Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe
Resource
win10v2004-20241007-en
General
-
Target
799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe
-
Size
923KB
-
MD5
c98a8ff00dec7043b03aa35079940304
-
SHA1
a0711ae5ebef5d2111f7b77ffc1c4caa937e38e0
-
SHA256
799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe
-
SHA512
a6bb62b37315ff89087a980ac6136e0c675d4aef598d16772c70f71c4f160a3f1a80042a2a2c3350b6cfed20a53e8326cfbece19750950abb6a54221a4a02f29
-
SSDEEP
12288:SByvNv54B9f01ZmHByvNv5VwLonfBHLqF1Nw5ILonfByvNv5HQ:Zvr4B9f01ZmQvrUENOVvrw
Malware Config
Extracted
berbew
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Omcngamh.exeIdbnmgll.exeNkdndeon.exeAhgofi32.exeDhhhbg32.exeEeojcmfi.exeIegeonpc.exeHjggap32.exeAjmfca32.exeAfcghbgp.exeCggcofkf.exeIhijhpdo.exeCiokijfd.exeIeibdnnp.exeJnagmc32.exeMkacfiga.exePiadma32.exeCapdpcge.exeDkhnmfle.exeMganfp32.exeAdfbpega.exeCbbomjnn.exeLlpoohik.exeBpboinpd.exeNlldmimi.exeManljd32.exeHpjeknfi.exeOaigib32.exeDnpebj32.exeHcblqb32.exeMiapbpmb.exeBdfahaaa.exeBmdefk32.exeGgapbcne.exeNqpmimbe.exeKbkdpnil.exeFjqhef32.exeAiflpm32.exeIjkocg32.exeNndemg32.exeKckhdg32.exeLqgjkbop.exeJfohgepi.exeIoiidfon.exeIlemce32.exeJnbifl32.exeFnkpcd32.exeLchclmla.exeGjdldd32.exePjoklkie.exeQfkelkkd.exeKjpceebh.exeAhpddmia.exeMmndfnpl.exeMjlejl32.exeAjapoqmf.exeBebfpm32.exeJipcbidn.exeNdgbgefh.exeNejkdm32.exeIofhmi32.exePeqhgmdd.exeMbjfcnkg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omcngamh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Idbnmgll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nkdndeon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahgofi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhhhbg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eeojcmfi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iegeonpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hjggap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajmfca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Afcghbgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cggcofkf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihijhpdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ciokijfd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieibdnnp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnagmc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkacfiga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Piadma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Capdpcge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkhnmfle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mganfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Adfbpega.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbbomjnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Llpoohik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpboinpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nlldmimi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Manljd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hpjeknfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oaigib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnpebj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hcblqb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miapbpmb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdfahaaa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmdefk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ggapbcne.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqpmimbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kbkdpnil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fjqhef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aiflpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ijkocg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nndemg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kckhdg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqgjkbop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfohgepi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioiidfon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ilemce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnbifl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnkpcd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lchclmla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gjdldd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjoklkie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qfkelkkd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjpceebh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahpddmia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mmndfnpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjlejl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajapoqmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bebfpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jipcbidn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndgbgefh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nejkdm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iofhmi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llpoohik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Peqhgmdd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbjfcnkg.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Ahgofi32.exeBbbpenco.exeBjmeiq32.exeDhhhbg32.exeDpcmgi32.exeEmifeqid.exeFeggob32.exeFkkfgi32.exeGjdldd32.exeHbnmienj.exeIjkocg32.exeJdflqo32.exeJieaofmp.exeLncfcgeb.exeLngpog32.exeMkipao32.exeNjnmbk32.exeOecmogln.exeObgnhkkh.exeOejcpf32.exePaaddgkj.exePjleclph.exePeefcjlg.exePaocnkph.exeQbnphngk.exeAphjjf32.exeAdfbpega.exeAobpfb32.exeBdfooh32.exeCcpeld32.exeCqdfehii.exeCiokijfd.exeCbjlhpkb.exeDaaenlng.exeDnhbmpkn.exeEmdeok32.exeEeojcmfi.exeEogolc32.exeFkqlgc32.exeFihfnp32.exeFdnjkh32.exeFmfocnjg.exeGmhkin32.exeGgapbcne.exeGiaidnkf.exeGoqnae32.exeGglbfg32.exeHnhgha32.exeHklhae32.exeHddmjk32.exeHjcaha32.exeIocgfhhc.exeInhdgdmk.exeIogpag32.exeIjaaae32.exeIegeonpc.exeIeibdnnp.exeJnagmc32.exeJikhnaao.exeJfohgepi.exeJedehaea.exeJplfkjbd.exeKjeglh32.exeKlecfkff.exepid process 2052 Ahgofi32.exe 1636 Bbbpenco.exe 2140 Bjmeiq32.exe 2900 Dhhhbg32.exe 2660 Dpcmgi32.exe 2632 Emifeqid.exe 2280 Feggob32.exe 1572 Fkkfgi32.exe 756 Gjdldd32.exe 2968 Hbnmienj.exe 1296 Ijkocg32.exe 3012 Jdflqo32.exe 2244 Jieaofmp.exe 2196 Lncfcgeb.exe 1824 Lngpog32.exe 1644 Mkipao32.exe 696 Njnmbk32.exe 1460 Oecmogln.exe 1068 Obgnhkkh.exe 768 Oejcpf32.exe 1116 Paaddgkj.exe 376 Pjleclph.exe 1712 Peefcjlg.exe 1920 Paocnkph.exe 2392 Qbnphngk.exe 1724 Aphjjf32.exe 2476 Adfbpega.exe 2764 Aobpfb32.exe 2252 Bdfooh32.exe 2744 Ccpeld32.exe 2912 Cqdfehii.exe 1144 Ciokijfd.exe 2980 Cbjlhpkb.exe 2692 Daaenlng.exe 1464 Dnhbmpkn.exe 2992 Emdeok32.exe 2984 Eeojcmfi.exe 2160 Eogolc32.exe 3064 Fkqlgc32.exe 956 Fihfnp32.exe 944 Fdnjkh32.exe 1764 Fmfocnjg.exe 1492 Gmhkin32.exe 2464 Ggapbcne.exe 1952 Giaidnkf.exe 1520 Goqnae32.exe 1600 Gglbfg32.exe 2024 Hnhgha32.exe 1080 Hklhae32.exe 2192 Hddmjk32.exe 2468 Hjcaha32.exe 3024 Iocgfhhc.exe 2112 Inhdgdmk.exe 1624 Iogpag32.exe 536 Ijaaae32.exe 2808 Iegeonpc.exe 1388 Ieibdnnp.exe 2212 Jnagmc32.exe 1368 Jikhnaao.exe 1736 Jfohgepi.exe 972 Jedehaea.exe 1684 Jplfkjbd.exe 2404 Kjeglh32.exe 3048 Klecfkff.exe -
Loads dropped DLL 64 IoCs
Processes:
799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exeAhgofi32.exeBbbpenco.exeBjmeiq32.exeDhhhbg32.exeDpcmgi32.exeEmifeqid.exeFeggob32.exeFkkfgi32.exeGjdldd32.exeHbnmienj.exeIjkocg32.exeJdflqo32.exeJieaofmp.exeLncfcgeb.exeLngpog32.exeMkipao32.exeNjnmbk32.exeOecmogln.exeObgnhkkh.exeOejcpf32.exePaaddgkj.exePjleclph.exePeefcjlg.exePaocnkph.exeQbnphngk.exeAphjjf32.exeAdfbpega.exeAobpfb32.exeBdfooh32.exeCcpeld32.exeCqdfehii.exepid process 2572 799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe 2572 799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe 2052 Ahgofi32.exe 2052 Ahgofi32.exe 1636 Bbbpenco.exe 1636 Bbbpenco.exe 2140 Bjmeiq32.exe 2140 Bjmeiq32.exe 2900 Dhhhbg32.exe 2900 Dhhhbg32.exe 2660 Dpcmgi32.exe 2660 Dpcmgi32.exe 2632 Emifeqid.exe 2632 Emifeqid.exe 2280 Feggob32.exe 2280 Feggob32.exe 1572 Fkkfgi32.exe 1572 Fkkfgi32.exe 756 Gjdldd32.exe 756 Gjdldd32.exe 2968 Hbnmienj.exe 2968 Hbnmienj.exe 1296 Ijkocg32.exe 1296 Ijkocg32.exe 3012 Jdflqo32.exe 3012 Jdflqo32.exe 2244 Jieaofmp.exe 2244 Jieaofmp.exe 2196 Lncfcgeb.exe 2196 Lncfcgeb.exe 1824 Lngpog32.exe 1824 Lngpog32.exe 1644 Mkipao32.exe 1644 Mkipao32.exe 696 Njnmbk32.exe 696 Njnmbk32.exe 1460 Oecmogln.exe 1460 Oecmogln.exe 1068 Obgnhkkh.exe 1068 Obgnhkkh.exe 768 Oejcpf32.exe 768 Oejcpf32.exe 1116 Paaddgkj.exe 1116 Paaddgkj.exe 376 Pjleclph.exe 376 Pjleclph.exe 1712 Peefcjlg.exe 1712 Peefcjlg.exe 1920 Paocnkph.exe 1920 Paocnkph.exe 2392 Qbnphngk.exe 2392 Qbnphngk.exe 1724 Aphjjf32.exe 1724 Aphjjf32.exe 2476 Adfbpega.exe 2476 Adfbpega.exe 2764 Aobpfb32.exe 2764 Aobpfb32.exe 2252 Bdfooh32.exe 2252 Bdfooh32.exe 2744 Ccpeld32.exe 2744 Ccpeld32.exe 2912 Cqdfehii.exe 2912 Cqdfehii.exe -
Drops file in System32 directory 64 IoCs
Processes:
Lncfcgeb.exeJplfkjbd.exeMclqqeaq.exeEgcfdn32.exeOejcpf32.exeJipcbidn.exeDhleaq32.exeGplebjbk.exeOlalpdbc.exeFkqlgc32.exeOabplobe.exeKjebjjck.exeAiflpm32.exePcbookpp.exeOcfiif32.exeGhpkbn32.exeBdfooh32.exeEogolc32.exeHddmjk32.exeKlecfkff.exeFfgfancd.exeIkapdqoc.exeBfmjoqoe.exeNndemg32.exeMiapbpmb.exeOmcngamh.exeBdfahaaa.exeMgkbjb32.exeJcaqmkpn.exeMpnkopeh.exeQmbqcf32.exeLiibgkoo.exeKhglkqfj.exeManljd32.exePbomli32.exeKjpceebh.exeJfddkmch.exeEgmbnkie.exeKnjdimdh.exeKngekdnf.exePofldf32.exeKioiffcn.exeMlhmkbhb.exeClilmbhd.exeEgebjmdn.exeGkhaooec.exeCggcofkf.exeFihalb32.exeAgkako32.exeEhkcpc32.exeOdacbpee.exeKkefoc32.exeKmklak32.exeOkhgod32.exePgjdmc32.exeBlnkbg32.exeKomjmk32.exeIjkocg32.exeNljhhi32.exePbhoip32.exedescription ioc process File created C:\Windows\SysWOW64\Bbcafk32.dll Lncfcgeb.exe File created C:\Windows\SysWOW64\Ciqmoj32.dll Jplfkjbd.exe File opened for modification C:\Windows\SysWOW64\Mneaacno.exe Mclqqeaq.exe File opened for modification C:\Windows\SysWOW64\Egebjmdn.exe Egcfdn32.exe File created C:\Windows\SysWOW64\Kalhln32.dll Oejcpf32.exe File opened for modification C:\Windows\SysWOW64\Jfddkmch.exe Jipcbidn.exe File created C:\Windows\SysWOW64\Dcbjni32.exe Dhleaq32.exe File created C:\Windows\SysWOW64\Ejlgciom.dll Gplebjbk.exe File opened for modification C:\Windows\SysWOW64\Ockdmn32.exe Olalpdbc.exe File created C:\Windows\SysWOW64\Fihfnp32.exe Fkqlgc32.exe File created C:\Windows\SysWOW64\Ocfiif32.exe Oabplobe.exe File opened for modification C:\Windows\SysWOW64\Kimlqfeq.exe Kjebjjck.exe File created C:\Windows\SysWOW64\Bmdefk32.exe Aiflpm32.exe File created C:\Windows\SysWOW64\Qpdhegcc.dll Pcbookpp.exe File created C:\Windows\SysWOW64\Ndmdqcnk.dll Oabplobe.exe File opened for modification C:\Windows\SysWOW64\Ojpaeq32.exe Ocfiif32.exe File opened for modification C:\Windows\SysWOW64\Gahpkd32.exe Ghpkbn32.exe File created C:\Windows\SysWOW64\Qhihii32.dll Bdfooh32.exe File created C:\Windows\SysWOW64\Ljdpbj32.dll Eogolc32.exe File opened for modification C:\Windows\SysWOW64\Hjcaha32.exe Hddmjk32.exe File created C:\Windows\SysWOW64\Hbppfnao.dll Klecfkff.exe File opened for modification C:\Windows\SysWOW64\Fbpclofe.exe Ffgfancd.exe File opened for modification C:\Windows\SysWOW64\Jnbifl32.exe Ikapdqoc.exe File opened for modification C:\Windows\SysWOW64\Bebfpm32.exe Bfmjoqoe.exe File created C:\Windows\SysWOW64\Dcdeed32.dll Nndemg32.exe File opened for modification C:\Windows\SysWOW64\Mclqqeaq.exe Miapbpmb.exe File created C:\Windows\SysWOW64\Pmpigl32.dll Omcngamh.exe File created C:\Windows\SysWOW64\Dilmaf32.dll Bdfahaaa.exe File opened for modification C:\Windows\SysWOW64\Mgmoob32.exe Mgkbjb32.exe File opened for modification C:\Windows\SysWOW64\Jllakpdk.exe Jcaqmkpn.exe File opened for modification C:\Windows\SysWOW64\Mkcplien.exe Mpnkopeh.exe File opened for modification C:\Windows\SysWOW64\Qfkelkkd.exe Qmbqcf32.exe File opened for modification C:\Windows\SysWOW64\Mmndfnpl.exe Liibgkoo.exe File created C:\Windows\SysWOW64\Knddcg32.exe Khglkqfj.exe File created C:\Windows\SysWOW64\Pfgmna32.dll Manljd32.exe File created C:\Windows\SysWOW64\Djaelqba.dll Pbomli32.exe File opened for modification C:\Windows\SysWOW64\Llpoohik.exe Kjpceebh.exe File created C:\Windows\SysWOW64\Mclqqeaq.exe Miapbpmb.exe File created C:\Windows\SysWOW64\Kbkdpnil.exe Jfddkmch.exe File created C:\Windows\SysWOW64\Hbpkaopd.dll Egmbnkie.exe File created C:\Windows\SysWOW64\Oefkcp32.dll Knjdimdh.exe File created C:\Windows\SysWOW64\Najeid32.dll Kngekdnf.exe File created C:\Windows\SysWOW64\Peeabm32.exe Pofldf32.exe File opened for modification C:\Windows\SysWOW64\Lmckeidj.exe Kioiffcn.exe File created C:\Windows\SysWOW64\Nepach32.exe Mlhmkbhb.exe File created C:\Windows\SysWOW64\Qaemlqhb.dll Clilmbhd.exe File opened for modification C:\Windows\SysWOW64\Efmlqigc.exe Egebjmdn.exe File created C:\Windows\SysWOW64\Cjqkgfdn.dll Gkhaooec.exe File created C:\Windows\SysWOW64\Capdpcge.exe Cggcofkf.exe File created C:\Windows\SysWOW64\Kioiffcn.exe Knjdimdh.exe File created C:\Windows\SysWOW64\Mkcplien.exe Mpnkopeh.exe File created C:\Windows\SysWOW64\Ebgahgaj.dll Fihalb32.exe File created C:\Windows\SysWOW64\Bkhjamcf.exe Agkako32.exe File created C:\Windows\SysWOW64\Emgkhj32.exe Ehkcpc32.exe File created C:\Windows\SysWOW64\Oknhdjko.exe Odacbpee.exe File created C:\Windows\SysWOW64\Qmpebb32.dll Kkefoc32.exe File created C:\Windows\SysWOW64\Lhapocoi.exe Kmklak32.exe File created C:\Windows\SysWOW64\Hmhonm32.dll Okhgod32.exe File opened for modification C:\Windows\SysWOW64\Pmiikipg.exe Pgjdmc32.exe File opened for modification C:\Windows\SysWOW64\Bakdjn32.exe Blnkbg32.exe File created C:\Windows\SysWOW64\Njbnon32.dll Komjmk32.exe File created C:\Windows\SysWOW64\Jdflqo32.exe Ijkocg32.exe File opened for modification C:\Windows\SysWOW64\Nlldmimi.exe Nljhhi32.exe File opened for modification C:\Windows\SysWOW64\Qbodjofc.exe Pbhoip32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2708 2044 WerFault.exe Ockdmn32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Agkako32.exeGncgbkki.exeBojkib32.exeOacbdg32.exeIcplje32.exeMiapbpmb.exeJjnlikic.exeMchokq32.exeNepach32.exeInhdgdmk.exeFllaopcg.exeGplebjbk.exeManljd32.exeBjmeiq32.exeChlgid32.exeEhkcpc32.exeIoiidfon.exeDcjjkkji.exePofldf32.exeFmfocnjg.exeCbbomjnn.exeBojipjcj.exeLaidgi32.exeMmpakm32.exeOobiclmh.exeAaklmhak.exeMneaacno.exeBemkle32.exeHadfah32.exeBebfpm32.exeJlghpa32.exeJaeehmko.exeNegeln32.exeMganfp32.exeCkomqopi.exeGlckihcg.exeLaaabo32.exeMfkebkjk.exeCiokijfd.exeEmdeok32.exeEogolc32.exeGfoeel32.exeNkdndeon.exeCggcofkf.exeBakdjn32.exeHibidc32.exeIofhmi32.exeDpcmgi32.exeMkipao32.exeMdendpbg.exePalpneop.exeGkmefaan.exeIkapdqoc.exeOkhgod32.exeBeldao32.exeGhpkbn32.exeJnagmc32.exeMokkegmm.exeCfcmlg32.exeMgmoob32.exeIpfkabpg.exeCqdfehii.exeDklepmal.exeLlebnfpe.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agkako32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gncgbkki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bojkib32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oacbdg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icplje32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Miapbpmb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjnlikic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mchokq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nepach32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inhdgdmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fllaopcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gplebjbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Manljd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjmeiq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chlgid32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehkcpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ioiidfon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcjjkkji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pofldf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmfocnjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbbomjnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bojipjcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Laidgi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmpakm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oobiclmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aaklmhak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mneaacno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bemkle32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hadfah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bebfpm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlghpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jaeehmko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Negeln32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mganfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckomqopi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glckihcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Laaabo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfkebkjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ciokijfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emdeok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eogolc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfoeel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkdndeon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cggcofkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bakdjn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hibidc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iofhmi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpcmgi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkipao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdendpbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Palpneop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkmefaan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikapdqoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Okhgod32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beldao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghpkbn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnagmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mokkegmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfcmlg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mgmoob32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ipfkabpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cqdfehii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dklepmal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llebnfpe.exe -
Modifies registry class 64 IoCs
Processes:
Iocgfhhc.exeJnagmc32.exeEloipb32.exeGajjhkgh.exeOknhdjko.exeDpcmgi32.exeHclhjpjc.exeIafofkkf.exeAiqjao32.exeCnlnpd32.exeQbnphngk.exeJfddkmch.exeMbjfcnkg.exeKnddcg32.exeOlopjddf.exeLncfcgeb.exeOcjpkm32.exePcmoie32.exeAjapoqmf.exeLngpog32.exeKmficl32.exePcbookpp.exeCabaec32.exeDdjphm32.exeManljd32.exeNllbdp32.exeNjalacon.exeOcfiif32.exeFnmmidhm.exeGfogneop.exeIhqilnig.exeFfgfancd.exeQmbqcf32.exeAipgifcp.exeLlpoohik.exeKmklak32.exeEgmbnkie.exeEfhenccl.exeLfdbcing.exePaocnkph.exeNpffaq32.exeIegeonpc.exeDcbjni32.exeNjnmbk32.exeDnhbmpkn.exeJfohgepi.exeNndemg32.exeKckhdg32.exeBkqiek32.exeAjmfca32.exeBmdefk32.exeCmikpngk.exeFpbihl32.exeOnocon32.exeNqeapo32.exeLljipmdl.exeFegjgkla.exeHokjkbkp.exeKomjmk32.exe799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncbdnb32.dll" Iocgfhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jnagmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eloipb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gajjhkgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oknhdjko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geldbhjk.dll" Dpcmgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jllaig32.dll" Hclhjpjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iafofkkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aiqjao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cnlnpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbjmif32.dll" Qbnphngk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaonla32.dll" Jfddkmch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pagmlp32.dll" Mbjfcnkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Knddcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkdjamga.dll" Olopjddf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbcafk32.dll" Lncfcgeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ocjpkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pcmoie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cnlnpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ajapoqmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lngpog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aggpokfi.dll" Kmficl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pcbookpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elnlcjph.dll" Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omhbed32.dll" Ddjphm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Manljd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkogobem.dll" Nllbdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odljflhj.dll" Njalacon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jfddkmch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ocfiif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fnmmidhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gfogneop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ihqilnig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjejch32.dll" Ffgfancd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amogaa32.dll" Qmbqcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aipgifcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Llpoohik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kmklak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbpkaopd.dll" Egmbnkie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cempgn32.dll" Efhenccl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iljakp32.dll" Lfdbcing.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Paocnkph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Npffaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbbngc32.dll" Iegeonpc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ocfiif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahgdoqqo.dll" Dcbjni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Njnmbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dnhbmpkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jfohgepi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nndemg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkhmod32.dll" Kckhdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngeogk32.dll" Bkqiek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ajmfca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bmdefk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hagojlib.dll" Paocnkph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cmikpngk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdfdbg32.dll" Fpbihl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlaagb32.dll" Onocon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nqeapo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lljipmdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fegjgkla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hokjkbkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Komjmk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exeAhgofi32.exeBbbpenco.exeBjmeiq32.exeDhhhbg32.exeDpcmgi32.exeEmifeqid.exeFeggob32.exeFkkfgi32.exeGjdldd32.exeHbnmienj.exeIjkocg32.exeJdflqo32.exeJieaofmp.exeLncfcgeb.exeLngpog32.exedescription pid process target process PID 2572 wrote to memory of 2052 2572 799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe Ahgofi32.exe PID 2572 wrote to memory of 2052 2572 799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe Ahgofi32.exe PID 2572 wrote to memory of 2052 2572 799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe Ahgofi32.exe PID 2572 wrote to memory of 2052 2572 799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe Ahgofi32.exe PID 2052 wrote to memory of 1636 2052 Ahgofi32.exe Bbbpenco.exe PID 2052 wrote to memory of 1636 2052 Ahgofi32.exe Bbbpenco.exe PID 2052 wrote to memory of 1636 2052 Ahgofi32.exe Bbbpenco.exe PID 2052 wrote to memory of 1636 2052 Ahgofi32.exe Bbbpenco.exe PID 1636 wrote to memory of 2140 1636 Bbbpenco.exe Bjmeiq32.exe PID 1636 wrote to memory of 2140 1636 Bbbpenco.exe Bjmeiq32.exe PID 1636 wrote to memory of 2140 1636 Bbbpenco.exe Bjmeiq32.exe PID 1636 wrote to memory of 2140 1636 Bbbpenco.exe Bjmeiq32.exe PID 2140 wrote to memory of 2900 2140 Bjmeiq32.exe Dhhhbg32.exe PID 2140 wrote to memory of 2900 2140 Bjmeiq32.exe Dhhhbg32.exe PID 2140 wrote to memory of 2900 2140 Bjmeiq32.exe Dhhhbg32.exe PID 2140 wrote to memory of 2900 2140 Bjmeiq32.exe Dhhhbg32.exe PID 2900 wrote to memory of 2660 2900 Dhhhbg32.exe Dpcmgi32.exe PID 2900 wrote to memory of 2660 2900 Dhhhbg32.exe Dpcmgi32.exe PID 2900 wrote to memory of 2660 2900 Dhhhbg32.exe Dpcmgi32.exe PID 2900 wrote to memory of 2660 2900 Dhhhbg32.exe Dpcmgi32.exe PID 2660 wrote to memory of 2632 2660 Dpcmgi32.exe Emifeqid.exe PID 2660 wrote to memory of 2632 2660 Dpcmgi32.exe Emifeqid.exe PID 2660 wrote to memory of 2632 2660 Dpcmgi32.exe Emifeqid.exe PID 2660 wrote to memory of 2632 2660 Dpcmgi32.exe Emifeqid.exe PID 2632 wrote to memory of 2280 2632 Emifeqid.exe Feggob32.exe PID 2632 wrote to memory of 2280 2632 Emifeqid.exe Feggob32.exe PID 2632 wrote to memory of 2280 2632 Emifeqid.exe Feggob32.exe PID 2632 wrote to memory of 2280 2632 Emifeqid.exe Feggob32.exe PID 2280 wrote to memory of 1572 2280 Feggob32.exe Fkkfgi32.exe PID 2280 wrote to memory of 1572 2280 Feggob32.exe Fkkfgi32.exe PID 2280 wrote to memory of 1572 2280 Feggob32.exe Fkkfgi32.exe PID 2280 wrote to memory of 1572 2280 Feggob32.exe Fkkfgi32.exe PID 1572 wrote to memory of 756 1572 Fkkfgi32.exe Gjdldd32.exe PID 1572 wrote to memory of 756 1572 Fkkfgi32.exe Gjdldd32.exe PID 1572 wrote to memory of 756 1572 Fkkfgi32.exe Gjdldd32.exe PID 1572 wrote to memory of 756 1572 Fkkfgi32.exe Gjdldd32.exe PID 756 wrote to memory of 2968 756 Gjdldd32.exe Hbnmienj.exe PID 756 wrote to memory of 2968 756 Gjdldd32.exe Hbnmienj.exe PID 756 wrote to memory of 2968 756 Gjdldd32.exe Hbnmienj.exe PID 756 wrote to memory of 2968 756 Gjdldd32.exe Hbnmienj.exe PID 2968 wrote to memory of 1296 2968 Hbnmienj.exe Ijkocg32.exe PID 2968 wrote to memory of 1296 2968 Hbnmienj.exe Ijkocg32.exe PID 2968 wrote to memory of 1296 2968 Hbnmienj.exe Ijkocg32.exe PID 2968 wrote to memory of 1296 2968 Hbnmienj.exe Ijkocg32.exe PID 1296 wrote to memory of 3012 1296 Ijkocg32.exe Jdflqo32.exe PID 1296 wrote to memory of 3012 1296 Ijkocg32.exe Jdflqo32.exe PID 1296 wrote to memory of 3012 1296 Ijkocg32.exe Jdflqo32.exe PID 1296 wrote to memory of 3012 1296 Ijkocg32.exe Jdflqo32.exe PID 3012 wrote to memory of 2244 3012 Jdflqo32.exe Jieaofmp.exe PID 3012 wrote to memory of 2244 3012 Jdflqo32.exe Jieaofmp.exe PID 3012 wrote to memory of 2244 3012 Jdflqo32.exe Jieaofmp.exe PID 3012 wrote to memory of 2244 3012 Jdflqo32.exe Jieaofmp.exe PID 2244 wrote to memory of 2196 2244 Jieaofmp.exe Lncfcgeb.exe PID 2244 wrote to memory of 2196 2244 Jieaofmp.exe Lncfcgeb.exe PID 2244 wrote to memory of 2196 2244 Jieaofmp.exe Lncfcgeb.exe PID 2244 wrote to memory of 2196 2244 Jieaofmp.exe Lncfcgeb.exe PID 2196 wrote to memory of 1824 2196 Lncfcgeb.exe Lngpog32.exe PID 2196 wrote to memory of 1824 2196 Lncfcgeb.exe Lngpog32.exe PID 2196 wrote to memory of 1824 2196 Lncfcgeb.exe Lngpog32.exe PID 2196 wrote to memory of 1824 2196 Lncfcgeb.exe Lngpog32.exe PID 1824 wrote to memory of 1644 1824 Lngpog32.exe Mkipao32.exe PID 1824 wrote to memory of 1644 1824 Lngpog32.exe Mkipao32.exe PID 1824 wrote to memory of 1644 1824 Lngpog32.exe Mkipao32.exe PID 1824 wrote to memory of 1644 1824 Lngpog32.exe Mkipao32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe"C:\Users\Admin\AppData\Local\Temp\799d37dcec23e0bff0c59f5c1d3d0bc1f5743d21a72c37c5ca4c02e472243abe.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\Ahgofi32.exeC:\Windows\system32\Ahgofi32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\Bbbpenco.exeC:\Windows\system32\Bbbpenco.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\Bjmeiq32.exeC:\Windows\system32\Bjmeiq32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\Dhhhbg32.exeC:\Windows\system32\Dhhhbg32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Dpcmgi32.exeC:\Windows\system32\Dpcmgi32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Emifeqid.exeC:\Windows\system32\Emifeqid.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\Feggob32.exeC:\Windows\system32\Feggob32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\Fkkfgi32.exeC:\Windows\system32\Fkkfgi32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\Gjdldd32.exeC:\Windows\system32\Gjdldd32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\Hbnmienj.exeC:\Windows\system32\Hbnmienj.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Ijkocg32.exeC:\Windows\system32\Ijkocg32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\Jdflqo32.exeC:\Windows\system32\Jdflqo32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\Jieaofmp.exeC:\Windows\system32\Jieaofmp.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Lncfcgeb.exeC:\Windows\system32\Lncfcgeb.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\Lngpog32.exeC:\Windows\system32\Lngpog32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Mkipao32.exeC:\Windows\system32\Mkipao32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\Njnmbk32.exeC:\Windows\system32\Njnmbk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:696 -
C:\Windows\SysWOW64\Oecmogln.exeC:\Windows\system32\Oecmogln.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1460 -
C:\Windows\SysWOW64\Obgnhkkh.exeC:\Windows\system32\Obgnhkkh.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068 -
C:\Windows\SysWOW64\Oejcpf32.exeC:\Windows\system32\Oejcpf32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\Paaddgkj.exeC:\Windows\system32\Paaddgkj.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1116 -
C:\Windows\SysWOW64\Pjleclph.exeC:\Windows\system32\Pjleclph.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:376 -
C:\Windows\SysWOW64\Peefcjlg.exeC:\Windows\system32\Peefcjlg.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Windows\SysWOW64\Paocnkph.exeC:\Windows\system32\Paocnkph.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1920 -
C:\Windows\SysWOW64\Qbnphngk.exeC:\Windows\system32\Qbnphngk.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\Aphjjf32.exeC:\Windows\system32\Aphjjf32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Windows\SysWOW64\Adfbpega.exeC:\Windows\system32\Adfbpega.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2476 -
C:\Windows\SysWOW64\Aobpfb32.exeC:\Windows\system32\Aobpfb32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764 -
C:\Windows\SysWOW64\Bdfooh32.exeC:\Windows\system32\Bdfooh32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\Ccpeld32.exeC:\Windows\system32\Ccpeld32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2744 -
C:\Windows\SysWOW64\Cqdfehii.exeC:\Windows\system32\Cqdfehii.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\Ciokijfd.exeC:\Windows\system32\Ciokijfd.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\Cbjlhpkb.exeC:\Windows\system32\Cbjlhpkb.exe34⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Daaenlng.exeC:\Windows\system32\Daaenlng.exe35⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\Dnhbmpkn.exeC:\Windows\system32\Dnhbmpkn.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:1464 -
C:\Windows\SysWOW64\Emdeok32.exeC:\Windows\system32\Emdeok32.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\Eeojcmfi.exeC:\Windows\system32\Eeojcmfi.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\Eogolc32.exeC:\Windows\system32\Eogolc32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\Fkqlgc32.exeC:\Windows\system32\Fkqlgc32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\Fihfnp32.exeC:\Windows\system32\Fihfnp32.exe41⤵
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\Fdnjkh32.exeC:\Windows\system32\Fdnjkh32.exe42⤵
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\Fmfocnjg.exeC:\Windows\system32\Fmfocnjg.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\Gmhkin32.exeC:\Windows\system32\Gmhkin32.exe44⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\Ggapbcne.exeC:\Windows\system32\Ggapbcne.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Giaidnkf.exeC:\Windows\system32\Giaidnkf.exe46⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Goqnae32.exeC:\Windows\system32\Goqnae32.exe47⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\Gglbfg32.exeC:\Windows\system32\Gglbfg32.exe48⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\Hnhgha32.exeC:\Windows\system32\Hnhgha32.exe49⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Hklhae32.exeC:\Windows\system32\Hklhae32.exe50⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\Hddmjk32.exeC:\Windows\system32\Hddmjk32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\Hjcaha32.exeC:\Windows\system32\Hjcaha32.exe52⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\Iocgfhhc.exeC:\Windows\system32\Iocgfhhc.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:3024 -
C:\Windows\SysWOW64\Inhdgdmk.exeC:\Windows\system32\Inhdgdmk.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\Iogpag32.exeC:\Windows\system32\Iogpag32.exe55⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Ijaaae32.exeC:\Windows\system32\Ijaaae32.exe56⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\Iegeonpc.exeC:\Windows\system32\Iegeonpc.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Ieibdnnp.exeC:\Windows\system32\Ieibdnnp.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1388 -
C:\Windows\SysWOW64\Jnagmc32.exeC:\Windows\system32\Jnagmc32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2212 -
C:\Windows\SysWOW64\Jikhnaao.exeC:\Windows\system32\Jikhnaao.exe60⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\Jfohgepi.exeC:\Windows\system32\Jfohgepi.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\Jedehaea.exeC:\Windows\system32\Jedehaea.exe62⤵
- Executes dropped EXE
PID:972 -
C:\Windows\SysWOW64\Jplfkjbd.exeC:\Windows\system32\Jplfkjbd.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\Kjeglh32.exeC:\Windows\system32\Kjeglh32.exe64⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\Klecfkff.exeC:\Windows\system32\Klecfkff.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\Ladebd32.exeC:\Windows\system32\Ladebd32.exe66⤵PID:848
-
C:\Windows\SysWOW64\Lljipmdl.exeC:\Windows\system32\Lljipmdl.exe67⤵
- Modifies registry class
PID:1948 -
C:\Windows\SysWOW64\Mdendpbg.exeC:\Windows\system32\Mdendpbg.exe68⤵
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Windows\SysWOW64\Mkacfiga.exeC:\Windows\system32\Mkacfiga.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2356 -
C:\Windows\SysWOW64\Mpnkopeh.exeC:\Windows\system32\Mpnkopeh.exe70⤵
- Drops file in System32 directory
PID:588 -
C:\Windows\SysWOW64\Mkcplien.exeC:\Windows\system32\Mkcplien.exe71⤵PID:2228
-
C:\Windows\SysWOW64\Moeeelhn.exeC:\Windows\system32\Moeeelhn.exe72⤵PID:2720
-
C:\Windows\SysWOW64\Nqeapo32.exeC:\Windows\system32\Nqeapo32.exe73⤵
- Modifies registry class
PID:2704 -
C:\Windows\SysWOW64\Nccnlk32.exeC:\Windows\system32\Nccnlk32.exe74⤵PID:2472
-
C:\Windows\SysWOW64\Nllbdp32.exeC:\Windows\system32\Nllbdp32.exe75⤵
- Modifies registry class
PID:2100 -
C:\Windows\SysWOW64\Noohlkpc.exeC:\Windows\system32\Noohlkpc.exe76⤵PID:1884
-
C:\Windows\SysWOW64\Nigldq32.exeC:\Windows\system32\Nigldq32.exe77⤵PID:1556
-
C:\Windows\SysWOW64\Nndemg32.exeC:\Windows\system32\Nndemg32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1972 -
C:\Windows\SysWOW64\Oaigib32.exeC:\Windows\system32\Oaigib32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2728 -
C:\Windows\SysWOW64\Ojblbgdg.exeC:\Windows\system32\Ojblbgdg.exe80⤵PID:2408
-
C:\Windows\SysWOW64\Ocjpkm32.exeC:\Windows\system32\Ocjpkm32.exe81⤵
- Modifies registry class
PID:1836 -
C:\Windows\SysWOW64\Pbomli32.exeC:\Windows\system32\Pbomli32.exe82⤵
- Drops file in System32 directory
PID:1292 -
C:\Windows\SysWOW64\Pbajbi32.exeC:\Windows\system32\Pbajbi32.exe83⤵PID:3068
-
C:\Windows\SysWOW64\Pjoklkie.exeC:\Windows\system32\Pjoklkie.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1936 -
C:\Windows\SysWOW64\Palpneop.exeC:\Windows\system32\Palpneop.exe85⤵
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\Qmbqcf32.exeC:\Windows\system32\Qmbqcf32.exe86⤵
- Drops file in System32 directory
- Modifies registry class
PID:2760 -
C:\Windows\SysWOW64\Qfkelkkd.exeC:\Windows\system32\Qfkelkkd.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2892 -
C:\Windows\SysWOW64\Qdofep32.exeC:\Windows\system32\Qdofep32.exe88⤵PID:1104
-
C:\Windows\SysWOW64\Afpogk32.exeC:\Windows\system32\Afpogk32.exe89⤵PID:2960
-
C:\Windows\SysWOW64\Aphcppmo.exeC:\Windows\system32\Aphcppmo.exe90⤵PID:836
-
C:\Windows\SysWOW64\Aipgifcp.exeC:\Windows\system32\Aipgifcp.exe91⤵
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Aaklmhak.exeC:\Windows\system32\Aaklmhak.exe92⤵
- System Location Discovery: System Language Discovery
PID:320 -
C:\Windows\SysWOW64\Agkako32.exeC:\Windows\system32\Agkako32.exe93⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1204 -
C:\Windows\SysWOW64\Bkhjamcf.exeC:\Windows\system32\Bkhjamcf.exe94⤵PID:908
-
C:\Windows\SysWOW64\Bnlphh32.exeC:\Windows\system32\Bnlphh32.exe95⤵PID:900
-
C:\Windows\SysWOW64\Chgnneiq.exeC:\Windows\system32\Chgnneiq.exe96⤵PID:1564
-
C:\Windows\SysWOW64\Coafko32.exeC:\Windows\system32\Coafko32.exe97⤵PID:2588
-
C:\Windows\SysWOW64\Cbbomjnn.exeC:\Windows\system32\Cbbomjnn.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\Chlgid32.exeC:\Windows\system32\Chlgid32.exe99⤵
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\SysWOW64\Cqjhcfpc.exeC:\Windows\system32\Cqjhcfpc.exe100⤵PID:2928
-
C:\Windows\SysWOW64\Ckomqopi.exeC:\Windows\system32\Ckomqopi.exe101⤵
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\Dnpebj32.exeC:\Windows\system32\Dnpebj32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2236 -
C:\Windows\SysWOW64\Dghjkpck.exeC:\Windows\system32\Dghjkpck.exe103⤵PID:1904
-
C:\Windows\SysWOW64\Dfngll32.exeC:\Windows\system32\Dfngll32.exe104⤵PID:1120
-
C:\Windows\SysWOW64\Eloipb32.exeC:\Windows\system32\Eloipb32.exe105⤵
- Modifies registry class
PID:1932 -
C:\Windows\SysWOW64\Ehkcpc32.exeC:\Windows\system32\Ehkcpc32.exe106⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\Emgkhj32.exeC:\Windows\system32\Emgkhj32.exe107⤵PID:2944
-
C:\Windows\SysWOW64\Fdfmpc32.exeC:\Windows\system32\Fdfmpc32.exe108⤵PID:1468
-
C:\Windows\SysWOW64\Fegjgkla.exeC:\Windows\system32\Fegjgkla.exe109⤵
- Modifies registry class
PID:264 -
C:\Windows\SysWOW64\Ffgfancd.exeC:\Windows\system32\Ffgfancd.exe110⤵
- Drops file in System32 directory
- Modifies registry class
PID:3028 -
C:\Windows\SysWOW64\Fbpclofe.exeC:\Windows\system32\Fbpclofe.exe111⤵PID:2564
-
C:\Windows\SysWOW64\Gaeqmk32.exeC:\Windows\system32\Gaeqmk32.exe112⤵PID:2232
-
C:\Windows\SysWOW64\Gkmefaan.exeC:\Windows\system32\Gkmefaan.exe113⤵
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\Gajjhkgh.exeC:\Windows\system32\Gajjhkgh.exe114⤵
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Gkbnap32.exeC:\Windows\system32\Gkbnap32.exe115⤵PID:1364
-
C:\Windows\SysWOW64\Glckihcg.exeC:\Windows\system32\Glckihcg.exe116⤵
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\Gncgbkki.exeC:\Windows\system32\Gncgbkki.exe117⤵
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\Hcblqb32.exeC:\Windows\system32\Hcblqb32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2460 -
C:\Windows\SysWOW64\Hkmaed32.exeC:\Windows\system32\Hkmaed32.exe119⤵PID:1804
-
C:\Windows\SysWOW64\Hokjkbkp.exeC:\Windows\system32\Hokjkbkp.exe120⤵
- Modifies registry class
PID:580 -
C:\Windows\SysWOW64\Hqochjnk.exeC:\Windows\system32\Hqochjnk.exe121⤵PID:2104
-
C:\Windows\SysWOW64\Hjggap32.exeC:\Windows\system32\Hjggap32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2872
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-