Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2N.exe
Resource
win10v2004-20241007-en
General
-
Target
e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2N.exe
-
Size
64KB
-
MD5
cdae742fe7615236441c259b271126b0
-
SHA1
9599cab16f1c600c352e453e79d8ce65fd3ab8ff
-
SHA256
e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2
-
SHA512
0a1fe65bb4e369a5ec5e44ba240293c67a6dad45d3be4aaccc62bd9f4b864d0d37880899622a08a3f78c368f404451b6f1facfaa5bbbafde8678a0e8662716d6
-
SSDEEP
768:4LzTaQYbKo+3S8XaugCZgobIAr/LPl1fAk/CUappPsuVaWaQHYgAJnD8/1H5foXk:4LzTnaHMv4BUaPGQHPkD+56gNtn
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fakkpnld.exeHhmbdeof.exeAlpqobgg.exeHgokel32.exeBoqlmebj.exeFaqkedkk.exeOgjcde32.exeNopgcbpn.exeHmfglfle.exeBlkipjio.exeJebfej32.exeMopefk32.exeFplnfk32.exeNgleec32.exeGnbjhkpp.exeIoogld32.exeEfjgggfl.exeBliceaom.exeDcdnpfjd.exeHppjmb32.exeInbfhdag.exeIpqbdpqk.exeHldgbm32.exePifeghba.exeCoflbj32.exeDocaibae.exeAmcdoh32.exeEbpqab32.exeInpjbecj.exeOjfamm32.exeHbnoog32.exeNlbbam32.exeJbhlih32.exeBkcjam32.exeCjkppc32.exeFebonfpg.exeCcienngm.exeCfgajjfa.exeNbbqmbqb.exeBkamlmab.exePopjoi32.exeHblbihli.exeOlknmeip.exeFgdqglbm.exeKeneqi32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fakkpnld.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhmbdeof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Alpqobgg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgokel32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boqlmebj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faqkedkk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogjcde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nopgcbpn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmfglfle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blkipjio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jebfej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mopefk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fplnfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngleec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnbjhkpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioogld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efjgggfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bliceaom.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcdnpfjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hppjmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inbfhdag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipqbdpqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hldgbm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pifeghba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Coflbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Docaibae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amcdoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebpqab32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inpjbecj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojfamm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbnoog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlbbam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbhlih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkcjam32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjkppc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Febonfpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccienngm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfgajjfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbbqmbqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkamlmab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Popjoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hblbihli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olknmeip.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgdqglbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Keneqi32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Fgdqglbm.exeFokhiibo.exeFajeeeac.exeFeeqec32.exeFdhaapqf.exeFkbinj32.exeFnqejfgg.exeFehmkchi.exeFkdfcjfq.exeFncboeed.exeFejjqcff.exeFgkfhk32.exeFneoeeca.exeFaqkedkk.exeGhkcbn32.exeGoekohjd.exeGoghdhhb.exeGeapabpo.exeGhommmob.exeGoiejg32.exeGahafc32.exeGhbicmmp.exeGkpeohlc.exeGajnlb32.exeGdhjhnbd.exeGkbbdh32.exeGaljabam.exeHhfbnl32.exeHoqkkfpg.exeHboggbok.exeHhioclgg.exeHocgpf32.exeHbadla32.exeHdpphm32.exeHgnldh32.exeHoedff32.exeHbcqba32.exeHdbmnm32.exeHklekg32.exeHnjagb32.exeHbfmgaic.exeHddiclhf.exeHojnaehl.exeHbhjmqgp.exeIdffilfd.exeIffbcomf.exeIdicol32.exeIkckkfln.exeIoogld32.exeIbmchp32.exeIiglejjg.exeIkehaejk.exeIoadadbd.exeIbopnpah.exeIiihjj32.exeIkgdfe32.exeIbamcooe.exeIepiokni.exeIkjale32.exeIoemmcno.exeJbdiio32.exeJebfej32.exeJbffno32.exeJedbjj32.exepid process 5104 Fgdqglbm.exe 1284 Fokhiibo.exe 4240 Fajeeeac.exe 1092 Feeqec32.exe 4616 Fdhaapqf.exe 1532 Fkbinj32.exe 4576 Fnqejfgg.exe 1716 Fehmkchi.exe 64 Fkdfcjfq.exe 2008 Fncboeed.exe 4188 Fejjqcff.exe 712 Fgkfhk32.exe 4752 Fneoeeca.exe 2828 Faqkedkk.exe 2784 Ghkcbn32.exe 4844 Goekohjd.exe 4988 Goghdhhb.exe 4884 Geapabpo.exe 2884 Ghommmob.exe 1596 Goiejg32.exe 3064 Gahafc32.exe 1680 Ghbicmmp.exe 264 Gkpeohlc.exe 3696 Gajnlb32.exe 3108 Gdhjhnbd.exe 2788 Gkbbdh32.exe 3120 Galjabam.exe 4956 Hhfbnl32.exe 792 Hoqkkfpg.exe 2524 Hboggbok.exe 3296 Hhioclgg.exe 1132 Hocgpf32.exe 4412 Hbadla32.exe 4856 Hdpphm32.exe 2076 Hgnldh32.exe 3708 Hoedff32.exe 4976 Hbcqba32.exe 516 Hdbmnm32.exe 2204 Hklekg32.exe 904 Hnjagb32.exe 4356 Hbfmgaic.exe 3024 Hddiclhf.exe 1484 Hojnaehl.exe 4880 Hbhjmqgp.exe 3992 Idffilfd.exe 5112 Iffbcomf.exe 2716 Idicol32.exe 3488 Ikckkfln.exe 4408 Ioogld32.exe 3440 Ibmchp32.exe 5040 Iiglejjg.exe 3432 Ikehaejk.exe 2740 Ioadadbd.exe 2532 Ibopnpah.exe 2412 Iiihjj32.exe 2276 Ikgdfe32.exe 3060 Ibamcooe.exe 4860 Iepiokni.exe 688 Ikjale32.exe 992 Ioemmcno.exe 5060 Jbdiio32.exe 1868 Jebfej32.exe 3504 Jbffno32.exe 1768 Jedbjj32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Eppojm32.exeFdjgljkh.exeJllmdpbj.exeLjeppa32.exeMakghjlk.exeMpmeknkb.exeHmdjgf32.exePobfeilm.exeCfmgjekp.exeJjefidmo.exeCfjdjo32.exeGokmnjhe.exeFpqgakql.exeGfobnnph.exeIgkakpld.exeKbhepfgo.exeNbgach32.exeNifbka32.exeNlhhqhie.exeEigenf32.exeAjianleg.exeLibmmpol.exeLigfho32.exeNidfeaeb.exeAfokhg32.exeGoiejg32.exeGkpeohlc.exeJgodlidc.exeMjehfoqi.exeDjjclgib.exeGpbmldkn.exeGplgmifo.exeOmdnihaj.exeKakelb32.exeNkpbgdlj.exeAhaann32.exePlgdcj32.exeAmhnjhdk.exeJhmkkc32.exePonddp32.exeGbecco32.exeCjkppc32.exeIkoqaj32.exeAhkddlek.exeDiiimhjh.exedescription ioc process File created C:\Windows\SysWOW64\Pjhpod32.exe File created C:\Windows\SysWOW64\Dbmnokkp.dll Eppojm32.exe File opened for modification C:\Windows\SysWOW64\Icohfelc.exe File opened for modification C:\Windows\SysWOW64\Fhecmhca.exe Fdjgljkh.exe File created C:\Windows\SysWOW64\Jphieo32.exe Jllmdpbj.exe File opened for modification C:\Windows\SysWOW64\Lmcllm32.exe Ljeppa32.exe File created C:\Windows\SysWOW64\Lbkogh32.dll Makghjlk.exe File opened for modification C:\Windows\SysWOW64\Llqhlglf.exe File created C:\Windows\SysWOW64\Dhjkoahi.dll File created C:\Windows\SysWOW64\Mopefk32.exe Mpmeknkb.exe File created C:\Windows\SysWOW64\Bjgidkfj.dll Hmdjgf32.exe File opened for modification C:\Windows\SysWOW64\Papbadkq.exe Pobfeilm.exe File created C:\Windows\SysWOW64\Cgakmlgc.dll File opened for modification C:\Windows\SysWOW64\Cilcfpjd.exe Cfmgjekp.exe File created C:\Windows\SysWOW64\Qojggjko.dll Jjefidmo.exe File opened for modification C:\Windows\SysWOW64\Chipfj32.exe Cfjdjo32.exe File created C:\Windows\SysWOW64\Gfbeogig.exe Gokmnjhe.exe File created C:\Windows\SysWOW64\Fnaofonk.dll File opened for modification C:\Windows\SysWOW64\Aakkbmng.exe File opened for modification C:\Windows\SysWOW64\Fhhpbhao.exe Fpqgakql.exe File created C:\Windows\SysWOW64\Gimojipl.exe Gfobnnph.exe File opened for modification C:\Windows\SysWOW64\Ijjnglkg.exe Igkakpld.exe File opened for modification C:\Windows\SysWOW64\Kakelb32.exe Kbhepfgo.exe File created C:\Windows\SysWOW64\Nefmoc32.exe Nbgach32.exe File created C:\Windows\SysWOW64\Oldogm32.exe Nifbka32.exe File created C:\Windows\SysWOW64\Njkile32.exe Nlhhqhie.exe File created C:\Windows\SysWOW64\Ekeaja32.exe Eigenf32.exe File created C:\Windows\SysWOW64\Amhnjhdk.exe Ajianleg.exe File created C:\Windows\SysWOW64\Ajjihd32.dll Fdjgljkh.exe File created C:\Windows\SysWOW64\Emopnpon.dll File created C:\Windows\SysWOW64\Galbgl32.dll File opened for modification C:\Windows\SysWOW64\Pafipppp.exe File created C:\Windows\SysWOW64\Lgemhm32.exe Libmmpol.exe File created C:\Windows\SysWOW64\Llecdk32.exe Ligfho32.exe File created C:\Windows\SysWOW64\Ilbcnfhh.dll Nidfeaeb.exe File created C:\Windows\SysWOW64\Ikopge32.dll Afokhg32.exe File created C:\Windows\SysWOW64\Ckfegp32.exe File created C:\Windows\SysWOW64\Gahafc32.exe Goiejg32.exe File created C:\Windows\SysWOW64\Gajnlb32.exe Gkpeohlc.exe File created C:\Windows\SysWOW64\Jjnqhecf.exe Jgodlidc.exe File opened for modification C:\Windows\SysWOW64\Mmdebjpm.exe Mjehfoqi.exe File opened for modification C:\Windows\SysWOW64\Mgpoondb.exe File created C:\Windows\SysWOW64\Lldjkako.dll File created C:\Windows\SysWOW64\Dimcgdpm.exe Djjclgib.exe File created C:\Windows\SysWOW64\Gbqjhpja.exe Gpbmldkn.exe File opened for modification C:\Windows\SysWOW64\Gdhcmh32.exe Gplgmifo.exe File created C:\Windows\SysWOW64\Jeeabo32.dll Omdnihaj.exe File opened for modification C:\Windows\SysWOW64\Lchcca32.exe File created C:\Windows\SysWOW64\Libmmpol.exe Kakelb32.exe File created C:\Windows\SysWOW64\Dlcpkl32.dll Nkpbgdlj.exe File created C:\Windows\SysWOW64\Aokikhdb.exe Ahaann32.exe File created C:\Windows\SysWOW64\Jbhmmpba.dll File created C:\Windows\SysWOW64\Pamoao32.exe File created C:\Windows\SysWOW64\Pcampdjk.exe Plgdcj32.exe File created C:\Windows\SysWOW64\Aofjfcco.exe Amhnjhdk.exe File created C:\Windows\SysWOW64\Jgpkfpgo.exe Jhmkkc32.exe File created C:\Windows\SysWOW64\Afmgobac.dll File created C:\Windows\SysWOW64\Onpafg32.dll Ponddp32.exe File opened for modification C:\Windows\SysWOW64\Gklkdl32.exe Gbecco32.exe File created C:\Windows\SysWOW64\Ckmmgk32.exe Cjkppc32.exe File created C:\Windows\SysWOW64\Obigec32.dll Ikoqaj32.exe File created C:\Windows\SysWOW64\Alfpek32.exe Ahkddlek.exe File created C:\Windows\SysWOW64\Docaibae.exe Diiimhjh.exe File created C:\Windows\SysWOW64\Loodhbkj.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 7980 7748 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Bjnkik32.exeDjgplagi.exeEfbjlbih.exeNjokmnho.exeEkeaja32.exeHhfbnl32.exeAjlnclce.exeDpfeihcn.exeLjccjaqo.exeMnlklnmg.exeDaobmb32.exeAaofmi32.exeNdgpec32.exeNopgcbpn.exeKjlmic32.exeNnhkhm32.exeAohflb32.exeKikgladd.exeMjehfoqi.exeGhommmob.exeLfpggiif.exeHalcglnb.exeHphfhgla.exeGiahei32.exeKepbfh32.exeHnpgfm32.exeGpdcgnep.exeGhbicmmp.exeAjdhcm32.exeMoniak32.exeNoglgj32.exeEakaiq32.exeFmadji32.exeIffbcomf.exeIkehaejk.exeQimkhg32.exeCkmmgk32.exeGajnlb32.exeQoggjo32.exeNegcjm32.exeOoicojdg.exeGoiphjjg.exeNghfof32.exeJjlkmkie.exeDkclndma.exeGfnkdh32.exeAfokhg32.exeCbfedeoa.exeDpgldn32.exeCfajjnco.exeLengmppk.exeMjafffhj.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjnkik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djgplagi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efbjlbih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njokmnho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekeaja32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhfbnl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajlnclce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpfeihcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljccjaqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnlklnmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daobmb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aaofmi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndgpec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nopgcbpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjlmic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nnhkhm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aohflb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kikgladd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjehfoqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghommmob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfpggiif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Halcglnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hphfhgla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Giahei32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kepbfh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnpgfm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpdcgnep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghbicmmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajdhcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moniak32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Noglgj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eakaiq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmadji32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iffbcomf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikehaejk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qimkhg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckmmgk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gajnlb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qoggjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Negcjm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ooicojdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Goiphjjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nghfof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjlkmkie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkclndma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfnkdh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afokhg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbfedeoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpgldn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfajjnco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lengmppk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjafffhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Modifies registry class 64 IoCs
Processes:
Gajnlb32.exeMibfdn32.exeDlmeniib.exeNbgach32.exeOcadif32.exeDpfeihcn.exeOndjck32.exeCnehna32.exeInqqmkgf.exeNenpdn32.exeQkngopag.exeGiodecjm.exeIdffilfd.exeJqhpoeno.exeLjeppa32.exeFmmkoj32.exeNoqomh32.exeJdkaqcpp.exeOaejpmij.exeLkcfoklm.exeDmcobm32.exeFbkibj32.exeIhhapc32.exeMbpdhb32.exeAohflb32.exeCakibchj.exeLdfjbkbg.exeQeqhmbpd.exeGlkdlokd.exeFncboeed.exeCkjpblig.exeFphckopm.exeJbkpingk.exeNonbhifl.exeGpealj32.exeBfddcfck.exeEpmkjgmf.exeQjpohnmb.exeQfdbgo32.exeGoekohjd.exeHpnmhbaq.exeNhnbkbkm.exePlcjinmi.exeJegopjha.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcaalm32.dll" Gajnlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mibfdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlmeniib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lllekp32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbgach32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocadif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmaliofd.dll" Dpfeihcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ondjck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnehna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjbcnc32.dll" Inqqmkgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnppcb32.dll" Nenpdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qkngopag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noahciko.dll" Giodecjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ignnabip.dll" Idffilfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jqhpoeno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljeppa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmmkoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idffilfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkjmij32.dll" Noqomh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cekcgf32.dll" Jdkaqcpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oaejpmij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnaofdlo.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkcfoklm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmcobm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbkibj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihhapc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Famemf32.dll" Mbpdhb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aohflb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cakibchj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldfjbkbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fijkeo32.dll" Qeqhmbpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Glkdlokd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agfqfabn.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fncboeed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckjpblig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnbldeqj.dll" Fphckopm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhping32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llgpic32.dll" Jbkpingk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdlhlgnp.dll" Nonbhifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gpealj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pajpdhgm.dll" Bfddcfck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Epmkjgmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qjpohnmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjoidfpi.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppndamag.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhjihg32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qfdbgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cakibchj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blkggm32.dll" Lkcfoklm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Goekohjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpnmhbaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhnbkbkm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plcjinmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jegopjha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2N.exeFgdqglbm.exeFokhiibo.exeFajeeeac.exeFeeqec32.exeFdhaapqf.exeFkbinj32.exeFnqejfgg.exeFehmkchi.exeFkdfcjfq.exeFncboeed.exeFejjqcff.exeFgkfhk32.exeFneoeeca.exeFaqkedkk.exeGhkcbn32.exeGoekohjd.exeGoghdhhb.exeGeapabpo.exeGhommmob.exeGoiejg32.exeGahafc32.exedescription pid process target process PID 920 wrote to memory of 5104 920 e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2N.exe Fgdqglbm.exe PID 920 wrote to memory of 5104 920 e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2N.exe Fgdqglbm.exe PID 920 wrote to memory of 5104 920 e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2N.exe Fgdqglbm.exe PID 5104 wrote to memory of 1284 5104 Fgdqglbm.exe Fokhiibo.exe PID 5104 wrote to memory of 1284 5104 Fgdqglbm.exe Fokhiibo.exe PID 5104 wrote to memory of 1284 5104 Fgdqglbm.exe Fokhiibo.exe PID 1284 wrote to memory of 4240 1284 Fokhiibo.exe Fajeeeac.exe PID 1284 wrote to memory of 4240 1284 Fokhiibo.exe Fajeeeac.exe PID 1284 wrote to memory of 4240 1284 Fokhiibo.exe Fajeeeac.exe PID 4240 wrote to memory of 1092 4240 Fajeeeac.exe Feeqec32.exe PID 4240 wrote to memory of 1092 4240 Fajeeeac.exe Feeqec32.exe PID 4240 wrote to memory of 1092 4240 Fajeeeac.exe Feeqec32.exe PID 1092 wrote to memory of 4616 1092 Feeqec32.exe Fdhaapqf.exe PID 1092 wrote to memory of 4616 1092 Feeqec32.exe Fdhaapqf.exe PID 1092 wrote to memory of 4616 1092 Feeqec32.exe Fdhaapqf.exe PID 4616 wrote to memory of 1532 4616 Fdhaapqf.exe Fkbinj32.exe PID 4616 wrote to memory of 1532 4616 Fdhaapqf.exe Fkbinj32.exe PID 4616 wrote to memory of 1532 4616 Fdhaapqf.exe Fkbinj32.exe PID 1532 wrote to memory of 4576 1532 Fkbinj32.exe Fnqejfgg.exe PID 1532 wrote to memory of 4576 1532 Fkbinj32.exe Fnqejfgg.exe PID 1532 wrote to memory of 4576 1532 Fkbinj32.exe Fnqejfgg.exe PID 4576 wrote to memory of 1716 4576 Fnqejfgg.exe Fehmkchi.exe PID 4576 wrote to memory of 1716 4576 Fnqejfgg.exe Fehmkchi.exe PID 4576 wrote to memory of 1716 4576 Fnqejfgg.exe Fehmkchi.exe PID 1716 wrote to memory of 64 1716 Fehmkchi.exe Fkdfcjfq.exe PID 1716 wrote to memory of 64 1716 Fehmkchi.exe Fkdfcjfq.exe PID 1716 wrote to memory of 64 1716 Fehmkchi.exe Fkdfcjfq.exe PID 64 wrote to memory of 2008 64 Fkdfcjfq.exe Fncboeed.exe PID 64 wrote to memory of 2008 64 Fkdfcjfq.exe Fncboeed.exe PID 64 wrote to memory of 2008 64 Fkdfcjfq.exe Fncboeed.exe PID 2008 wrote to memory of 4188 2008 Fncboeed.exe Fejjqcff.exe PID 2008 wrote to memory of 4188 2008 Fncboeed.exe Fejjqcff.exe PID 2008 wrote to memory of 4188 2008 Fncboeed.exe Fejjqcff.exe PID 4188 wrote to memory of 712 4188 Fejjqcff.exe Fgkfhk32.exe PID 4188 wrote to memory of 712 4188 Fejjqcff.exe Fgkfhk32.exe PID 4188 wrote to memory of 712 4188 Fejjqcff.exe Fgkfhk32.exe PID 712 wrote to memory of 4752 712 Fgkfhk32.exe Fneoeeca.exe PID 712 wrote to memory of 4752 712 Fgkfhk32.exe Fneoeeca.exe PID 712 wrote to memory of 4752 712 Fgkfhk32.exe Fneoeeca.exe PID 4752 wrote to memory of 2828 4752 Fneoeeca.exe Faqkedkk.exe PID 4752 wrote to memory of 2828 4752 Fneoeeca.exe Faqkedkk.exe PID 4752 wrote to memory of 2828 4752 Fneoeeca.exe Faqkedkk.exe PID 2828 wrote to memory of 2784 2828 Faqkedkk.exe Ghkcbn32.exe PID 2828 wrote to memory of 2784 2828 Faqkedkk.exe Ghkcbn32.exe PID 2828 wrote to memory of 2784 2828 Faqkedkk.exe Ghkcbn32.exe PID 2784 wrote to memory of 4844 2784 Ghkcbn32.exe Goekohjd.exe PID 2784 wrote to memory of 4844 2784 Ghkcbn32.exe Goekohjd.exe PID 2784 wrote to memory of 4844 2784 Ghkcbn32.exe Goekohjd.exe PID 4844 wrote to memory of 4988 4844 Goekohjd.exe Goghdhhb.exe PID 4844 wrote to memory of 4988 4844 Goekohjd.exe Goghdhhb.exe PID 4844 wrote to memory of 4988 4844 Goekohjd.exe Goghdhhb.exe PID 4988 wrote to memory of 4884 4988 Goghdhhb.exe Geapabpo.exe PID 4988 wrote to memory of 4884 4988 Goghdhhb.exe Geapabpo.exe PID 4988 wrote to memory of 4884 4988 Goghdhhb.exe Geapabpo.exe PID 4884 wrote to memory of 2884 4884 Geapabpo.exe Ghommmob.exe PID 4884 wrote to memory of 2884 4884 Geapabpo.exe Ghommmob.exe PID 4884 wrote to memory of 2884 4884 Geapabpo.exe Ghommmob.exe PID 2884 wrote to memory of 1596 2884 Ghommmob.exe Goiejg32.exe PID 2884 wrote to memory of 1596 2884 Ghommmob.exe Goiejg32.exe PID 2884 wrote to memory of 1596 2884 Ghommmob.exe Goiejg32.exe PID 1596 wrote to memory of 3064 1596 Goiejg32.exe Gahafc32.exe PID 1596 wrote to memory of 3064 1596 Goiejg32.exe Gahafc32.exe PID 1596 wrote to memory of 3064 1596 Goiejg32.exe Gahafc32.exe PID 3064 wrote to memory of 1680 3064 Gahafc32.exe Ghbicmmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2N.exe"C:\Users\Admin\AppData\Local\Temp\e71f3c18b6dfe909513f1c644a7d762b58ca3772875c4546ae85699fe7d0c4e2N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\Fgdqglbm.exeC:\Windows\system32\Fgdqglbm.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\Fokhiibo.exeC:\Windows\system32\Fokhiibo.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\Fajeeeac.exeC:\Windows\system32\Fajeeeac.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\Feeqec32.exeC:\Windows\system32\Feeqec32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\Fdhaapqf.exeC:\Windows\system32\Fdhaapqf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\Fkbinj32.exeC:\Windows\system32\Fkbinj32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\Fnqejfgg.exeC:\Windows\system32\Fnqejfgg.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\Fehmkchi.exeC:\Windows\system32\Fehmkchi.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\Fkdfcjfq.exeC:\Windows\system32\Fkdfcjfq.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\Fncboeed.exeC:\Windows\system32\Fncboeed.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Fejjqcff.exeC:\Windows\system32\Fejjqcff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\Fgkfhk32.exeC:\Windows\system32\Fgkfhk32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\Fneoeeca.exeC:\Windows\system32\Fneoeeca.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\Faqkedkk.exeC:\Windows\system32\Faqkedkk.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Ghkcbn32.exeC:\Windows\system32\Ghkcbn32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Goekohjd.exeC:\Windows\system32\Goekohjd.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\Goghdhhb.exeC:\Windows\system32\Goghdhhb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\Geapabpo.exeC:\Windows\system32\Geapabpo.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\Ghommmob.exeC:\Windows\system32\Ghommmob.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Goiejg32.exeC:\Windows\system32\Goiejg32.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\Gahafc32.exeC:\Windows\system32\Gahafc32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\Ghbicmmp.exeC:\Windows\system32\Ghbicmmp.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\Gkpeohlc.exeC:\Windows\system32\Gkpeohlc.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:264 -
C:\Windows\SysWOW64\Gajnlb32.exeC:\Windows\system32\Gajnlb32.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3696 -
C:\Windows\SysWOW64\Gdhjhnbd.exeC:\Windows\system32\Gdhjhnbd.exe26⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\SysWOW64\Gkbbdh32.exeC:\Windows\system32\Gkbbdh32.exe27⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Galjabam.exeC:\Windows\system32\Galjabam.exe28⤵
- Executes dropped EXE
PID:3120 -
C:\Windows\SysWOW64\Hhfbnl32.exeC:\Windows\system32\Hhfbnl32.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Windows\SysWOW64\Hoqkkfpg.exeC:\Windows\system32\Hoqkkfpg.exe30⤵
- Executes dropped EXE
PID:792 -
C:\Windows\SysWOW64\Hboggbok.exeC:\Windows\system32\Hboggbok.exe31⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\Hhioclgg.exeC:\Windows\system32\Hhioclgg.exe32⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\SysWOW64\Hocgpf32.exeC:\Windows\system32\Hocgpf32.exe33⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Hbadla32.exeC:\Windows\system32\Hbadla32.exe34⤵
- Executes dropped EXE
PID:4412 -
C:\Windows\SysWOW64\Hdpphm32.exeC:\Windows\system32\Hdpphm32.exe35⤵
- Executes dropped EXE
PID:4856 -
C:\Windows\SysWOW64\Hgnldh32.exeC:\Windows\system32\Hgnldh32.exe36⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\Hoedff32.exeC:\Windows\system32\Hoedff32.exe37⤵
- Executes dropped EXE
PID:3708 -
C:\Windows\SysWOW64\Hbcqba32.exeC:\Windows\system32\Hbcqba32.exe38⤵
- Executes dropped EXE
PID:4976 -
C:\Windows\SysWOW64\Hdbmnm32.exeC:\Windows\system32\Hdbmnm32.exe39⤵
- Executes dropped EXE
PID:516 -
C:\Windows\SysWOW64\Hklekg32.exeC:\Windows\system32\Hklekg32.exe40⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Hnjagb32.exeC:\Windows\system32\Hnjagb32.exe41⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Hbfmgaic.exeC:\Windows\system32\Hbfmgaic.exe42⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\Hddiclhf.exeC:\Windows\system32\Hddiclhf.exe43⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Hojnaehl.exeC:\Windows\system32\Hojnaehl.exe44⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\Hbhjmqgp.exeC:\Windows\system32\Hbhjmqgp.exe45⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\Idffilfd.exeC:\Windows\system32\Idffilfd.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:3992 -
C:\Windows\SysWOW64\Iffbcomf.exeC:\Windows\system32\Iffbcomf.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Windows\SysWOW64\Idicol32.exeC:\Windows\system32\Idicol32.exe48⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Ikckkfln.exeC:\Windows\system32\Ikckkfln.exe49⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\Ioogld32.exeC:\Windows\system32\Ioogld32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\Ibmchp32.exeC:\Windows\system32\Ibmchp32.exe51⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\Iiglejjg.exeC:\Windows\system32\Iiglejjg.exe52⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\SysWOW64\Ikehaejk.exeC:\Windows\system32\Ikehaejk.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3432 -
C:\Windows\SysWOW64\Ioadadbd.exeC:\Windows\system32\Ioadadbd.exe54⤵
- Executes dropped EXE
PID:2740 -
C:\Windows\SysWOW64\Ibopnpah.exeC:\Windows\system32\Ibopnpah.exe55⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\Iiihjj32.exeC:\Windows\system32\Iiihjj32.exe56⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\Ikgdfe32.exeC:\Windows\system32\Ikgdfe32.exe57⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\Ibamcooe.exeC:\Windows\system32\Ibamcooe.exe58⤵
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\Iepiokni.exeC:\Windows\system32\Iepiokni.exe59⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\Ikjale32.exeC:\Windows\system32\Ikjale32.exe60⤵
- Executes dropped EXE
PID:688 -
C:\Windows\SysWOW64\Ioemmcno.exeC:\Windows\system32\Ioemmcno.exe61⤵
- Executes dropped EXE
PID:992 -
C:\Windows\SysWOW64\Jbdiio32.exeC:\Windows\system32\Jbdiio32.exe62⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\Jebfej32.exeC:\Windows\system32\Jebfej32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\Jbffno32.exeC:\Windows\system32\Jbffno32.exe64⤵
- Executes dropped EXE
PID:3504 -
C:\Windows\SysWOW64\Jedbjj32.exeC:\Windows\system32\Jedbjj32.exe65⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\Jipnkibm.exeC:\Windows\system32\Jipnkibm.exe66⤵PID:4092
-
C:\Windows\SysWOW64\Jnmgcpqd.exeC:\Windows\system32\Jnmgcpqd.exe67⤵PID:3952
-
C:\Windows\SysWOW64\Jfdodm32.exeC:\Windows\system32\Jfdodm32.exe68⤵PID:4924
-
C:\Windows\SysWOW64\Jegopjha.exeC:\Windows\system32\Jegopjha.exe69⤵
- Modifies registry class
PID:3520 -
C:\Windows\SysWOW64\Jpmcmbhg.exeC:\Windows\system32\Jpmcmbhg.exe70⤵PID:4644
-
C:\Windows\SysWOW64\Jbkpingk.exeC:\Windows\system32\Jbkpingk.exe71⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies registry class
PID:1480 -
C:\Windows\SysWOW64\Jffljm32.exeC:\Windows\system32\Jffljm32.exe72⤵PID:4744
-
C:\Windows\SysWOW64\Jghhaeeb.exeC:\Windows\system32\Jghhaeeb.exe73⤵PID:4384
-
C:\Windows\SysWOW64\Jnapno32.exeC:\Windows\system32\Jnapno32.exe74⤵PID:4352
-
C:\Windows\SysWOW64\Jelhki32.exeC:\Windows\system32\Jelhki32.exe75⤵PID:512
-
C:\Windows\SysWOW64\Jigdlhle.exeC:\Windows\system32\Jigdlhle.exe76⤵PID:392
-
C:\Windows\SysWOW64\Jpamhb32.exeC:\Windows\system32\Jpamhb32.exe77⤵PID:2124
-
C:\Windows\SysWOW64\Kndmdojl.exeC:\Windows\system32\Kndmdojl.exe78⤵PID:3988
-
C:\Windows\SysWOW64\Keneqi32.exeC:\Windows\system32\Keneqi32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3660 -
C:\Windows\SysWOW64\Klhnmcif.exeC:\Windows\system32\Klhnmcif.exe80⤵PID:2268
-
C:\Windows\SysWOW64\Kbbfjm32.exeC:\Windows\system32\Kbbfjm32.exe81⤵PID:3280
-
C:\Windows\SysWOW64\Kepbfh32.exeC:\Windows\system32\Kepbfh32.exe82⤵
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\Khonbdoj.exeC:\Windows\system32\Khonbdoj.exe83⤵PID:4920
-
C:\Windows\SysWOW64\Knifon32.exeC:\Windows\system32\Knifon32.exe84⤵PID:3624
-
C:\Windows\SysWOW64\Kfpnpk32.exeC:\Windows\system32\Kfpnpk32.exe85⤵PID:212
-
C:\Windows\SysWOW64\Kphcianj.exeC:\Windows\system32\Kphcianj.exe86⤵PID:1856
-
C:\Windows\SysWOW64\Knkcdn32.exeC:\Windows\system32\Knkcdn32.exe87⤵PID:1500
-
C:\Windows\SysWOW64\Kiqgbf32.exeC:\Windows\system32\Kiqgbf32.exe88⤵PID:1928
-
C:\Windows\SysWOW64\Klocnbcn.exeC:\Windows\system32\Klocnbcn.exe89⤵PID:3180
-
C:\Windows\SysWOW64\Kbilkl32.exeC:\Windows\system32\Kbilkl32.exe90⤵PID:1448
-
C:\Windows\SysWOW64\Keghgg32.exeC:\Windows\system32\Keghgg32.exe91⤵PID:1140
-
C:\Windows\SysWOW64\Khfdcc32.exeC:\Windows\system32\Khfdcc32.exe92⤵PID:632
-
C:\Windows\SysWOW64\Klapcaak.exeC:\Windows\system32\Klapcaak.exe93⤵PID:2692
-
C:\Windows\SysWOW64\Lnpmpmpo.exeC:\Windows\system32\Lnpmpmpo.exe94⤵PID:4080
-
C:\Windows\SysWOW64\Lejelg32.exeC:\Windows\system32\Lejelg32.exe95⤵PID:636
-
C:\Windows\SysWOW64\Lhhahb32.exeC:\Windows\system32\Lhhahb32.exe96⤵PID:4156
-
C:\Windows\SysWOW64\Lpoijpgb.exeC:\Windows\system32\Lpoijpgb.exe97⤵PID:5004
-
C:\Windows\SysWOW64\Lbnefkfe.exeC:\Windows\system32\Lbnefkfe.exe98⤵PID:2004
-
C:\Windows\SysWOW64\Lelabgfi.exeC:\Windows\system32\Lelabgfi.exe99⤵PID:1512
-
C:\Windows\SysWOW64\Lpafopeo.exeC:\Windows\system32\Lpafopeo.exe100⤵PID:1572
-
C:\Windows\SysWOW64\Lbpbkkdc.exeC:\Windows\system32\Lbpbkkdc.exe101⤵PID:552
-
C:\Windows\SysWOW64\Lhmjcbcj.exeC:\Windows\system32\Lhmjcbcj.exe102⤵PID:1832
-
C:\Windows\SysWOW64\Llhfdq32.exeC:\Windows\system32\Llhfdq32.exe103⤵PID:2476
-
C:\Windows\SysWOW64\Logbpljg.exeC:\Windows\system32\Logbpljg.exe104⤵PID:2492
-
C:\Windows\SysWOW64\Lfnkaiki.exeC:\Windows\system32\Lfnkaiki.exe105⤵PID:2748
-
C:\Windows\SysWOW64\Lhogia32.exeC:\Windows\system32\Lhogia32.exe106⤵PID:976
-
C:\Windows\SysWOW64\Lpfojo32.exeC:\Windows\system32\Lpfojo32.exe107⤵PID:2284
-
C:\Windows\SysWOW64\Lfpggiif.exeC:\Windows\system32\Lfpggiif.exe108⤵
- System Location Discovery: System Language Discovery
PID:4132 -
C:\Windows\SysWOW64\Lioccdhj.exeC:\Windows\system32\Lioccdhj.exe109⤵PID:3636
-
C:\Windows\SysWOW64\Mlmpopgn.exeC:\Windows\system32\Mlmpopgn.exe110⤵PID:744
-
C:\Windows\SysWOW64\Moklkkfa.exeC:\Windows\system32\Moklkkfa.exe111⤵PID:1020
-
C:\Windows\SysWOW64\Mfbdmi32.exeC:\Windows\system32\Mfbdmi32.exe112⤵PID:3036
-
C:\Windows\SysWOW64\Miapid32.exeC:\Windows\system32\Miapid32.exe113⤵PID:3604
-
C:\Windows\SysWOW64\Mhdqdamb.exeC:\Windows\system32\Mhdqdamb.exe114⤵PID:1380
-
C:\Windows\SysWOW64\Moniak32.exeC:\Windows\system32\Moniak32.exe115⤵
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Windows\SysWOW64\Mbieajlh.exeC:\Windows\system32\Mbieajlh.exe116⤵PID:3512
-
C:\Windows\SysWOW64\Mehanell.exeC:\Windows\system32\Mehanell.exe117⤵PID:4164
-
C:\Windows\SysWOW64\Mhfmjqkp.exeC:\Windows\system32\Mhfmjqkp.exe118⤵PID:3848
-
C:\Windows\SysWOW64\Mpmeknkb.exeC:\Windows\system32\Mpmeknkb.exe119⤵
- Drops file in System32 directory
PID:2036 -
C:\Windows\SysWOW64\Mopefk32.exeC:\Windows\system32\Mopefk32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5144 -
C:\Windows\SysWOW64\Mfgnhhbo.exeC:\Windows\system32\Mfgnhhbo.exe121⤵PID:5184
-
C:\Windows\SysWOW64\Mifjdcbb.exeC:\Windows\system32\Mifjdcbb.exe122⤵PID:5228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-