Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a.exe
Resource
win10v2004-20241007-en
General
-
Target
152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a.exe
-
Size
96KB
-
MD5
fd187f5e53323f4c2f0fecc2d1c89752
-
SHA1
a9761f984153852db706ac2cafac33c23b42fc73
-
SHA256
152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a
-
SHA512
daa84e600daa79f8cf18a49cb12bba2581ad23eb2f5f5fb39861b48cf988f290a2697a2d2510bc484300cdf2c6abc04b2b47b0535208f621b8722783cec8d39a
-
SSDEEP
1536:FcHw/NhOowXJk2LYo0IXmPlBnLPbABCquhx/IZf2Le7RZObZUUWaegPYA2:3//wXZLYo0kmPlBnbIZkeClUUWae1
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lolaogdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lclfjehh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojimjjal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjjohe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aidlmcdl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajeemfil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdjjaj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loeceeli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Didnkogg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lclfjehh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbmcgpcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nocpfc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmmcad32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pckdin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjjfag32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlbefm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlcgdhch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojljpi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcfknodh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcfknodh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdqpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obdbolog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpedajgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccfmcedp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lplmhj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbkohn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Piagafda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpidfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpgqgjel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpbjbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lolaogdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbibcnie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omemqfbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcihco32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kblmcg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbibcnie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmggeohk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljiklonb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhnhnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbbnpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adnjek32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Capgpnbf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mllaci32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcnaonnp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpjmmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kimlqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lekbfpgk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mplfog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfkkmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qmhbmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qpikonoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfapmfkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bipliajo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kikokq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlcgdhch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oihdkgll.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oilmfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmbnjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ablafi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aikbnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbachf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bipliajo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckhkic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khifln32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
pid Process 2296 Jalaid32.exe 1600 Jlbefm32.exe 1060 Kblmcg32.exe 868 Khifln32.exe 4032 Kppnmk32.exe 4064 Kbnjig32.exe 912 Kemfeb32.exe 908 Kpbjbk32.exe 3320 Kcqgnfbe.exe 3996 Kikokq32.exe 2344 Kpdghkao.exe 1504 Kafcpc32.exe 2876 Kimlqp32.exe 2488 Kojdig32.exe 3176 Khbibm32.exe 4796 Lolaogdd.exe 4580 Lefika32.exe 2756 Llpahkcm.exe 1880 Lplmhj32.exe 4968 Lehfqqjn.exe 4472 Lclfjehh.exe 2668 Lekbfpgk.exe 3760 Llekcj32.exe 2396 Ljiklonb.exe 2236 Loeceeli.exe 400 Lhnhnk32.exe 5016 Mfbigo32.exe 1144 Mllaci32.exe 4040 Mojmpe32.exe 2976 Mbhilp32.exe 396 Mpjijhof.exe 4908 Mffbbomn.exe 220 Mlqjoiek.exe 5056 Mplfog32.exe 2680 Mbmcgpcb.exe 4624 Mhgkdj32.exe 5040 Mlcgdhch.exe 4992 Mbppmoap.exe 3512 Mfkkmn32.exe 3056 Nocpfc32.exe 2852 Nbblbo32.exe 4348 Nhldoifj.exe 2564 Nmgpoh32.exe 3776 Nbdiho32.exe 2008 Njkail32.exe 408 Nqeiefei.exe 1896 Nohiacld.exe 1456 Nfbanm32.exe 4704 Nmljjgkm.exe 4852 Nokfgbja.exe 4368 Nbibcnie.exe 2148 Nmofpgik.exe 1232 Nbkohn32.exe 2688 Njbgik32.exe 1932 Niegehno.exe 844 Oqlofeoa.exe 4440 Ofiholmi.exe 1368 Oihdkgll.exe 2664 Ooalga32.exe 5060 Obphcm32.exe 2960 Oijqpg32.exe 872 Omemqfbc.exe 4480 Obbeimaj.exe 1312 Ojimjjal.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Lhnhnk32.exe Loeceeli.exe File created C:\Windows\SysWOW64\Alocgfpg.dll Mbhilp32.exe File opened for modification C:\Windows\SysWOW64\Ammlhbnh.exe Ajoplgod.exe File opened for modification C:\Windows\SysWOW64\Bfocgfmn.exe Apekklea.exe File created C:\Windows\SysWOW64\Mfickphb.dll Bakmen32.exe File created C:\Windows\SysWOW64\Bpggpl32.exe Bmikdq32.exe File created C:\Windows\SysWOW64\Qkjbpk32.dll Cgolnd32.exe File created C:\Windows\SysWOW64\Pifple32.exe Pfgdpj32.exe File created C:\Windows\SysWOW64\Djmbpkja.dll Apndjm32.exe File opened for modification C:\Windows\SysWOW64\Ajeemfil.exe Afjjlg32.exe File created C:\Windows\SysWOW64\Lgekgpjm.dll Bmbnjo32.exe File created C:\Windows\SysWOW64\Qjlcfgag.exe Qmhbmc32.exe File created C:\Windows\SysWOW64\Ammlhbnh.exe Ajoplgod.exe File opened for modification C:\Windows\SysWOW64\Dpofhiod.exe Didnkogg.exe File created C:\Windows\SysWOW64\Fjpiapan.dll Nfbanm32.exe File created C:\Windows\SysWOW64\Bdjlbfin.dll Kikokq32.exe File created C:\Windows\SysWOW64\Ieokpbhe.dll Nbkohn32.exe File created C:\Windows\SysWOW64\Ppbeno32.exe Pihmae32.exe File opened for modification C:\Windows\SysWOW64\Ckoajb32.exe Cgdeicjf.exe File created C:\Windows\SysWOW64\Kppnmk32.exe Khifln32.exe File opened for modification C:\Windows\SysWOW64\Obphcm32.exe Ooalga32.exe File created C:\Windows\SysWOW64\Lolaogdd.exe Khbibm32.exe File created C:\Windows\SysWOW64\Fmpaaacg.dll Llpahkcm.exe File opened for modification C:\Windows\SysWOW64\Afepahei.exe Acgdelfe.exe File opened for modification C:\Windows\SysWOW64\Lclfjehh.exe Lehfqqjn.exe File created C:\Windows\SysWOW64\Nhldoifj.exe Nbblbo32.exe File created C:\Windows\SysWOW64\Cgbaak32.dll Ojimjjal.exe File created C:\Windows\SysWOW64\Piccfe32.exe Pfegjjck.exe File created C:\Windows\SysWOW64\Hmidnd32.dll Cpjmmi32.exe File opened for modification C:\Windows\SysWOW64\Mpjijhof.exe Mbhilp32.exe File created C:\Windows\SysWOW64\Bjjohe32.exe Bfocgfmn.exe File created C:\Windows\SysWOW64\Mhgkdj32.exe Mbmcgpcb.exe File created C:\Windows\SysWOW64\Nmgpoh32.exe Nhldoifj.exe File created C:\Windows\SysWOW64\Khchhjnf.dll Nmofpgik.exe File created C:\Windows\SysWOW64\Pkcajdkd.dll Kpbjbk32.exe File created C:\Windows\SysWOW64\Cmggeohk.exe Cikkeppa.exe File created C:\Windows\SysWOW64\Jlbefm32.exe Jalaid32.exe File opened for modification C:\Windows\SysWOW64\Kpdghkao.exe Kikokq32.exe File opened for modification C:\Windows\SysWOW64\Khbibm32.exe Kojdig32.exe File created C:\Windows\SysWOW64\Mllaci32.exe Mfbigo32.exe File created C:\Windows\SysWOW64\Nbkohn32.exe Nmofpgik.exe File opened for modification C:\Windows\SysWOW64\Qcdgom32.exe Qpikonoo.exe File opened for modification C:\Windows\SysWOW64\Bipliajo.exe Bfapmfkk.exe File opened for modification C:\Windows\SysWOW64\Pfegjjck.exe Pcfknodh.exe File created C:\Windows\SysWOW64\Kikokq32.exe Kcqgnfbe.exe File created C:\Windows\SysWOW64\Fiklig32.dll Nqeiefei.exe File created C:\Windows\SysWOW64\Obaigm32.dll Oihdkgll.exe File created C:\Windows\SysWOW64\Fbepla32.dll Pifple32.exe File opened for modification C:\Windows\SysWOW64\Apndjm32.exe Aidlmcdl.exe File opened for modification C:\Windows\SysWOW64\Kbnjig32.exe Kppnmk32.exe File opened for modification C:\Windows\SysWOW64\Kemfeb32.exe Kbnjig32.exe File created C:\Windows\SysWOW64\Necgdk32.dll Mlcgdhch.exe File created C:\Windows\SysWOW64\Piagafda.exe Ofbjdken.exe File created C:\Windows\SysWOW64\Ckhkic32.exe Cbachf32.exe File created C:\Windows\SysWOW64\Bgeffkol.dll Mplfog32.exe File created C:\Windows\SysWOW64\Nmofpgik.exe Nbibcnie.exe File opened for modification C:\Windows\SysWOW64\Pbbnpj32.exe Pmfegc32.exe File created C:\Windows\SysWOW64\Jkmplmef.dll Afepahei.exe File created C:\Windows\SysWOW64\Lldllaon.dll Bkcbnd32.exe File opened for modification C:\Windows\SysWOW64\Cdqpbi32.exe Cpedajgo.exe File created C:\Windows\SysWOW64\Mmgqogpe.dll Kppnmk32.exe File created C:\Windows\SysWOW64\Ngijllno.dll Lekbfpgk.exe File created C:\Windows\SysWOW64\Oopadn32.dll Obdbolog.exe File created C:\Windows\SysWOW64\Dghodc32.exe Dpofhiod.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5140 6032 WerFault.exe 237 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbibcnie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pckdin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qjjfag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjohcdab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdjjaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdncliaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cikkeppa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pifple32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcnaonnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgjbcebq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgolnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kemfeb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lplmhj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Niegehno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obphcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpggpl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpofhiod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amaeca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bideda32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkcbnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acgdelfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfocgfmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khifln32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llpahkcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Piagafda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcihco32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qpikonoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpgqgjel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kikokq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfbigo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obdbolog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bipliajo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpqjfk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Didnkogg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nohiacld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckhkic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckmedbeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opibhq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dghodc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jalaid32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbnjig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbhilp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oqlofeoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obbeimaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pamhmb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjjohe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ciioopad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kojdig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfbanm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajhbbegj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcqgnfbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mllaci32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhgkdj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmgpoh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bakmen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loeceeli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofbjdken.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfgdpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aapnip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpidfl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Capgpnbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ooalga32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mffbbomn.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlcgdhch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmmiandi.dll" Pmfegc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qiocbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdjjaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mffbbomn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmpaaacg.dll" Llpahkcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmofpgik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Appapm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Capgpnbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edflan32.dll" Cmidknfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajoplgod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idelqf32.dll" Lefika32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcgabk32.dll" Lplmhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgeicpna.dll" Lehfqqjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mbmcgpcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Giijoi32.dll" Pcfknodh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pfgdpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcqgnfbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kikokq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmggeohk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cldfolkf.dll" Kojdig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lehfqqjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofbjdken.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmmcad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aidlmcdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmikdq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aigkcl32.dll" Cdncliaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgqpbc32.dll" Mojmpe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nocpfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfegjjck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppbeno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcnaonnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cooepb32.dll" Pckdin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jalaid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcqgnfbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpgqgjel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nikpidbp.dll" Bbhqbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mojmpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mbppmoap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpedajgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcigff32.dll" Bmikdq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qbhjmlfg.dll" Kblmcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kppnmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdjmdlap.dll" Mbmcgpcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfbanm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apjllkfe.dll" Omemqfbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdpddmnb.dll" Qiocbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llpahkcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oilmfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acgdelfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Baiqpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lekbfpgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fiklig32.dll" Nqeiefei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obphcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkmomhoc.dll" Piagafda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lldllaon.dll" Bkcbnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cikkeppa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nibimbeo.dll" Lclfjehh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Obphcm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojimjjal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edkkqf32.dll" Pfegjjck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpgefj32.dll" Kemfeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfbigo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkiibe32.dll" Cmggeohk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2296 2440 152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a.exe 82 PID 2440 wrote to memory of 2296 2440 152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a.exe 82 PID 2440 wrote to memory of 2296 2440 152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a.exe 82 PID 2296 wrote to memory of 1600 2296 Jalaid32.exe 83 PID 2296 wrote to memory of 1600 2296 Jalaid32.exe 83 PID 2296 wrote to memory of 1600 2296 Jalaid32.exe 83 PID 1600 wrote to memory of 1060 1600 Jlbefm32.exe 84 PID 1600 wrote to memory of 1060 1600 Jlbefm32.exe 84 PID 1600 wrote to memory of 1060 1600 Jlbefm32.exe 84 PID 1060 wrote to memory of 868 1060 Kblmcg32.exe 85 PID 1060 wrote to memory of 868 1060 Kblmcg32.exe 85 PID 1060 wrote to memory of 868 1060 Kblmcg32.exe 85 PID 868 wrote to memory of 4032 868 Khifln32.exe 86 PID 868 wrote to memory of 4032 868 Khifln32.exe 86 PID 868 wrote to memory of 4032 868 Khifln32.exe 86 PID 4032 wrote to memory of 4064 4032 Kppnmk32.exe 87 PID 4032 wrote to memory of 4064 4032 Kppnmk32.exe 87 PID 4032 wrote to memory of 4064 4032 Kppnmk32.exe 87 PID 4064 wrote to memory of 912 4064 Kbnjig32.exe 88 PID 4064 wrote to memory of 912 4064 Kbnjig32.exe 88 PID 4064 wrote to memory of 912 4064 Kbnjig32.exe 88 PID 912 wrote to memory of 908 912 Kemfeb32.exe 89 PID 912 wrote to memory of 908 912 Kemfeb32.exe 89 PID 912 wrote to memory of 908 912 Kemfeb32.exe 89 PID 908 wrote to memory of 3320 908 Kpbjbk32.exe 90 PID 908 wrote to memory of 3320 908 Kpbjbk32.exe 90 PID 908 wrote to memory of 3320 908 Kpbjbk32.exe 90 PID 3320 wrote to memory of 3996 3320 Kcqgnfbe.exe 91 PID 3320 wrote to memory of 3996 3320 Kcqgnfbe.exe 91 PID 3320 wrote to memory of 3996 3320 Kcqgnfbe.exe 91 PID 3996 wrote to memory of 2344 3996 Kikokq32.exe 92 PID 3996 wrote to memory of 2344 3996 Kikokq32.exe 92 PID 3996 wrote to memory of 2344 3996 Kikokq32.exe 92 PID 2344 wrote to memory of 1504 2344 Kpdghkao.exe 93 PID 2344 wrote to memory of 1504 2344 Kpdghkao.exe 93 PID 2344 wrote to memory of 1504 2344 Kpdghkao.exe 93 PID 1504 wrote to memory of 2876 1504 Kafcpc32.exe 94 PID 1504 wrote to memory of 2876 1504 Kafcpc32.exe 94 PID 1504 wrote to memory of 2876 1504 Kafcpc32.exe 94 PID 2876 wrote to memory of 2488 2876 Kimlqp32.exe 95 PID 2876 wrote to memory of 2488 2876 Kimlqp32.exe 95 PID 2876 wrote to memory of 2488 2876 Kimlqp32.exe 95 PID 2488 wrote to memory of 3176 2488 Kojdig32.exe 96 PID 2488 wrote to memory of 3176 2488 Kojdig32.exe 96 PID 2488 wrote to memory of 3176 2488 Kojdig32.exe 96 PID 3176 wrote to memory of 4796 3176 Khbibm32.exe 97 PID 3176 wrote to memory of 4796 3176 Khbibm32.exe 97 PID 3176 wrote to memory of 4796 3176 Khbibm32.exe 97 PID 4796 wrote to memory of 4580 4796 Lolaogdd.exe 98 PID 4796 wrote to memory of 4580 4796 Lolaogdd.exe 98 PID 4796 wrote to memory of 4580 4796 Lolaogdd.exe 98 PID 4580 wrote to memory of 2756 4580 Lefika32.exe 99 PID 4580 wrote to memory of 2756 4580 Lefika32.exe 99 PID 4580 wrote to memory of 2756 4580 Lefika32.exe 99 PID 2756 wrote to memory of 1880 2756 Llpahkcm.exe 100 PID 2756 wrote to memory of 1880 2756 Llpahkcm.exe 100 PID 2756 wrote to memory of 1880 2756 Llpahkcm.exe 100 PID 1880 wrote to memory of 4968 1880 Lplmhj32.exe 101 PID 1880 wrote to memory of 4968 1880 Lplmhj32.exe 101 PID 1880 wrote to memory of 4968 1880 Lplmhj32.exe 101 PID 4968 wrote to memory of 4472 4968 Lehfqqjn.exe 102 PID 4968 wrote to memory of 4472 4968 Lehfqqjn.exe 102 PID 4968 wrote to memory of 4472 4968 Lehfqqjn.exe 102 PID 4472 wrote to memory of 2668 4472 Lclfjehh.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a.exe"C:\Users\Admin\AppData\Local\Temp\152ab2e9a09dc76543b174cad908c0d3e95c07115787361f938c75882dbfdf8a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Jalaid32.exeC:\Windows\system32\Jalaid32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Jlbefm32.exeC:\Windows\system32\Jlbefm32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\Kblmcg32.exeC:\Windows\system32\Kblmcg32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\Khifln32.exeC:\Windows\system32\Khifln32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\Kppnmk32.exeC:\Windows\system32\Kppnmk32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\Kbnjig32.exeC:\Windows\system32\Kbnjig32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\Kemfeb32.exeC:\Windows\system32\Kemfeb32.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\Kpbjbk32.exeC:\Windows\system32\Kpbjbk32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\Kcqgnfbe.exeC:\Windows\system32\Kcqgnfbe.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\Kikokq32.exeC:\Windows\system32\Kikokq32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\Kpdghkao.exeC:\Windows\system32\Kpdghkao.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Kafcpc32.exeC:\Windows\system32\Kafcpc32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\Kimlqp32.exeC:\Windows\system32\Kimlqp32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\Kojdig32.exeC:\Windows\system32\Kojdig32.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\Khbibm32.exeC:\Windows\system32\Khbibm32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\Lolaogdd.exeC:\Windows\system32\Lolaogdd.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\Lefika32.exeC:\Windows\system32\Lefika32.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\Llpahkcm.exeC:\Windows\system32\Llpahkcm.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Lplmhj32.exeC:\Windows\system32\Lplmhj32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\Lehfqqjn.exeC:\Windows\system32\Lehfqqjn.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\Lclfjehh.exeC:\Windows\system32\Lclfjehh.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\Lekbfpgk.exeC:\Windows\system32\Lekbfpgk.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2668 -
C:\Windows\SysWOW64\Llekcj32.exeC:\Windows\system32\Llekcj32.exe24⤵
- Executes dropped EXE
PID:3760 -
C:\Windows\SysWOW64\Ljiklonb.exeC:\Windows\system32\Ljiklonb.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\Loeceeli.exeC:\Windows\system32\Loeceeli.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\Lhnhnk32.exeC:\Windows\system32\Lhnhnk32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:400 -
C:\Windows\SysWOW64\Mfbigo32.exeC:\Windows\system32\Mfbigo32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5016 -
C:\Windows\SysWOW64\Mllaci32.exeC:\Windows\system32\Mllaci32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\Mojmpe32.exeC:\Windows\system32\Mojmpe32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:4040 -
C:\Windows\SysWOW64\Mbhilp32.exeC:\Windows\system32\Mbhilp32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\Mpjijhof.exeC:\Windows\system32\Mpjijhof.exe32⤵
- Executes dropped EXE
PID:396 -
C:\Windows\SysWOW64\Mffbbomn.exeC:\Windows\system32\Mffbbomn.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4908 -
C:\Windows\SysWOW64\Mlqjoiek.exeC:\Windows\system32\Mlqjoiek.exe34⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Mplfog32.exeC:\Windows\system32\Mplfog32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5056 -
C:\Windows\SysWOW64\Mbmcgpcb.exeC:\Windows\system32\Mbmcgpcb.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Mhgkdj32.exeC:\Windows\system32\Mhgkdj32.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\Mlcgdhch.exeC:\Windows\system32\Mlcgdhch.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5040 -
C:\Windows\SysWOW64\Mbppmoap.exeC:\Windows\system32\Mbppmoap.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:4992 -
C:\Windows\SysWOW64\Mfkkmn32.exeC:\Windows\system32\Mfkkmn32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\Nocpfc32.exeC:\Windows\system32\Nocpfc32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3056 -
C:\Windows\SysWOW64\Nbblbo32.exeC:\Windows\system32\Nbblbo32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\Nhldoifj.exeC:\Windows\system32\Nhldoifj.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4348 -
C:\Windows\SysWOW64\Nmgpoh32.exeC:\Windows\system32\Nmgpoh32.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\Nbdiho32.exeC:\Windows\system32\Nbdiho32.exe45⤵
- Executes dropped EXE
PID:3776 -
C:\Windows\SysWOW64\Njkail32.exeC:\Windows\system32\Njkail32.exe46⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\Nqeiefei.exeC:\Windows\system32\Nqeiefei.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:408 -
C:\Windows\SysWOW64\Nohiacld.exeC:\Windows\system32\Nohiacld.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\Nfbanm32.exeC:\Windows\system32\Nfbanm32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1456 -
C:\Windows\SysWOW64\Nmljjgkm.exeC:\Windows\system32\Nmljjgkm.exe50⤵
- Executes dropped EXE
PID:4704 -
C:\Windows\SysWOW64\Nokfgbja.exeC:\Windows\system32\Nokfgbja.exe51⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\Nbibcnie.exeC:\Windows\system32\Nbibcnie.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\Nmofpgik.exeC:\Windows\system32\Nmofpgik.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2148 -
C:\Windows\SysWOW64\Nbkohn32.exeC:\Windows\system32\Nbkohn32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\Njbgik32.exeC:\Windows\system32\Njbgik32.exe55⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Niegehno.exeC:\Windows\system32\Niegehno.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\Oqlofeoa.exeC:\Windows\system32\Oqlofeoa.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\Ofiholmi.exeC:\Windows\system32\Ofiholmi.exe58⤵
- Executes dropped EXE
PID:4440 -
C:\Windows\SysWOW64\Oihdkgll.exeC:\Windows\system32\Oihdkgll.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1368 -
C:\Windows\SysWOW64\Ooalga32.exeC:\Windows\system32\Ooalga32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\Obphcm32.exeC:\Windows\system32\Obphcm32.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5060 -
C:\Windows\SysWOW64\Oijqpg32.exeC:\Windows\system32\Oijqpg32.exe62⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\Omemqfbc.exeC:\Windows\system32\Omemqfbc.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:872 -
C:\Windows\SysWOW64\Obbeimaj.exeC:\Windows\system32\Obbeimaj.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4480 -
C:\Windows\SysWOW64\Ojimjjal.exeC:\Windows\system32\Ojimjjal.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1312 -
C:\Windows\SysWOW64\Oilmfg32.exeC:\Windows\system32\Oilmfg32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1152 -
C:\Windows\SysWOW64\Opfebqpd.exeC:\Windows\system32\Opfebqpd.exe67⤵PID:3712
-
C:\Windows\SysWOW64\Obdbolog.exeC:\Windows\system32\Obdbolog.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\Ojljpi32.exeC:\Windows\system32\Ojljpi32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2444 -
C:\Windows\SysWOW64\Opibhq32.exeC:\Windows\system32\Opibhq32.exe70⤵
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Windows\SysWOW64\Ofbjdken.exeC:\Windows\system32\Ofbjdken.exe71⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\Piagafda.exeC:\Windows\system32\Piagafda.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1964 -
C:\Windows\SysWOW64\Pmmcad32.exeC:\Windows\system32\Pmmcad32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\Pcfknodh.exeC:\Windows\system32\Pcfknodh.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3704 -
C:\Windows\SysWOW64\Pfegjjck.exeC:\Windows\system32\Pfegjjck.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Piccfe32.exeC:\Windows\system32\Piccfe32.exe76⤵PID:1468
-
C:\Windows\SysWOW64\Pcihco32.exeC:\Windows\system32\Pcihco32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3596 -
C:\Windows\SysWOW64\Pfgdpj32.exeC:\Windows\system32\Pfgdpj32.exe78⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3184 -
C:\Windows\SysWOW64\Pifple32.exeC:\Windows\system32\Pifple32.exe79⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\Pamhmb32.exeC:\Windows\system32\Pamhmb32.exe80⤵
- System Location Discovery: System Language Discovery
PID:1176 -
C:\Windows\SysWOW64\Pckdin32.exeC:\Windows\system32\Pckdin32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4824 -
C:\Windows\SysWOW64\Pihmae32.exeC:\Windows\system32\Pihmae32.exe82⤵
- Drops file in System32 directory
PID:4900 -
C:\Windows\SysWOW64\Ppbeno32.exeC:\Windows\system32\Ppbeno32.exe83⤵
- Modifies registry class
PID:4528 -
C:\Windows\SysWOW64\Pcnaonnp.exeC:\Windows\system32\Pcnaonnp.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1080 -
C:\Windows\SysWOW64\Pmfegc32.exeC:\Windows\system32\Pmfegc32.exe85⤵
- Drops file in System32 directory
- Modifies registry class
PID:2232 -
C:\Windows\SysWOW64\Pbbnpj32.exeC:\Windows\system32\Pbbnpj32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1812 -
C:\Windows\SysWOW64\Qjjfag32.exeC:\Windows\system32\Qjjfag32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\SysWOW64\Qmhbmc32.exeC:\Windows\system32\Qmhbmc32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1180 -
C:\Windows\SysWOW64\Qjlcfgag.exeC:\Windows\system32\Qjlcfgag.exe89⤵PID:336
-
C:\Windows\SysWOW64\Qiocbd32.exeC:\Windows\system32\Qiocbd32.exe90⤵
- Modifies registry class
PID:4380 -
C:\Windows\SysWOW64\Qpikonoo.exeC:\Windows\system32\Qpikonoo.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4356 -
C:\Windows\SysWOW64\Qcdgom32.exeC:\Windows\system32\Qcdgom32.exe92⤵PID:224
-
C:\Windows\SysWOW64\Ajoplgod.exeC:\Windows\system32\Ajoplgod.exe93⤵
- Drops file in System32 directory
- Modifies registry class
PID:5112 -
C:\Windows\SysWOW64\Ammlhbnh.exeC:\Windows\system32\Ammlhbnh.exe94⤵PID:1532
-
C:\Windows\SysWOW64\Acgdelfe.exeC:\Windows\system32\Acgdelfe.exe95⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2684 -
C:\Windows\SysWOW64\Afepahei.exeC:\Windows\system32\Afepahei.exe96⤵
- Drops file in System32 directory
PID:1988 -
C:\Windows\SysWOW64\Aidlmcdl.exeC:\Windows\system32\Aidlmcdl.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3756 -
C:\Windows\SysWOW64\Apndjm32.exeC:\Windows\system32\Apndjm32.exe98⤵
- Drops file in System32 directory
PID:4444 -
C:\Windows\SysWOW64\Ablafi32.exeC:\Windows\system32\Ablafi32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3316 -
C:\Windows\SysWOW64\Afhmggcf.exeC:\Windows\system32\Afhmggcf.exe100⤵PID:3828
-
C:\Windows\SysWOW64\Amaeca32.exeC:\Windows\system32\Amaeca32.exe101⤵
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\Appapm32.exeC:\Windows\system32\Appapm32.exe102⤵
- Modifies registry class
PID:4184 -
C:\Windows\SysWOW64\Afjjlg32.exeC:\Windows\system32\Afjjlg32.exe103⤵PID:1832
-
C:\Windows\SysWOW64\Afjjlg32.exeC:\Windows\system32\Afjjlg32.exe104⤵
- Drops file in System32 directory
PID:3140 -
C:\Windows\SysWOW64\Ajeemfil.exeC:\Windows\system32\Ajeemfil.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:624 -
C:\Windows\SysWOW64\Aapnip32.exeC:\Windows\system32\Aapnip32.exe106⤵
- System Location Discovery: System Language Discovery
PID:4920 -
C:\Windows\SysWOW64\Adnjek32.exeC:\Windows\system32\Adnjek32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1440 -
C:\Windows\SysWOW64\Ajhbbegj.exeC:\Windows\system32\Ajhbbegj.exe108⤵
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Windows\SysWOW64\Aikbnb32.exeC:\Windows\system32\Aikbnb32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3856 -
C:\Windows\SysWOW64\Apekklea.exeC:\Windows\system32\Apekklea.exe110⤵
- Drops file in System32 directory
PID:4972 -
C:\Windows\SysWOW64\Bfocgfmn.exeC:\Windows\system32\Bfocgfmn.exe111⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Windows\SysWOW64\Bjjohe32.exeC:\Windows\system32\Bjjohe32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3684 -
C:\Windows\SysWOW64\Bmikdq32.exeC:\Windows\system32\Bmikdq32.exe113⤵
- Drops file in System32 directory
- Modifies registry class
PID:4028 -
C:\Windows\SysWOW64\Bpggpl32.exeC:\Windows\system32\Bpggpl32.exe114⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\Bfapmfkk.exeC:\Windows\system32\Bfapmfkk.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4792 -
C:\Windows\SysWOW64\Bipliajo.exeC:\Windows\system32\Bipliajo.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:324 -
C:\Windows\SysWOW64\Bpidfl32.exeC:\Windows\system32\Bpidfl32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\Bbhqbg32.exeC:\Windows\system32\Bbhqbg32.exe118⤵
- Modifies registry class
PID:3424 -
C:\Windows\SysWOW64\Bjohcdab.exeC:\Windows\system32\Bjohcdab.exe119⤵
- System Location Discovery: System Language Discovery
PID:3708 -
C:\Windows\SysWOW64\Baiqpo32.exeC:\Windows\system32\Baiqpo32.exe120⤵
- Modifies registry class
PID:4292 -
C:\Windows\SysWOW64\Bplakkoi.exeC:\Windows\system32\Bplakkoi.exe121⤵PID:2812
-
C:\Windows\SysWOW64\Bbjmggnm.exeC:\Windows\system32\Bbjmggnm.exe122⤵PID:3812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-