bgcbhd32.exe 2768 Bgcbhd32.exe 2192 Bcjcme32.exe 2192 Bcjcme32.exe 2996 Bkegah32.exe 2996 Bkegah32.exe 2668 Cileqlmg.exe 2668 Cileqlmg.exe 2664 Cinafkkd.exe 2664 Cinafkkd.exe 2952 Cbffoabe.exe 2952 Cbffoabe.exe 2720 Cjakccop.exe 2720 Cjakccop.exe 1152 Dmbcen32.exe 1152 Dmbcen32.exe 1932 Djfdob32.exe 1932 Djfdob32.exe 2476 Dilapopb.exe 2476 Dilapopb.exe 940 Dfpaic32.exe 940 Dfpaic32.exe 2056 Dokfme32.exe 2056 Dokfme32.exe 1352 Domccejd.exe 1352 Domccejd.exe 2392 Eegkpo32.exe 2392 Eegkpo32.exe 1184 Eopphehb.exe 1184 Eopphehb.exe 1716 Ekfpmf32.exe 1716 Ekfpmf32.exe 1780 Eeldkonl.exe 1780 Eeldkonl.exe 2308 Ehlmljkm.exe 2308 Ehlmljkm.exe 2580 Eaebeoan.exe 2580 Eaebeoan.exe 2372 Egajnfoe.exe 2372 Egajnfoe.exe 2500 Feggob32.exe 2500 Feggob32.exe 2408 Fplllkdc.exe 2408 Fplllkdc.exe 2332 Fpohakbp.exe 2332 Fpohakbp.exe 2512 Fhjmfnok.exe 2512 Fhjmfnok.exe 2208 Fkkfgi32.exe 2208 Fkkfgi32.exe 2760 Gagkjbaf.exe 2760 Gagkjbaf.exe 2772 Gkoobhhg.exe 2772 Gkoobhhg.exe 2956 Ggfpgi32.exe 2956 Ggfpgi32.exe 3024 Glchpp32.exe 3024 Glchpp32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fdnjkh32.exeJjpgfbom.exeLlebnfpe.exeCkpoih32.exeEomdoj32.exeGfgdij32.exeJhmpbc32.exeQaapcj32.exeGpgjnbnl.exePkjqcg32.exeQjgcecja.exeBobleeef.exeDckcnj32.exeDbejjfek.exeAgeompfe.exeDdppmclb.exeGjjafkpe.exeJkcmjpma.exeMlgkbi32.exePiabdiep.exeMqbejp32.exeChhpgn32.exeJmkmjoec.exePlpqim32.exeLfhiepbn.exeCofaog32.exeInhdgdmk.exeOlkifaen.exeHafbghhj.exeKckjmpko.exeFpohakbp.exeEmjhmipi.exeGahpkd32.exeGdflgo32.exeJkdfmoha.exeChabmm32.exeDfpaic32.exeNnleiipc.exePebbcdkn.exeAjdcofop.exePfflql32.exeEdofbpja.exeMkggnp32.exeKjcedj32.exeNmhqokcq.exeHdpcokdo.exeClnehado.exeEiilge32.exeDfpfke32.exeJnjhjj32.exeFpkchm32.exeIlmlfcel.exeIcdhnn32.exeFhgifgnb.exeLplbjm32.exeMjdcbf32.exeNojnql32.exeAljmbknm.exeEfmlqigc.exeJmgfgham.exeMjlejl32.exeOnipqp32.exedescription ioc process File created C:\Windows\SysWOW64\Fijbco32.exe Fdnjkh32.exe File opened for modification C:\Windows\SysWOW64\Jpmooind.exe Jjpgfbom.exe File opened for modification C:\Windows\SysWOW64\Lbojjq32.exe Llebnfpe.exe File created C:\Windows\SysWOW64\Oiiakm32.dll Ckpoih32.exe File created C:\Windows\SysWOW64\Oinpjm32.dll Eomdoj32.exe File created C:\Windows\SysWOW64\Aegqok32.dll Gfgdij32.exe File opened for modification C:\Windows\SysWOW64\Jkllnn32.exe Jhmpbc32.exe File opened for modification C:\Windows\SysWOW64\Qlfdac32.exe Qaapcj32.exe File created C:\Windows\SysWOW64\Ajpqndbo.dll Gpgjnbnl.exe File created C:\Windows\SysWOW64\Pioamlkk.exe Pkjqcg32.exe File created C:\Windows\SysWOW64\Qmepanje.exe Qjgcecja.exe File opened for modification C:\Windows\SysWOW64\Baqhapdj.exe Bobleeef.exe File opened for modification C:\Windows\SysWOW64\Dgfpni32.exe Dckcnj32.exe File created C:\Windows\SysWOW64\Dfpfke32.exe Dbejjfek.exe File created C:\Windows\SysWOW64\Jqgaapqd.dll Ageompfe.exe File created C:\Windows\SysWOW64\Dnhefh32.exe Ddppmclb.exe File created C:\Windows\SysWOW64\Gpgjnbnl.exe Gjjafkpe.exe File created C:\Windows\SysWOW64\Jmdiahco.exe Jkcmjpma.exe File opened for modification C:\Windows\SysWOW64\Nepokogo.exe Mlgkbi32.exe File created C:\Windows\SysWOW64\Ponklpcg.exe Piabdiep.exe File created C:\Windows\SysWOW64\Mhninb32.exe Mqbejp32.exe File created C:\Windows\SysWOW64\Cnfnahkp.dll Chhpgn32.exe File created C:\Windows\SysWOW64\Jpjifjdg.exe Jmkmjoec.exe File created C:\Windows\SysWOW64\Qklhgdgp.dll Plpqim32.exe File created C:\Windows\SysWOW64\Llebnfpe.exe Lfhiepbn.exe File opened for modification C:\Windows\SysWOW64\Caenkc32.exe Cofaog32.exe File created C:\Windows\SysWOW64\Ikldqile.exe Inhdgdmk.exe File created C:\Windows\SysWOW64\Fknodfcm.dll Olkifaen.exe File created C:\Windows\SysWOW64\Hkogpn32.exe Hafbghhj.exe File created C:\Windows\SysWOW64\Ddpidhgj.dll Kckjmpko.exe File created C:\Windows\SysWOW64\Jplagm32.dll Fpohakbp.exe File opened for modification C:\Windows\SysWOW64\Ffbmfo32.exe Emjhmipi.exe File created C:\Windows\SysWOW64\Gdflgo32.exe Gahpkd32.exe File created C:\Windows\SysWOW64\Gjpddigo.exe Gdflgo32.exe File created C:\Windows\SysWOW64\Hnlalbhe.dll Jkdfmoha.exe File opened for modification C:\Windows\SysWOW64\Ckpoih32.exe Chabmm32.exe File created C:\Windows\SysWOW64\Dokfme32.exe Dfpaic32.exe File opened for modification C:\Windows\SysWOW64\Ncinap32.exe Nnleiipc.exe File opened for modification C:\Windows\SysWOW64\Obeacl32.exe Olkifaen.exe File created C:\Windows\SysWOW64\Alglaj32.dll Pebbcdkn.exe File created C:\Windows\SysWOW64\Jafjpdlm.dll Ajdcofop.exe File opened for modification C:\Windows\SysWOW64\Qpamoa32.exe Pfflql32.exe File created C:\Windows\SysWOW64\Egmbnkie.exe Edofbpja.exe File created C:\Windows\SysWOW64\Gibcam32.dll Mkggnp32.exe File created C:\Windows\SysWOW64\Opbjmj32.dll Kjcedj32.exe File created C:\Windows\SysWOW64\Hlaegk32.dll Nmhqokcq.exe File created C:\Windows\SysWOW64\Gfbaonni.dll Hdpcokdo.exe File created C:\Windows\SysWOW64\Mlanmb32.dll Clnehado.exe File created C:\Windows\SysWOW64\Ecnpdnho.exe Eiilge32.exe File created C:\Windows\SysWOW64\Peblbj32.dll Dfpfke32.exe File created C:\Windows\SysWOW64\Jddqgdii.exe Jnjhjj32.exe File opened for modification C:\Windows\SysWOW64\Ponklpcg.exe Piabdiep.exe File created C:\Windows\SysWOW64\Hfggne32.dll Fpkchm32.exe File created C:\Windows\SysWOW64\Icgdcm32.exe Ilmlfcel.exe File opened for modification C:\Windows\SysWOW64\Iecdji32.exe Icdhnn32.exe File opened for modification C:\Windows\SysWOW64\Fihfnp32.exe Fhgifgnb.exe File created C:\Windows\SysWOW64\Lmpcca32.exe Lplbjm32.exe File created C:\Windows\SysWOW64\Dabahf32.dll Mjdcbf32.exe File created C:\Windows\SysWOW64\Nhbciaki.exe Nojnql32.exe File opened for modification C:\Windows\SysWOW64\Acadchoo.exe Aljmbknm.exe File opened for modification C:\Windows\SysWOW64\Epeajo32.exe Efmlqigc.exe File opened for modification C:\Windows\SysWOW64\Jqeomfgc.exe Jmgfgham.exe File opened for modification C:\Windows\SysWOW64\Mmkafhnb.exe Mjlejl32.exe File created C:\Windows\SysWOW64\Ogaeieoj.exe Onipqp32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 5240 3388 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Dfpfke32.exeEdeclabl.exeEqopfbfn.exeCbdkbjkl.exeKglfcd32.exePioamlkk.exeCaenkc32.exeEokgij32.exeJfhmehji.exeBgcbhd32.exeBihgmdih.exeCkhpejbf.exeOgaeieoj.exeMphiqbon.exeLbgkfbbj.exeIlemce32.exeKbenacdm.exeLdhgnk32.exeLdpnoj32.exeMlmoilni.exeAknngo32.exeDgnjqe32.exeMgcjpkak.exeKmaphmln.exeHkbmil32.exeKdfmlc32.exeNgqeha32.exeLbkaoalg.exeMkohjbah.exeNohddd32.exeFblljhbo.exeKenhopmf.exeJoblkegc.exeCpohhk32.exeOemhjlha.exePiabdiep.exeOfafgipc.exeNpkdnnfk.exeKigibh32.exeQnpcpa32.exeAjdcofop.exeGjpddigo.exeJdogldmo.exeKbpbmkan.exeHdpcokdo.exePfqlkfoc.exeEcgjdong.exeMfjkdh32.exeAedlhg32.exeCqleifna.exeBpboinpd.exeAeenapck.exeClfhml32.exeIgoomk32.exeNjnmbk32.exeFooembgb.exeOielnd32.exeDfniee32.exeNahfkigd.exeBnknoogp.exeGmkjgfmf.exeGhghnc32.exeHememgdi.exeLkggmldl.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpfke32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edeclabl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eqopfbfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbdkbjkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kglfcd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pioamlkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caenkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eokgij32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfhmehji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgcbhd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bihgmdih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckhpejbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogaeieoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mphiqbon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbgkfbbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilemce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbenacdm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldhgnk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldpnoj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlmoilni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aknngo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgnjqe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mgcjpkak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmaphmln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbmil32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdfmlc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ngqeha32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbkaoalg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkohjbah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nohddd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fblljhbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kenhopmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Joblkegc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpohhk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oemhjlha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Piabdiep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofafgipc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npkdnnfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kigibh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnpcpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajdcofop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjpddigo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdogldmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbpbmkan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdpcokdo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfqlkfoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ecgjdong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfjkdh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aedlhg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cqleifna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpboinpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeenapck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clfhml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igoomk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njnmbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fooembgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oielnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfniee32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nahfkigd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnknoogp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmkjgfmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghghnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hememgdi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkggmldl.exe -
Modifies registry class 64 IoCs
Processes:
Dekdikhc.exeAdblnnbk.exePioamlkk.exeBfcodkcb.exeHcgmfgfd.exeNnahgh32.exeAbhlak32.exeHjlemlnk.exeQifnhaho.exeNmjmekan.exeHejmpqop.exeOiafee32.exeOddphp32.exeCffjagko.exeKikokf32.exeKimlqfeq.exePbajbi32.exeJcfgoadd.exePodpoffm.exeMjlejl32.exeObeacl32.exePonklpcg.exeQjgjpi32.exeAmjiln32.exeOemhjlha.exeLdpnoj32.exeQnpcpa32.exeJfhmehji.exeEdjlgq32.exeLcppgbjd.exeKbmfgk32.exeGiaidnkf.exeCkkcep32.exeHpgfmeag.exeKccgheib.exeBaealp32.exeLgingm32.exeKbhbai32.exeNflfad32.exeAhedjb32.exeEnbapf32.exeBkkgfm32.exeDijfch32.exeDklepmal.exeEpeajo32.exeGddobpbe.exeAeoijidl.exeAedlhg32.exeLnqjnhge.exeFhhbif32.exeImcfjg32.exeDomccejd.exeNnnbni32.exeDnqlmq32.exeKenhopmf.exeCmqihg32.exeBobleeef.exeEafkhn32.exeOekehomj.exeFjhdpk32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dekdikhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adblnnbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pioamlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfcodkcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfmgba32.dll" Hcgmfgfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnahgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abhlak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dblknlpo.dll" Hjlemlnk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qifnhaho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmjmekan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eldhjg32.dll" Hejmpqop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oiafee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oddphp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inhcgajk.dll" Cffjagko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgnigi32.dll" Kikokf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kimlqfeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbajbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmhpkkdp.dll" Jcfgoadd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dngdfinb.dll" Podpoffm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjlejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obeacl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ponklpcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qjgjpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amjiln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oemhjlha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmcmif32.dll" Ldpnoj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qnpcpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfhmehji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mqobfajn.dll" Edjlgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekbglc32.dll" Lcppgbjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbmfgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Giaidnkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckkcep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfgqnf32.dll" Hpgfmeag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aooglmid.dll" Kccgheib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Baealp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noockemb.dll" Lgingm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbhbai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nflfad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmjmekan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahedjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enbapf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbobli32.dll" Obeacl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkkgfm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dijfch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojdlmb32.dll" Dklepmal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Epeajo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gddobpbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aeoijidl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbjemo32.dll" Aedlhg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnqjnhge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fhhbif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imcfjg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kikokf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Domccejd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Liefaj32.dll" Nnnbni32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnqlmq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlekjpbi.dll" Kenhopmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cheleg32.dll" Cmqihg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anfdhfiq.dll" Bobleeef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eafkhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nplkbo32.dll" Oekehomj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajgpacpe.dll" Fjhdpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjhdpk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exeBgoime32.exeBnknoogp.exeBgcbhd32.exeBcjcme32.exeBkegah32.exeCileqlmg.exeCinafkkd.exeCbffoabe.exeCjakccop.exeDmbcen32.exeDjfdob32.exeDilapopb.exeDfpaic32.exeDokfme32.exeDomccejd.exedescription pid process target process PID 2236 wrote to memory of 1552 2236 7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe Bgoime32.exe PID 2236 wrote to memory of 1552 2236 7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe Bgoime32.exe PID 2236 wrote to memory of 1552 2236 7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe Bgoime32.exe PID 2236 wrote to memory of 1552 2236 7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe Bgoime32.exe PID 1552 wrote to memory of 2440 1552 Bgoime32.exe Bnknoogp.exe PID 1552 wrote to memory of 2440 1552 Bgoime32.exe Bnknoogp.exe PID 1552 wrote to memory of 2440 1552 Bgoime32.exe Bnknoogp.exe PID 1552 wrote to memory of 2440 1552 Bgoime32.exe Bnknoogp.exe PID 2440 wrote to memory of 2768 2440 Bnknoogp.exe Bgcbhd32.exe PID 2440 wrote to memory of 2768 2440 Bnknoogp.exe Bgcbhd32.exe PID 2440 wrote to memory of 2768 2440 Bnknoogp.exe Bgcbhd32.exe PID 2440 wrote to memory of 2768 2440 Bnknoogp.exe Bgcbhd32.exe PID 2768 wrote to memory of 2192 2768 Bgcbhd32.exe Bcjcme32.exe PID 2768 wrote to memory of 2192 2768 Bgcbhd32.exe Bcjcme32.exe PID 2768 wrote to memory of 2192 2768 Bgcbhd32.exe Bcjcme32.exe PID 2768 wrote to memory of 2192 2768 Bgcbhd32.exe Bcjcme32.exe PID 2192 wrote to memory of 2996 2192 Bcjcme32.exe Bkegah32.exe PID 2192 wrote to memory of 2996 2192 Bcjcme32.exe Bkegah32.exe PID 2192 wrote to memory of 2996 2192 Bcjcme32.exe Bkegah32.exe PID 2192 wrote to memory of 2996 2192 Bcjcme32.exe Bkegah32.exe PID 2996 wrote to memory of 2668 2996 Bkegah32.exe Cileqlmg.exe PID 2996 wrote to memory of 2668 2996 Bkegah32.exe Cileqlmg.exe PID 2996 wrote to memory of 2668 2996 Bkegah32.exe Cileqlmg.exe PID 2996 wrote to memory of 2668 2996 Bkegah32.exe Cileqlmg.exe PID 2668 wrote to memory of 2664 2668 Cileqlmg.exe Cinafkkd.exe PID 2668 wrote to memory of 2664 2668 Cileqlmg.exe Cinafkkd.exe PID 2668 wrote to memory of 2664 2668 Cileqlmg.exe Cinafkkd.exe PID 2668 wrote to memory of 2664 2668 Cileqlmg.exe Cinafkkd.exe PID 2664 wrote to memory of 2952 2664 Cinafkkd.exe Cbffoabe.exe PID 2664 wrote to memory of 2952 2664 Cinafkkd.exe Cbffoabe.exe PID 2664 wrote to memory of 2952 2664 Cinafkkd.exe Cbffoabe.exe PID 2664 wrote to memory of 2952 2664 Cinafkkd.exe Cbffoabe.exe PID 2952 wrote to memory of 2720 2952 Cbffoabe.exe Cjakccop.exe PID 2952 wrote to memory of 2720 2952 Cbffoabe.exe Cjakccop.exe PID 2952 wrote to memory of 2720 2952 Cbffoabe.exe Cjakccop.exe PID 2952 wrote to memory of 2720 2952 Cbffoabe.exe Cjakccop.exe PID 2720 wrote to memory of 1152 2720 Cjakccop.exe Dmbcen32.exe PID 2720 wrote to memory of 1152 2720 Cjakccop.exe Dmbcen32.exe PID 2720 wrote to memory of 1152 2720 Cjakccop.exe Dmbcen32.exe PID 2720 wrote to memory of 1152 2720 Cjakccop.exe Dmbcen32.exe PID 1152 wrote to memory of 1932 1152 Dmbcen32.exe Djfdob32.exe PID 1152 wrote to memory of 1932 1152 Dmbcen32.exe Djfdob32.exe PID 1152 wrote to memory of 1932 1152 Dmbcen32.exe Djfdob32.exe PID 1152 wrote to memory of 1932 1152 Dmbcen32.exe Djfdob32.exe PID 1932 wrote to memory of 2476 1932 Djfdob32.exe Dilapopb.exe PID 1932 wrote to memory of 2476 1932 Djfdob32.exe Dilapopb.exe PID 1932 wrote to memory of 2476 1932 Djfdob32.exe Dilapopb.exe PID 1932 wrote to memory of 2476 1932 Djfdob32.exe Dilapopb.exe PID 2476 wrote to memory of 940 2476 Dilapopb.exe Dfpaic32.exe PID 2476 wrote to memory of 940 2476 Dilapopb.exe Dfpaic32.exe PID 2476 wrote to memory of 940 2476 Dilapopb.exe Dfpaic32.exe PID 2476 wrote to memory of 940 2476 Dilapopb.exe Dfpaic32.exe PID 940 wrote to memory of 2056 940 Dfpaic32.exe Dokfme32.exe PID 940 wrote to memory of 2056 940 Dfpaic32.exe Dokfme32.exe PID 940 wrote to memory of 2056 940 Dfpaic32.exe Dokfme32.exe PID 940 wrote to memory of 2056 940 Dfpaic32.exe Dokfme32.exe PID 2056 wrote to memory of 1352 2056 Dokfme32.exe Domccejd.exe PID 2056 wrote to memory of 1352 2056 Dokfme32.exe Domccejd.exe PID 2056 wrote to memory of 1352 2056 Dokfme32.exe Domccejd.exe PID 2056 wrote to memory of 1352 2056 Dokfme32.exe Domccejd.exe PID 1352 wrote to memory of 2392 1352 Domccejd.exe Eegkpo32.exe PID 1352 wrote to memory of 2392 1352 Domccejd.exe Eegkpo32.exe PID 1352 wrote to memory of 2392 1352 Domccejd.exe Eegkpo32.exe PID 1352 wrote to memory of 2392 1352 Domccejd.exe Eegkpo32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe"C:\Users\Admin\AppData\Local\Temp\7ae423fabcc46fba74281ba6826f5e2a39e5d7be4199f71f27595f74aa49e7acN.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Bgoime32.exeC:\Windows\system32\Bgoime32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\Bnknoogp.exeC:\Windows\system32\Bnknoogp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Bgcbhd32.exeC:\Windows\system32\Bgcbhd32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\Bcjcme32.exeC:\Windows\system32\Bcjcme32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Bkegah32.exeC:\Windows\system32\Bkegah32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Cileqlmg.exeC:\Windows\system32\Cileqlmg.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Cinafkkd.exeC:\Windows\system32\Cinafkkd.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Cbffoabe.exeC:\Windows\system32\Cbffoabe.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Cjakccop.exeC:\Windows\system32\Cjakccop.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Dmbcen32.exeC:\Windows\system32\Dmbcen32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\Djfdob32.exeC:\Windows\system32\Djfdob32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\Dilapopb.exeC:\Windows\system32\Dilapopb.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\Dfpaic32.exeC:\Windows\system32\Dfpaic32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\Dokfme32.exeC:\Windows\system32\Dokfme32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Domccejd.exeC:\Windows\system32\Domccejd.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\Eegkpo32.exeC:\Windows\system32\Eegkpo32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2392 -
C:\Windows\SysWOW64\Eopphehb.exeC:\Windows\system32\Eopphehb.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1184 -
C:\Windows\SysWOW64\Ekfpmf32.exeC:\Windows\system32\Ekfpmf32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Windows\SysWOW64\Eeldkonl.exeC:\Windows\system32\Eeldkonl.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780 -
C:\Windows\SysWOW64\Ehlmljkm.exeC:\Windows\system32\Ehlmljkm.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2308 -
C:\Windows\SysWOW64\Eaebeoan.exeC:\Windows\system32\Eaebeoan.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2580 -
C:\Windows\SysWOW64\Egajnfoe.exeC:\Windows\system32\Egajnfoe.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2372 -
C:\Windows\SysWOW64\Feggob32.exeC:\Windows\system32\Feggob32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2500 -
C:\Windows\SysWOW64\Fplllkdc.exeC:\Windows\system32\Fplllkdc.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408 -
C:\Windows\SysWOW64\Fpohakbp.exeC:\Windows\system32\Fpohakbp.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2332 -
C:\Windows\SysWOW64\Fhjmfnok.exeC:\Windows\system32\Fhjmfnok.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Windows\SysWOW64\Fkkfgi32.exeC:\Windows\system32\Fkkfgi32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2208 -
C:\Windows\SysWOW64\Gagkjbaf.exeC:\Windows\system32\Gagkjbaf.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Windows\SysWOW64\Gkoobhhg.exeC:\Windows\system32\Gkoobhhg.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2772 -
C:\Windows\SysWOW64\Ggfpgi32.exeC:\Windows\system32\Ggfpgi32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2956 -
C:\Windows\SysWOW64\Glchpp32.exeC:\Windows\system32\Glchpp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Windows\SysWOW64\Gcmamj32.exeC:\Windows\system32\Gcmamj32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\Gqaafn32.exeC:\Windows\system32\Gqaafn32.exe34⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\Gfnjne32.exeC:\Windows\system32\Gfnjne32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\Hjlbdc32.exeC:\Windows\system32\Hjlbdc32.exe36⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\Hcdgmimg.exeC:\Windows\system32\Hcdgmimg.exe37⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\Hdecea32.exeC:\Windows\system32\Hdecea32.exe38⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\Hokhbj32.exeC:\Windows\system32\Hokhbj32.exe39⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Hgflflqg.exeC:\Windows\system32\Hgflflqg.exe40⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\Hkahgk32.exeC:\Windows\system32\Hkahgk32.exe41⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\Hejmpqop.exeC:\Windows\system32\Hejmpqop.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:936 -
C:\Windows\SysWOW64\Hghillnd.exeC:\Windows\system32\Hghillnd.exe43⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\Hnbaif32.exeC:\Windows\system32\Hnbaif32.exe44⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\Haqnea32.exeC:\Windows\system32\Haqnea32.exe45⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\Hcojam32.exeC:\Windows\system32\Hcojam32.exe46⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Ingkdeak.exeC:\Windows\system32\Ingkdeak.exe47⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Iaegpaao.exeC:\Windows\system32\Iaegpaao.exe48⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\Igoomk32.exeC:\Windows\system32\Igoomk32.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\Iiqldc32.exeC:\Windows\system32\Iiqldc32.exe50⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\Ipmqgmcd.exeC:\Windows\system32\Ipmqgmcd.exe51⤵
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\Jokqnhpa.exeC:\Windows\system32\Jokqnhpa.exe52⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\Jfgebjnm.exeC:\Windows\system32\Jfgebjnm.exe53⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\Kalipcmb.exeC:\Windows\system32\Kalipcmb.exe54⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\Kbmfgk32.exeC:\Windows\system32\Kbmfgk32.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:2748 -
C:\Windows\SysWOW64\Kbpbmkan.exeC:\Windows\system32\Kbpbmkan.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\Kenoifpb.exeC:\Windows\system32\Kenoifpb.exe57⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\Klhgfq32.exeC:\Windows\system32\Klhgfq32.exe58⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\SysWOW64\Kgnkci32.exeC:\Windows\system32\Kgnkci32.exe59⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\Kljdkpfl.exeC:\Windows\system32\Kljdkpfl.exe60⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\Kcdlhj32.exeC:\Windows\system32\Kcdlhj32.exe61⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Kokmmkcm.exeC:\Windows\system32\Kokmmkcm.exe62⤵
- Executes dropped EXE
PID:1284 -
C:\Windows\SysWOW64\Keeeje32.exeC:\Windows\system32\Keeeje32.exe63⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\Lnqjnhge.exeC:\Windows\system32\Lnqjnhge.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:2076 -
C:\Windows\SysWOW64\Legaoehg.exeC:\Windows\system32\Legaoehg.exe65⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\Lgingm32.exeC:\Windows\system32\Lgingm32.exe66⤵
- Modifies registry class
PID:620 -
C:\Windows\SysWOW64\Lncfcgeb.exeC:\Windows\system32\Lncfcgeb.exe67⤵PID:968
-
C:\Windows\SysWOW64\Ldmopa32.exeC:\Windows\system32\Ldmopa32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:824 -
C:\Windows\SysWOW64\Lkggmldl.exeC:\Windows\system32\Lkggmldl.exe69⤵
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Windows\SysWOW64\Lcblan32.exeC:\Windows\system32\Lcblan32.exe70⤵PID:2428
-
C:\Windows\SysWOW64\Ljldnhid.exeC:\Windows\system32\Ljldnhid.exe71⤵PID:2528
-
C:\Windows\SysWOW64\Lgpdglhn.exeC:\Windows\system32\Lgpdglhn.exe72⤵PID:1720
-
C:\Windows\SysWOW64\Ljnqdhga.exeC:\Windows\system32\Ljnqdhga.exe73⤵PID:2936
-
C:\Windows\SysWOW64\Mphiqbon.exeC:\Windows\system32\Mphiqbon.exe74⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\Mgbaml32.exeC:\Windows\system32\Mgbaml32.exe75⤵PID:2824
-
C:\Windows\SysWOW64\Momfan32.exeC:\Windows\system32\Momfan32.exe76⤵PID:2380
-
C:\Windows\SysWOW64\Mfgnnhkc.exeC:\Windows\system32\Mfgnnhkc.exe77⤵PID:2080
-
C:\Windows\SysWOW64\Mopbgn32.exeC:\Windows\system32\Mopbgn32.exe78⤵PID:3000
-
C:\Windows\SysWOW64\Mfjkdh32.exeC:\Windows\system32\Mfjkdh32.exe79⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\Mkfclo32.exeC:\Windows\system32\Mkfclo32.exe80⤵PID:1712
-
C:\Windows\SysWOW64\Mhjcec32.exeC:\Windows\system32\Mhjcec32.exe81⤵PID:1460
-
C:\Windows\SysWOW64\Mdadjd32.exeC:\Windows\system32\Mdadjd32.exe82⤵PID:1908
-
C:\Windows\SysWOW64\Njnmbk32.exeC:\Windows\system32\Njnmbk32.exe83⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\Ngbmlo32.exeC:\Windows\system32\Ngbmlo32.exe84⤵PID:1076
-
C:\Windows\SysWOW64\Nnleiipc.exeC:\Windows\system32\Nnleiipc.exe85⤵
- Drops file in System32 directory
PID:952 -
C:\Windows\SysWOW64\Ncinap32.exeC:\Windows\system32\Ncinap32.exe86⤵PID:828
-
C:\Windows\SysWOW64\Nnnbni32.exeC:\Windows\system32\Nnnbni32.exe87⤵
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Nggggoda.exeC:\Windows\system32\Nggggoda.exe88⤵PID:2452
-
C:\Windows\SysWOW64\Nmcopebh.exeC:\Windows\system32\Nmcopebh.exe89⤵PID:872
-
C:\Windows\SysWOW64\Njgpij32.exeC:\Windows\system32\Njgpij32.exe90⤵PID:804
-
C:\Windows\SysWOW64\Npdhaq32.exeC:\Windows\system32\Npdhaq32.exe91⤵PID:2712
-
C:\Windows\SysWOW64\Oeaqig32.exeC:\Windows\system32\Oeaqig32.exe92⤵PID:2780
-
C:\Windows\SysWOW64\Olkifaen.exeC:\Windows\system32\Olkifaen.exe93⤵
- Drops file in System32 directory
PID:2628 -
C:\Windows\SysWOW64\Obeacl32.exeC:\Windows\system32\Obeacl32.exe94⤵
- Modifies registry class
PID:2672 -
C:\Windows\SysWOW64\Olmela32.exeC:\Windows\system32\Olmela32.exe95⤵PID:2836
-
C:\Windows\SysWOW64\Obgnhkkh.exeC:\Windows\system32\Obgnhkkh.exe96⤵PID:1896
-
C:\Windows\SysWOW64\Oiafee32.exeC:\Windows\system32\Oiafee32.exe97⤵
- Modifies registry class
PID:2716 -
C:\Windows\SysWOW64\Ojbbmnhc.exeC:\Windows\system32\Ojbbmnhc.exe98⤵PID:2248
-
C:\Windows\SysWOW64\Objjnkie.exeC:\Windows\system32\Objjnkie.exe99⤵PID:756
-
C:\Windows\SysWOW64\Onqkclni.exeC:\Windows\system32\Onqkclni.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2704 -
C:\Windows\SysWOW64\Pnchhllf.exeC:\Windows\system32\Pnchhllf.exe101⤵PID:1344
-
C:\Windows\SysWOW64\Pjihmmbk.exeC:\Windows\system32\Pjihmmbk.exe102⤵PID:1988
-
C:\Windows\SysWOW64\Ppfafcpb.exeC:\Windows\system32\Ppfafcpb.exe103⤵PID:1620
-
C:\Windows\SysWOW64\Pbemboof.exeC:\Windows\system32\Pbemboof.exe104⤵PID:2892
-
C:\Windows\SysWOW64\Pioeoi32.exeC:\Windows\system32\Pioeoi32.exe105⤵PID:2164
-
C:\Windows\SysWOW64\Pddjlb32.exeC:\Windows\system32\Pddjlb32.exe106⤵PID:2832
-
C:\Windows\SysWOW64\Piabdiep.exeC:\Windows\system32\Piabdiep.exe107⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\Ponklpcg.exeC:\Windows\system32\Ponklpcg.exe108⤵
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Pbigmn32.exeC:\Windows\system32\Pbigmn32.exe109⤵PID:528
-
C:\Windows\SysWOW64\Picojhcm.exeC:\Windows\system32\Picojhcm.exe110⤵PID:1480
-
C:\Windows\SysWOW64\Plbkfdba.exeC:\Windows\system32\Plbkfdba.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1232 -
C:\Windows\SysWOW64\Qejpoi32.exeC:\Windows\system32\Qejpoi32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1488 -
C:\Windows\SysWOW64\Qhilkege.exeC:\Windows\system32\Qhilkege.exe113⤵PID:524
-
C:\Windows\SysWOW64\Qaapcj32.exeC:\Windows\system32\Qaapcj32.exe114⤵
- Drops file in System32 directory
PID:880 -
C:\Windows\SysWOW64\Qlfdac32.exeC:\Windows\system32\Qlfdac32.exe115⤵PID:2728
-
C:\Windows\SysWOW64\Qoeamo32.exeC:\Windows\system32\Qoeamo32.exe116⤵PID:2620
-
C:\Windows\SysWOW64\Aeoijidl.exeC:\Windows\system32\Aeoijidl.exe117⤵
- Modifies registry class
PID:2376 -
C:\Windows\SysWOW64\Aklabp32.exeC:\Windows\system32\Aklabp32.exe118⤵PID:1948
-
C:\Windows\SysWOW64\Addfkeid.exeC:\Windows\system32\Addfkeid.exe119⤵PID:1900
-
C:\Windows\SysWOW64\Aknngo32.exeC:\Windows\system32\Aknngo32.exe120⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\Aahfdihn.exeC:\Windows\system32\Aahfdihn.exe121⤵PID:972
-
C:\Windows\SysWOW64\Ageompfe.exeC:\Windows\system32\Ageompfe.exe122⤵
- Drops file in System32 directory
PID:2856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-