Analysis
-
max time kernel
107s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe
Resource
win10v2004-20241007-en
General
-
Target
a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe
-
Size
296KB
-
MD5
467e787905fb3d60451f747fffac826c
-
SHA1
2e55fed4e38dbe0a832e8e2f17751e38ca875584
-
SHA256
a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e
-
SHA512
df98b2bbcd30e7725bdf895d11334bb3cd24b58a23a79a6ced795999361c858a0915f3ea3deff15bde77998f25f1e61ce9ed4fec0fd5b55d38d0f569aa76de49
-
SSDEEP
3072:xpG9A5oUYgw6cD6cNUgUARA1+6NhZ6P0c9fpxg6p2:zxoU7cFR6NPKG62
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jhahanie.exeMhcfjnhm.exeNdggib32.exeNegeln32.exeOcclcg32.exeEgihcl32.exeCiagojda.exeKcmdjgbh.exeNfjildbp.exePpipdl32.exeBklpjlmc.exeDkjhjm32.exeEdmilpld.exeMddibb32.exeHnpdcf32.exeMblcin32.exeDjicmk32.exeIqllghon.exeBpfebmia.exeMbjfcnkg.exeEfedga32.exeNqpdcc32.exeKlhioioc.exePodpoffm.exeIaladj32.exeEimcjl32.exeIokfjf32.exeCdkkcp32.exeJfgebjnm.exeKmfpmc32.exeNbeedh32.exeIocioq32.exeJkgbcofn.exeCpfmmf32.exeIiqldc32.exeGcmcebkc.exeBihgmdih.exeJbedkhie.exeBolcma32.exeMeljbqna.exeOknhdjko.exeAeokba32.exeMagdam32.exeQmepanje.exeKqkalenn.exeJimdcqom.exeMgcjpkak.exeCbdkbjkl.exeJacibm32.exeElkofg32.exeHalcmn32.exeColadm32.exeHbekojlp.exeLadpagin.exeBnlgbnbp.exeAlmihjlj.exeIjibng32.exeGgbieb32.exeGampaipe.exeOhengmcf.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhahanie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhcfjnhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndggib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Negeln32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Occlcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Egihcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ciagojda.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndggib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kcmdjgbh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfjildbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ppipdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bklpjlmc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkjhjm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edmilpld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mddibb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hnpdcf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mblcin32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djicmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iqllghon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpfebmia.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbjfcnkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Efedga32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqpdcc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klhioioc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Podpoffm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ialadj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eimcjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iokfjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdkkcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mbjfcnkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfgebjnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmfpmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nbeedh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iocioq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmfpmc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkgbcofn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cpfmmf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiqldc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gcmcebkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bihgmdih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jbedkhie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bolcma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Meljbqna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oknhdjko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeokba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Magdam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qmepanje.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kqkalenn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jimdcqom.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgcjpkak.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbdkbjkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jacibm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Elkofg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Halcmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Coladm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hbekojlp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ladpagin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnlgbnbp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Almihjlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Almihjlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ijibng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ggbieb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gampaipe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohengmcf.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Bqijljfd.exeBmpkqklh.exeCpfmmf32.exeCjonncab.exeCegoqlof.exeDilapopb.exeDipjkn32.exeElcpbigl.exeEdoefl32.exeEcfnmh32.exeFgfdie32.exeFhjmfnok.exeFennoa32.exeGdcjpncm.exeGpjkeoha.exeGodaakic.exeGmhbkohm.exeHegpjaac.exeHnpdcf32.exeIjibng32.exeIeofkp32.exeIiqldc32.exeIjphofem.exeJbnjhh32.exeJhahanie.exeJfgebjnm.exeKkdnhi32.exeKgnkci32.exeKljdkpfl.exeLlomfpag.exeLdjbkb32.exeLnecigcp.exeLgngbmjp.exeLpflkb32.exeMjqmig32.exeMkdffoij.exeMflgih32.exeMnglnj32.exeNbeedh32.exeNgbmlo32.exeNqjaeeog.exeNqmnjd32.exeNfigck32.exeNcmglp32.exeNmflee32.exeOeaqig32.exeOecmogln.exeOhbikbkb.exeOefjdgjk.exeOehgjfhi.exeOejcpf32.exeOhipla32.exePfnmmn32.exePmjaohol.exePmmneg32.exePlbkfdba.exePaocnkph.exeQoeamo32.exeAklabp32.exeAddfkeid.exeAiaoclgl.exeAdfbpega.exeAnogijnb.exeAdipfd32.exepid process 2000 Bqijljfd.exe 2456 Bmpkqklh.exe 2940 Cpfmmf32.exe 3012 Cjonncab.exe 2668 Cegoqlof.exe 772 Dilapopb.exe 1312 Dipjkn32.exe 2708 Elcpbigl.exe 384 Edoefl32.exe 2868 Ecfnmh32.exe 1460 Fgfdie32.exe 2404 Fhjmfnok.exe 2344 Fennoa32.exe 2252 Gdcjpncm.exe 3052 Gpjkeoha.exe 1804 Godaakic.exe 1716 Gmhbkohm.exe 1780 Hegpjaac.exe 676 Hnpdcf32.exe 1212 Ijibng32.exe 2372 Ieofkp32.exe 2368 Iiqldc32.exe 1012 Ijphofem.exe 872 Jbnjhh32.exe 2536 Jhahanie.exe 1620 Jfgebjnm.exe 2712 Kkdnhi32.exe 2892 Kgnkci32.exe 2764 Kljdkpfl.exe 2932 Llomfpag.exe 2652 Ldjbkb32.exe 2148 Lnecigcp.exe 656 Lgngbmjp.exe 2828 Lpflkb32.exe 2508 Mjqmig32.exe 2944 Mkdffoij.exe 2476 Mflgih32.exe 2024 Mnglnj32.exe 1100 Nbeedh32.exe 2056 Ngbmlo32.exe 756 Nqjaeeog.exe 2120 Nqmnjd32.exe 2420 Nfigck32.exe 828 Ncmglp32.exe 1412 Nmflee32.exe 1232 Oeaqig32.exe 2500 Oecmogln.exe 1668 Ohbikbkb.exe 1408 Oefjdgjk.exe 2008 Oehgjfhi.exe 2880 Oejcpf32.exe 2380 Ohipla32.exe 2624 Pfnmmn32.exe 2672 Pmjaohol.exe 1616 Pmmneg32.exe 2840 Plbkfdba.exe 2904 Paocnkph.exe 1624 Qoeamo32.exe 936 Aklabp32.exe 1520 Addfkeid.exe 528 Aiaoclgl.exe 1148 Adfbpega.exe 2032 Anogijnb.exe 2580 Adipfd32.exe -
Loads dropped DLL 64 IoCs
Processes:
a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exeBqijljfd.exeBmpkqklh.exeCpfmmf32.exeCjonncab.exeCegoqlof.exeDilapopb.exeDipjkn32.exeElcpbigl.exeEdoefl32.exeEcfnmh32.exeFgfdie32.exeFhjmfnok.exeFennoa32.exeGdcjpncm.exeGpjkeoha.exeGodaakic.exeGmhbkohm.exeHegpjaac.exeHnpdcf32.exeIjibng32.exeIeofkp32.exeIiqldc32.exeIjphofem.exeJbnjhh32.exeJhahanie.exeJfgebjnm.exeKkdnhi32.exeKgnkci32.exeKljdkpfl.exeLlomfpag.exeLdjbkb32.exepid process 1116 a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe 1116 a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe 2000 Bqijljfd.exe 2000 Bqijljfd.exe 2456 Bmpkqklh.exe 2456 Bmpkqklh.exe 2940 Cpfmmf32.exe 2940 Cpfmmf32.exe 3012 Cjonncab.exe 3012 Cjonncab.exe 2668 Cegoqlof.exe 2668 Cegoqlof.exe 772 Dilapopb.exe 772 Dilapopb.exe 1312 Dipjkn32.exe 1312 Dipjkn32.exe 2708 Elcpbigl.exe 2708 Elcpbigl.exe 384 Edoefl32.exe 384 Edoefl32.exe 2868 Ecfnmh32.exe 2868 Ecfnmh32.exe 1460 Fgfdie32.exe 1460 Fgfdie32.exe 2404 Fhjmfnok.exe 2404 Fhjmfnok.exe 2344 Fennoa32.exe 2344 Fennoa32.exe 2252 Gdcjpncm.exe 2252 Gdcjpncm.exe 3052 Gpjkeoha.exe 3052 Gpjkeoha.exe 1804 Godaakic.exe 1804 Godaakic.exe 1716 Gmhbkohm.exe 1716 Gmhbkohm.exe 1780 Hegpjaac.exe 1780 Hegpjaac.exe 676 Hnpdcf32.exe 676 Hnpdcf32.exe 1212 Ijibng32.exe 1212 Ijibng32.exe 2372 Ieofkp32.exe 2372 Ieofkp32.exe 2368 Iiqldc32.exe 2368 Iiqldc32.exe 1012 Ijphofem.exe 1012 Ijphofem.exe 872 Jbnjhh32.exe 872 Jbnjhh32.exe 2536 Jhahanie.exe 2536 Jhahanie.exe 1620 Jfgebjnm.exe 1620 Jfgebjnm.exe 2712 Kkdnhi32.exe 2712 Kkdnhi32.exe 2892 Kgnkci32.exe 2892 Kgnkci32.exe 2764 Kljdkpfl.exe 2764 Kljdkpfl.exe 2932 Llomfpag.exe 2932 Llomfpag.exe 2652 Ldjbkb32.exe 2652 Ldjbkb32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Meemgk32.exeDilapopb.exeNoohlkpc.exeAhqkocmm.exeFiqibj32.exeGgbieb32.exeDcjjkkji.exeDbdagg32.exeNaimepkp.exeEfeoedjo.exeNbeedh32.exeFmdbnnlj.exeGpggei32.exeNbhkmg32.exeFmaqgaae.exeIecdji32.exeHqkmplen.exeIcncgf32.exeLjplkonl.exeBbfnchfb.exeAddfkeid.exeBomlppdb.exeIocioq32.exeLffmpp32.exeLekjal32.exeOhengmcf.exeBaqhapdj.exeNikkkn32.exeGcjmmdbf.exeJcnoejch.exeBdaojbjf.exeJacibm32.exeMdmmhn32.exeDhgccbhp.exeFijnabef.exeFdpgph32.exeNndemg32.exeFedfgejh.exeMmmnkglp.exeIiqldc32.exeHhkopj32.exeHjaeba32.exeKhnapkjg.exeNqjaeeog.exePmjaohol.exeOodjjign.exeClilmbhd.exeDgqion32.exeMkdffoij.exeCiagojda.exeDcdkef32.exeEemnnn32.exeGlnhjjml.exeAmgjnepn.exeBedamd32.exeKgnkci32.exeDcbnpgkh.exeHalcmn32.exeIokfjf32.exeAlmihjlj.exedescription ioc process File created C:\Windows\SysWOW64\Mpnngi32.exe Meemgk32.exe File created C:\Windows\SysWOW64\Lmmbhhfg.dll Dilapopb.exe File created C:\Windows\SysWOW64\Kllhoh32.dll Noohlkpc.exe File created C:\Windows\SysWOW64\Olcdph32.dll Ahqkocmm.exe File opened for modification C:\Windows\SysWOW64\Fbimkpmm.exe Fiqibj32.exe File created C:\Windows\SysWOW64\Gkpakq32.exe Ggbieb32.exe File opened for modification C:\Windows\SysWOW64\Dhgccbhp.exe Dcjjkkji.exe File created C:\Windows\SysWOW64\Dgqion32.exe Dbdagg32.exe File created C:\Windows\SysWOW64\Nommodjj.exe Naimepkp.exe File opened for modification C:\Windows\SysWOW64\Egflml32.exe Efeoedjo.exe File opened for modification C:\Windows\SysWOW64\Ngbmlo32.exe Nbeedh32.exe File created C:\Windows\SysWOW64\Fmfocnjg.exe Fmdbnnlj.exe File created C:\Windows\SysWOW64\Gecpnp32.exe Gpggei32.exe File created C:\Windows\SysWOW64\Kcnhjgln.dll Nbhkmg32.exe File created C:\Windows\SysWOW64\Fqdcka32.dll Fmaqgaae.exe File created C:\Windows\SysWOW64\Ckgcql32.dll Iecdji32.exe File created C:\Windows\SysWOW64\Iddiakkl.dll Hqkmplen.exe File created C:\Windows\SysWOW64\Kmkoadgf.dll Icncgf32.exe File created C:\Windows\SysWOW64\Jgnapb32.dll Ljplkonl.exe File opened for modification C:\Windows\SysWOW64\Bdfjnkne.exe Bbfnchfb.exe File opened for modification C:\Windows\SysWOW64\Aiaoclgl.exe Addfkeid.exe File created C:\Windows\SysWOW64\Pklmdamd.dll Bomlppdb.exe File opened for modification C:\Windows\SysWOW64\Ioefdpne.exe Iocioq32.exe File created C:\Windows\SysWOW64\Nlqiie32.dll Lffmpp32.exe File created C:\Windows\SysWOW64\Chobpcbd.dll Lekjal32.exe File opened for modification C:\Windows\SysWOW64\Ooofcg32.exe Ohengmcf.exe File created C:\Windows\SysWOW64\Lpqafeln.dll Baqhapdj.exe File created C:\Windows\SysWOW64\Alkjpb32.dll Nikkkn32.exe File created C:\Windows\SysWOW64\Ngbmlo32.exe Nbeedh32.exe File created C:\Windows\SysWOW64\Pblmdj32.dll Gcjmmdbf.exe File created C:\Windows\SysWOW64\Jjhgbd32.exe Jcnoejch.exe File created C:\Windows\SysWOW64\Bnicbh32.exe Bdaojbjf.exe File opened for modification C:\Windows\SysWOW64\Jkimpfmg.exe Jacibm32.exe File created C:\Windows\SysWOW64\Qgfnod32.dll Mdmmhn32.exe File created C:\Windows\SysWOW64\Fcphaglh.dll Dhgccbhp.exe File opened for modification C:\Windows\SysWOW64\Nommodjj.exe Naimepkp.exe File created C:\Windows\SysWOW64\Egflml32.exe Efeoedjo.exe File created C:\Windows\SysWOW64\Pdfdbg32.dll Fijnabef.exe File opened for modification C:\Windows\SysWOW64\Gpggei32.exe Fdpgph32.exe File opened for modification C:\Windows\SysWOW64\Ncamen32.exe Nndemg32.exe File opened for modification C:\Windows\SysWOW64\Fhjhdp32.exe Fedfgejh.exe File created C:\Windows\SysWOW64\Mbjfcnkg.exe Mmmnkglp.exe File created C:\Windows\SysWOW64\Ijphofem.exe Iiqldc32.exe File opened for modification C:\Windows\SysWOW64\Hadcipbi.exe Hhkopj32.exe File created C:\Windows\SysWOW64\Jfmgba32.dll Hjaeba32.exe File created C:\Windows\SysWOW64\Kageia32.exe Khnapkjg.exe File created C:\Windows\SysWOW64\Fdapnj32.dll Nqjaeeog.exe File opened for modification C:\Windows\SysWOW64\Pmmneg32.exe Pmjaohol.exe File created C:\Windows\SysWOW64\Ofobgc32.exe Oodjjign.exe File created C:\Windows\SysWOW64\Cpgecq32.exe Clilmbhd.exe File opened for modification C:\Windows\SysWOW64\Dgqion32.exe Dbdagg32.exe File created C:\Windows\SysWOW64\Dqinhcoc.exe Dgqion32.exe File created C:\Windows\SysWOW64\Ofglaipf.dll Mkdffoij.exe File created C:\Windows\SysWOW64\Mhqnpqce.dll Ciagojda.exe File created C:\Windows\SysWOW64\Dmmpolof.exe Dcdkef32.exe File opened for modification C:\Windows\SysWOW64\Ebqngb32.exe Eemnnn32.exe File opened for modification C:\Windows\SysWOW64\Gcgqgd32.exe Glnhjjml.exe File created C:\Windows\SysWOW64\Ahqkocmm.exe Amgjnepn.exe File opened for modification C:\Windows\SysWOW64\Befnbd32.exe Bedamd32.exe File created C:\Windows\SysWOW64\Nhbcdh32.dll Kgnkci32.exe File created C:\Windows\SysWOW64\Pdjiflem.dll Dcbnpgkh.exe File created C:\Windows\SysWOW64\Hpmlce32.dll Halcmn32.exe File created C:\Windows\SysWOW64\Bgfdgq32.dll Iokfjf32.exe File created C:\Windows\SysWOW64\Ahfgbkpl.exe Almihjlj.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2452 5068 WerFault.exe Opblgehg.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Bqijljfd.exeHjaeba32.exeKfodfh32.exeNommodjj.exeNndgeplo.exeAnogijnb.exeDcjjkkji.exeFqhclqnc.exeNdbile32.exeGkbnap32.exeIgpaec32.exeKabngjla.exeMfpmbf32.exeOckinl32.exeFobkfqpo.exeNlbgkgcc.exeGodaakic.exeApnfno32.exeAdfbpega.exeHcgmfgfd.exeQekbgbpf.exeMmmnkglp.exeMldgbcoe.exeLkgifd32.exeDipjkn32.exeNgbmlo32.exeEfppqoil.exeBklpjlmc.exeCdkkcp32.exeGjjafkpe.exeJhkclc32.exeNbeedh32.exeJahbmlil.exeEepmlf32.exeBjbqmi32.exeHpicbe32.exeKfacdqhf.exeCidddj32.exeLlpoohik.exeNpkdnnfk.exeGkhaooec.exeNcmglp32.exeKoflgf32.exeHhfkihon.exePpipdl32.exeDqinhcoc.exeIjibng32.exeOfilgh32.exeAhfgbkpl.exeCpfmmf32.exeElkofg32.exeOibohdmd.exeGmhbkohm.exeOcefpnom.exeGlnhjjml.exeCcqhdmbc.exeAlmihjlj.exeBaqhapdj.exeLpflkb32.exeBojipjcj.exePildgl32.exeEkpkhkji.exeMkdffoij.exeJkimpfmg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bqijljfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjaeba32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfodfh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nommodjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nndgeplo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anogijnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcjjkkji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fqhclqnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndbile32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkbnap32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igpaec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kabngjla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfpmbf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ockinl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fobkfqpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlbgkgcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Godaakic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apnfno32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adfbpega.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hcgmfgfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qekbgbpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmmnkglp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mldgbcoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkgifd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dipjkn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ngbmlo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efppqoil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bklpjlmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdkkcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjjafkpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jhkclc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbeedh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jahbmlil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eepmlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjbqmi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpicbe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfacdqhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cidddj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llpoohik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npkdnnfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkhaooec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncmglp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Koflgf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhfkihon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppipdl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dqinhcoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijibng32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofilgh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahfgbkpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpfmmf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Elkofg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oibohdmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmhbkohm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocefpnom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glnhjjml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccqhdmbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Almihjlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baqhapdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpflkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bojipjcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pildgl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekpkhkji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkdffoij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkimpfmg.exe -
Modifies registry class 64 IoCs
Processes:
Iqllghon.exeMagdam32.exeOgmkne32.exeJhkclc32.exeNldcagaq.exeNcmglp32.exeDhgccbhp.exeHpicbe32.exeCnlnpd32.exeGpjkeoha.exeAklabp32.exeEkghcq32.exeGbhcpmkm.exeKmklak32.exeBaefnmml.exeImggplgm.exeDcjjkkji.exeNfjildbp.exeAbdeoe32.exeEgflml32.exeKkdnhi32.exeAhchdb32.exeLalhgogb.exeBaqhapdj.exeLdjbkb32.exeAddfkeid.exeGmqkml32.exeIeofkp32.exeOhbikbkb.exeFmohco32.exeLjplkonl.exeGieaef32.exeMflgih32.exeDjicmk32.exeAjamfh32.exeGlnhjjml.exeNdggib32.exeNinhamne.exeOcclcg32.exeGhpkbn32.exeLgngbmjp.exeOehgjfhi.exePlbkfdba.exeIcbkhnan.exeBcpimq32.exeJkopndcb.exeCabaec32.exeJhfjadim.exeBqijljfd.exeDcdkef32.exeJjhgbd32.exeElcpbigl.exeMlolnllf.exeMmmnkglp.exeMjqmig32.exePehebbbh.exeMmdkfmjc.exeDgqion32.exeNdlbmk32.exePbomli32.exeJacibm32.exeNpkdnnfk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iqllghon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Magdam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kegmaomi.dll" Ogmkne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jhkclc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nldcagaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ncmglp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhgccbhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hpicbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cnlnpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apidjmhc.dll" Gpjkeoha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aklabp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekghcq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gbhcpmkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kmklak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Baefnmml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Imggplgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikggmnae.dll" Dcjjkkji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nfjildbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfhenelp.dll" Cnlnpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Egflml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aehlpleg.dll" Kkdnhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ahchdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lalhgogb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Baqhapdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhmcaf32.dll" Ldjbkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Addfkeid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gmqkml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkbgjc32.dll" Iqllghon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ieofkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhigkm32.dll" Ohbikbkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocfqdk32.dll" Fmohco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ljplkonl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aegqok32.dll" Gieaef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mflgih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Djicmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffemqioj.dll" Ajamfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojacgdmh.dll" Glnhjjml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Medefa32.dll" Ndggib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ninhamne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mafalppn.dll" Occlcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ghpkbn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lgngbmjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lffkcfke.dll" Oehgjfhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hqgggnne.dll" Plbkfdba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Icbkhnan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ginaep32.dll" Bcpimq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jkopndcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jhfjadim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bqijljfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dcdkef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jjhgbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpoggldm.dll" Elcpbigl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlglpa32.dll" Mlolnllf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mmmnkglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mjqmig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pehebbbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjpjcm32.dll" Mmdkfmjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dgqion32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ndlbmk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pbomli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jacibm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfdbgnmd.dll" Npkdnnfk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exeBqijljfd.exeBmpkqklh.exeCpfmmf32.exeCjonncab.exeCegoqlof.exeDilapopb.exeDipjkn32.exeElcpbigl.exeEdoefl32.exeEcfnmh32.exeFgfdie32.exeFhjmfnok.exeFennoa32.exeGdcjpncm.exeGpjkeoha.exedescription pid process target process PID 1116 wrote to memory of 2000 1116 a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe Bqijljfd.exe PID 1116 wrote to memory of 2000 1116 a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe Bqijljfd.exe PID 1116 wrote to memory of 2000 1116 a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe Bqijljfd.exe PID 1116 wrote to memory of 2000 1116 a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe Bqijljfd.exe PID 2000 wrote to memory of 2456 2000 Bqijljfd.exe Bmpkqklh.exe PID 2000 wrote to memory of 2456 2000 Bqijljfd.exe Bmpkqklh.exe PID 2000 wrote to memory of 2456 2000 Bqijljfd.exe Bmpkqklh.exe PID 2000 wrote to memory of 2456 2000 Bqijljfd.exe Bmpkqklh.exe PID 2456 wrote to memory of 2940 2456 Bmpkqklh.exe Cpfmmf32.exe PID 2456 wrote to memory of 2940 2456 Bmpkqklh.exe Cpfmmf32.exe PID 2456 wrote to memory of 2940 2456 Bmpkqklh.exe Cpfmmf32.exe PID 2456 wrote to memory of 2940 2456 Bmpkqklh.exe Cpfmmf32.exe PID 2940 wrote to memory of 3012 2940 Cpfmmf32.exe Cjonncab.exe PID 2940 wrote to memory of 3012 2940 Cpfmmf32.exe Cjonncab.exe PID 2940 wrote to memory of 3012 2940 Cpfmmf32.exe Cjonncab.exe PID 2940 wrote to memory of 3012 2940 Cpfmmf32.exe Cjonncab.exe PID 3012 wrote to memory of 2668 3012 Cjonncab.exe Cegoqlof.exe PID 3012 wrote to memory of 2668 3012 Cjonncab.exe Cegoqlof.exe PID 3012 wrote to memory of 2668 3012 Cjonncab.exe Cegoqlof.exe PID 3012 wrote to memory of 2668 3012 Cjonncab.exe Cegoqlof.exe PID 2668 wrote to memory of 772 2668 Cegoqlof.exe Dilapopb.exe PID 2668 wrote to memory of 772 2668 Cegoqlof.exe Dilapopb.exe PID 2668 wrote to memory of 772 2668 Cegoqlof.exe Dilapopb.exe PID 2668 wrote to memory of 772 2668 Cegoqlof.exe Dilapopb.exe PID 772 wrote to memory of 1312 772 Dilapopb.exe Dipjkn32.exe PID 772 wrote to memory of 1312 772 Dilapopb.exe Dipjkn32.exe PID 772 wrote to memory of 1312 772 Dilapopb.exe Dipjkn32.exe PID 772 wrote to memory of 1312 772 Dilapopb.exe Dipjkn32.exe PID 1312 wrote to memory of 2708 1312 Dipjkn32.exe Elcpbigl.exe PID 1312 wrote to memory of 2708 1312 Dipjkn32.exe Elcpbigl.exe PID 1312 wrote to memory of 2708 1312 Dipjkn32.exe Elcpbigl.exe PID 1312 wrote to memory of 2708 1312 Dipjkn32.exe Elcpbigl.exe PID 2708 wrote to memory of 384 2708 Elcpbigl.exe Edoefl32.exe PID 2708 wrote to memory of 384 2708 Elcpbigl.exe Edoefl32.exe PID 2708 wrote to memory of 384 2708 Elcpbigl.exe Edoefl32.exe PID 2708 wrote to memory of 384 2708 Elcpbigl.exe Edoefl32.exe PID 384 wrote to memory of 2868 384 Edoefl32.exe Ecfnmh32.exe PID 384 wrote to memory of 2868 384 Edoefl32.exe Ecfnmh32.exe PID 384 wrote to memory of 2868 384 Edoefl32.exe Ecfnmh32.exe PID 384 wrote to memory of 2868 384 Edoefl32.exe Ecfnmh32.exe PID 2868 wrote to memory of 1460 2868 Ecfnmh32.exe Fgfdie32.exe PID 2868 wrote to memory of 1460 2868 Ecfnmh32.exe Fgfdie32.exe PID 2868 wrote to memory of 1460 2868 Ecfnmh32.exe Fgfdie32.exe PID 2868 wrote to memory of 1460 2868 Ecfnmh32.exe Fgfdie32.exe PID 1460 wrote to memory of 2404 1460 Fgfdie32.exe Fhjmfnok.exe PID 1460 wrote to memory of 2404 1460 Fgfdie32.exe Fhjmfnok.exe PID 1460 wrote to memory of 2404 1460 Fgfdie32.exe Fhjmfnok.exe PID 1460 wrote to memory of 2404 1460 Fgfdie32.exe Fhjmfnok.exe PID 2404 wrote to memory of 2344 2404 Fhjmfnok.exe Fennoa32.exe PID 2404 wrote to memory of 2344 2404 Fhjmfnok.exe Fennoa32.exe PID 2404 wrote to memory of 2344 2404 Fhjmfnok.exe Fennoa32.exe PID 2404 wrote to memory of 2344 2404 Fhjmfnok.exe Fennoa32.exe PID 2344 wrote to memory of 2252 2344 Fennoa32.exe Gdcjpncm.exe PID 2344 wrote to memory of 2252 2344 Fennoa32.exe Gdcjpncm.exe PID 2344 wrote to memory of 2252 2344 Fennoa32.exe Gdcjpncm.exe PID 2344 wrote to memory of 2252 2344 Fennoa32.exe Gdcjpncm.exe PID 2252 wrote to memory of 3052 2252 Gdcjpncm.exe Gpjkeoha.exe PID 2252 wrote to memory of 3052 2252 Gdcjpncm.exe Gpjkeoha.exe PID 2252 wrote to memory of 3052 2252 Gdcjpncm.exe Gpjkeoha.exe PID 2252 wrote to memory of 3052 2252 Gdcjpncm.exe Gpjkeoha.exe PID 3052 wrote to memory of 1804 3052 Gpjkeoha.exe Godaakic.exe PID 3052 wrote to memory of 1804 3052 Gpjkeoha.exe Godaakic.exe PID 3052 wrote to memory of 1804 3052 Gpjkeoha.exe Godaakic.exe PID 3052 wrote to memory of 1804 3052 Gpjkeoha.exe Godaakic.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe"C:\Users\Admin\AppData\Local\Temp\a76b5cfac8a178308d712a3c1192c8e231230dee6a6be23d5c4cb42ded49e91e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\Bqijljfd.exeC:\Windows\system32\Bqijljfd.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\Bmpkqklh.exeC:\Windows\system32\Bmpkqklh.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\Cpfmmf32.exeC:\Windows\system32\Cpfmmf32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\Cjonncab.exeC:\Windows\system32\Cjonncab.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\Cegoqlof.exeC:\Windows\system32\Cegoqlof.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Dilapopb.exeC:\Windows\system32\Dilapopb.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\Dipjkn32.exeC:\Windows\system32\Dipjkn32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\Elcpbigl.exeC:\Windows\system32\Elcpbigl.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Edoefl32.exeC:\Windows\system32\Edoefl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Ecfnmh32.exeC:\Windows\system32\Ecfnmh32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Fgfdie32.exeC:\Windows\system32\Fgfdie32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\Fhjmfnok.exeC:\Windows\system32\Fhjmfnok.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Fennoa32.exeC:\Windows\system32\Fennoa32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Gdcjpncm.exeC:\Windows\system32\Gdcjpncm.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Gpjkeoha.exeC:\Windows\system32\Gpjkeoha.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\Godaakic.exeC:\Windows\system32\Godaakic.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\Gmhbkohm.exeC:\Windows\system32\Gmhbkohm.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\Hegpjaac.exeC:\Windows\system32\Hegpjaac.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780 -
C:\Windows\SysWOW64\Hnpdcf32.exeC:\Windows\system32\Hnpdcf32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:676 -
C:\Windows\SysWOW64\Ijibng32.exeC:\Windows\system32\Ijibng32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1212 -
C:\Windows\SysWOW64\Ieofkp32.exeC:\Windows\system32\Ieofkp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Iiqldc32.exeC:\Windows\system32\Iiqldc32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2368 -
C:\Windows\SysWOW64\Ijphofem.exeC:\Windows\system32\Ijphofem.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012 -
C:\Windows\SysWOW64\Jbnjhh32.exeC:\Windows\system32\Jbnjhh32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:872 -
C:\Windows\SysWOW64\Jhahanie.exeC:\Windows\system32\Jhahanie.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2536 -
C:\Windows\SysWOW64\Jfgebjnm.exeC:\Windows\system32\Jfgebjnm.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Windows\SysWOW64\Kkdnhi32.exeC:\Windows\system32\Kkdnhi32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Kgnkci32.exeC:\Windows\system32\Kgnkci32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\Kljdkpfl.exeC:\Windows\system32\Kljdkpfl.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764 -
C:\Windows\SysWOW64\Llomfpag.exeC:\Windows\system32\Llomfpag.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932 -
C:\Windows\SysWOW64\Ldjbkb32.exeC:\Windows\system32\Ldjbkb32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2652 -
C:\Windows\SysWOW64\Lnecigcp.exeC:\Windows\system32\Lnecigcp.exe33⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\Lgngbmjp.exeC:\Windows\system32\Lgngbmjp.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:656 -
C:\Windows\SysWOW64\Lpflkb32.exeC:\Windows\system32\Lpflkb32.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\Mjqmig32.exeC:\Windows\system32\Mjqmig32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\Mkdffoij.exeC:\Windows\system32\Mkdffoij.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\Mflgih32.exeC:\Windows\system32\Mflgih32.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:2476 -
C:\Windows\SysWOW64\Mnglnj32.exeC:\Windows\system32\Mnglnj32.exe39⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Nbeedh32.exeC:\Windows\system32\Nbeedh32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1100 -
C:\Windows\SysWOW64\Ngbmlo32.exeC:\Windows\system32\Ngbmlo32.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\SysWOW64\Nqjaeeog.exeC:\Windows\system32\Nqjaeeog.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:756 -
C:\Windows\SysWOW64\Nqmnjd32.exeC:\Windows\system32\Nqmnjd32.exe43⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\Nfigck32.exeC:\Windows\system32\Nfigck32.exe44⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\Ncmglp32.exeC:\Windows\system32\Ncmglp32.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:828 -
C:\Windows\SysWOW64\Nmflee32.exeC:\Windows\system32\Nmflee32.exe46⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\Oeaqig32.exeC:\Windows\system32\Oeaqig32.exe47⤵
- Executes dropped EXE
PID:1232 -
C:\Windows\SysWOW64\Oecmogln.exeC:\Windows\system32\Oecmogln.exe48⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\Ohbikbkb.exeC:\Windows\system32\Ohbikbkb.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:1668 -
C:\Windows\SysWOW64\Oefjdgjk.exeC:\Windows\system32\Oefjdgjk.exe50⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\Oehgjfhi.exeC:\Windows\system32\Oehgjfhi.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Oejcpf32.exeC:\Windows\system32\Oejcpf32.exe52⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\Ohipla32.exeC:\Windows\system32\Ohipla32.exe53⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Pfnmmn32.exeC:\Windows\system32\Pfnmmn32.exe54⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\Pmjaohol.exeC:\Windows\system32\Pmjaohol.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\Pmmneg32.exeC:\Windows\system32\Pmmneg32.exe56⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Plbkfdba.exeC:\Windows\system32\Plbkfdba.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:2840 -
C:\Windows\SysWOW64\Paocnkph.exeC:\Windows\system32\Paocnkph.exe58⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\Qoeamo32.exeC:\Windows\system32\Qoeamo32.exe59⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Aklabp32.exeC:\Windows\system32\Aklabp32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:936 -
C:\Windows\SysWOW64\Addfkeid.exeC:\Windows\system32\Addfkeid.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1520 -
C:\Windows\SysWOW64\Aiaoclgl.exeC:\Windows\system32\Aiaoclgl.exe62⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\Adfbpega.exeC:\Windows\system32\Adfbpega.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\Anogijnb.exeC:\Windows\system32\Anogijnb.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\Adipfd32.exeC:\Windows\system32\Adipfd32.exe65⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\Anadojlo.exeC:\Windows\system32\Anadojlo.exe66⤵PID:2092
-
C:\Windows\SysWOW64\Bcpimq32.exeC:\Windows\system32\Bcpimq32.exe67⤵
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\Blinefnd.exeC:\Windows\system32\Blinefnd.exe68⤵PID:2108
-
C:\Windows\SysWOW64\Baefnmml.exeC:\Windows\system32\Baefnmml.exe69⤵
- Modifies registry class
PID:1720 -
C:\Windows\SysWOW64\Bhonjg32.exeC:\Windows\system32\Bhonjg32.exe70⤵PID:2768
-
C:\Windows\SysWOW64\Bnlgbnbp.exeC:\Windows\system32\Bnlgbnbp.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2780 -
C:\Windows\SysWOW64\Bhbkpgbf.exeC:\Windows\system32\Bhbkpgbf.exe72⤵PID:3024
-
C:\Windows\SysWOW64\Bolcma32.exeC:\Windows\system32\Bolcma32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1580 -
C:\Windows\SysWOW64\Cogfqe32.exeC:\Windows\system32\Cogfqe32.exe74⤵PID:2688
-
C:\Windows\SysWOW64\Ciagojda.exeC:\Windows\system32\Ciagojda.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\Cidddj32.exeC:\Windows\system32\Cidddj32.exe76⤵
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\Dpnladjl.exeC:\Windows\system32\Dpnladjl.exe77⤵PID:1892
-
C:\Windows\SysWOW64\Difqji32.exeC:\Windows\system32\Difqji32.exe78⤵PID:1628
-
C:\Windows\SysWOW64\Demaoj32.exeC:\Windows\system32\Demaoj32.exe79⤵PID:2224
-
C:\Windows\SysWOW64\Djjjga32.exeC:\Windows\system32\Djjjga32.exe80⤵PID:1052
-
C:\Windows\SysWOW64\Dcbnpgkh.exeC:\Windows\system32\Dcbnpgkh.exe81⤵
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\Dmkcil32.exeC:\Windows\system32\Dmkcil32.exe82⤵PID:1788
-
C:\Windows\SysWOW64\Dcdkef32.exeC:\Windows\system32\Dcdkef32.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Dmmpolof.exeC:\Windows\system32\Dmmpolof.exe84⤵PID:2116
-
C:\Windows\SysWOW64\Efedga32.exeC:\Windows\system32\Efedga32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1188 -
C:\Windows\SysWOW64\Emaijk32.exeC:\Windows\system32\Emaijk32.exe86⤵PID:2200
-
C:\Windows\SysWOW64\Eemnnn32.exeC:\Windows\system32\Eemnnn32.exe87⤵
- Drops file in System32 directory
PID:2776 -
C:\Windows\SysWOW64\Ebqngb32.exeC:\Windows\system32\Ebqngb32.exe88⤵PID:2784
-
C:\Windows\SysWOW64\Epeoaffo.exeC:\Windows\system32\Epeoaffo.exe89⤵PID:1648
-
C:\Windows\SysWOW64\Eimcjl32.exeC:\Windows\system32\Eimcjl32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2832 -
C:\Windows\SysWOW64\Elkofg32.exeC:\Windows\system32\Elkofg32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\Fhbpkh32.exeC:\Windows\system32\Fhbpkh32.exe92⤵PID:2396
-
C:\Windows\SysWOW64\Fmohco32.exeC:\Windows\system32\Fmohco32.exe93⤵
- Modifies registry class
PID:1288 -
C:\Windows\SysWOW64\Fggmldfp.exeC:\Windows\system32\Fggmldfp.exe94⤵PID:432
-
C:\Windows\SysWOW64\Famaimfe.exeC:\Windows\system32\Famaimfe.exe95⤵PID:1964
-
C:\Windows\SysWOW64\Fmdbnnlj.exeC:\Windows\system32\Fmdbnnlj.exe96⤵
- Drops file in System32 directory
PID:612 -
C:\Windows\SysWOW64\Fmfocnjg.exeC:\Windows\system32\Fmfocnjg.exe97⤵PID:1660
-
C:\Windows\SysWOW64\Fdpgph32.exeC:\Windows\system32\Fdpgph32.exe98⤵
- Drops file in System32 directory
PID:856 -
C:\Windows\SysWOW64\Gpggei32.exeC:\Windows\system32\Gpggei32.exe99⤵
- Drops file in System32 directory
PID:1600 -
C:\Windows\SysWOW64\Gecpnp32.exeC:\Windows\system32\Gecpnp32.exe100⤵PID:1988
-
C:\Windows\SysWOW64\Glnhjjml.exeC:\Windows\system32\Glnhjjml.exe101⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2628 -
C:\Windows\SysWOW64\Gcgqgd32.exeC:\Windows\system32\Gcgqgd32.exe102⤵PID:2288
-
C:\Windows\SysWOW64\Gcjmmdbf.exeC:\Windows\system32\Gcjmmdbf.exe103⤵
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\Gkebafoa.exeC:\Windows\system32\Gkebafoa.exe104⤵PID:2860
-
C:\Windows\SysWOW64\Gncnmane.exeC:\Windows\system32\Gncnmane.exe105⤵PID:1464
-
C:\Windows\SysWOW64\Gockgdeh.exeC:\Windows\system32\Gockgdeh.exe106⤵PID:2100
-
C:\Windows\SysWOW64\Gqdgom32.exeC:\Windows\system32\Gqdgom32.exe107⤵PID:1728
-
C:\Windows\SysWOW64\Hhkopj32.exeC:\Windows\system32\Hhkopj32.exe108⤵
- Drops file in System32 directory
PID:1632 -
C:\Windows\SysWOW64\Hadcipbi.exeC:\Windows\system32\Hadcipbi.exe109⤵PID:2480
-
C:\Windows\SysWOW64\Hdbpekam.exeC:\Windows\system32\Hdbpekam.exe110⤵PID:824
-
C:\Windows\SysWOW64\Hcgmfgfd.exeC:\Windows\system32\Hcgmfgfd.exe111⤵
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\Hjaeba32.exeC:\Windows\system32\Hjaeba32.exe112⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\Hqkmplen.exeC:\Windows\system32\Hqkmplen.exe113⤵
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Hgeelf32.exeC:\Windows\system32\Hgeelf32.exe114⤵PID:2788
-
C:\Windows\SysWOW64\Hiioin32.exeC:\Windows\system32\Hiioin32.exe115⤵PID:2576
-
C:\Windows\SysWOW64\Icncgf32.exeC:\Windows\system32\Icncgf32.exe116⤵
- Drops file in System32 directory
PID:2804 -
C:\Windows\SysWOW64\Imggplgm.exeC:\Windows\system32\Imggplgm.exe117⤵
- Modifies registry class
PID:2836 -
C:\Windows\SysWOW64\Ibcphc32.exeC:\Windows\system32\Ibcphc32.exe118⤵PID:840
-
C:\Windows\SysWOW64\Ikldqile.exeC:\Windows\system32\Ikldqile.exe119⤵PID:2572
-
C:\Windows\SysWOW64\Ibfmmb32.exeC:\Windows\system32\Ibfmmb32.exe120⤵PID:2400
-
C:\Windows\SysWOW64\Igceej32.exeC:\Windows\system32\Igceej32.exe121⤵PID:688
-
C:\Windows\SysWOW64\Ijaaae32.exeC:\Windows\system32\Ijaaae32.exe122⤵PID:836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-