Analysis
-
max time kernel
70s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe
Resource
win10v2004-20241007-en
General
-
Target
5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe
-
Size
1.3MB
-
MD5
ff197790b16ed31f0b7aa1d1514486e0
-
SHA1
34f259a1d982b6c4a07681dcf3fab35a41b0c058
-
SHA256
5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980b
-
SHA512
6fedc1d20524a3aa6515099d8ba17877ef6fb5c9cb1e0ddac574b21b3c515bd7bd43ccfefd9e39af1741ee52b6e321272836dd2f21f3348f755e808ae932abac
-
SSDEEP
6144:gbj8pRJllYgM9cVE5ZC2npb+oB+Zz2HG8t0DoEWufVuvw0HBHY8rQ+6bPD3wPSkq:4jeuGAbaz22cWfVaw0HBHY8r8ABjMn
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Egchocif.exeOckhpgbf.exeQlnghj32.exeAdnegldo.exeLmlofhmb.exeGpkckneh.exeNimaic32.exeDfhial32.exeJilkbn32.exeLghgocek.exeMkiemqdo.exeKgkokjjd.exeHifdjcif.exeJjjfbikh.exeHcajjf32.exeBdoeipjh.exeEkeiel32.exeFkmhij32.exeMdcfle32.exeOcmbmnio.exeAndlmnki.exeQjacai32.exeFialggcl.exeHnomkloi.exeHcdihn32.exeIgoagpja.exeBdiciboh.exeIljkofkg.exeIimhfj32.exeNfnfjmgp.exeAioppl32.exeGfpkbbmo.exeAbachg32.exeBapejd32.exeGpagbp32.exeBpbokj32.exeDblcnngi.exeOkecak32.exeMpeidjfo.exePqlhbo32.exeJmpqbnmp.exeCcdnipal.exeGhcbga32.exeQifnjm32.exeFabppo32.exeLpfdpmho.exeNnknqpgi.exeCklpml32.exeOoccap32.exePeandcih.exeGibmglep.exeIcmlnmgb.exeJgiffg32.exeAedghf32.exeIaipmm32.exeAimckl32.exeHobfgcdb.exeGhlgdecf.exePmjohoej.exeBigbmb32.exeIijbnkne.exeGqmmhdka.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egchocif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ockhpgbf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlnghj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Adnegldo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmlofhmb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpkckneh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nimaic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfhial32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jilkbn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lghgocek.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkiemqdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgkokjjd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hifdjcif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jjjfbikh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcajjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hcajjf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdoeipjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekeiel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkmhij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdcfle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ocmbmnio.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Andlmnki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qjacai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fialggcl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnomkloi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcdihn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igoagpja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bdiciboh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iljkofkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iimhfj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfnfjmgp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aioppl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfpkbbmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Abachg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bapejd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpagbp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpbokj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dblcnngi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okecak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mpeidjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pqlhbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmpqbnmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccdnipal.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghcbga32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qifnjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fabppo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpfdpmho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnknqpgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cklpml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Igoagpja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ooccap32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Peandcih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gibmglep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Icmlnmgb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgiffg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aedghf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iaipmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aimckl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hobfgcdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ghlgdecf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmjohoej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bigbmb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iijbnkne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gqmmhdka.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Oikcicfl.exeObcgaill.exePpgdjqna.exeAbachg32.exeBfkobj32.exeCappnf32.exeCpemob32.exeEdhkpcdb.exeEhjqif32.exeGqcaoghl.exeGnphfppi.exeHkfeec32.exeHcajjf32.exeHgobpd32.exeHchpjddc.exeIpoqofjh.exeIijbnkne.exeIljkofkg.exeIdepdhia.exeIaipmm32.exeJmpqbnmp.exeJpajdi32.exeJpcfih32.exeJilkbn32.exeAenileon.exeAhancp32.exeAhdkhp32.exeBdoeipjh.exeBnhjae32.exeCcileljk.exeCfjdfg32.exeCcdnipal.exeDcihdo32.exeDckdio32.exeDeajlf32.exeElpldp32.exeEkeiel32.exeFmholgpj.exeFpihnbmk.exeFialggcl.exeGemfghek.exeGpfggeai.exeGgeiooea.exeGqmmhdka.exeHoegoqng.exeHefibg32.exeHnomkloi.exeIcponb32.exeIimhfj32.exeJnojjp32.exeJafilj32.exeKifgllbc.exeKemgqm32.exeKhnqbhdi.exeLojeda32.exeLghgocek.exeLjhppo32.exeLdndng32.exeMnfhfmhc.exeMkqbhf32.exeMhgpgjoj.exeNbaafocg.exeNqgngk32.exeNnknqpgi.exepid process 2140 Oikcicfl.exe 2944 Obcgaill.exe 2848 Ppgdjqna.exe 2844 Abachg32.exe 2168 Bfkobj32.exe 2712 Cappnf32.exe 2312 Cpemob32.exe 1468 Edhkpcdb.exe 1248 Ehjqif32.exe 1500 Gqcaoghl.exe 2908 Gnphfppi.exe 940 Hkfeec32.exe 1472 Hcajjf32.exe 2076 Hgobpd32.exe 2264 Hchpjddc.exe 1328 Ipoqofjh.exe 616 Iijbnkne.exe 2400 Iljkofkg.exe 1480 Idepdhia.exe 1200 Iaipmm32.exe 2044 Jmpqbnmp.exe 2420 Jpajdi32.exe 2348 Jpcfih32.exe 868 Jilkbn32.exe 2456 Aenileon.exe 2880 Ahancp32.exe 3052 Ahdkhp32.exe 2856 Bdoeipjh.exe 2740 Bnhjae32.exe 2096 Ccileljk.exe 1612 Cfjdfg32.exe 2128 Ccdnipal.exe 796 Dcihdo32.exe 2440 Dckdio32.exe 924 Deajlf32.exe 784 Elpldp32.exe 2276 Ekeiel32.exe 2240 Fmholgpj.exe 1424 Fpihnbmk.exe 2816 Fialggcl.exe 1296 Gemfghek.exe 1280 Gpfggeai.exe 2416 Ggeiooea.exe 2272 Gqmmhdka.exe 620 Hoegoqng.exe 1020 Hefibg32.exe 2176 Hnomkloi.exe 976 Icponb32.exe 1680 Iimhfj32.exe 2472 Jnojjp32.exe 2768 Jafilj32.exe 2980 Kifgllbc.exe 2796 Kemgqm32.exe 1876 Khnqbhdi.exe 2108 Lojeda32.exe 980 Lghgocek.exe 1564 Ljhppo32.exe 1732 Ldndng32.exe 1808 Mnfhfmhc.exe 2660 Mkqbhf32.exe 236 Mhgpgjoj.exe 1664 Nbaafocg.exe 1828 Nqgngk32.exe 2328 Nnknqpgi.exe -
Loads dropped DLL 64 IoCs
Processes:
5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exeOikcicfl.exeObcgaill.exePpgdjqna.exeAbachg32.exeBfkobj32.exeCappnf32.exeCpemob32.exeEdhkpcdb.exeEhjqif32.exeGqcaoghl.exeGnphfppi.exeHkfeec32.exeHcajjf32.exeHgobpd32.exeHchpjddc.exeIpoqofjh.exeIijbnkne.exeIljkofkg.exeIdepdhia.exeIaipmm32.exeJmpqbnmp.exeJpajdi32.exeJpcfih32.exeJilkbn32.exeAenileon.exeAhancp32.exeAhdkhp32.exeBdoeipjh.exeBnhjae32.exeCcileljk.exeCfjdfg32.exepid process 2164 5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe 2164 5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe 2140 Oikcicfl.exe 2140 Oikcicfl.exe 2944 Obcgaill.exe 2944 Obcgaill.exe 2848 Ppgdjqna.exe 2848 Ppgdjqna.exe 2844 Abachg32.exe 2844 Abachg32.exe 2168 Bfkobj32.exe 2168 Bfkobj32.exe 2712 Cappnf32.exe 2712 Cappnf32.exe 2312 Cpemob32.exe 2312 Cpemob32.exe 1468 Edhkpcdb.exe 1468 Edhkpcdb.exe 1248 Ehjqif32.exe 1248 Ehjqif32.exe 1500 Gqcaoghl.exe 1500 Gqcaoghl.exe 2908 Gnphfppi.exe 2908 Gnphfppi.exe 940 Hkfeec32.exe 940 Hkfeec32.exe 1472 Hcajjf32.exe 1472 Hcajjf32.exe 2076 Hgobpd32.exe 2076 Hgobpd32.exe 2264 Hchpjddc.exe 2264 Hchpjddc.exe 1328 Ipoqofjh.exe 1328 Ipoqofjh.exe 616 Iijbnkne.exe 616 Iijbnkne.exe 2400 Iljkofkg.exe 2400 Iljkofkg.exe 1480 Idepdhia.exe 1480 Idepdhia.exe 1200 Iaipmm32.exe 1200 Iaipmm32.exe 2044 Jmpqbnmp.exe 2044 Jmpqbnmp.exe 2420 Jpajdi32.exe 2420 Jpajdi32.exe 2348 Jpcfih32.exe 2348 Jpcfih32.exe 868 Jilkbn32.exe 868 Jilkbn32.exe 2456 Aenileon.exe 2456 Aenileon.exe 2880 Ahancp32.exe 2880 Ahancp32.exe 3052 Ahdkhp32.exe 3052 Ahdkhp32.exe 2856 Bdoeipjh.exe 2856 Bdoeipjh.exe 2740 Bnhjae32.exe 2740 Bnhjae32.exe 2096 Ccileljk.exe 2096 Ccileljk.exe 1612 Cfjdfg32.exe 1612 Cfjdfg32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Deajlf32.exeNcjcnfcn.exeCnbfkccn.exeIjcmipjh.exeAioppl32.exeAgkfil32.exeDghjmlnm.exeJafilj32.exeKnckbe32.exeFcehpbdm.exePpgdjqna.exeIimhfj32.exeNimaic32.exeBijobb32.exeLghgocek.exeJakjlpif.exeAdnegldo.exeDcaghm32.exeJecnpg32.exeJlleni32.exeNodikecl.exeLpfdpmho.exeBoadlk32.exeOljanhmc.exeFbebcp32.exeKffblb32.exeLmlofhmb.exeBnfodojp.exeBcbabodk.exeEligoe32.exeIaipmm32.exeBoiagp32.exeInjlmcib.exeNbmhfdnh.exeAbachg32.exeHchpjddc.exeBnhjae32.exeKamncagl.exeKgkokjjd.exeDclikp32.exeDdjbbbna.exePpgfciee.exeEkjjebed.exeEqmbca32.exeGhcbga32.exeEhjqif32.exeEkeiel32.exeFbbcdh32.exeBjomoo32.exeGaokhdja.exeOikcicfl.exeGnphfppi.exeGqmmhdka.exeQjacai32.exeEgedebgc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Elpldp32.exe Deajlf32.exe File opened for modification C:\Windows\SysWOW64\Ombhgljn.exe Ncjcnfcn.exe File created C:\Windows\SysWOW64\Jhcojn32.dll Cnbfkccn.exe File created C:\Windows\SysWOW64\Iejnna32.exe Ijcmipjh.exe File opened for modification C:\Windows\SysWOW64\Bpbokj32.exe Aioppl32.exe File opened for modification C:\Windows\SysWOW64\Abpjgekf.exe Agkfil32.exe File created C:\Windows\SysWOW64\Dlfbck32.exe Dghjmlnm.exe File created C:\Windows\SysWOW64\Kifgllbc.exe Jafilj32.exe File opened for modification C:\Windows\SysWOW64\Dlfbck32.exe Dghjmlnm.exe File created C:\Windows\SysWOW64\Hijeld32.dll Ijcmipjh.exe File opened for modification C:\Windows\SysWOW64\Kgkokjjd.exe Knckbe32.exe File created C:\Windows\SysWOW64\Fnoiqpqk.exe Fcehpbdm.exe File opened for modification C:\Windows\SysWOW64\Abachg32.exe Ppgdjqna.exe File opened for modification C:\Windows\SysWOW64\Jnojjp32.exe Iimhfj32.exe File opened for modification C:\Windows\SysWOW64\Nceeaikk.exe Nimaic32.exe File opened for modification C:\Windows\SysWOW64\Bholco32.exe Bijobb32.exe File created C:\Windows\SysWOW64\Ljhppo32.exe Lghgocek.exe File opened for modification C:\Windows\SysWOW64\Jdlcnkfg.exe Jakjlpif.exe File created C:\Windows\SysWOW64\Eapgpd32.dll Adnegldo.exe File created C:\Windows\SysWOW64\Ejpipf32.exe Dcaghm32.exe File opened for modification C:\Windows\SysWOW64\Kmjfae32.exe Jecnpg32.exe File created C:\Windows\SysWOW64\Jakjlpif.exe Jlleni32.exe File opened for modification C:\Windows\SysWOW64\Nchkjhdh.exe Nodikecl.exe File created C:\Windows\SysWOW64\Bipbphih.dll Lpfdpmho.exe File opened for modification C:\Windows\SysWOW64\Bmfamg32.exe Boadlk32.exe File created C:\Windows\SysWOW64\Ohqbbi32.exe Oljanhmc.exe File created C:\Windows\SysWOW64\Fjpggb32.exe Fbebcp32.exe File created C:\Windows\SysWOW64\Nfqdgd32.dll Kffblb32.exe File created C:\Windows\SysWOW64\Acoacabb.dll Lmlofhmb.exe File created C:\Windows\SysWOW64\Bjomoo32.exe Bnfodojp.exe File created C:\Windows\SysWOW64\Boiagp32.exe Bcbabodk.exe File opened for modification C:\Windows\SysWOW64\Egchocif.exe Eligoe32.exe File opened for modification C:\Windows\SysWOW64\Jakjlpif.exe Jlleni32.exe File opened for modification C:\Windows\SysWOW64\Jmpqbnmp.exe Iaipmm32.exe File created C:\Windows\SysWOW64\Ecnfbaka.dll Boiagp32.exe File opened for modification C:\Windows\SysWOW64\Jjqlbdog.exe Injlmcib.exe File created C:\Windows\SysWOW64\Bmfamg32.exe Boadlk32.exe File created C:\Windows\SysWOW64\Ebcfiddj.dll Nbmhfdnh.exe File created C:\Windows\SysWOW64\Bfkobj32.exe Abachg32.exe File created C:\Windows\SysWOW64\Fhhehj32.dll Hchpjddc.exe File created C:\Windows\SysWOW64\Fcnbll32.dll Bnhjae32.exe File opened for modification C:\Windows\SysWOW64\Bebjdjal.exe Boiagp32.exe File created C:\Windows\SysWOW64\Fihmiqhb.dll Kamncagl.exe File created C:\Windows\SysWOW64\Jofjcfle.dll Kgkokjjd.exe File created C:\Windows\SysWOW64\Idgegk32.dll Dclikp32.exe File created C:\Windows\SysWOW64\Egchocif.exe Eligoe32.exe File created C:\Windows\SysWOW64\Dhhkiq32.exe Ddjbbbna.exe File opened for modification C:\Windows\SysWOW64\Qlnghj32.exe Ppgfciee.exe File created C:\Windows\SysWOW64\Fddfbm32.dll Ekjjebed.exe File created C:\Windows\SysWOW64\Fmcchb32.exe Eqmbca32.exe File created C:\Windows\SysWOW64\Gppnejgk.dll Ppgdjqna.exe File created C:\Windows\SysWOW64\Alnfeemk.dll Ghcbga32.exe File created C:\Windows\SysWOW64\Pdhpfchb.dll Ehjqif32.exe File created C:\Windows\SysWOW64\Djffdk32.dll Ekeiel32.exe File created C:\Windows\SysWOW64\Hbaeanda.dll Fbbcdh32.exe File created C:\Windows\SysWOW64\Ilgdco32.dll Bjomoo32.exe File created C:\Windows\SysWOW64\Cadincif.dll Bcbabodk.exe File created C:\Windows\SysWOW64\Gcmgdpid.exe Gaokhdja.exe File created C:\Windows\SysWOW64\Obcgaill.exe Oikcicfl.exe File opened for modification C:\Windows\SysWOW64\Hkfeec32.exe Gnphfppi.exe File created C:\Windows\SysWOW64\Koehka32.dll Gqmmhdka.exe File created C:\Windows\SysWOW64\Ajcpgi32.exe Qjacai32.exe File created C:\Windows\SysWOW64\Eqninhmc.exe Egedebgc.exe File opened for modification C:\Windows\SysWOW64\Agonig32.exe Adnegldo.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3292 3136 WerFault.exe Hblgkkfa.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Iimhfj32.exeKemgqm32.exeIdqpjg32.exeJjocoedg.exeKjalch32.exeLmjdia32.exeDcgppana.exeGnaffpoi.exeGijplg32.exeAlcqcjgd.exeAimckl32.exeEnokidgl.exeLghgocek.exeOoccap32.exeMmaghc32.exeCklpml32.exeFfeoid32.exeLedpjdid.exeNqgngk32.exeIcmlnmgb.exeElleai32.exeGemhpq32.exeMpeidjfo.exe5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exeCpemob32.exeGgeiooea.exeGibmglep.exeHljljflh.exeGaokhdja.exeAenileon.exeHnomkloi.exeMinldf32.exeEelfedpa.exeQifnjm32.exeDbfaopqo.exePeandcih.exeDcihdo32.exeAdnegldo.exeBapejd32.exeDblcnngi.exeFcehpbdm.exeJjdcdjcm.exeHifdjcif.exeLbdghi32.exeAjcpgi32.exeLjhppo32.exeEjpipf32.exeAnbohn32.exeOohmmojn.exeIdepdhia.exeNcjcnfcn.exeLllkaobc.exePfgeoo32.exeKmkodd32.exeIjcmipjh.exeKgffpk32.exeQnjbmh32.exeIpoqofjh.exeImaglc32.exeIgoagpja.exeKigidd32.exePpcoqbao.exeEkkppkpf.exeMnfhfmhc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iimhfj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kemgqm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idqpjg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjocoedg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjalch32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmjdia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcgppana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnaffpoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gijplg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alcqcjgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aimckl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enokidgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lghgocek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ooccap32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmaghc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cklpml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffeoid32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ledpjdid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqgngk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icmlnmgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Elleai32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemhpq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpeidjfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpemob32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggeiooea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gibmglep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hljljflh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gaokhdja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aenileon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnomkloi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Minldf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eelfedpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qifnjm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbfaopqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Peandcih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcihdo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adnegldo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bapejd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dblcnngi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcehpbdm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjdcdjcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hifdjcif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbdghi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajcpgi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljhppo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ejpipf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anbohn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oohmmojn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idepdhia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncjcnfcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lllkaobc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfgeoo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmkodd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijcmipjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgffpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnjbmh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ipoqofjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imaglc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igoagpja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kigidd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppcoqbao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekkppkpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnfhfmhc.exe -
Modifies registry class 64 IoCs
Processes:
Elpldp32.exeEgchocif.exeAbpjgekf.exeCmcjldbf.exeKemgqm32.exeDlfbck32.exeKgffpk32.exeNchkjhdh.exeGijplg32.exeMkqbhf32.exeJnncoini.exeGemhpq32.exeGijncn32.exeKamncagl.exePmjohoej.exeBigbmb32.exeObcgaill.exeFkmhij32.exeEpopff32.exeJnnehb32.exeNcellpog.exeEdhkpcdb.exeBnhjae32.exeGpfggeai.exeNnknqpgi.exeKmnljc32.exeFcehpbdm.exeIijbnkne.exeIdepdhia.exeJchhhjjg.exeCdkfco32.exeBfkobj32.exeJodkkj32.exeCdpfiekl.exeDcgppana.exeLiqnclia.exeLlojpghe.exeOmbhgljn.exeMdcfle32.exeMcafbm32.exeNgikaijm.exeEkicjlai.exeHkfeec32.exeDcaghm32.exeOcbbbd32.exeEnokidgl.exeLmmaoq32.exePjhaec32.exeKdoaackf.exeJjjfbikh.exeCcileljk.exeMlhbgc32.exeMddidnqa.exeBmfamg32.exeEhjqif32.exeIckoimie.exeHgobpd32.exeIimhfj32.exeBoiagp32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Elpldp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dicildoo.dll" Egchocif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Abpjgekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjgbfapp.dll" Cmcjldbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kemgqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dlfbck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kgffpk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nchkjhdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gijplg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mkqbhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fggkpgmn.dll" Jnncoini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gemhpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poabochn.dll" Gijncn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fihmiqhb.dll" Kamncagl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pmjohoej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bigbmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Obcgaill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Giadfimp.dll" Fkmhij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpkjfq32.dll" Epopff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jnnehb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ncellpog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipgmbc32.dll" Edhkpcdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bnhjae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gpfggeai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nnknqpgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jnncoini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kmnljc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpnkmh32.dll" Fcehpbdm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iijbnkne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Idepdhia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jchhhjjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cdkfco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bfkobj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jodkkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egmieb32.dll" Cdpfiekl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dcgppana.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aafhafjm.dll" Liqnclia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Llojpghe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iiicgkof.dll" Mkqbhf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ombhgljn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mdcfle32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mcafbm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ngikaijm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekicjlai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hkfeec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edlmlclc.dll" Dcaghm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ocbbbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Enokidgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lmmaoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hiegacgd.dll" Pjhaec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kdoaackf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jjjfbikh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anbckadf.dll" Jodkkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odkjck32.dll" Cdkfco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ccileljk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jelbdp32.dll" Mlhbgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mddidnqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmfamg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ehjqif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ickoimie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hgobpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdmqnh32.dll" Iimhfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Boiagp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eolegi32.dll" Bmfamg32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exeOikcicfl.exeObcgaill.exePpgdjqna.exeAbachg32.exeBfkobj32.exeCappnf32.exeCpemob32.exeEdhkpcdb.exeEhjqif32.exeGqcaoghl.exeGnphfppi.exeHkfeec32.exeHcajjf32.exeHgobpd32.exeHchpjddc.exedescription pid process target process PID 2164 wrote to memory of 2140 2164 5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe Oikcicfl.exe PID 2164 wrote to memory of 2140 2164 5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe Oikcicfl.exe PID 2164 wrote to memory of 2140 2164 5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe Oikcicfl.exe PID 2164 wrote to memory of 2140 2164 5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe Oikcicfl.exe PID 2140 wrote to memory of 2944 2140 Oikcicfl.exe Obcgaill.exe PID 2140 wrote to memory of 2944 2140 Oikcicfl.exe Obcgaill.exe PID 2140 wrote to memory of 2944 2140 Oikcicfl.exe Obcgaill.exe PID 2140 wrote to memory of 2944 2140 Oikcicfl.exe Obcgaill.exe PID 2944 wrote to memory of 2848 2944 Obcgaill.exe Ppgdjqna.exe PID 2944 wrote to memory of 2848 2944 Obcgaill.exe Ppgdjqna.exe PID 2944 wrote to memory of 2848 2944 Obcgaill.exe Ppgdjqna.exe PID 2944 wrote to memory of 2848 2944 Obcgaill.exe Ppgdjqna.exe PID 2848 wrote to memory of 2844 2848 Ppgdjqna.exe Abachg32.exe PID 2848 wrote to memory of 2844 2848 Ppgdjqna.exe Abachg32.exe PID 2848 wrote to memory of 2844 2848 Ppgdjqna.exe Abachg32.exe PID 2848 wrote to memory of 2844 2848 Ppgdjqna.exe Abachg32.exe PID 2844 wrote to memory of 2168 2844 Abachg32.exe Bfkobj32.exe PID 2844 wrote to memory of 2168 2844 Abachg32.exe Bfkobj32.exe PID 2844 wrote to memory of 2168 2844 Abachg32.exe Bfkobj32.exe PID 2844 wrote to memory of 2168 2844 Abachg32.exe Bfkobj32.exe PID 2168 wrote to memory of 2712 2168 Bfkobj32.exe Cappnf32.exe PID 2168 wrote to memory of 2712 2168 Bfkobj32.exe Cappnf32.exe PID 2168 wrote to memory of 2712 2168 Bfkobj32.exe Cappnf32.exe PID 2168 wrote to memory of 2712 2168 Bfkobj32.exe Cappnf32.exe PID 2712 wrote to memory of 2312 2712 Cappnf32.exe Cpemob32.exe PID 2712 wrote to memory of 2312 2712 Cappnf32.exe Cpemob32.exe PID 2712 wrote to memory of 2312 2712 Cappnf32.exe Cpemob32.exe PID 2712 wrote to memory of 2312 2712 Cappnf32.exe Cpemob32.exe PID 2312 wrote to memory of 1468 2312 Cpemob32.exe Edhkpcdb.exe PID 2312 wrote to memory of 1468 2312 Cpemob32.exe Edhkpcdb.exe PID 2312 wrote to memory of 1468 2312 Cpemob32.exe Edhkpcdb.exe PID 2312 wrote to memory of 1468 2312 Cpemob32.exe Edhkpcdb.exe PID 1468 wrote to memory of 1248 1468 Edhkpcdb.exe Ehjqif32.exe PID 1468 wrote to memory of 1248 1468 Edhkpcdb.exe Ehjqif32.exe PID 1468 wrote to memory of 1248 1468 Edhkpcdb.exe Ehjqif32.exe PID 1468 wrote to memory of 1248 1468 Edhkpcdb.exe Ehjqif32.exe PID 1248 wrote to memory of 1500 1248 Ehjqif32.exe Gqcaoghl.exe PID 1248 wrote to memory of 1500 1248 Ehjqif32.exe Gqcaoghl.exe PID 1248 wrote to memory of 1500 1248 Ehjqif32.exe Gqcaoghl.exe PID 1248 wrote to memory of 1500 1248 Ehjqif32.exe Gqcaoghl.exe PID 1500 wrote to memory of 2908 1500 Gqcaoghl.exe Gnphfppi.exe PID 1500 wrote to memory of 2908 1500 Gqcaoghl.exe Gnphfppi.exe PID 1500 wrote to memory of 2908 1500 Gqcaoghl.exe Gnphfppi.exe PID 1500 wrote to memory of 2908 1500 Gqcaoghl.exe Gnphfppi.exe PID 2908 wrote to memory of 940 2908 Gnphfppi.exe Hkfeec32.exe PID 2908 wrote to memory of 940 2908 Gnphfppi.exe Hkfeec32.exe PID 2908 wrote to memory of 940 2908 Gnphfppi.exe Hkfeec32.exe PID 2908 wrote to memory of 940 2908 Gnphfppi.exe Hkfeec32.exe PID 940 wrote to memory of 1472 940 Hkfeec32.exe Hcajjf32.exe PID 940 wrote to memory of 1472 940 Hkfeec32.exe Hcajjf32.exe PID 940 wrote to memory of 1472 940 Hkfeec32.exe Hcajjf32.exe PID 940 wrote to memory of 1472 940 Hkfeec32.exe Hcajjf32.exe PID 1472 wrote to memory of 2076 1472 Hcajjf32.exe Hgobpd32.exe PID 1472 wrote to memory of 2076 1472 Hcajjf32.exe Hgobpd32.exe PID 1472 wrote to memory of 2076 1472 Hcajjf32.exe Hgobpd32.exe PID 1472 wrote to memory of 2076 1472 Hcajjf32.exe Hgobpd32.exe PID 2076 wrote to memory of 2264 2076 Hgobpd32.exe Hchpjddc.exe PID 2076 wrote to memory of 2264 2076 Hgobpd32.exe Hchpjddc.exe PID 2076 wrote to memory of 2264 2076 Hgobpd32.exe Hchpjddc.exe PID 2076 wrote to memory of 2264 2076 Hgobpd32.exe Hchpjddc.exe PID 2264 wrote to memory of 1328 2264 Hchpjddc.exe Ipoqofjh.exe PID 2264 wrote to memory of 1328 2264 Hchpjddc.exe Ipoqofjh.exe PID 2264 wrote to memory of 1328 2264 Hchpjddc.exe Ipoqofjh.exe PID 2264 wrote to memory of 1328 2264 Hchpjddc.exe Ipoqofjh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe"C:\Users\Admin\AppData\Local\Temp\5cdd4d08a20d730c50863b550eb866aa4878bb5f7c355cdd25094ce2f9f9980bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\Oikcicfl.exeC:\Windows\system32\Oikcicfl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\Obcgaill.exeC:\Windows\system32\Obcgaill.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Ppgdjqna.exeC:\Windows\system32\Ppgdjqna.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Abachg32.exeC:\Windows\system32\Abachg32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Bfkobj32.exeC:\Windows\system32\Bfkobj32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\Cappnf32.exeC:\Windows\system32\Cappnf32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Cpemob32.exeC:\Windows\system32\Cpemob32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\Edhkpcdb.exeC:\Windows\system32\Edhkpcdb.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\Ehjqif32.exeC:\Windows\system32\Ehjqif32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\Gqcaoghl.exeC:\Windows\system32\Gqcaoghl.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\Gnphfppi.exeC:\Windows\system32\Gnphfppi.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Hkfeec32.exeC:\Windows\system32\Hkfeec32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\Hcajjf32.exeC:\Windows\system32\Hcajjf32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\Hgobpd32.exeC:\Windows\system32\Hgobpd32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\Hchpjddc.exeC:\Windows\system32\Hchpjddc.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Ipoqofjh.exeC:\Windows\system32\Ipoqofjh.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Windows\SysWOW64\Iijbnkne.exeC:\Windows\system32\Iijbnkne.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:616 -
C:\Windows\SysWOW64\Iljkofkg.exeC:\Windows\system32\Iljkofkg.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2400 -
C:\Windows\SysWOW64\Idepdhia.exeC:\Windows\system32\Idepdhia.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1480 -
C:\Windows\SysWOW64\Iaipmm32.exeC:\Windows\system32\Iaipmm32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1200 -
C:\Windows\SysWOW64\Jmpqbnmp.exeC:\Windows\system32\Jmpqbnmp.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2044 -
C:\Windows\SysWOW64\Jpajdi32.exeC:\Windows\system32\Jpajdi32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2420 -
C:\Windows\SysWOW64\Jpcfih32.exeC:\Windows\system32\Jpcfih32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2348 -
C:\Windows\SysWOW64\Jilkbn32.exeC:\Windows\system32\Jilkbn32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:868 -
C:\Windows\SysWOW64\Aenileon.exeC:\Windows\system32\Aenileon.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\Ahancp32.exeC:\Windows\system32\Ahancp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2880 -
C:\Windows\SysWOW64\Ahdkhp32.exeC:\Windows\system32\Ahdkhp32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3052 -
C:\Windows\SysWOW64\Bdoeipjh.exeC:\Windows\system32\Bdoeipjh.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2856 -
C:\Windows\SysWOW64\Bnhjae32.exeC:\Windows\system32\Bnhjae32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Ccileljk.exeC:\Windows\system32\Ccileljk.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\Cfjdfg32.exeC:\Windows\system32\Cfjdfg32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612 -
C:\Windows\SysWOW64\Ccdnipal.exeC:\Windows\system32\Ccdnipal.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\Dcihdo32.exeC:\Windows\system32\Dcihdo32.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\Dckdio32.exeC:\Windows\system32\Dckdio32.exe35⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\Deajlf32.exeC:\Windows\system32\Deajlf32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:924 -
C:\Windows\SysWOW64\Elpldp32.exeC:\Windows\system32\Elpldp32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:784 -
C:\Windows\SysWOW64\Ekeiel32.exeC:\Windows\system32\Ekeiel32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\Fmholgpj.exeC:\Windows\system32\Fmholgpj.exe39⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\Fpihnbmk.exeC:\Windows\system32\Fpihnbmk.exe40⤵
- Executes dropped EXE
PID:1424 -
C:\Windows\SysWOW64\Fialggcl.exeC:\Windows\system32\Fialggcl.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\Gemfghek.exeC:\Windows\system32\Gemfghek.exe42⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\Gpfggeai.exeC:\Windows\system32\Gpfggeai.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1280 -
C:\Windows\SysWOW64\Ggeiooea.exeC:\Windows\system32\Ggeiooea.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\Gqmmhdka.exeC:\Windows\system32\Gqmmhdka.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\Hoegoqng.exeC:\Windows\system32\Hoegoqng.exe46⤵
- Executes dropped EXE
PID:620 -
C:\Windows\SysWOW64\Hefibg32.exeC:\Windows\system32\Hefibg32.exe47⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\Hnomkloi.exeC:\Windows\system32\Hnomkloi.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\Icponb32.exeC:\Windows\system32\Icponb32.exe49⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\Iimhfj32.exeC:\Windows\system32\Iimhfj32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\Jnojjp32.exeC:\Windows\system32\Jnojjp32.exe51⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\Jafilj32.exeC:\Windows\system32\Jafilj32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2768 -
C:\Windows\SysWOW64\Kifgllbc.exeC:\Windows\system32\Kifgllbc.exe53⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Kemgqm32.exeC:\Windows\system32\Kemgqm32.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Khnqbhdi.exeC:\Windows\system32\Khnqbhdi.exe55⤵
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\Lojeda32.exeC:\Windows\system32\Lojeda32.exe56⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\Lghgocek.exeC:\Windows\system32\Lghgocek.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:980 -
C:\Windows\SysWOW64\Ljhppo32.exeC:\Windows\system32\Ljhppo32.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\Ldndng32.exeC:\Windows\system32\Ldndng32.exe59⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Mnfhfmhc.exeC:\Windows\system32\Mnfhfmhc.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Windows\SysWOW64\Mkqbhf32.exeC:\Windows\system32\Mkqbhf32.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Mhgpgjoj.exeC:\Windows\system32\Mhgpgjoj.exe62⤵
- Executes dropped EXE
PID:236 -
C:\Windows\SysWOW64\Nbaafocg.exeC:\Windows\system32\Nbaafocg.exe63⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\Nqgngk32.exeC:\Windows\system32\Nqgngk32.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\SysWOW64\Nnknqpgi.exeC:\Windows\system32\Nnknqpgi.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2328 -
C:\Windows\SysWOW64\Ncjcnfcn.exeC:\Windows\system32\Ncjcnfcn.exe66⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\Ombhgljn.exeC:\Windows\system32\Ombhgljn.exe67⤵
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Oljanhmc.exeC:\Windows\system32\Oljanhmc.exe68⤵
- Drops file in System32 directory
PID:1260 -
C:\Windows\SysWOW64\Ohqbbi32.exeC:\Windows\system32\Ohqbbi32.exe69⤵PID:2488
-
C:\Windows\SysWOW64\Oaiglnih.exeC:\Windows\system32\Oaiglnih.exe70⤵PID:2384
-
C:\Windows\SysWOW64\Papmlmbp.exeC:\Windows\system32\Papmlmbp.exe71⤵PID:2992
-
C:\Windows\SysWOW64\Pjhaec32.exeC:\Windows\system32\Pjhaec32.exe72⤵
- Modifies registry class
PID:2976 -
C:\Windows\SysWOW64\Ppgfciee.exeC:\Windows\system32\Ppgfciee.exe73⤵
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\Qlnghj32.exeC:\Windows\system32\Qlnghj32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2728 -
C:\Windows\SysWOW64\Alcqcjgd.exeC:\Windows\system32\Alcqcjgd.exe75⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\Adnegldo.exeC:\Windows\system32\Adnegldo.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\Agonig32.exeC:\Windows\system32\Agonig32.exe77⤵PID:1624
-
C:\Windows\SysWOW64\Apjpglfn.exeC:\Windows\system32\Apjpglfn.exe78⤵PID:2800
-
C:\Windows\SysWOW64\Apllml32.exeC:\Windows\system32\Apllml32.exe79⤵PID:2808
-
C:\Windows\SysWOW64\Bapejd32.exeC:\Windows\system32\Bapejd32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\Bkjfhile.exeC:\Windows\system32\Bkjfhile.exe81⤵PID:2708
-
C:\Windows\SysWOW64\Cnbfkccn.exeC:\Windows\system32\Cnbfkccn.exe82⤵
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Cfmjoe32.exeC:\Windows\system32\Cfmjoe32.exe83⤵PID:2480
-
C:\Windows\SysWOW64\Cklpml32.exeC:\Windows\system32\Cklpml32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\Dmllgo32.exeC:\Windows\system32\Dmllgo32.exe85⤵PID:1040
-
C:\Windows\SysWOW64\Dghjmlnm.exeC:\Windows\system32\Dghjmlnm.exe86⤵
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\Dlfbck32.exeC:\Windows\system32\Dlfbck32.exe87⤵
- Modifies registry class
PID:2200 -
C:\Windows\SysWOW64\Dcaghm32.exeC:\Windows\system32\Dcaghm32.exe88⤵
- Drops file in System32 directory
- Modifies registry class
PID:596 -
C:\Windows\SysWOW64\Ejpipf32.exeC:\Windows\system32\Ejpipf32.exe89⤵
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\Ebkndibq.exeC:\Windows\system32\Ebkndibq.exe90⤵PID:2852
-
C:\Windows\SysWOW64\Eelfedpa.exeC:\Windows\system32\Eelfedpa.exe91⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\Fbbcdh32.exeC:\Windows\system32\Fbbcdh32.exe92⤵
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\Fkmhij32.exeC:\Windows\system32\Fkmhij32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1560 -
C:\Windows\SysWOW64\Feeilbhg.exeC:\Windows\system32\Feeilbhg.exe94⤵PID:932
-
C:\Windows\SysWOW64\Gpagbp32.exeC:\Windows\system32\Gpagbp32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1944 -
C:\Windows\SysWOW64\Glhhgahg.exeC:\Windows\system32\Glhhgahg.exe96⤵PID:1820
-
C:\Windows\SysWOW64\Gokmnlcf.exeC:\Windows\system32\Gokmnlcf.exe97⤵PID:2084
-
C:\Windows\SysWOW64\Ghcbga32.exeC:\Windows\system32\Ghcbga32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Gegbpe32.exeC:\Windows\system32\Gegbpe32.exe99⤵PID:608
-
C:\Windows\SysWOW64\Hgkknm32.exeC:\Windows\system32\Hgkknm32.exe100⤵PID:700
-
C:\Windows\SysWOW64\Hcdihn32.exeC:\Windows\system32\Hcdihn32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2516 -
C:\Windows\SysWOW64\Hnimeg32.exeC:\Windows\system32\Hnimeg32.exe102⤵PID:2888
-
C:\Windows\SysWOW64\Imaglc32.exeC:\Windows\system32\Imaglc32.exe103⤵
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\Ickoimie.exeC:\Windows\system32\Ickoimie.exe104⤵
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\Icmlnmgb.exeC:\Windows\system32\Icmlnmgb.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1128 -
C:\Windows\SysWOW64\Igoagpja.exeC:\Windows\system32\Igoagpja.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\Jnncoini.exeC:\Windows\system32\Jnncoini.exe107⤵
- Modifies registry class
PID:1860 -
C:\Windows\SysWOW64\Jjdcdjcm.exeC:\Windows\system32\Jjdcdjcm.exe108⤵
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\Jjgpjjak.exeC:\Windows\system32\Jjgpjjak.exe109⤵PID:2664
-
C:\Windows\SysWOW64\Jecnpg32.exeC:\Windows\system32\Jecnpg32.exe110⤵
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\Kmjfae32.exeC:\Windows\system32\Kmjfae32.exe111⤵PID:2100
-
C:\Windows\SysWOW64\Knkbimbg.exeC:\Windows\system32\Knkbimbg.exe112⤵PID:1868
-
C:\Windows\SysWOW64\Kdoaackf.exeC:\Windows\system32\Kdoaackf.exe113⤵
- Modifies registry class
PID:3000 -
C:\Windows\SysWOW64\Lpfagd32.exeC:\Windows\system32\Lpfagd32.exe114⤵PID:2952
-
C:\Windows\SysWOW64\Lmlofhmb.exeC:\Windows\system32\Lmlofhmb.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2936 -
C:\Windows\SysWOW64\Licpki32.exeC:\Windows\system32\Licpki32.exe116⤵PID:2648
-
C:\Windows\SysWOW64\Mkiemqdo.exeC:\Windows\system32\Mkiemqdo.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1232 -
C:\Windows\SysWOW64\Mlhbgc32.exeC:\Windows\system32\Mlhbgc32.exe118⤵
- Modifies registry class
PID:1196 -
C:\Windows\SysWOW64\Mdcfle32.exeC:\Windows\system32\Mdcfle32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Majdkifd.exeC:\Windows\system32\Majdkifd.exe120⤵PID:2156
-
C:\Windows\SysWOW64\Nfnfjmgp.exeC:\Windows\system32\Nfnfjmgp.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1616 -
C:\Windows\SysWOW64\Ncbfcq32.exeC:\Windows\system32\Ncbfcq32.exe122⤵PID:1540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-