Analysis
-
max time kernel
64s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe
Resource
win10v2004-20241007-en
General
-
Target
52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe
-
Size
243KB
-
MD5
0dcd118843f26068224ae016b71e9f05
-
SHA1
182e20300b158dc1ed293dc02ed4ef39b9c214db
-
SHA256
52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a
-
SHA512
b31cec27950ddc3b827b3cdaae6dce05acffbef80cd48156d6a40afffdf7a0f21e2bf47cfcd0d6dbd15d39924d9ee9da219b7d08c3f5683eb3db7f4a984533a5
-
SSDEEP
6144:cOklbFtxZo+KzwdlU2zlNgwTnAWtlhjQ2:cOkdFPVl5LhDAalhjL
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Glcfgk32.exeMlmjgnaa.exeOhkdfhge.exeAbldccka.exeCedpdpdf.exeDapjdq32.exeMigdig32.exePhhmeehg.exeKcngcp32.exeCkfeic32.exeIeppjclf.exeMagfjebk.exeDgalhgpg.exeGcchgini.exeKkfhglen.exeQcmnaaji.exeMpqjmh32.exeMbginomj.exeBefpkmph.exeAodnfbpm.exeLefikg32.exeNifgekbm.exeOnocon32.exeQdhqpe32.exeFfboohnm.exeHbekojlp.exeInebpgbf.exeJdmjfe32.exeJnjhjj32.exeLpiacp32.exePncljmko.exeQoqhncgp.exeCpejfjha.exeAcadchoo.exeDakpiajj.exeKhcbpa32.exeHagepa32.exeIoheci32.exeEmggflfc.exeJjkiie32.exeMffkgl32.exeDpaqmnap.exeKimlqfeq.exePjofjm32.exeEoajgh32.exeLadpagin.exeNomphm32.exeNdmeecmb.exeMebpakbq.exeIcbkhnan.exeAjapoqmf.exeKdjceb32.exePdigkk32.exeEplmflde.exeCelbik32.exePeeabm32.exeJoekimld.exeIhpgce32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glcfgk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlmjgnaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohkdfhge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abldccka.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cedpdpdf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dapjdq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Migdig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phhmeehg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcngcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckfeic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ieppjclf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Magfjebk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgalhgpg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcchgini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkfhglen.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcmnaaji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpqjmh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbginomj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Befpkmph.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckfeic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aodnfbpm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lefikg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nifgekbm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onocon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdhqpe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffboohnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbekojlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inebpgbf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdmjfe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnjhjj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpiacp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pncljmko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qoqhncgp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpejfjha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acadchoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dakpiajj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khcbpa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hagepa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioheci32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phhmeehg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emggflfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjkiie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mffkgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpaqmnap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kimlqfeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjofjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eoajgh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ladpagin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nomphm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndmeecmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aodnfbpm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mebpakbq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icbkhnan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajapoqmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdjceb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdigkk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eplmflde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Celbik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peeabm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joekimld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcngcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ladpagin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hagepa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihpgce32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Gbcien32.exeGolgon32.exeGbjpem32.exeHadfah32.exeHipkfkgh.exeHghdjn32.exeIaaekl32.exeIhpgce32.exeIqllghon.exeJfmnkn32.exeJfagemej.exeKnohpo32.exeKkciic32.exeKglfcd32.exeLlcehg32.exeLiibgkoo.exeMebpakbq.exeMpqjmh32.exeMkfojakp.exeNeblqoel.exeOapcfo32.exeOjpaeq32.exeOgdaod32.exeOmqjgl32.exePodpoffm.exePgodcich.exePeeabm32.exePalbgn32.exeQmcclolh.exeAbbhje32.exeAcadchoo.exeAbgaeddg.exeAicfgn32.exeAdmgglep.exeBkkioeig.exeBfbjdf32.exeBpjnmlel.exeBmnofp32.exeCapdpcge.exeCodeih32.exeCdcjgnbc.exeCkmbdh32.exeCkpoih32.exeDckcnj32.exeDdjphm32.exeDpaqmnap.exeEhaolpke.exeEdhpaa32.exeEqopfbfn.exeEbnmpemq.exeEmhnqbjo.exeEcbfmm32.exeFphgbn32.exeFfboohnm.exeFmlglb32.exeFcfohlmg.exeFfeldglk.exeFmodaadg.exeFblljhbo.exeFldabn32.exeFbniohpl.exeFhkagonc.exeFbpfeh32.exeGhmnmo32.exepid process 2904 Gbcien32.exe 2780 Golgon32.exe 2848 Gbjpem32.exe 2724 Hadfah32.exe 392 Hipkfkgh.exe 2968 Hghdjn32.exe 384 Iaaekl32.exe 2532 Ihpgce32.exe 2976 Iqllghon.exe 2996 Jfmnkn32.exe 1992 Jfagemej.exe 1664 Knohpo32.exe 932 Kkciic32.exe 2088 Kglfcd32.exe 2456 Llcehg32.exe 1392 Liibgkoo.exe 2272 Mebpakbq.exe 1252 Mpqjmh32.exe 800 Mkfojakp.exe 1632 Neblqoel.exe 1720 Oapcfo32.exe 2576 Ojpaeq32.exe 848 Ogdaod32.exe 1940 Omqjgl32.exe 2160 Podpoffm.exe 2104 Pgodcich.exe 1604 Peeabm32.exe 2920 Palbgn32.exe 2840 Qmcclolh.exe 2732 Abbhje32.exe 1876 Acadchoo.exe 1444 Abgaeddg.exe 1980 Aicfgn32.exe 2364 Admgglep.exe 2112 Bkkioeig.exe 2988 Bfbjdf32.exe 2452 Bpjnmlel.exe 2304 Bmnofp32.exe 2420 Capdpcge.exe 2284 Codeih32.exe 436 Cdcjgnbc.exe 1420 Ckmbdh32.exe 1292 Ckpoih32.exe 2424 Dckcnj32.exe 652 Ddjphm32.exe 1552 Dpaqmnap.exe 952 Ehaolpke.exe 2268 Edhpaa32.exe 2656 Eqopfbfn.exe 2260 Ebnmpemq.exe 2824 Emhnqbjo.exe 1568 Ecbfmm32.exe 2884 Fphgbn32.exe 2876 Ffboohnm.exe 2856 Fmlglb32.exe 1932 Fcfohlmg.exe 2616 Ffeldglk.exe 2332 Fmodaadg.exe 2924 Fblljhbo.exe 2568 Fldabn32.exe 464 Fbniohpl.exe 2428 Fhkagonc.exe 1812 Fbpfeh32.exe 1768 Ghmnmo32.exe -
Loads dropped DLL 64 IoCs
Processes:
52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exeGbcien32.exeGolgon32.exeGbjpem32.exeHadfah32.exeHipkfkgh.exeHghdjn32.exeIaaekl32.exeIhpgce32.exeIqllghon.exeJfmnkn32.exeJfagemej.exeKnohpo32.exeKkciic32.exeKglfcd32.exeLlcehg32.exeLiibgkoo.exeMebpakbq.exeMpqjmh32.exeMkfojakp.exeNeblqoel.exeOapcfo32.exeOjpaeq32.exeOgdaod32.exeOmqjgl32.exePodpoffm.exePgodcich.exePeeabm32.exePalbgn32.exeQmcclolh.exeAbbhje32.exeAcadchoo.exepid process 2772 52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe 2772 52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe 2904 Gbcien32.exe 2904 Gbcien32.exe 2780 Golgon32.exe 2780 Golgon32.exe 2848 Gbjpem32.exe 2848 Gbjpem32.exe 2724 Hadfah32.exe 2724 Hadfah32.exe 392 Hipkfkgh.exe 392 Hipkfkgh.exe 2968 Hghdjn32.exe 2968 Hghdjn32.exe 384 Iaaekl32.exe 384 Iaaekl32.exe 2532 Ihpgce32.exe 2532 Ihpgce32.exe 2976 Iqllghon.exe 2976 Iqllghon.exe 2996 Jfmnkn32.exe 2996 Jfmnkn32.exe 1992 Jfagemej.exe 1992 Jfagemej.exe 1664 Knohpo32.exe 1664 Knohpo32.exe 932 Kkciic32.exe 932 Kkciic32.exe 2088 Kglfcd32.exe 2088 Kglfcd32.exe 2456 Llcehg32.exe 2456 Llcehg32.exe 1392 Liibgkoo.exe 1392 Liibgkoo.exe 2272 Mebpakbq.exe 2272 Mebpakbq.exe 1252 Mpqjmh32.exe 1252 Mpqjmh32.exe 800 Mkfojakp.exe 800 Mkfojakp.exe 1632 Neblqoel.exe 1632 Neblqoel.exe 1720 Oapcfo32.exe 1720 Oapcfo32.exe 2576 Ojpaeq32.exe 2576 Ojpaeq32.exe 848 Ogdaod32.exe 848 Ogdaod32.exe 1940 Omqjgl32.exe 1940 Omqjgl32.exe 2160 Podpoffm.exe 2160 Podpoffm.exe 2104 Pgodcich.exe 2104 Pgodcich.exe 1604 Peeabm32.exe 1604 Peeabm32.exe 2920 Palbgn32.exe 2920 Palbgn32.exe 2840 Qmcclolh.exe 2840 Qmcclolh.exe 2732 Abbhje32.exe 2732 Abbhje32.exe 1876 Acadchoo.exe 1876 Acadchoo.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ogdaod32.exeOmqjgl32.exeKfgjdlme.exeLpiacp32.exeNifgekbm.exePncljmko.exeOaqeogll.exeBmldji32.exeJlaeab32.exeLadpagin.exeNbbegl32.exeAicipgqe.exeHlcbfnjk.exeLiboodmk.exeNomphm32.exePkifgpeh.exeGbcien32.exeHagepa32.exeKodghqop.exeMbginomj.exeMemlki32.exeIencdc32.exeOkijhmcm.exeBbimbpld.exeCapdpcge.exeAaikfkgf.exeDkjkcfjc.exeLojjfo32.exeMigdig32.exeJfagemej.exeMpqjmh32.exeMkfojakp.exeAdmgglep.exeCkmbdh32.exeEbnmpemq.exeIcgdcm32.exeLggbmbfc.exeCpejfjha.exeHmgodc32.exeFmodaadg.exeFblljhbo.exeKkckblgq.exeOeegnj32.exeKglfcd32.exeCkpoih32.exeCkfeic32.exeGpeoakhc.exeNkdpmn32.exeAoihaa32.exeCdlmlidp.exeEmggflfc.exeHfodmhbk.exeIoheci32.exeLkfdfo32.exeBmhkojab.exeOlimlf32.exeBpbabf32.exeFipdqmje.exeLffohikd.exeLenioenj.exeQcmnaaji.exeJfmnkn32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Omqjgl32.exe Ogdaod32.exe File created C:\Windows\SysWOW64\Podpoffm.exe Omqjgl32.exe File opened for modification C:\Windows\SysWOW64\Kopnma32.exe Kfgjdlme.exe File opened for modification C:\Windows\SysWOW64\Lefikg32.exe Lpiacp32.exe File opened for modification C:\Windows\SysWOW64\Ogjhnp32.exe Nifgekbm.exe File created C:\Windows\SysWOW64\Cadmjo32.dll Pncljmko.exe File created C:\Windows\SysWOW64\Okijhmcm.exe Oaqeogll.exe File opened for modification C:\Windows\SysWOW64\Bbimbpld.exe Bmldji32.exe File created C:\Windows\SysWOW64\Pjpief32.dll Jlaeab32.exe File created C:\Windows\SysWOW64\Mbginomj.exe Ladpagin.exe File opened for modification C:\Windows\SysWOW64\Nljjqbfp.exe Nbbegl32.exe File opened for modification C:\Windows\SysWOW64\Ajdego32.exe Aicipgqe.exe File created C:\Windows\SysWOW64\Iekgod32.exe Hlcbfnjk.exe File created C:\Windows\SysWOW64\Bpkphm32.dll Liboodmk.exe File created C:\Windows\SysWOW64\Okhbco32.dll Nomphm32.exe File created C:\Windows\SysWOW64\Pngbcldl.exe Pkifgpeh.exe File created C:\Windows\SysWOW64\Ljmdkm32.dll Gbcien32.exe File created C:\Windows\SysWOW64\Hgmoqm32.dll Hagepa32.exe File opened for modification C:\Windows\SysWOW64\Pngbcldl.exe Pkifgpeh.exe File created C:\Windows\SysWOW64\Ijcbdhqk.dll Kodghqop.exe File opened for modification C:\Windows\SysWOW64\Monjcp32.exe Mbginomj.exe File opened for modification C:\Windows\SysWOW64\Nmhqokcq.exe Memlki32.exe File opened for modification C:\Windows\SysWOW64\Ikjlmjmp.exe Iencdc32.exe File opened for modification C:\Windows\SysWOW64\Opebpdad.exe Okijhmcm.exe File created C:\Windows\SysWOW64\Nemfepee.dll Bbimbpld.exe File created C:\Windows\SysWOW64\Amljgema.dll Capdpcge.exe File created C:\Windows\SysWOW64\Ajapoqmf.exe Aaikfkgf.exe File created C:\Windows\SysWOW64\Nlaeee32.dll Dkjkcfjc.exe File created C:\Windows\SysWOW64\Liboodmk.exe Lojjfo32.exe File opened for modification C:\Windows\SysWOW64\Mbpibm32.exe Migdig32.exe File created C:\Windows\SysWOW64\Knohpo32.exe Jfagemej.exe File created C:\Windows\SysWOW64\Fmeefhhi.dll Mpqjmh32.exe File created C:\Windows\SysWOW64\Neblqoel.exe Mkfojakp.exe File created C:\Windows\SysWOW64\Bkkioeig.exe Admgglep.exe File created C:\Windows\SysWOW64\Ckpoih32.exe Ckmbdh32.exe File created C:\Windows\SysWOW64\Emhnqbjo.exe Ebnmpemq.exe File created C:\Windows\SysWOW64\Ciodpf32.dll Icgdcm32.exe File opened for modification C:\Windows\SysWOW64\Lmfgkh32.exe Lggbmbfc.exe File opened for modification C:\Windows\SysWOW64\Cpgglifo.exe Cpejfjha.exe File created C:\Windows\SysWOW64\Dokpie32.dll Hmgodc32.exe File opened for modification C:\Windows\SysWOW64\Fblljhbo.exe Fmodaadg.exe File created C:\Windows\SysWOW64\Fldabn32.exe Fblljhbo.exe File created C:\Windows\SysWOW64\Aonjnmnj.dll Kkckblgq.exe File created C:\Windows\SysWOW64\Ebakdbbk.dll Oeegnj32.exe File created C:\Windows\SysWOW64\Pdleiobf.dll Kglfcd32.exe File created C:\Windows\SysWOW64\Dckcnj32.exe Ckpoih32.exe File opened for modification C:\Windows\SysWOW64\Ckhbnb32.exe Ckfeic32.exe File created C:\Windows\SysWOW64\Facahjoh.dll Gpeoakhc.exe File created C:\Windows\SysWOW64\Mbpibm32.exe Migdig32.exe File opened for modification C:\Windows\SysWOW64\Ndmeecmb.exe Nkdpmn32.exe File opened for modification C:\Windows\SysWOW64\Agdlfd32.exe Aoihaa32.exe File created C:\Windows\SysWOW64\Ooocab32.dll Cdlmlidp.exe File created C:\Windows\SysWOW64\Oaeghhnb.dll Emggflfc.exe File created C:\Windows\SysWOW64\Hjmmcgha.exe Hfodmhbk.exe File opened for modification C:\Windows\SysWOW64\Jjkiie32.exe Ioheci32.exe File created C:\Windows\SysWOW64\Lenioenj.exe Lkfdfo32.exe File created C:\Windows\SysWOW64\Bjlkhn32.exe Bmhkojab.exe File created C:\Windows\SysWOW64\Ffphmc32.dll Olimlf32.exe File opened for modification C:\Windows\SysWOW64\Bepjjn32.exe Bpbabf32.exe File created C:\Windows\SysWOW64\Pnnbagpd.dll Fipdqmje.exe File created C:\Windows\SysWOW64\Ibnqpj32.dll Lffohikd.exe File opened for modification C:\Windows\SysWOW64\Lkhalo32.exe Lenioenj.exe File opened for modification C:\Windows\SysWOW64\Aodnfbpm.exe Qcmnaaji.exe File created C:\Windows\SysWOW64\Jfagemej.exe Jfmnkn32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3140 3108 WerFault.exe Eceimadb.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Gpjilj32.exeGbcien32.exePgodcich.exeOlimlf32.exeFqnfkoen.exeMigdig32.exeMebpakbq.exeMkfojakp.exeOmqjgl32.exeBepjjn32.exeCedpdpdf.exeEhaolpke.exeHehafe32.exeOdfofhic.exeBlibghmm.exeKdqifajl.exeLojjfo32.exeAcbglq32.exeAjdego32.exePnfipm32.exeGjkcod32.exeGegaeabe.exeOkijhmcm.exeOeegnj32.exeQdhqpe32.exe52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exeGbbbjg32.exeKfgjdlme.exeLkhalo32.exeAjapoqmf.exeDkjkcfjc.exeIekgod32.exeAodnfbpm.exeBmhkojab.exeCapdpcge.exeLmfgkh32.exeAbldccka.exeBppdlgjk.exeMbpibm32.exeNljjqbfp.exeJfmnkn32.exeAicfgn32.exeDckcnj32.exeOgjhnp32.exeFldabn32.exeKopnma32.exePqgbah32.exeAjibckpc.exeBjlkhn32.exeQmcclolh.exeKqkalenn.exeKngaig32.exeBkdbab32.exeIcgdcm32.exeKodghqop.exePgjdmc32.exeFipdqmje.exeFcjeakfd.exeAgdlfd32.exeJcgqbq32.exeOnocon32.exeAbbhje32.exeEqopfbfn.exeKkckblgq.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpjilj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgodcich.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olimlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fqnfkoen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Migdig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mebpakbq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkfojakp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omqjgl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bepjjn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cedpdpdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehaolpke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hehafe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odfofhic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blibghmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdqifajl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lojjfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acbglq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajdego32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnfipm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjkcod32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gegaeabe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Okijhmcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oeegnj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qdhqpe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbbbjg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfgjdlme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkhalo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajapoqmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkjkcfjc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iekgod32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aodnfbpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmhkojab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Capdpcge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmfgkh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abldccka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bppdlgjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbpibm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nljjqbfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfmnkn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aicfgn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dckcnj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogjhnp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fldabn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kopnma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqgbah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajibckpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjlkhn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qmcclolh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqkalenn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kngaig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkdbab32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icgdcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kodghqop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgjdmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fipdqmje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcjeakfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agdlfd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcgqbq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onocon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abbhje32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eqopfbfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkckblgq.exe -
Modifies registry class 64 IoCs
Processes:
Bmnofp32.exeFbniohpl.exeKbppdfmk.exeDogpfc32.exeAbbhje32.exeEhaolpke.exeBlnkbg32.exeLkfdfo32.exeNkdpmn32.exeBmoaoikj.exeIaaekl32.exeOmqjgl32.exeEdhpaa32.exeOhkdfhge.exeQdhqpe32.exeAjibckpc.exeDihkimag.exeHghdjn32.exeBfbjdf32.exeInebpgbf.exePjofjm32.exeAbldccka.exeDkcebg32.exeQcmnaaji.exeNeblqoel.exeAbgaeddg.exeFblljhbo.exeLbjjekhl.exeKnohpo32.exeAaikfkgf.exeOheppe32.exePkplgoop.exePeeabm32.exeDdjphm32.exeBepjjn32.exeEhgaknbp.exeKkckblgq.exeBbgplq32.exeMbginomj.exeAgdlfd32.exeBkdbab32.exeFldabn32.exeFbpfeh32.exeHagepa32.exeNomphm32.exeGhmnmo32.exeLefikg32.exePodpoffm.exeQmcclolh.exeIcgdcm32.exeGpjilj32.exeOeegnj32.exeKkfhglen.exeCdcjgnbc.exeKcngcp32.exePqdelh32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmfjgc32.dll" Bmnofp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbniohpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbppdfmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogpfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abbhje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehaolpke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjdhaj32.dll" Blnkbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkfdfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkfdfo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkdpmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmoaoikj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iaaekl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjibmbqj.dll" Omqjgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edhpaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohkdfhge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkdpmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hncklnkp.dll" Qdhqpe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajibckpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bblehg32.dll" Dihkimag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hghdjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpijio32.dll" Bfbjdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Libmacbm.dll" Inebpgbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjofjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abldccka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkcebg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qcmnaaji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjgkgm32.dll" Neblqoel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abgaeddg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fblljhbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbjjekhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmkakd32.dll" Knohpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aaikfkgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oheppe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkplgoop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knohpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npjkgala.dll" Peeabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddjphm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bepjjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaomng32.dll" Ehgaknbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkckblgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbgplq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mbginomj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Agdlfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkdbab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beboid32.dll" Bkdbab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmnofp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fldabn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbpfeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkfmmd32.dll" Abldccka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hagepa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nomphm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpfbjp32.dll" Ghmnmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjchollj.dll" Lefikg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfpegp32.dll" Bepjjn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Podpoffm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qmcclolh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciodpf32.dll" Icgdcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhopbilb.dll" Gpjilj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebakdbbk.dll" Oeegnj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkfhglen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdcjgnbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcngcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqdelh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aaikfkgf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exeGbcien32.exeGolgon32.exeGbjpem32.exeHadfah32.exeHipkfkgh.exeHghdjn32.exeIaaekl32.exeIhpgce32.exeIqllghon.exeJfmnkn32.exeJfagemej.exeKnohpo32.exeKkciic32.exeKglfcd32.exeLlcehg32.exedescription pid process target process PID 2772 wrote to memory of 2904 2772 52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe Gbcien32.exe PID 2772 wrote to memory of 2904 2772 52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe Gbcien32.exe PID 2772 wrote to memory of 2904 2772 52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe Gbcien32.exe PID 2772 wrote to memory of 2904 2772 52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe Gbcien32.exe PID 2904 wrote to memory of 2780 2904 Gbcien32.exe Golgon32.exe PID 2904 wrote to memory of 2780 2904 Gbcien32.exe Golgon32.exe PID 2904 wrote to memory of 2780 2904 Gbcien32.exe Golgon32.exe PID 2904 wrote to memory of 2780 2904 Gbcien32.exe Golgon32.exe PID 2780 wrote to memory of 2848 2780 Golgon32.exe Gbjpem32.exe PID 2780 wrote to memory of 2848 2780 Golgon32.exe Gbjpem32.exe PID 2780 wrote to memory of 2848 2780 Golgon32.exe Gbjpem32.exe PID 2780 wrote to memory of 2848 2780 Golgon32.exe Gbjpem32.exe PID 2848 wrote to memory of 2724 2848 Gbjpem32.exe Hadfah32.exe PID 2848 wrote to memory of 2724 2848 Gbjpem32.exe Hadfah32.exe PID 2848 wrote to memory of 2724 2848 Gbjpem32.exe Hadfah32.exe PID 2848 wrote to memory of 2724 2848 Gbjpem32.exe Hadfah32.exe PID 2724 wrote to memory of 392 2724 Hadfah32.exe Hipkfkgh.exe PID 2724 wrote to memory of 392 2724 Hadfah32.exe Hipkfkgh.exe PID 2724 wrote to memory of 392 2724 Hadfah32.exe Hipkfkgh.exe PID 2724 wrote to memory of 392 2724 Hadfah32.exe Hipkfkgh.exe PID 392 wrote to memory of 2968 392 Hipkfkgh.exe Hghdjn32.exe PID 392 wrote to memory of 2968 392 Hipkfkgh.exe Hghdjn32.exe PID 392 wrote to memory of 2968 392 Hipkfkgh.exe Hghdjn32.exe PID 392 wrote to memory of 2968 392 Hipkfkgh.exe Hghdjn32.exe PID 2968 wrote to memory of 384 2968 Hghdjn32.exe Iaaekl32.exe PID 2968 wrote to memory of 384 2968 Hghdjn32.exe Iaaekl32.exe PID 2968 wrote to memory of 384 2968 Hghdjn32.exe Iaaekl32.exe PID 2968 wrote to memory of 384 2968 Hghdjn32.exe Iaaekl32.exe PID 384 wrote to memory of 2532 384 Iaaekl32.exe Ihpgce32.exe PID 384 wrote to memory of 2532 384 Iaaekl32.exe Ihpgce32.exe PID 384 wrote to memory of 2532 384 Iaaekl32.exe Ihpgce32.exe PID 384 wrote to memory of 2532 384 Iaaekl32.exe Ihpgce32.exe PID 2532 wrote to memory of 2976 2532 Ihpgce32.exe Iqllghon.exe PID 2532 wrote to memory of 2976 2532 Ihpgce32.exe Iqllghon.exe PID 2532 wrote to memory of 2976 2532 Ihpgce32.exe Iqllghon.exe PID 2532 wrote to memory of 2976 2532 Ihpgce32.exe Iqllghon.exe PID 2976 wrote to memory of 2996 2976 Iqllghon.exe Jfmnkn32.exe PID 2976 wrote to memory of 2996 2976 Iqllghon.exe Jfmnkn32.exe PID 2976 wrote to memory of 2996 2976 Iqllghon.exe Jfmnkn32.exe PID 2976 wrote to memory of 2996 2976 Iqllghon.exe Jfmnkn32.exe PID 2996 wrote to memory of 1992 2996 Jfmnkn32.exe Jfagemej.exe PID 2996 wrote to memory of 1992 2996 Jfmnkn32.exe Jfagemej.exe PID 2996 wrote to memory of 1992 2996 Jfmnkn32.exe Jfagemej.exe PID 2996 wrote to memory of 1992 2996 Jfmnkn32.exe Jfagemej.exe PID 1992 wrote to memory of 1664 1992 Jfagemej.exe Knohpo32.exe PID 1992 wrote to memory of 1664 1992 Jfagemej.exe Knohpo32.exe PID 1992 wrote to memory of 1664 1992 Jfagemej.exe Knohpo32.exe PID 1992 wrote to memory of 1664 1992 Jfagemej.exe Knohpo32.exe PID 1664 wrote to memory of 932 1664 Knohpo32.exe Kkciic32.exe PID 1664 wrote to memory of 932 1664 Knohpo32.exe Kkciic32.exe PID 1664 wrote to memory of 932 1664 Knohpo32.exe Kkciic32.exe PID 1664 wrote to memory of 932 1664 Knohpo32.exe Kkciic32.exe PID 932 wrote to memory of 2088 932 Kkciic32.exe Kglfcd32.exe PID 932 wrote to memory of 2088 932 Kkciic32.exe Kglfcd32.exe PID 932 wrote to memory of 2088 932 Kkciic32.exe Kglfcd32.exe PID 932 wrote to memory of 2088 932 Kkciic32.exe Kglfcd32.exe PID 2088 wrote to memory of 2456 2088 Kglfcd32.exe Llcehg32.exe PID 2088 wrote to memory of 2456 2088 Kglfcd32.exe Llcehg32.exe PID 2088 wrote to memory of 2456 2088 Kglfcd32.exe Llcehg32.exe PID 2088 wrote to memory of 2456 2088 Kglfcd32.exe Llcehg32.exe PID 2456 wrote to memory of 1392 2456 Llcehg32.exe Liibgkoo.exe PID 2456 wrote to memory of 1392 2456 Llcehg32.exe Liibgkoo.exe PID 2456 wrote to memory of 1392 2456 Llcehg32.exe Liibgkoo.exe PID 2456 wrote to memory of 1392 2456 Llcehg32.exe Liibgkoo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe"C:\Users\Admin\AppData\Local\Temp\52fca3883dd6bf954f98e6aca60a2a40b28b2d9d315279dd785f99a2a7703a3a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\Gbcien32.exeC:\Windows\system32\Gbcien32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Golgon32.exeC:\Windows\system32\Golgon32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Gbjpem32.exeC:\Windows\system32\Gbjpem32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Hadfah32.exeC:\Windows\system32\Hadfah32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Hipkfkgh.exeC:\Windows\system32\Hipkfkgh.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\Hghdjn32.exeC:\Windows\system32\Hghdjn32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Iaaekl32.exeC:\Windows\system32\Iaaekl32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Ihpgce32.exeC:\Windows\system32\Ihpgce32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\Iqllghon.exeC:\Windows\system32\Iqllghon.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\Jfmnkn32.exeC:\Windows\system32\Jfmnkn32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Jfagemej.exeC:\Windows\system32\Jfagemej.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\Knohpo32.exeC:\Windows\system32\Knohpo32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Kkciic32.exeC:\Windows\system32\Kkciic32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\Kglfcd32.exeC:\Windows\system32\Kglfcd32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Llcehg32.exeC:\Windows\system32\Llcehg32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\Liibgkoo.exeC:\Windows\system32\Liibgkoo.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392 -
C:\Windows\SysWOW64\Mebpakbq.exeC:\Windows\system32\Mebpakbq.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\Mpqjmh32.exeC:\Windows\system32\Mpqjmh32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1252 -
C:\Windows\SysWOW64\Mkfojakp.exeC:\Windows\system32\Mkfojakp.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\Neblqoel.exeC:\Windows\system32\Neblqoel.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Oapcfo32.exeC:\Windows\system32\Oapcfo32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720 -
C:\Windows\SysWOW64\Ojpaeq32.exeC:\Windows\system32\Ojpaeq32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576 -
C:\Windows\SysWOW64\Ogdaod32.exeC:\Windows\system32\Ogdaod32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\Omqjgl32.exeC:\Windows\system32\Omqjgl32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\Podpoffm.exeC:\Windows\system32\Podpoffm.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2160 -
C:\Windows\SysWOW64\Pgodcich.exeC:\Windows\system32\Pgodcich.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\Peeabm32.exeC:\Windows\system32\Peeabm32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1604 -
C:\Windows\SysWOW64\Palbgn32.exeC:\Windows\system32\Palbgn32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920 -
C:\Windows\SysWOW64\Qmcclolh.exeC:\Windows\system32\Qmcclolh.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2840 -
C:\Windows\SysWOW64\Abbhje32.exeC:\Windows\system32\Abbhje32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2732 -
C:\Windows\SysWOW64\Acadchoo.exeC:\Windows\system32\Acadchoo.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1876 -
C:\Windows\SysWOW64\Abgaeddg.exeC:\Windows\system32\Abgaeddg.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:1444 -
C:\Windows\SysWOW64\Aicfgn32.exeC:\Windows\system32\Aicfgn32.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\SysWOW64\Admgglep.exeC:\Windows\system32\Admgglep.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2364 -
C:\Windows\SysWOW64\Bkkioeig.exeC:\Windows\system32\Bkkioeig.exe36⤵
- Executes dropped EXE
PID:2112 -
C:\Windows\SysWOW64\Bfbjdf32.exeC:\Windows\system32\Bfbjdf32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:2988 -
C:\Windows\SysWOW64\Bpjnmlel.exeC:\Windows\system32\Bpjnmlel.exe38⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Bmnofp32.exeC:\Windows\system32\Bmnofp32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Capdpcge.exeC:\Windows\system32\Capdpcge.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\Codeih32.exeC:\Windows\system32\Codeih32.exe41⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Cdcjgnbc.exeC:\Windows\system32\Cdcjgnbc.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:436 -
C:\Windows\SysWOW64\Ckmbdh32.exeC:\Windows\system32\Ckmbdh32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1420 -
C:\Windows\SysWOW64\Ckpoih32.exeC:\Windows\system32\Ckpoih32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1292 -
C:\Windows\SysWOW64\Dckcnj32.exeC:\Windows\system32\Dckcnj32.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\Ddjphm32.exeC:\Windows\system32\Ddjphm32.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:652 -
C:\Windows\SysWOW64\Dpaqmnap.exeC:\Windows\system32\Dpaqmnap.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\Ehaolpke.exeC:\Windows\system32\Ehaolpke.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:952 -
C:\Windows\SysWOW64\Edhpaa32.exeC:\Windows\system32\Edhpaa32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:2268 -
C:\Windows\SysWOW64\Eqopfbfn.exeC:\Windows\system32\Eqopfbfn.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\Ebnmpemq.exeC:\Windows\system32\Ebnmpemq.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\Emhnqbjo.exeC:\Windows\system32\Emhnqbjo.exe52⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Ecbfmm32.exeC:\Windows\system32\Ecbfmm32.exe53⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\Fphgbn32.exeC:\Windows\system32\Fphgbn32.exe54⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\SysWOW64\Ffboohnm.exeC:\Windows\system32\Ffboohnm.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2876 -
C:\Windows\SysWOW64\Fmlglb32.exeC:\Windows\system32\Fmlglb32.exe56⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\Fcfohlmg.exeC:\Windows\system32\Fcfohlmg.exe57⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\Ffeldglk.exeC:\Windows\system32\Ffeldglk.exe58⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\Fmodaadg.exeC:\Windows\system32\Fmodaadg.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2332 -
C:\Windows\SysWOW64\Fblljhbo.exeC:\Windows\system32\Fblljhbo.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Fldabn32.exeC:\Windows\system32\Fldabn32.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2568 -
C:\Windows\SysWOW64\Fbniohpl.exeC:\Windows\system32\Fbniohpl.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:464 -
C:\Windows\SysWOW64\Fhkagonc.exeC:\Windows\system32\Fhkagonc.exe63⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\Fbpfeh32.exeC:\Windows\system32\Fbpfeh32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:1812 -
C:\Windows\SysWOW64\Ghmnmo32.exeC:\Windows\system32\Ghmnmo32.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:1768 -
C:\Windows\SysWOW64\Gjljij32.exeC:\Windows\system32\Gjljij32.exe66⤵PID:1624
-
C:\Windows\SysWOW64\Gbbbjg32.exeC:\Windows\system32\Gbbbjg32.exe67⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\Hbekojlp.exeC:\Windows\system32\Hbekojlp.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1924 -
C:\Windows\SysWOW64\Hehafe32.exeC:\Windows\system32\Hehafe32.exe69⤵
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\Inebpgbf.exeC:\Windows\system32\Inebpgbf.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\Icbkhnan.exeC:\Windows\system32\Icbkhnan.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2940 -
C:\Windows\SysWOW64\Ipfkabpg.exeC:\Windows\system32\Ipfkabpg.exe72⤵PID:1492
-
C:\Windows\SysWOW64\Injlkf32.exeC:\Windows\system32\Injlkf32.exe73⤵PID:2652
-
C:\Windows\SysWOW64\Icgdcm32.exeC:\Windows\system32\Icgdcm32.exe74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\Ijampgde.exeC:\Windows\system32\Ijampgde.exe75⤵PID:2636
-
C:\Windows\SysWOW64\Jlaeab32.exeC:\Windows\system32\Jlaeab32.exe76⤵
- Drops file in System32 directory
PID:1988 -
C:\Windows\SysWOW64\Jdmjfe32.exeC:\Windows\system32\Jdmjfe32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3020 -
C:\Windows\SysWOW64\Jobocn32.exeC:\Windows\system32\Jobocn32.exe78⤵PID:264
-
C:\Windows\SysWOW64\Joekimld.exeC:\Windows\system32\Joekimld.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2056 -
C:\Windows\SysWOW64\Jnjhjj32.exeC:\Windows\system32\Jnjhjj32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2324 -
C:\Windows\SysWOW64\Jcgqbq32.exeC:\Windows\system32\Jcgqbq32.exe81⤵
- System Location Discovery: System Language Discovery
PID:972 -
C:\Windows\SysWOW64\Kqkalenn.exeC:\Windows\system32\Kqkalenn.exe82⤵
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\Kfgjdlme.exeC:\Windows\system32\Kfgjdlme.exe83⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\Kopnma32.exeC:\Windows\system32\Kopnma32.exe84⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\Kcngcp32.exeC:\Windows\system32\Kcngcp32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\Kodghqop.exeC:\Windows\system32\Kodghqop.exe86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\Kimlqfeq.exeC:\Windows\system32\Kimlqfeq.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1936 -
C:\Windows\SysWOW64\Kfaljjdj.exeC:\Windows\system32\Kfaljjdj.exe88⤵PID:888
-
C:\Windows\SysWOW64\Lpiacp32.exeC:\Windows\system32\Lpiacp32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\Lefikg32.exeC:\Windows\system32\Lefikg32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2800 -
C:\Windows\SysWOW64\Lbjjekhl.exeC:\Windows\system32\Lbjjekhl.exe91⤵
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Lggbmbfc.exeC:\Windows\system32\Lggbmbfc.exe92⤵
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\Lmfgkh32.exeC:\Windows\system32\Lmfgkh32.exe93⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\Ladpagin.exeC:\Windows\system32\Ladpagin.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\Mbginomj.exeC:\Windows\system32\Mbginomj.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Monjcp32.exeC:\Windows\system32\Monjcp32.exe96⤵PID:2916
-
C:\Windows\SysWOW64\Memlki32.exeC:\Windows\system32\Memlki32.exe97⤵
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\Nmhqokcq.exeC:\Windows\system32\Nmhqokcq.exe98⤵PID:428
-
C:\Windows\SysWOW64\Nafiej32.exeC:\Windows\system32\Nafiej32.exe99⤵PID:2404
-
C:\Windows\SysWOW64\Nknnnoph.exeC:\Windows\system32\Nknnnoph.exe100⤵PID:1804
-
C:\Windows\SysWOW64\Nickoldp.exeC:\Windows\system32\Nickoldp.exe101⤵PID:1956
-
C:\Windows\SysWOW64\Nifgekbm.exeC:\Windows\system32\Nifgekbm.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1376 -
C:\Windows\SysWOW64\Ogjhnp32.exeC:\Windows\system32\Ogjhnp32.exe103⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\Ohkdfhge.exeC:\Windows\system32\Ohkdfhge.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2580 -
C:\Windows\SysWOW64\Olimlf32.exeC:\Windows\system32\Olimlf32.exe105⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\Oeaael32.exeC:\Windows\system32\Oeaael32.exe106⤵PID:2484
-
C:\Windows\SysWOW64\Odfofhic.exeC:\Windows\system32\Odfofhic.exe107⤵
- System Location Discovery: System Language Discovery
PID:752 -
C:\Windows\SysWOW64\Onocon32.exeC:\Windows\system32\Onocon32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\Pgjdmc32.exeC:\Windows\system32\Pgjdmc32.exe109⤵
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\Pncljmko.exeC:\Windows\system32\Pncljmko.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1912 -
C:\Windows\SysWOW64\Pnfipm32.exeC:\Windows\system32\Pnfipm32.exe111⤵
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Windows\SysWOW64\Pqdelh32.exeC:\Windows\system32\Pqdelh32.exe112⤵
- Modifies registry class
PID:2748 -
C:\Windows\SysWOW64\Pqgbah32.exeC:\Windows\system32\Pqgbah32.exe113⤵
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\Pjofjm32.exeC:\Windows\system32\Pjofjm32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1900 -
C:\Windows\SysWOW64\Pdigkk32.exeC:\Windows\system32\Pdigkk32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1928 -
C:\Windows\SysWOW64\Qoqhncgp.exeC:\Windows\system32\Qoqhncgp.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2620 -
C:\Windows\SysWOW64\Aaikfkgf.exeC:\Windows\system32\Aaikfkgf.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:960 -
C:\Windows\SysWOW64\Ajapoqmf.exeC:\Windows\system32\Ajapoqmf.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\SysWOW64\Abldccka.exeC:\Windows\system32\Abldccka.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Bppdlgjk.exeC:\Windows\system32\Bppdlgjk.exe120⤵
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\SysWOW64\Bpbabf32.exeC:\Windows\system32\Bpbabf32.exe121⤵
- Drops file in System32 directory
PID:568 -
C:\Windows\SysWOW64\Bepjjn32.exeC:\Windows\system32\Bepjjn32.exe122⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-