Analysis
-
max time kernel
68s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe
Resource
win10v2004-20241007-en
General
-
Target
04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe
-
Size
71KB
-
MD5
f3f5cb4cc1b6968325fc1f0c8665c594
-
SHA1
203ab8341a6e31968e4790e51307c244a891b2ec
-
SHA256
04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1
-
SHA512
464b65da326edad4054e4a23e967e04bb1d87af8d6067da374310ba01bcb1b624a0188feb443a7ad3f6e775a3a7bcf60cac0d2eb34713ad4a7287adc57669d41
-
SSDEEP
1536:esACG+h4s1r7rXxLv/5ZHVM1hkGXtqRQcxDbEyRCRRRoR4RkG:DAJ+qs1Tp5+9tqeKEy032yaG
Malware Config
Extracted
berbew
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Caomgjnk.exeEnjmlgoj.exeJeenfd32.exeOofpgolq.exeEdafjiqe.exeFeeldk32.exeKamncagl.exeHbcdfq32.exeNihjfm32.exeNpdohg32.exeCjmaed32.exeAcafnm32.exeEjldfh32.exeOmddmkhl.exeMnnhjk32.exeIlolol32.exeHepdml32.exeLiqnclia.exePkdiehca.exeCaligc32.exeEaclgf32.exeHancef32.exeMacnjk32.exeFjjeid32.exeHilghaqq.exeIhopjl32.exeHbmpoj32.exeIjahik32.exeKcjqlm32.exeAihmhe32.exeCaajmilh.exeIfceemdj.exePmijgn32.exeBfieec32.exeLpfagd32.exePihnqj32.exeGhndjd32.exeAieihpgi.exeDokmel32.exeNbckeb32.exeJanijh32.exeEfihcpqk.exeNihgndip.exeCpigeblb.exeJlkigbef.exeKhdgabih.exeLhkiae32.exeBdiaqj32.exeChickknc.exeDpkpie32.exeFchgnj32.exeMkqbhf32.exeAefhpc32.exeKceijg32.exeEomfiobe.exePkebig32.exeKihcakpa.exeJadnoc32.exeIhefjg32.exeQfbcae32.exeCdhino32.exeIikneggd.exeOjakdd32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Caomgjnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Enjmlgoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jeenfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oofpgolq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edafjiqe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feeldk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kamncagl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbcdfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nihjfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Npdohg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjmaed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Acafnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ejldfh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omddmkhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mnnhjk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilolol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hepdml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liqnclia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pkdiehca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caligc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eaclgf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hancef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Macnjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fjjeid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hilghaqq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihopjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hbmpoj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijahik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kcjqlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aihmhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Caajmilh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifceemdj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmijgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfieec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lpfagd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pihnqj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghndjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aieihpgi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dokmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nbckeb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Janijh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efihcpqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nihgndip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cpigeblb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jlkigbef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Khdgabih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lhkiae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdiaqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Chickknc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpkpie32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaclgf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fchgnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mkqbhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aefhpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kceijg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eomfiobe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pkebig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kihcakpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jadnoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihefjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfbcae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdhino32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iikneggd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ojakdd32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Igioiacg.exeIcponb32.exeIbeloo32.exeIfceemdj.exeJbjejojn.exeJekoljgo.exeJdplmflg.exeJjlqpp32.exeKhpaidpk.exeKbjbibli.exeKpnbcfkc.exeKihcakpa.exeKeodflee.exeLddagi32.exeLahaqm32.exeLnobfn32.exeLjfckodo.exeLkepdbkb.exeLlgllj32.exeMnfhfmhc.exeMfamko32.exeMhpigk32.exeMkqbhf32.exeMfhcknpf.exeMkelcenm.exeNnfeep32.exeNgoinfao.exeNgafdepl.exeNcggifep.exeOiglfm32.exeObopobhe.exeOmddmkhl.exeOnfadc32.exeOdgchjhl.exeOjakdd32.exePegpamoo.exePiiekp32.exePbaide32.exePmijgn32.exeQeihfp32.exeAgmacgcc.exeAdqbml32.exeAcfonhgd.exeAjpgkb32.exeAefhpc32.exeAlqplmlb.exeBfieec32.exeBfkakbpp.exeBhjngnod.exeBocfch32.exeBhljlnma.exeBkjfhile.exeBbdoec32.exeBhngbm32.exeBbflkcao.exeBgcdcjpf.exeCqlhlo32.exeCgfqii32.exeCmbiap32.exeCjfjjd32.exeCqqbgoba.exeCfmjoe32.exeCmgblphf.exeCcakij32.exepid process 1184 Igioiacg.exe 2920 Icponb32.exe 2408 Ibeloo32.exe 3032 Ifceemdj.exe 2996 Jbjejojn.exe 2532 Jekoljgo.exe 2780 Jdplmflg.exe 2508 Jjlqpp32.exe 1844 Khpaidpk.exe 2064 Kbjbibli.exe 1200 Kpnbcfkc.exe 800 Kihcakpa.exe 2204 Keodflee.exe 1160 Lddagi32.exe 2212 Lahaqm32.exe 612 Lnobfn32.exe 1712 Ljfckodo.exe 696 Lkepdbkb.exe 640 Llgllj32.exe 2524 Mnfhfmhc.exe 1372 Mfamko32.exe 964 Mhpigk32.exe 2392 Mkqbhf32.exe 1004 Mfhcknpf.exe 1792 Mkelcenm.exe 3008 Nnfeep32.exe 1596 Ngoinfao.exe 2980 Ngafdepl.exe 3004 Ncggifep.exe 2848 Oiglfm32.exe 2716 Obopobhe.exe 2588 Omddmkhl.exe 1064 Onfadc32.exe 832 Odgchjhl.exe 2092 Ojakdd32.exe 2968 Pegpamoo.exe 1260 Piiekp32.exe 1096 Pbaide32.exe 2228 Pmijgn32.exe 2096 Qeihfp32.exe 2080 Agmacgcc.exe 2620 Adqbml32.exe 2580 Acfonhgd.exe 1056 Ajpgkb32.exe 1820 Aefhpc32.exe 1464 Alqplmlb.exe 524 Bfieec32.exe 2544 Bfkakbpp.exe 876 Bhjngnod.exe 1132 Bocfch32.exe 2948 Bhljlnma.exe 2816 Bkjfhile.exe 2748 Bbdoec32.exe 2884 Bhngbm32.exe 2708 Bbflkcao.exe 1660 Bgcdcjpf.exe 2104 Cqlhlo32.exe 2320 Cgfqii32.exe 2016 Cmbiap32.exe 2248 Cjfjjd32.exe 1728 Cqqbgoba.exe 2404 Cfmjoe32.exe 2140 Cmgblphf.exe 2484 Ccakij32.exe -
Loads dropped DLL 64 IoCs
Processes:
04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exeIgioiacg.exeIcponb32.exeIbeloo32.exeIfceemdj.exeJbjejojn.exeJekoljgo.exeJdplmflg.exeJjlqpp32.exeKhpaidpk.exeKbjbibli.exeKpnbcfkc.exeKihcakpa.exeKeodflee.exeLddagi32.exeLahaqm32.exeLnobfn32.exeLjfckodo.exeLkepdbkb.exeLlgllj32.exeMnfhfmhc.exeMfamko32.exeMhpigk32.exeMkqbhf32.exeMfhcknpf.exeMkelcenm.exeNnfeep32.exeNgoinfao.exeNgafdepl.exeNcggifep.exeOiglfm32.exeObopobhe.exepid process 2380 04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe 2380 04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe 1184 Igioiacg.exe 1184 Igioiacg.exe 2920 Icponb32.exe 2920 Icponb32.exe 2408 Ibeloo32.exe 2408 Ibeloo32.exe 3032 Ifceemdj.exe 3032 Ifceemdj.exe 2996 Jbjejojn.exe 2996 Jbjejojn.exe 2532 Jekoljgo.exe 2532 Jekoljgo.exe 2780 Jdplmflg.exe 2780 Jdplmflg.exe 2508 Jjlqpp32.exe 2508 Jjlqpp32.exe 1844 Khpaidpk.exe 1844 Khpaidpk.exe 2064 Kbjbibli.exe 2064 Kbjbibli.exe 1200 Kpnbcfkc.exe 1200 Kpnbcfkc.exe 800 Kihcakpa.exe 800 Kihcakpa.exe 2204 Keodflee.exe 2204 Keodflee.exe 1160 Lddagi32.exe 1160 Lddagi32.exe 2212 Lahaqm32.exe 2212 Lahaqm32.exe 612 Lnobfn32.exe 612 Lnobfn32.exe 1712 Ljfckodo.exe 1712 Ljfckodo.exe 696 Lkepdbkb.exe 696 Lkepdbkb.exe 640 Llgllj32.exe 640 Llgllj32.exe 2524 Mnfhfmhc.exe 2524 Mnfhfmhc.exe 1372 Mfamko32.exe 1372 Mfamko32.exe 964 Mhpigk32.exe 964 Mhpigk32.exe 2392 Mkqbhf32.exe 2392 Mkqbhf32.exe 1004 Mfhcknpf.exe 1004 Mfhcknpf.exe 1792 Mkelcenm.exe 1792 Mkelcenm.exe 3008 Nnfeep32.exe 3008 Nnfeep32.exe 1596 Ngoinfao.exe 1596 Ngoinfao.exe 2980 Ngafdepl.exe 2980 Ngafdepl.exe 3004 Ncggifep.exe 3004 Ncggifep.exe 2848 Oiglfm32.exe 2848 Oiglfm32.exe 2716 Obopobhe.exe 2716 Obopobhe.exe -
Drops file in System32 directory 64 IoCs
Processes:
Okomappb.exeAeachphg.exeGocpcfeb.exeChafpfqp.exePfekbg32.exeFkmhij32.exePihnqj32.exeCocpjf32.exePbfehn32.exeMdaedhoh.exeLakqoe32.exeIlihij32.exeJakjlpif.exePadcqp32.exeFmmjpoci.exeHkngbj32.exeJkeialfp.exeJhjldiln.exeFqhegf32.exeHpcnmnnh.exeGeplpfnh.exePmoqfi32.exeLicpki32.exeLmhhcaik.exeDicmlpje.exeEoanij32.exeAgkfil32.exeGhpngkhm.exeJffddfjk.exeMgebfi32.exeMmojcceo.exeBlkoocfl.exeDpkpie32.exeLeilnllb.exeOdgchjhl.exeGlajmppm.exeFaedpdcc.exeKmbgnl32.exeKfnpgg32.exeLbdiabcg.exeHlmpjl32.exeGhndjd32.exeAqpgblqh.exeDcmkciap.exeAkpmhdqd.exeHejaon32.exeChickknc.exeHpodbo32.exePmijgn32.exeEphhmn32.exeFdldmokn.exeHhobbqkc.exeFmnakege.exeAjipmocp.exeAqkmgl32.exeEfdmohmm.exeQpmbgaid.exeJcpglhpo.exeChiedc32.exeHbcdfq32.exeKoogdg32.exeQfbcae32.exeGfcjqkbp.exeFjjeid32.exedescription ioc process File created C:\Windows\SysWOW64\Pgfnfq32.exe Okomappb.exe File created C:\Windows\SysWOW64\Anigaeoh.exe Aeachphg.exe File created C:\Windows\SysWOW64\Gkjahg32.exe Gocpcfeb.exe File created C:\Windows\SysWOW64\Caijik32.exe Chafpfqp.exe File created C:\Windows\SysWOW64\Pcikllja.exe Pfekbg32.exe File created C:\Windows\SysWOW64\Fkkdedfm.dll Fkmhij32.exe File created C:\Windows\SysWOW64\Mofjof32.dll Pihnqj32.exe File created C:\Windows\SysWOW64\Cdphbm32.exe Cocpjf32.exe File opened for modification C:\Windows\SysWOW64\Qloiqcbn.exe Pbfehn32.exe File created C:\Windows\SysWOW64\Minnmomo.exe Mdaedhoh.exe File opened for modification C:\Windows\SysWOW64\Lkcehkeh.exe Lakqoe32.exe File opened for modification C:\Windows\SysWOW64\Igomfb32.exe Ilihij32.exe File opened for modification C:\Windows\SysWOW64\Jlqniihl.exe Jakjlpif.exe File created C:\Windows\SysWOW64\Qjoheb32.exe Padcqp32.exe File created C:\Windows\SysWOW64\Ebineoap.dll Fmmjpoci.exe File created C:\Windows\SysWOW64\Hdgkkppm.exe Hkngbj32.exe File created C:\Windows\SysWOW64\Fdhidgbq.dll Jkeialfp.exe File opened for modification C:\Windows\SysWOW64\Jnfdlpje.exe Jhjldiln.exe File created C:\Windows\SysWOW64\Ghnldlle.dll Fqhegf32.exe File created C:\Windows\SysWOW64\Dpligk32.dll Hpcnmnnh.exe File opened for modification C:\Windows\SysWOW64\Gpfpmonn.exe Geplpfnh.exe File created C:\Windows\SysWOW64\Lglpbp32.dll Pmoqfi32.exe File created C:\Windows\SysWOW64\Lckdcn32.exe Licpki32.exe File created C:\Windows\SysWOW64\Ollkojil.dll Lmhhcaik.exe File created C:\Windows\SysWOW64\Gadllf32.dll Dicmlpje.exe File created C:\Windows\SysWOW64\Eikngjpo.dll Eoanij32.exe File created C:\Windows\SysWOW64\Acafnm32.exe Agkfil32.exe File created C:\Windows\SysWOW64\Onpoob32.dll Ghpngkhm.exe File created C:\Windows\SysWOW64\Jkcllmhb.exe Jffddfjk.exe File opened for modification C:\Windows\SysWOW64\Mmojcceo.exe Mgebfi32.exe File created C:\Windows\SysWOW64\Cljiqf32.dll Mmojcceo.exe File created C:\Windows\SysWOW64\Jgidhgbh.dll Blkoocfl.exe File created C:\Windows\SysWOW64\Obhblkpa.dll Dpkpie32.exe File created C:\Windows\SysWOW64\Mmdkodce.dll Leilnllb.exe File opened for modification C:\Windows\SysWOW64\Ojakdd32.exe Odgchjhl.exe File opened for modification C:\Windows\SysWOW64\Hancef32.exe Glajmppm.exe File opened for modification C:\Windows\SysWOW64\Fkmhij32.exe Faedpdcc.exe File created C:\Windows\SysWOW64\Kqncnjan.exe Kmbgnl32.exe File created C:\Windows\SysWOW64\Lmhhcaik.exe Kfnpgg32.exe File opened for modification C:\Windows\SysWOW64\Llmnjg32.exe Lbdiabcg.exe File opened for modification C:\Windows\SysWOW64\Heedbbdb.exe Hlmpjl32.exe File opened for modification C:\Windows\SysWOW64\Ghqqpd32.exe Ghndjd32.exe File created C:\Windows\SysWOW64\Cojfkela.dll Aqpgblqh.exe File created C:\Windows\SysWOW64\Dlepmnhq.exe Dcmkciap.exe File opened for modification C:\Windows\SysWOW64\Bdiaqj32.exe Akpmhdqd.exe File opened for modification C:\Windows\SysWOW64\Hkgjge32.exe Hejaon32.exe File opened for modification C:\Windows\SysWOW64\Cbagdq32.exe Chickknc.exe File created C:\Windows\SysWOW64\Lboeoagk.dll Hpodbo32.exe File created C:\Windows\SysWOW64\Qeihfp32.exe Pmijgn32.exe File opened for modification C:\Windows\SysWOW64\Ehopnk32.exe Ephhmn32.exe File created C:\Windows\SysWOW64\Idpipo32.dll Fdldmokn.exe File created C:\Windows\SysWOW64\Namjglek.dll Hhobbqkc.exe File opened for modification C:\Windows\SysWOW64\Fhcehngk.exe Fmnakege.exe File created C:\Windows\SysWOW64\Pohcck32.dll Ajipmocp.exe File opened for modification C:\Windows\SysWOW64\Ajcbpbkn.exe Aqkmgl32.exe File created C:\Windows\SysWOW64\Qfchcq32.dll Efdmohmm.exe File created C:\Windows\SysWOW64\Bgleei32.dll Qpmbgaid.exe File created C:\Windows\SysWOW64\Kgidlm32.dll Jcpglhpo.exe File opened for modification C:\Windows\SysWOW64\Caajmilh.exe Chiedc32.exe File opened for modification C:\Windows\SysWOW64\Hinlck32.exe Hbcdfq32.exe File created C:\Windows\SysWOW64\Kmbgnl32.exe Koogdg32.exe File created C:\Windows\SysWOW64\Qehlbk32.dll Qfbcae32.exe File created C:\Windows\SysWOW64\Ghdfhc32.exe Gfcjqkbp.exe File created C:\Windows\SysWOW64\Jckflh32.dll Fjjeid32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5012 4512 WerFault.exe Lfnkejeg.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Ifceemdj.exeHancef32.exeJnfdlpje.exeMlogojjp.exeBfgikgjq.exePnebgcqb.exeBbflkcao.exeGocpcfeb.exeGhpngkhm.exeInopce32.exeAngafl32.exeLegohm32.exeKffblb32.exeOjijha32.exeHbjjfl32.exeHkkaik32.exeLgpjcnhh.exeDihojnqo.exeJobnej32.exeEqpfchka.exeFmnmih32.exeJgbboa32.exeNihjfm32.exeIopqoi32.exeLmmcgilj.exeDcojbm32.exeFjjeid32.exeIlolol32.exePqdend32.exeCdhino32.exeEomfiobe.exeMlhbgc32.exeIlfbpk32.exeCmjoaofc.exeGpfpmonn.exeAjipmocp.exeGbmbgngb.exeKqomai32.exeMnnhjk32.exeNqdjge32.exeObpbhk32.exeGadkmj32.exeDgphpi32.exeMpgdaqmh.exeIpmeej32.exeLcolpe32.exeDabkla32.exeIjegeg32.exeAbhnlqlf.exeOjlmgg32.exeFmnakege.exeCcmcfc32.exeIjeinphf.exeIeepad32.exeNfnfjmgp.exeMamjchoa.exeMkcjlhdh.exeOqibjq32.exeHaiagm32.exeIgjckcbo.exeJjpehn32.exeCqqbgoba.exeKbikokin.exeNncaejie.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifceemdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hancef32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnfdlpje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlogojjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfgikgjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnebgcqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbflkcao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gocpcfeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghpngkhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inopce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Angafl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Legohm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kffblb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojijha32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbjjfl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkkaik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgpjcnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dihojnqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jobnej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eqpfchka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmnmih32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgbboa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nihjfm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iopqoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmmcgilj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcojbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fjjeid32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilolol32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqdend32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdhino32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eomfiobe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlhbgc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilfbpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmjoaofc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpfpmonn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajipmocp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbmbgngb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqomai32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnnhjk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqdjge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obpbhk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gadkmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgphpi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpgdaqmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ipmeej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcolpe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dabkla32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijegeg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abhnlqlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojlmgg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmnakege.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccmcfc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijeinphf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ieepad32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfnfjmgp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mamjchoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkcjlhdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oqibjq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Haiagm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igjckcbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjpehn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cqqbgoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbikokin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nncaejie.exe -
Modifies registry class 64 IoCs
Processes:
Hdjnje32.exeCdhino32.exeEpjdbn32.exeGlmckikf.exeNglhghgj.exeOamohenq.exeAefhpc32.exeCefpmiji.exeKfcoll32.exeQgcingnm.exeHbjjfl32.exeEfdmohmm.exeKceijg32.exeMdaedhoh.exeEcfednma.exeCbpbek32.exeKolcdahb.exeIjokcl32.exeKpnbcfkc.exeJfnaok32.exeNfcoel32.exeLjdgqc32.exeKiojqfdp.exeMgglcqdk.exeGloppi32.exeIcnngeof.exeJekoljgo.exeHdgkkppm.exeJlcmhann.exeMfhcknpf.exeGphmbolk.exePmmppm32.exePgfnfq32.exeLckdcn32.exeHeedbbdb.exeKiihcmoi.exeHpaaho32.exeCaligc32.exeJnogakma.exeBeibln32.exeGebiefle.exeJffddfjk.exeOncpmf32.exeJhjldiln.exeDgefmf32.exeBpokkdim.exeEjcjfgbk.exeDlepmnhq.exeMhaobd32.exeKjeblf32.exeHbmpoj32.exeMnjnolap.exeOlapcm32.exeAbfmecba.exeFpncbjqj.exeHlmpjl32.exeNkmffegm.exePgkjji32.exeMhpigk32.exeGocpcfeb.exeLbdiabcg.exeKogjib32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnokki32.dll" Hdjnje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cdhino32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okgdkphm.dll" Epjdbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Glmckikf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nglhghgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbdippia.dll" Oamohenq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aefhpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cefpmiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kfcoll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agbledno.dll" Qgcingnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdomqo32.dll" Hbjjfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Efdmohmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kceijg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mdaedhoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ecfednma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cbpbek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Loehdb32.dll" Kolcdahb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ijokcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhjcendg.dll" Kpnbcfkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jfnaok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Offlpgfp.dll" Nfcoel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ljdgqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgnpfnnd.dll" Kiojqfdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mgglcqdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndahdfnp.dll" Gloppi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Icnngeof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jekoljgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hneffc32.dll" Hdgkkppm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jlcmhann.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mfhcknpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gphmbolk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pmmppm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjmkkfek.dll" Pgfnfq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lckdcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Heedbbdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kiihcmoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiclffeg.dll" Hpaaho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Caligc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jnogakma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Beibln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihckdmko.dll" Gebiefle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpnncope.dll" Jffddfjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oncpmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiacqhfi.dll" Jhjldiln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcegdl32.dll" Dgefmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bpokkdim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gckknefg.dll" Ejcjfgbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dlepmnhq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mhaobd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmggemgf.dll" Kjeblf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hbmpoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jlcmhann.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jekoljgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mnjnolap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jggafj32.dll" Olapcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Abfmecba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beoanjep.dll" Fpncbjqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkmadk32.dll" Hlmpjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdpggf32.dll" Nkmffegm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcnfibmg.dll" Pgkjji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mhpigk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gocpcfeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lbdiabcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kogjib32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exeIgioiacg.exeIcponb32.exeIbeloo32.exeIfceemdj.exeJbjejojn.exeJekoljgo.exeJdplmflg.exeJjlqpp32.exeKhpaidpk.exeKbjbibli.exeKpnbcfkc.exeKihcakpa.exeKeodflee.exeLddagi32.exeLahaqm32.exedescription pid process target process PID 2380 wrote to memory of 1184 2380 04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe Igioiacg.exe PID 2380 wrote to memory of 1184 2380 04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe Igioiacg.exe PID 2380 wrote to memory of 1184 2380 04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe Igioiacg.exe PID 2380 wrote to memory of 1184 2380 04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe Igioiacg.exe PID 1184 wrote to memory of 2920 1184 Igioiacg.exe Icponb32.exe PID 1184 wrote to memory of 2920 1184 Igioiacg.exe Icponb32.exe PID 1184 wrote to memory of 2920 1184 Igioiacg.exe Icponb32.exe PID 1184 wrote to memory of 2920 1184 Igioiacg.exe Icponb32.exe PID 2920 wrote to memory of 2408 2920 Icponb32.exe Ibeloo32.exe PID 2920 wrote to memory of 2408 2920 Icponb32.exe Ibeloo32.exe PID 2920 wrote to memory of 2408 2920 Icponb32.exe Ibeloo32.exe PID 2920 wrote to memory of 2408 2920 Icponb32.exe Ibeloo32.exe PID 2408 wrote to memory of 3032 2408 Ibeloo32.exe Ifceemdj.exe PID 2408 wrote to memory of 3032 2408 Ibeloo32.exe Ifceemdj.exe PID 2408 wrote to memory of 3032 2408 Ibeloo32.exe Ifceemdj.exe PID 2408 wrote to memory of 3032 2408 Ibeloo32.exe Ifceemdj.exe PID 3032 wrote to memory of 2996 3032 Ifceemdj.exe Jbjejojn.exe PID 3032 wrote to memory of 2996 3032 Ifceemdj.exe Jbjejojn.exe PID 3032 wrote to memory of 2996 3032 Ifceemdj.exe Jbjejojn.exe PID 3032 wrote to memory of 2996 3032 Ifceemdj.exe Jbjejojn.exe PID 2996 wrote to memory of 2532 2996 Jbjejojn.exe Jekoljgo.exe PID 2996 wrote to memory of 2532 2996 Jbjejojn.exe Jekoljgo.exe PID 2996 wrote to memory of 2532 2996 Jbjejojn.exe Jekoljgo.exe PID 2996 wrote to memory of 2532 2996 Jbjejojn.exe Jekoljgo.exe PID 2532 wrote to memory of 2780 2532 Jekoljgo.exe Jdplmflg.exe PID 2532 wrote to memory of 2780 2532 Jekoljgo.exe Jdplmflg.exe PID 2532 wrote to memory of 2780 2532 Jekoljgo.exe Jdplmflg.exe PID 2532 wrote to memory of 2780 2532 Jekoljgo.exe Jdplmflg.exe PID 2780 wrote to memory of 2508 2780 Jdplmflg.exe Jjlqpp32.exe PID 2780 wrote to memory of 2508 2780 Jdplmflg.exe Jjlqpp32.exe PID 2780 wrote to memory of 2508 2780 Jdplmflg.exe Jjlqpp32.exe PID 2780 wrote to memory of 2508 2780 Jdplmflg.exe Jjlqpp32.exe PID 2508 wrote to memory of 1844 2508 Jjlqpp32.exe Khpaidpk.exe PID 2508 wrote to memory of 1844 2508 Jjlqpp32.exe Khpaidpk.exe PID 2508 wrote to memory of 1844 2508 Jjlqpp32.exe Khpaidpk.exe PID 2508 wrote to memory of 1844 2508 Jjlqpp32.exe Khpaidpk.exe PID 1844 wrote to memory of 2064 1844 Khpaidpk.exe Kbjbibli.exe PID 1844 wrote to memory of 2064 1844 Khpaidpk.exe Kbjbibli.exe PID 1844 wrote to memory of 2064 1844 Khpaidpk.exe Kbjbibli.exe PID 1844 wrote to memory of 2064 1844 Khpaidpk.exe Kbjbibli.exe PID 2064 wrote to memory of 1200 2064 Kbjbibli.exe Kpnbcfkc.exe PID 2064 wrote to memory of 1200 2064 Kbjbibli.exe Kpnbcfkc.exe PID 2064 wrote to memory of 1200 2064 Kbjbibli.exe Kpnbcfkc.exe PID 2064 wrote to memory of 1200 2064 Kbjbibli.exe Kpnbcfkc.exe PID 1200 wrote to memory of 800 1200 Kpnbcfkc.exe Kihcakpa.exe PID 1200 wrote to memory of 800 1200 Kpnbcfkc.exe Kihcakpa.exe PID 1200 wrote to memory of 800 1200 Kpnbcfkc.exe Kihcakpa.exe PID 1200 wrote to memory of 800 1200 Kpnbcfkc.exe Kihcakpa.exe PID 800 wrote to memory of 2204 800 Kihcakpa.exe Keodflee.exe PID 800 wrote to memory of 2204 800 Kihcakpa.exe Keodflee.exe PID 800 wrote to memory of 2204 800 Kihcakpa.exe Keodflee.exe PID 800 wrote to memory of 2204 800 Kihcakpa.exe Keodflee.exe PID 2204 wrote to memory of 1160 2204 Keodflee.exe Lddagi32.exe PID 2204 wrote to memory of 1160 2204 Keodflee.exe Lddagi32.exe PID 2204 wrote to memory of 1160 2204 Keodflee.exe Lddagi32.exe PID 2204 wrote to memory of 1160 2204 Keodflee.exe Lddagi32.exe PID 1160 wrote to memory of 2212 1160 Lddagi32.exe Lahaqm32.exe PID 1160 wrote to memory of 2212 1160 Lddagi32.exe Lahaqm32.exe PID 1160 wrote to memory of 2212 1160 Lddagi32.exe Lahaqm32.exe PID 1160 wrote to memory of 2212 1160 Lddagi32.exe Lahaqm32.exe PID 2212 wrote to memory of 612 2212 Lahaqm32.exe Lnobfn32.exe PID 2212 wrote to memory of 612 2212 Lahaqm32.exe Lnobfn32.exe PID 2212 wrote to memory of 612 2212 Lahaqm32.exe Lnobfn32.exe PID 2212 wrote to memory of 612 2212 Lahaqm32.exe Lnobfn32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe"C:\Users\Admin\AppData\Local\Temp\04fd80ee7f306717f2f7d97332b8f3e2bb225c401424137a939fe6f75c7a35c1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\Igioiacg.exeC:\Windows\system32\Igioiacg.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\Icponb32.exeC:\Windows\system32\Icponb32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\Ibeloo32.exeC:\Windows\system32\Ibeloo32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\Ifceemdj.exeC:\Windows\system32\Ifceemdj.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Jbjejojn.exeC:\Windows\system32\Jbjejojn.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Jekoljgo.exeC:\Windows\system32\Jekoljgo.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\Jdplmflg.exeC:\Windows\system32\Jdplmflg.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Jjlqpp32.exeC:\Windows\system32\Jjlqpp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Khpaidpk.exeC:\Windows\system32\Khpaidpk.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\Kbjbibli.exeC:\Windows\system32\Kbjbibli.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\Kpnbcfkc.exeC:\Windows\system32\Kpnbcfkc.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Kihcakpa.exeC:\Windows\system32\Kihcakpa.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\Keodflee.exeC:\Windows\system32\Keodflee.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\Lddagi32.exeC:\Windows\system32\Lddagi32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\Lahaqm32.exeC:\Windows\system32\Lahaqm32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\Lnobfn32.exeC:\Windows\system32\Lnobfn32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:612 -
C:\Windows\SysWOW64\Ljfckodo.exeC:\Windows\system32\Ljfckodo.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Windows\SysWOW64\Lkepdbkb.exeC:\Windows\system32\Lkepdbkb.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:696 -
C:\Windows\SysWOW64\Llgllj32.exeC:\Windows\system32\Llgllj32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:640 -
C:\Windows\SysWOW64\Mnfhfmhc.exeC:\Windows\system32\Mnfhfmhc.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524 -
C:\Windows\SysWOW64\Mfamko32.exeC:\Windows\system32\Mfamko32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1372 -
C:\Windows\SysWOW64\Mhpigk32.exeC:\Windows\system32\Mhpigk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\Mkqbhf32.exeC:\Windows\system32\Mkqbhf32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2392 -
C:\Windows\SysWOW64\Mfhcknpf.exeC:\Windows\system32\Mfhcknpf.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Mkelcenm.exeC:\Windows\system32\Mkelcenm.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792 -
C:\Windows\SysWOW64\Nnfeep32.exeC:\Windows\system32\Nnfeep32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3008 -
C:\Windows\SysWOW64\Ngoinfao.exeC:\Windows\system32\Ngoinfao.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1596 -
C:\Windows\SysWOW64\Ngafdepl.exeC:\Windows\system32\Ngafdepl.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2980 -
C:\Windows\SysWOW64\Ncggifep.exeC:\Windows\system32\Ncggifep.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Windows\SysWOW64\Oiglfm32.exeC:\Windows\system32\Oiglfm32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2848 -
C:\Windows\SysWOW64\Obopobhe.exeC:\Windows\system32\Obopobhe.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Windows\SysWOW64\Omddmkhl.exeC:\Windows\system32\Omddmkhl.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Onfadc32.exeC:\Windows\system32\Onfadc32.exe34⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\Odgchjhl.exeC:\Windows\system32\Odgchjhl.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:832 -
C:\Windows\SysWOW64\Ojakdd32.exeC:\Windows\system32\Ojakdd32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2092 -
C:\Windows\SysWOW64\Pegpamoo.exeC:\Windows\system32\Pegpamoo.exe37⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\Piiekp32.exeC:\Windows\system32\Piiekp32.exe38⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\Pbaide32.exeC:\Windows\system32\Pbaide32.exe39⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\SysWOW64\Pmijgn32.exeC:\Windows\system32\Pmijgn32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\Qeihfp32.exeC:\Windows\system32\Qeihfp32.exe41⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\Agmacgcc.exeC:\Windows\system32\Agmacgcc.exe42⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\SysWOW64\Adqbml32.exeC:\Windows\system32\Adqbml32.exe43⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\Acfonhgd.exeC:\Windows\system32\Acfonhgd.exe44⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\Ajpgkb32.exeC:\Windows\system32\Ajpgkb32.exe45⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\Aefhpc32.exeC:\Windows\system32\Aefhpc32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\Alqplmlb.exeC:\Windows\system32\Alqplmlb.exe47⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\SysWOW64\Bfieec32.exeC:\Windows\system32\Bfieec32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\Bfkakbpp.exeC:\Windows\system32\Bfkakbpp.exe49⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\Bhjngnod.exeC:\Windows\system32\Bhjngnod.exe50⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\Bocfch32.exeC:\Windows\system32\Bocfch32.exe51⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Bhljlnma.exeC:\Windows\system32\Bhljlnma.exe52⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\Bkjfhile.exeC:\Windows\system32\Bkjfhile.exe53⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\Bbdoec32.exeC:\Windows\system32\Bbdoec32.exe54⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\Bhngbm32.exeC:\Windows\system32\Bhngbm32.exe55⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\SysWOW64\Bbflkcao.exeC:\Windows\system32\Bbflkcao.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\Bgcdcjpf.exeC:\Windows\system32\Bgcdcjpf.exe57⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\Cqlhlo32.exeC:\Windows\system32\Cqlhlo32.exe58⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\Cgfqii32.exeC:\Windows\system32\Cgfqii32.exe59⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Cmbiap32.exeC:\Windows\system32\Cmbiap32.exe60⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\Cjfjjd32.exeC:\Windows\system32\Cjfjjd32.exe61⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\Cqqbgoba.exeC:\Windows\system32\Cqqbgoba.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\Cfmjoe32.exeC:\Windows\system32\Cfmjoe32.exe63⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\Cmgblphf.exeC:\Windows\system32\Cmgblphf.exe64⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\Ccakij32.exeC:\Windows\system32\Ccakij32.exe65⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\Cmjoaofc.exeC:\Windows\system32\Cmjoaofc.exe66⤵
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\Dfbdje32.exeC:\Windows\system32\Dfbdje32.exe67⤵PID:1624
-
C:\Windows\SysWOW64\Dnmhogjo.exeC:\Windows\system32\Dnmhogjo.exe68⤵PID:924
-
C:\Windows\SysWOW64\Dicmlpje.exeC:\Windows\system32\Dicmlpje.exe69⤵
- Drops file in System32 directory
PID:472 -
C:\Windows\SysWOW64\Dpmeij32.exeC:\Windows\system32\Dpmeij32.exe70⤵PID:2632
-
C:\Windows\SysWOW64\Dieiap32.exeC:\Windows\system32\Dieiap32.exe71⤵PID:2468
-
C:\Windows\SysWOW64\Dbmnjenb.exeC:\Windows\system32\Dbmnjenb.exe72⤵PID:2316
-
C:\Windows\SysWOW64\Dcojbm32.exeC:\Windows\system32\Dcojbm32.exe73⤵
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\Dabkla32.exeC:\Windows\system32\Dabkla32.exe74⤵
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\Dfpcdh32.exeC:\Windows\system32\Dfpcdh32.exe75⤵PID:2028
-
C:\Windows\SysWOW64\Ephhmn32.exeC:\Windows\system32\Ephhmn32.exe76⤵
- Drops file in System32 directory
PID:1172 -
C:\Windows\SysWOW64\Ehopnk32.exeC:\Windows\system32\Ehopnk32.exe77⤵PID:2972
-
C:\Windows\SysWOW64\Epjdbn32.exeC:\Windows\system32\Epjdbn32.exe78⤵
- Modifies registry class
PID:1812 -
C:\Windows\SysWOW64\Efdmohmm.exeC:\Windows\system32\Efdmohmm.exe79⤵
- Drops file in System32 directory
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\Edhmhl32.exeC:\Windows\system32\Edhmhl32.exe80⤵PID:2512
-
C:\Windows\SysWOW64\Eeijpdbd.exeC:\Windows\system32\Eeijpdbd.exe81⤵PID:2216
-
C:\Windows\SysWOW64\Eoanij32.exeC:\Windows\system32\Eoanij32.exe82⤵
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\Eigbfb32.exeC:\Windows\system32\Eigbfb32.exe83⤵PID:2444
-
C:\Windows\SysWOW64\Ehjbaooe.exeC:\Windows\system32\Ehjbaooe.exe84⤵PID:2556
-
C:\Windows\SysWOW64\Ebpgoh32.exeC:\Windows\system32\Ebpgoh32.exe85⤵PID:2008
-
C:\Windows\SysWOW64\Flhkhnel.exeC:\Windows\system32\Flhkhnel.exe86⤵PID:1084
-
C:\Windows\SysWOW64\Faedpdcc.exeC:\Windows\system32\Faedpdcc.exe87⤵
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\Fkmhij32.exeC:\Windows\system32\Fkmhij32.exe88⤵
- Drops file in System32 directory
PID:2820 -
C:\Windows\SysWOW64\Fagqed32.exeC:\Windows\system32\Fagqed32.exe89⤵PID:3024
-
C:\Windows\SysWOW64\Fkpeojha.exeC:\Windows\system32\Fkpeojha.exe90⤵PID:2924
-
C:\Windows\SysWOW64\Fmnakege.exeC:\Windows\system32\Fmnakege.exe91⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\SysWOW64\Fhcehngk.exeC:\Windows\system32\Fhcehngk.exe92⤵PID:2612
-
C:\Windows\SysWOW64\Fkbadifn.exeC:\Windows\system32\Fkbadifn.exe93⤵PID:2956
-
C:\Windows\SysWOW64\Fpojlp32.exeC:\Windows\system32\Fpojlp32.exe94⤵PID:2348
-
C:\Windows\SysWOW64\Fgibijkb.exeC:\Windows\system32\Fgibijkb.exe95⤵PID:2260
-
C:\Windows\SysWOW64\Gpagbp32.exeC:\Windows\system32\Gpagbp32.exe96⤵PID:2428
-
C:\Windows\SysWOW64\Gkfkoi32.exeC:\Windows\system32\Gkfkoi32.exe97⤵PID:1076
-
C:\Windows\SysWOW64\Gdophn32.exeC:\Windows\system32\Gdophn32.exe98⤵PID:2284
-
C:\Windows\SysWOW64\Geplpfnh.exeC:\Windows\system32\Geplpfnh.exe99⤵
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Gpfpmonn.exeC:\Windows\system32\Gpfpmonn.exe100⤵
- System Location Discovery: System Language Discovery
PID:572 -
C:\Windows\SysWOW64\Gebiefle.exeC:\Windows\system32\Gebiefle.exe101⤵
- Modifies registry class
PID:1600 -
C:\Windows\SysWOW64\Gphmbolk.exeC:\Windows\system32\Gphmbolk.exe102⤵
- Modifies registry class
PID:2836 -
C:\Windows\SysWOW64\Gjpakdbl.exeC:\Windows\system32\Gjpakdbl.exe103⤵PID:2976
-
C:\Windows\SysWOW64\Gomjckqc.exeC:\Windows\system32\Gomjckqc.exe104⤵PID:2692
-
C:\Windows\SysWOW64\Galfpgpg.exeC:\Windows\system32\Galfpgpg.exe105⤵PID:2952
-
C:\Windows\SysWOW64\Glajmppm.exeC:\Windows\system32\Glajmppm.exe106⤵
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\Hancef32.exeC:\Windows\system32\Hancef32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1524 -
C:\Windows\SysWOW64\Hkfgnldd.exeC:\Windows\system32\Hkfgnldd.exe108⤵PID:1536
-
C:\Windows\SysWOW64\Happkf32.exeC:\Windows\system32\Happkf32.exe109⤵PID:2516
-
C:\Windows\SysWOW64\Hgmhcm32.exeC:\Windows\system32\Hgmhcm32.exe110⤵PID:660
-
C:\Windows\SysWOW64\Hngppgae.exeC:\Windows\system32\Hngppgae.exe111⤵PID:920
-
C:\Windows\SysWOW64\Hkkaik32.exeC:\Windows\system32\Hkkaik32.exe112⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\Hmojfcdk.exeC:\Windows\system32\Hmojfcdk.exe113⤵PID:1620
-
C:\Windows\SysWOW64\Igdndl32.exeC:\Windows\system32\Igdndl32.exe114⤵PID:1708
-
C:\Windows\SysWOW64\Iiekkdjo.exeC:\Windows\system32\Iiekkdjo.exe115⤵PID:2312
-
C:\Windows\SysWOW64\Ioochn32.exeC:\Windows\system32\Ioochn32.exe116⤵PID:2196
-
C:\Windows\SysWOW64\Ijegeg32.exeC:\Windows\system32\Ijegeg32.exe117⤵
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\Imccab32.exeC:\Windows\system32\Imccab32.exe118⤵PID:2152
-
C:\Windows\SysWOW64\Ijpjik32.exeC:\Windows\system32\Ijpjik32.exe119⤵PID:1840
-
C:\Windows\SysWOW64\Jeenfd32.exeC:\Windows\system32\Jeenfd32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2576 -
C:\Windows\SysWOW64\Jnppei32.exeC:\Windows\system32\Jnppei32.exe121⤵PID:2012
-
C:\Windows\SysWOW64\Jcmhmp32.exeC:\Windows\system32\Jcmhmp32.exe122⤵PID:844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-