Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe
Resource
win10v2004-20241007-en
General
-
Target
fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe
-
Size
95KB
-
MD5
07b36f926be17e12aa00234163f4926d
-
SHA1
04a798906fa871122ebfc5f53f448a32e257d9a1
-
SHA256
fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013
-
SHA512
fe058d42e5c9ed0fb42114d2a1b1daa478a4efac8bb241878f27ca438eacfef1e5eb0467d09713a91a1c2016413090a5a208f9be589b18be4362420caaf368c8
-
SSDEEP
1536:vL8o7k2R+8fEa0bt1YPkqwciT5h4gn8M/c/0VhJaPioBKKKKAIVMRQrgRVRoRchK:D8o7k2R+da0biTwc+Tv8M/CaWioBKKKK
Malware Config
Extracted
berbew
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Mdgkjopd.exeDjicmk32.exeGcppkbia.exeMgbcfdmo.exeBmnofp32.exeBmelpa32.exeFfbmfo32.exeJnemfa32.exeLdpnoj32.exeBlniinac.exeJbfkeo32.exeIjdppm32.exeLfkfkopk.exeNcdpdcfh.exeQijdqp32.exeGmqkml32.exeJnifaajh.exeCeickb32.exeKimjhnnl.exeLkgifd32.exeObcffefa.exeQpaohjkk.exeAdmgglep.exeCmqihg32.exeJgmaog32.exeNjnokdaq.exeBmjekahk.exeLljipmdl.exeJcikog32.exeLdhgnk32.exeKffqqm32.exeKmklak32.exeDnfhqi32.exeHocmpm32.exeJmgfgham.exeEjklan32.exeNlohmonb.exeAhngomkd.exeLbmnea32.exeFpjaodmj.exeAljmbknm.exeIojopp32.exefdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exeEalahi32.exeAmhcad32.exeDcjjkkji.exeEnmnahnm.exeNhbciaki.exeLepclldc.exeCobhdhha.exeIickckcl.exeAfcdpi32.exeCnhhge32.exeHkmjjn32.exeBbfnchfb.exeDgcmod32.exePpipdl32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mdgkjopd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djicmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gcppkbia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mgbcfdmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmnofp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmelpa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffbmfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jnemfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ldpnoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Blniinac.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbfkeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ijdppm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lfkfkopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ncdpdcfh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qijdqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gmqkml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnifaajh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceickb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kimjhnnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkgifd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obcffefa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qpaohjkk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Admgglep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cmqihg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jgmaog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njnokdaq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfkfkopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmjekahk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lljipmdl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcikog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ldhgnk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kffqqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kmklak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dnfhqi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hocmpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jmgfgham.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejklan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgbcfdmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nlohmonb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ahngomkd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnfhqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lbmnea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fpjaodmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lkgifd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aljmbknm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iojopp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbmnea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ceickb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ealahi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amhcad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dcjjkkji.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enmnahnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nhbciaki.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgmaog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lepclldc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iickckcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Afcdpi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnhhge32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkmjjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbfnchfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dgcmod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ppipdl32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Llbconkd.exeLpqlemaj.exeLljipmdl.exeMojbaham.exeMdgkjopd.exeMpnkopeh.exeMndhnd32.exeNfbjhf32.exeNhbciaki.exeNigldq32.exeOnfabgch.exeOfdclinq.exeOchcem32.exePbomli32.exePljnkodm.exePaggce32.exePmpdmfff.exeQmbqcf32.exeQfkelkkd.exeQdofep32.exeApefjqob.exeAipgifcp.exeAompambg.exeAlaqjaaa.exeAeiecfga.exeBpebidam.exeBkkgfm32.exeBdckobhd.exeBpjldc32.exeChgnneiq.exeClefdcog.exeCofofolh.exeCmqihg32.exeDijfch32.exeDjicmk32.exeDkmljcdh.exeDfbqgldn.exeDgcmod32.exeEalahi32.exeEbknblho.exeEldbkbop.exeEelgcg32.exeEfmckpko.exeEacghhkd.exeEjklan32.exeFfbmfo32.exeFpjaodmj.exeFpmned32.exeFiebnjbg.exeFapgblob.exeFkilka32.exeFkkhpadq.exeGgbieb32.exeGpjmnh32.exeGkpakq32.exeGckfpc32.exeGmqkml32.exeGgiofa32.exeGcppkbia.exeHpcpdfhj.exeHaemloni.exeHecebm32.exeHlmnogkl.exeHdhbci32.exepid process 2980 Llbconkd.exe 2740 Lpqlemaj.exe 2716 Lljipmdl.exe 2888 Mojbaham.exe 2660 Mdgkjopd.exe 2452 Mpnkopeh.exe 2052 Mndhnd32.exe 1740 Nfbjhf32.exe 1492 Nhbciaki.exe 636 Nigldq32.exe 1252 Onfabgch.exe 2792 Ofdclinq.exe 2128 Ochcem32.exe 2148 Pbomli32.exe 700 Pljnkodm.exe 316 Paggce32.exe 1552 Pmpdmfff.exe 748 Qmbqcf32.exe 2416 Qfkelkkd.exe 2312 Qdofep32.exe 1956 Apefjqob.exe 2044 Aipgifcp.exe 1248 Aompambg.exe 2304 Alaqjaaa.exe 1600 Aeiecfga.exe 2244 Bpebidam.exe 2880 Bkkgfm32.exe 2736 Bdckobhd.exe 2796 Bpjldc32.exe 2480 Chgnneiq.exe 1648 Clefdcog.exe 2956 Cofofolh.exe 1240 Cmqihg32.exe 1480 Dijfch32.exe 2700 Djicmk32.exe 1116 Dkmljcdh.exe 2428 Dfbqgldn.exe 672 Dgcmod32.exe 2232 Ealahi32.exe 1988 Ebknblho.exe 1396 Eldbkbop.exe 1816 Eelgcg32.exe 2136 Efmckpko.exe 932 Eacghhkd.exe 1928 Ejklan32.exe 2192 Ffbmfo32.exe 108 Fpjaodmj.exe 1808 Fpmned32.exe 2308 Fiebnjbg.exe 1688 Fapgblob.exe 2844 Fkilka32.exe 2744 Fkkhpadq.exe 2908 Ggbieb32.exe 2808 Gpjmnh32.exe 1268 Gkpakq32.exe 388 Gckfpc32.exe 2032 Gmqkml32.exe 1160 Ggiofa32.exe 2864 Gcppkbia.exe 1756 Hpcpdfhj.exe 1132 Haemloni.exe 2588 Hecebm32.exe 1380 Hlmnogkl.exe 904 Hdhbci32.exe -
Loads dropped DLL 64 IoCs
Processes:
fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exeLlbconkd.exeLpqlemaj.exeLljipmdl.exeMojbaham.exeMdgkjopd.exeMpnkopeh.exeMndhnd32.exeNfbjhf32.exeNhbciaki.exeNigldq32.exeOnfabgch.exeOfdclinq.exeOchcem32.exePbomli32.exePljnkodm.exePaggce32.exePmpdmfff.exeQmbqcf32.exeQfkelkkd.exeQdofep32.exeApefjqob.exeAipgifcp.exeAompambg.exeAlaqjaaa.exeAeiecfga.exeBpebidam.exeBkkgfm32.exeBdckobhd.exeBpjldc32.exeChgnneiq.exeClefdcog.exepid process 3044 fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe 3044 fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe 2980 Llbconkd.exe 2980 Llbconkd.exe 2740 Lpqlemaj.exe 2740 Lpqlemaj.exe 2716 Lljipmdl.exe 2716 Lljipmdl.exe 2888 Mojbaham.exe 2888 Mojbaham.exe 2660 Mdgkjopd.exe 2660 Mdgkjopd.exe 2452 Mpnkopeh.exe 2452 Mpnkopeh.exe 2052 Mndhnd32.exe 2052 Mndhnd32.exe 1740 Nfbjhf32.exe 1740 Nfbjhf32.exe 1492 Nhbciaki.exe 1492 Nhbciaki.exe 636 Nigldq32.exe 636 Nigldq32.exe 1252 Onfabgch.exe 1252 Onfabgch.exe 2792 Ofdclinq.exe 2792 Ofdclinq.exe 2128 Ochcem32.exe 2128 Ochcem32.exe 2148 Pbomli32.exe 2148 Pbomli32.exe 700 Pljnkodm.exe 700 Pljnkodm.exe 316 Paggce32.exe 316 Paggce32.exe 1552 Pmpdmfff.exe 1552 Pmpdmfff.exe 748 Qmbqcf32.exe 748 Qmbqcf32.exe 2416 Qfkelkkd.exe 2416 Qfkelkkd.exe 2312 Qdofep32.exe 2312 Qdofep32.exe 1956 Apefjqob.exe 1956 Apefjqob.exe 2044 Aipgifcp.exe 2044 Aipgifcp.exe 1248 Aompambg.exe 1248 Aompambg.exe 2304 Alaqjaaa.exe 2304 Alaqjaaa.exe 1600 Aeiecfga.exe 1600 Aeiecfga.exe 2244 Bpebidam.exe 2244 Bpebidam.exe 2880 Bkkgfm32.exe 2880 Bkkgfm32.exe 2736 Bdckobhd.exe 2736 Bdckobhd.exe 2796 Bpjldc32.exe 2796 Bpjldc32.exe 2480 Chgnneiq.exe 2480 Chgnneiq.exe 1648 Clefdcog.exe 1648 Clefdcog.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ilifndlo.exeLbmnea32.exeLfkfkopk.exeMhcicf32.exeNommodjj.exePmmqmpdm.exeHocmpm32.exeFlqkjo32.exeKmklak32.exeAfbnec32.exeCffjagko.exeDcjjkkji.exeAbnopj32.exeImhqbkbm.exeOiahnnji.exeClilmbhd.exeMalmllfb.exeMlgkbi32.exeMojbaham.exePglojj32.exeNipefmkb.exeGdcfoq32.exeMdlfngcc.exeClefdcog.exeJcikog32.exePadccpal.exeKghmhegc.exeMndhnd32.exeQdofep32.exeLdkdckff.exeAdgein32.exeAicmadmm.exeIhlnhffh.exeNcdpdcfh.exeAompambg.exeBdckobhd.exeLlebnfpe.exeMohhea32.exeNphpng32.exeJnemfa32.exeDnfhqi32.exeObjmgd32.exeJdlacfca.exeAdmgglep.exeCeqjla32.exeNcgcdi32.exeOmfnnnhj.exeKjpceebh.exePjhnqfla.exeBimphc32.exeHchoop32.exeHlmnogkl.exeJgbjjf32.exeChbihc32.exeAljmbknm.exeMaoalb32.exeDqinhcoc.exeGlbdnbpk.exeLhapocoi.exePgcnnh32.exedescription ioc process File created C:\Windows\SysWOW64\Iafofkkf.exe Ilifndlo.exe File created C:\Windows\SysWOW64\Miepgfmf.dll Lbmnea32.exe File opened for modification C:\Windows\SysWOW64\Llhocfnb.exe Lfkfkopk.exe File created C:\Windows\SysWOW64\Aghijlbj.dll Mhcicf32.exe File created C:\Windows\SysWOW64\Aphgbo32.dll Nommodjj.exe File opened for modification C:\Windows\SysWOW64\Pnnmeh32.exe Pmmqmpdm.exe File created C:\Windows\SysWOW64\Hdpehd32.exe Hocmpm32.exe File opened for modification C:\Windows\SysWOW64\Fjfhkl32.exe Flqkjo32.exe File created C:\Windows\SysWOW64\Lhapocoi.exe Kmklak32.exe File created C:\Windows\SysWOW64\Abinjdad.exe Afbnec32.exe File opened for modification C:\Windows\SysWOW64\Dcjjkkji.exe Cffjagko.exe File created C:\Windows\SysWOW64\Dlboca32.exe Dcjjkkji.exe File created C:\Windows\SysWOW64\Blgcio32.exe Abnopj32.exe File created C:\Windows\SysWOW64\Ijlaloaf.exe Imhqbkbm.exe File opened for modification C:\Windows\SysWOW64\Objmgd32.exe Oiahnnji.exe File created C:\Windows\SysWOW64\Cnhhge32.exe Clilmbhd.exe File created C:\Windows\SysWOW64\Kllpgcjb.dll Malmllfb.exe File opened for modification C:\Windows\SysWOW64\Nmggllha.exe Mlgkbi32.exe File created C:\Windows\SysWOW64\Ocpbal32.dll Mojbaham.exe File created C:\Windows\SysWOW64\Padccpal.exe Pglojj32.exe File created C:\Windows\SysWOW64\Nommodjj.exe Nipefmkb.exe File created C:\Windows\SysWOW64\Glnkcc32.exe Gdcfoq32.exe File created C:\Windows\SysWOW64\Onchdkoc.dll Mdlfngcc.exe File created C:\Windows\SysWOW64\Cofofolh.exe Clefdcog.exe File opened for modification C:\Windows\SysWOW64\Kmaphmln.exe Jcikog32.exe File opened for modification C:\Windows\SysWOW64\Padccpal.exe Pglojj32.exe File created C:\Windows\SysWOW64\Pjlgle32.exe Padccpal.exe File created C:\Windows\SysWOW64\Geiilj32.dll Kghmhegc.exe File created C:\Windows\SysWOW64\Kcfjhebe.dll Mndhnd32.exe File opened for modification C:\Windows\SysWOW64\Apefjqob.exe Qdofep32.exe File opened for modification C:\Windows\SysWOW64\Lpaehl32.exe Ldkdckff.exe File opened for modification C:\Windows\SysWOW64\Aicmadmm.exe Adgein32.exe File created C:\Windows\SysWOW64\Aejnfe32.exe Aicmadmm.exe File opened for modification C:\Windows\SysWOW64\Ioefdpne.exe Ihlnhffh.exe File created C:\Windows\SysWOW64\Hennhl32.dll Ncdpdcfh.exe File created C:\Windows\SysWOW64\Hjfdcidn.dll Aompambg.exe File created C:\Windows\SysWOW64\Iokhldhb.dll Bdckobhd.exe File created C:\Windows\SysWOW64\Lfkfkopk.exe Llebnfpe.exe File created C:\Windows\SysWOW64\Dknnijed.dll Mohhea32.exe File opened for modification C:\Windows\SysWOW64\Nipefmkb.exe Nphpng32.exe File opened for modification C:\Windows\SysWOW64\Jgmaog32.exe Jnemfa32.exe File created C:\Windows\SysWOW64\Dgnminke.exe Dnfhqi32.exe File created C:\Windows\SysWOW64\Phahme32.dll Objmgd32.exe File created C:\Windows\SysWOW64\Jmgfgham.exe Jdlacfca.exe File created C:\Windows\SysWOW64\Bhhjdb32.dll Admgglep.exe File created C:\Windows\SysWOW64\Coindgbi.exe Ceqjla32.exe File created C:\Windows\SysWOW64\Mpbelhkp.dll Ncgcdi32.exe File opened for modification C:\Windows\SysWOW64\Obcffefa.exe Omfnnnhj.exe File opened for modification C:\Windows\SysWOW64\Ldhgnk32.exe Kjpceebh.exe File created C:\Windows\SysWOW64\Noclah32.dll Pjhnqfla.exe File created C:\Windows\SysWOW64\Bedamd32.exe Bimphc32.exe File opened for modification C:\Windows\SysWOW64\Hkogpn32.exe Hchoop32.exe File created C:\Windows\SysWOW64\Bmelpa32.exe Admgglep.exe File opened for modification C:\Windows\SysWOW64\Hdhbci32.exe Hlmnogkl.exe File opened for modification C:\Windows\SysWOW64\Jcikog32.exe Jgbjjf32.exe File opened for modification C:\Windows\SysWOW64\Cffjagko.exe Chbihc32.exe File created C:\Windows\SysWOW64\Kljmfe32.dll Aljmbknm.exe File created C:\Windows\SysWOW64\Honlnbae.dll Maoalb32.exe File opened for modification C:\Windows\SysWOW64\Aejnfe32.exe Aicmadmm.exe File created C:\Windows\SysWOW64\Copjlmfa.dll Omfnnnhj.exe File created C:\Windows\SysWOW64\Enmnahnm.exe Dqinhcoc.exe File created C:\Windows\SysWOW64\Gekhgh32.exe Glbdnbpk.exe File opened for modification C:\Windows\SysWOW64\Lbkaoalg.exe Lhapocoi.exe File created C:\Windows\SysWOW64\Nilacmgb.dll Pgcnnh32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Dgcmod32.exeIokfjf32.exeKjpceebh.exeKpdeoh32.exeKabngjla.exeKnfopnkk.exeMdlfngcc.exeNphpng32.exeGcppkbia.exeObjmgd32.exeDlboca32.exeLbmnea32.exeLkgifd32.exeJmlobg32.exeBpebidam.exeBmnofp32.exeNigldq32.exeLepclldc.exeMkohjbah.exeMlgkbi32.exeCeickb32.exeOfdclinq.exeHpcpdfhj.exeNopaoj32.exeBlgcio32.exeBoobki32.exeKmklak32.exeCdamao32.exeLpqlemaj.exeFlqkjo32.exeGlbdnbpk.exeNipefmkb.exePjhnqfla.exeDcjjkkji.exeEmbkbdce.exeKgjjndeq.exeAhfgbkpl.exePmpdmfff.exeJgmaog32.exeAipgifcp.exeKijmbnpo.exeChbihc32.exeLpaehl32.exeDqfabdaf.exeJmgfgham.exeNcdpdcfh.exePgcnnh32.exeOnjgkf32.exeGjjafkpe.exeHdpehd32.exeJibpghbk.exeCmqihg32.exeIcdeee32.exeKghmhegc.exeQijdqp32.exeLdkdckff.exePglojj32.exeAdgein32.exeDqinhcoc.exeHmijajbd.exeBfmqigba.exeBbfnchfb.exeBdckobhd.exeEalahi32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgcmod32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iokfjf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjpceebh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpdeoh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kabngjla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knfopnkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdlfngcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nphpng32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gcppkbia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Objmgd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dlboca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbmnea32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkgifd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmlobg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpebidam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmnofp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nigldq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepclldc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkohjbah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlgkbi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceickb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofdclinq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpcpdfhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nopaoj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blgcio32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boobki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmklak32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdamao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpqlemaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flqkjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glbdnbpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nipefmkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjhnqfla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcjjkkji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Embkbdce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgjjndeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahfgbkpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmpdmfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgmaog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aipgifcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kijmbnpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chbihc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpaehl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dqfabdaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmgfgham.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncdpdcfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgcnnh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onjgkf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjjafkpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdpehd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jibpghbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmqihg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icdeee32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kghmhegc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qijdqp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldkdckff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pglojj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adgein32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dqinhcoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmijajbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfmqigba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbfnchfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdckobhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ealahi32.exe -
Modifies registry class 64 IoCs
Processes:
Ihbdhepp.exeMghfdcdi.exeHpcpdfhj.exeKijmbnpo.exeHmijajbd.exePjhnqfla.exeBlgcio32.exeAbinjdad.exeBpjnmlel.exeBmnofp32.exeLljipmdl.exeOknhdjko.exeQjgjpi32.exeLfkfkopk.exeGlnkcc32.exeIafofkkf.exeCofofolh.exeKoibpd32.exeAhngomkd.exeCcqhdmbc.exeDqinhcoc.exeAeiecfga.exeBkkgfm32.exeOnjgkf32.exeLdhgnk32.exeBmjekahk.exeLkgifd32.exeBimphc32.exeChbihc32.exeNfbjhf32.exeAlaqjaaa.exeDkmljcdh.exeIlifndlo.exeKgjjndeq.exeMlgkbi32.exePmqffonj.exeJgkdigfa.exeAmhcad32.exeBefnbd32.exeJibpghbk.exeKabngjla.exeMhcicf32.exefdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exeHdgkicek.exeFhjhdp32.exeHchoop32.exeKnfopnkk.exeCkiiiine.exeMgbcfdmo.exeOmhkcnfg.exePaafmp32.exeIjlaloaf.exeNjeelc32.exeCkecpjdh.exeIoefdpne.exeAompambg.exeDijfch32.exeFpmned32.exeIojopp32.exeCeqjla32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oqncib32.dll" Ihbdhepp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibkhgp32.dll" Mghfdcdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Algllb32.dll" Hpcpdfhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omkicqkc.dll" Kijmbnpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hmijajbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noclah32.dll" Pjhnqfla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Blgcio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Abinjdad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edalmn32.dll" Bpjnmlel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bmnofp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lljipmdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kijmbnpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oknhdjko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qjgjpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lfkfkopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehameajg.dll" Glnkcc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iafofkkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cofofolh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gaeddino.dll" Koibpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ahngomkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ccqhdmbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glgkjp32.dll" Dqinhcoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aeiecfga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bkkgfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aolgka32.dll" Onjgkf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ldhgnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bmjekahk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcgalk32.dll" Lkgifd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkbhkj32.dll" Bimphc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlanmb32.dll" Chbihc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nfbjhf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Alaqjaaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbgghlmq.dll" Dkmljcdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ilifndlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kgjjndeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mlgkbi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pmqffonj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maflig32.dll" Jgkdigfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Amhcad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Befnbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejcfme32.dll" Jibpghbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kabngjla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mhcicf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kijmbnpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abfdhg32.dll" Hdgkicek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fhjhdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hchoop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nfhkkc32.dll" Knfopnkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ckiiiine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mgbcfdmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Omhkcnfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Paafmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fojegeeg.dll" Ijlaloaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Njeelc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gipjkn32.dll" Paafmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iidbakdl.dll" Ckecpjdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odfhpd32.dll" Ioefdpne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjfdcidn.dll" Aompambg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dijfch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmgfal32.dll" Fpmned32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iojopp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mghfdcdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ceqjla32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exeLlbconkd.exeLpqlemaj.exeLljipmdl.exeMojbaham.exeMdgkjopd.exeMpnkopeh.exeMndhnd32.exeNfbjhf32.exeNhbciaki.exeNigldq32.exeOnfabgch.exeOfdclinq.exeOchcem32.exePbomli32.exePljnkodm.exedescription pid process target process PID 3044 wrote to memory of 2980 3044 fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe Llbconkd.exe PID 3044 wrote to memory of 2980 3044 fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe Llbconkd.exe PID 3044 wrote to memory of 2980 3044 fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe Llbconkd.exe PID 3044 wrote to memory of 2980 3044 fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe Llbconkd.exe PID 2980 wrote to memory of 2740 2980 Llbconkd.exe Lpqlemaj.exe PID 2980 wrote to memory of 2740 2980 Llbconkd.exe Lpqlemaj.exe PID 2980 wrote to memory of 2740 2980 Llbconkd.exe Lpqlemaj.exe PID 2980 wrote to memory of 2740 2980 Llbconkd.exe Lpqlemaj.exe PID 2740 wrote to memory of 2716 2740 Lpqlemaj.exe Lljipmdl.exe PID 2740 wrote to memory of 2716 2740 Lpqlemaj.exe Lljipmdl.exe PID 2740 wrote to memory of 2716 2740 Lpqlemaj.exe Lljipmdl.exe PID 2740 wrote to memory of 2716 2740 Lpqlemaj.exe Lljipmdl.exe PID 2716 wrote to memory of 2888 2716 Lljipmdl.exe Mojbaham.exe PID 2716 wrote to memory of 2888 2716 Lljipmdl.exe Mojbaham.exe PID 2716 wrote to memory of 2888 2716 Lljipmdl.exe Mojbaham.exe PID 2716 wrote to memory of 2888 2716 Lljipmdl.exe Mojbaham.exe PID 2888 wrote to memory of 2660 2888 Mojbaham.exe Mdgkjopd.exe PID 2888 wrote to memory of 2660 2888 Mojbaham.exe Mdgkjopd.exe PID 2888 wrote to memory of 2660 2888 Mojbaham.exe Mdgkjopd.exe PID 2888 wrote to memory of 2660 2888 Mojbaham.exe Mdgkjopd.exe PID 2660 wrote to memory of 2452 2660 Mdgkjopd.exe Mpnkopeh.exe PID 2660 wrote to memory of 2452 2660 Mdgkjopd.exe Mpnkopeh.exe PID 2660 wrote to memory of 2452 2660 Mdgkjopd.exe Mpnkopeh.exe PID 2660 wrote to memory of 2452 2660 Mdgkjopd.exe Mpnkopeh.exe PID 2452 wrote to memory of 2052 2452 Mpnkopeh.exe Mndhnd32.exe PID 2452 wrote to memory of 2052 2452 Mpnkopeh.exe Mndhnd32.exe PID 2452 wrote to memory of 2052 2452 Mpnkopeh.exe Mndhnd32.exe PID 2452 wrote to memory of 2052 2452 Mpnkopeh.exe Mndhnd32.exe PID 2052 wrote to memory of 1740 2052 Mndhnd32.exe Nfbjhf32.exe PID 2052 wrote to memory of 1740 2052 Mndhnd32.exe Nfbjhf32.exe PID 2052 wrote to memory of 1740 2052 Mndhnd32.exe Nfbjhf32.exe PID 2052 wrote to memory of 1740 2052 Mndhnd32.exe Nfbjhf32.exe PID 1740 wrote to memory of 1492 1740 Nfbjhf32.exe Nhbciaki.exe PID 1740 wrote to memory of 1492 1740 Nfbjhf32.exe Nhbciaki.exe PID 1740 wrote to memory of 1492 1740 Nfbjhf32.exe Nhbciaki.exe PID 1740 wrote to memory of 1492 1740 Nfbjhf32.exe Nhbciaki.exe PID 1492 wrote to memory of 636 1492 Nhbciaki.exe Nigldq32.exe PID 1492 wrote to memory of 636 1492 Nhbciaki.exe Nigldq32.exe PID 1492 wrote to memory of 636 1492 Nhbciaki.exe Nigldq32.exe PID 1492 wrote to memory of 636 1492 Nhbciaki.exe Nigldq32.exe PID 636 wrote to memory of 1252 636 Nigldq32.exe Onfabgch.exe PID 636 wrote to memory of 1252 636 Nigldq32.exe Onfabgch.exe PID 636 wrote to memory of 1252 636 Nigldq32.exe Onfabgch.exe PID 636 wrote to memory of 1252 636 Nigldq32.exe Onfabgch.exe PID 1252 wrote to memory of 2792 1252 Onfabgch.exe Ofdclinq.exe PID 1252 wrote to memory of 2792 1252 Onfabgch.exe Ofdclinq.exe PID 1252 wrote to memory of 2792 1252 Onfabgch.exe Ofdclinq.exe PID 1252 wrote to memory of 2792 1252 Onfabgch.exe Ofdclinq.exe PID 2792 wrote to memory of 2128 2792 Ofdclinq.exe Ochcem32.exe PID 2792 wrote to memory of 2128 2792 Ofdclinq.exe Ochcem32.exe PID 2792 wrote to memory of 2128 2792 Ofdclinq.exe Ochcem32.exe PID 2792 wrote to memory of 2128 2792 Ofdclinq.exe Ochcem32.exe PID 2128 wrote to memory of 2148 2128 Ochcem32.exe Pbomli32.exe PID 2128 wrote to memory of 2148 2128 Ochcem32.exe Pbomli32.exe PID 2128 wrote to memory of 2148 2128 Ochcem32.exe Pbomli32.exe PID 2128 wrote to memory of 2148 2128 Ochcem32.exe Pbomli32.exe PID 2148 wrote to memory of 700 2148 Pbomli32.exe Pljnkodm.exe PID 2148 wrote to memory of 700 2148 Pbomli32.exe Pljnkodm.exe PID 2148 wrote to memory of 700 2148 Pbomli32.exe Pljnkodm.exe PID 2148 wrote to memory of 700 2148 Pbomli32.exe Pljnkodm.exe PID 700 wrote to memory of 316 700 Pljnkodm.exe Paggce32.exe PID 700 wrote to memory of 316 700 Pljnkodm.exe Paggce32.exe PID 700 wrote to memory of 316 700 Pljnkodm.exe Paggce32.exe PID 700 wrote to memory of 316 700 Pljnkodm.exe Paggce32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe"C:\Users\Admin\AppData\Local\Temp\fdac1f893a275410012b4378419e0a748f14211a26f90b8a82340dfc23086013.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Llbconkd.exeC:\Windows\system32\Llbconkd.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Lpqlemaj.exeC:\Windows\system32\Lpqlemaj.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Lljipmdl.exeC:\Windows\system32\Lljipmdl.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Mojbaham.exeC:\Windows\system32\Mojbaham.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Mdgkjopd.exeC:\Windows\system32\Mdgkjopd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Mpnkopeh.exeC:\Windows\system32\Mpnkopeh.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\Mndhnd32.exeC:\Windows\system32\Mndhnd32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\Nfbjhf32.exeC:\Windows\system32\Nfbjhf32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\Nhbciaki.exeC:\Windows\system32\Nhbciaki.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\Nigldq32.exeC:\Windows\system32\Nigldq32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\Onfabgch.exeC:\Windows\system32\Onfabgch.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\Ofdclinq.exeC:\Windows\system32\Ofdclinq.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\Ochcem32.exeC:\Windows\system32\Ochcem32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\Pbomli32.exeC:\Windows\system32\Pbomli32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\Pljnkodm.exeC:\Windows\system32\Pljnkodm.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\Paggce32.exeC:\Windows\system32\Paggce32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:316 -
C:\Windows\SysWOW64\Pmpdmfff.exeC:\Windows\system32\Pmpdmfff.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Windows\SysWOW64\Qmbqcf32.exeC:\Windows\system32\Qmbqcf32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:748 -
C:\Windows\SysWOW64\Qfkelkkd.exeC:\Windows\system32\Qfkelkkd.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416 -
C:\Windows\SysWOW64\Qdofep32.exeC:\Windows\system32\Qdofep32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\Apefjqob.exeC:\Windows\system32\Apefjqob.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Windows\SysWOW64\Aipgifcp.exeC:\Windows\system32\Aipgifcp.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\Aompambg.exeC:\Windows\system32\Aompambg.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1248 -
C:\Windows\SysWOW64\Alaqjaaa.exeC:\Windows\system32\Alaqjaaa.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Aeiecfga.exeC:\Windows\system32\Aeiecfga.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1600 -
C:\Windows\SysWOW64\Bpebidam.exeC:\Windows\system32\Bpebidam.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\Bkkgfm32.exeC:\Windows\system32\Bkkgfm32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Bdckobhd.exeC:\Windows\system32\Bdckobhd.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\Bpjldc32.exeC:\Windows\system32\Bpjldc32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2796 -
C:\Windows\SysWOW64\Chgnneiq.exeC:\Windows\system32\Chgnneiq.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2480 -
C:\Windows\SysWOW64\Clefdcog.exeC:\Windows\system32\Clefdcog.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\Cofofolh.exeC:\Windows\system32\Cofofolh.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2956 -
C:\Windows\SysWOW64\Cmqihg32.exeC:\Windows\system32\Cmqihg32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\Dijfch32.exeC:\Windows\system32\Dijfch32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:1480 -
C:\Windows\SysWOW64\Djicmk32.exeC:\Windows\system32\Djicmk32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\Dkmljcdh.exeC:\Windows\system32\Dkmljcdh.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:1116 -
C:\Windows\SysWOW64\Dfbqgldn.exeC:\Windows\system32\Dfbqgldn.exe38⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\Dgcmod32.exeC:\Windows\system32\Dgcmod32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:672 -
C:\Windows\SysWOW64\Ealahi32.exeC:\Windows\system32\Ealahi32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\Ebknblho.exeC:\Windows\system32\Ebknblho.exe41⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\Eldbkbop.exeC:\Windows\system32\Eldbkbop.exe42⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\Eelgcg32.exeC:\Windows\system32\Eelgcg32.exe43⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Efmckpko.exeC:\Windows\system32\Efmckpko.exe44⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\Eacghhkd.exeC:\Windows\system32\Eacghhkd.exe45⤵
- Executes dropped EXE
PID:932 -
C:\Windows\SysWOW64\Ejklan32.exeC:\Windows\system32\Ejklan32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\Ffbmfo32.exeC:\Windows\system32\Ffbmfo32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\Fpjaodmj.exeC:\Windows\system32\Fpjaodmj.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:108 -
C:\Windows\SysWOW64\Fpmned32.exeC:\Windows\system32\Fpmned32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\Fiebnjbg.exeC:\Windows\system32\Fiebnjbg.exe50⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\Fapgblob.exeC:\Windows\system32\Fapgblob.exe51⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\Fkilka32.exeC:\Windows\system32\Fkilka32.exe52⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\Fkkhpadq.exeC:\Windows\system32\Fkkhpadq.exe53⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\Ggbieb32.exeC:\Windows\system32\Ggbieb32.exe54⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\Gpjmnh32.exeC:\Windows\system32\Gpjmnh32.exe55⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Gkpakq32.exeC:\Windows\system32\Gkpakq32.exe56⤵
- Executes dropped EXE
PID:1268 -
C:\Windows\SysWOW64\Gckfpc32.exeC:\Windows\system32\Gckfpc32.exe57⤵
- Executes dropped EXE
PID:388 -
C:\Windows\SysWOW64\Gmqkml32.exeC:\Windows\system32\Gmqkml32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\Ggiofa32.exeC:\Windows\system32\Ggiofa32.exe59⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\Gcppkbia.exeC:\Windows\system32\Gcppkbia.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\Hpcpdfhj.exeC:\Windows\system32\Hpcpdfhj.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Haemloni.exeC:\Windows\system32\Haemloni.exe62⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Hecebm32.exeC:\Windows\system32\Hecebm32.exe63⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Hlmnogkl.exeC:\Windows\system32\Hlmnogkl.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1380 -
C:\Windows\SysWOW64\Hdhbci32.exeC:\Windows\system32\Hdhbci32.exe65⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Hkbkpcpd.exeC:\Windows\system32\Hkbkpcpd.exe66⤵PID:1356
-
C:\Windows\SysWOW64\Hdjoii32.exeC:\Windows\system32\Hdjoii32.exe67⤵PID:332
-
C:\Windows\SysWOW64\Hkdgecna.exeC:\Windows\system32\Hkdgecna.exe68⤵PID:2300
-
C:\Windows\SysWOW64\Icplje32.exeC:\Windows\system32\Icplje32.exe69⤵PID:2392
-
C:\Windows\SysWOW64\Imhqbkbm.exeC:\Windows\system32\Imhqbkbm.exe70⤵
- Drops file in System32 directory
PID:1504 -
C:\Windows\SysWOW64\Ijlaloaf.exeC:\Windows\system32\Ijlaloaf.exe71⤵
- Modifies registry class
PID:1604 -
C:\Windows\SysWOW64\Icdeee32.exeC:\Windows\system32\Icdeee32.exe72⤵
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Windows\SysWOW64\Iokfjf32.exeC:\Windows\system32\Iokfjf32.exe73⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\Iickckcl.exeC:\Windows\system32\Iickckcl.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2892 -
C:\Windows\SysWOW64\Ifgklp32.exeC:\Windows\system32\Ifgklp32.exe75⤵PID:2612
-
C:\Windows\SysWOW64\Jkdcdf32.exeC:\Windows\system32\Jkdcdf32.exe76⤵PID:1652
-
C:\Windows\SysWOW64\Jgkdigfa.exeC:\Windows\system32\Jgkdigfa.exe77⤵
- Modifies registry class
PID:2356 -
C:\Windows\SysWOW64\Jnemfa32.exeC:\Windows\system32\Jnemfa32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1724 -
C:\Windows\SysWOW64\Jgmaog32.exeC:\Windows\system32\Jgmaog32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\Jbcelp32.exeC:\Windows\system32\Jbcelp32.exe80⤵PID:584
-
C:\Windows\SysWOW64\Jcdadhjb.exeC:\Windows\system32\Jcdadhjb.exe81⤵PID:2440
-
C:\Windows\SysWOW64\Jnifaajh.exeC:\Windows\system32\Jnifaajh.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1288 -
C:\Windows\SysWOW64\Jgbjjf32.exeC:\Windows\system32\Jgbjjf32.exe83⤵
- Drops file in System32 directory
PID:2096 -
C:\Windows\SysWOW64\Jcikog32.exeC:\Windows\system32\Jcikog32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1044 -
C:\Windows\SysWOW64\Kmaphmln.exeC:\Windows\system32\Kmaphmln.exe85⤵PID:1772
-
C:\Windows\SysWOW64\Kfidqb32.exeC:\Windows\system32\Kfidqb32.exe86⤵PID:2488
-
C:\Windows\SysWOW64\Klfmijae.exeC:\Windows\system32\Klfmijae.exe87⤵PID:2324
-
C:\Windows\SysWOW64\Kijmbnpo.exeC:\Windows\system32\Kijmbnpo.exe88⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3028 -
C:\Windows\SysWOW64\Kpdeoh32.exeC:\Windows\system32\Kpdeoh32.exe89⤵
- System Location Discovery: System Language Discovery
PID:652 -
C:\Windows\SysWOW64\Kimjhnnl.exeC:\Windows\system32\Kimjhnnl.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2564 -
C:\Windows\SysWOW64\Koibpd32.exeC:\Windows\system32\Koibpd32.exe91⤵
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Kecjmodq.exeC:\Windows\system32\Kecjmodq.exe92⤵PID:2124
-
C:\Windows\SysWOW64\Kjpceebh.exeC:\Windows\system32\Kjpceebh.exe93⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\Ldhgnk32.exeC:\Windows\system32\Ldhgnk32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Lkbpke32.exeC:\Windows\system32\Lkbpke32.exe95⤵PID:2920
-
C:\Windows\SysWOW64\Ldkdckff.exeC:\Windows\system32\Ldkdckff.exe96⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:528 -
C:\Windows\SysWOW64\Lpaehl32.exeC:\Windows\system32\Lpaehl32.exe97⤵
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\Lkgifd32.exeC:\Windows\system32\Lkgifd32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1500 -
C:\Windows\SysWOW64\Ldpnoj32.exeC:\Windows\system32\Ldpnoj32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2432 -
C:\Windows\SysWOW64\Mgbcfdmo.exeC:\Windows\system32\Mgbcfdmo.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2412 -
C:\Windows\SysWOW64\Mcidkf32.exeC:\Windows\system32\Mcidkf32.exe101⤵PID:1748
-
C:\Windows\SysWOW64\Maoalb32.exeC:\Windows\system32\Maoalb32.exe102⤵
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\Npfjbn32.exeC:\Windows\system32\Npfjbn32.exe103⤵PID:2456
-
C:\Windows\SysWOW64\Ngpcohbm.exeC:\Windows\system32\Ngpcohbm.exe104⤵PID:1548
-
C:\Windows\SysWOW64\Njnokdaq.exeC:\Windows\system32\Njnokdaq.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2528 -
C:\Windows\SysWOW64\Ncgcdi32.exeC:\Windows\system32\Ncgcdi32.exe106⤵
- Drops file in System32 directory
PID:2016 -
C:\Windows\SysWOW64\Nlohmonb.exeC:\Windows\system32\Nlohmonb.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1284 -
C:\Windows\SysWOW64\Nfglfdeb.exeC:\Windows\system32\Nfglfdeb.exe108⤵PID:2712
-
C:\Windows\SysWOW64\Nopaoj32.exeC:\Windows\system32\Nopaoj32.exe109⤵
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Windows\SysWOW64\Njeelc32.exeC:\Windows\system32\Njeelc32.exe110⤵
- Modifies registry class
PID:1752 -
C:\Windows\SysWOW64\Nbqjqehd.exeC:\Windows\system32\Nbqjqehd.exe111⤵PID:1788
-
C:\Windows\SysWOW64\Omfnnnhj.exeC:\Windows\system32\Omfnnnhj.exe112⤵
- Drops file in System32 directory
PID:692 -
C:\Windows\SysWOW64\Obcffefa.exeC:\Windows\system32\Obcffefa.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3012 -
C:\Windows\SysWOW64\Omhkcnfg.exeC:\Windows\system32\Omhkcnfg.exe114⤵
- Modifies registry class
PID:1984 -
C:\Windows\SysWOW64\Onjgkf32.exeC:\Windows\system32\Onjgkf32.exe115⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:956 -
C:\Windows\SysWOW64\Oknhdjko.exeC:\Windows\system32\Oknhdjko.exe116⤵
- Modifies registry class
PID:1572 -
C:\Windows\SysWOW64\Oiahnnji.exeC:\Windows\system32\Oiahnnji.exe117⤵
- Drops file in System32 directory
PID:1812 -
C:\Windows\SysWOW64\Objmgd32.exeC:\Windows\system32\Objmgd32.exe118⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\Okbapi32.exeC:\Windows\system32\Okbapi32.exe119⤵PID:2076
-
C:\Windows\SysWOW64\Omcngamh.exeC:\Windows\system32\Omcngamh.exe120⤵PID:2884
-
C:\Windows\SysWOW64\Pjhnqfla.exeC:\Windows\system32\Pjhnqfla.exe121⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2896 -
C:\Windows\SysWOW64\Paafmp32.exeC:\Windows\system32\Paafmp32.exe122⤵
- Modifies registry class
PID:2596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-