Analysis
-
max time kernel
526s -
max time network
526s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 09:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mini-01-s3.vx-underground.org/samples/Samples/VirusSign%20Collection/2024.08/Virussign.2024.08.17.7z
Resource
win10v2004-20241007-en
General
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfcakh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmofmaao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idjdjipi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmkgmlko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpglfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdabog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egjeld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhfegb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqcgie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fplifofg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnojlh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gngllfol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqfqpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljfmgocq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnnlfneo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjcfoebo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgmkkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjfnined.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fqfleb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpmpickd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clmcdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceehmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggdbfeml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bqkiqe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdhlofpi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpihlobd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmneocgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmmgkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkhphmng.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdhladbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jknoma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgnlgjim.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Meedjgkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agleagbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gplgoj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hammllfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Loqjem32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjakebfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpaidb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eicbpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbejobal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgdloqal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fepbkhog.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilmikmhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgnloooa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pookqgeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcaqeg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpgndkhb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kikjfhcp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lambcc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcmqcc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifjohe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iekpfmpl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohnlcndb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpmpickd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghbbhmem.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijjedc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cegnhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dqdncl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bojoaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfaaogcg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahinld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djmifg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ficlfl32.exe -
Berbew family
-
Detect Neshta payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000241fa-3072.dat family_neshta -
Floxif family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Xmrig family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000024062-2256.dat floxif -
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/files/0x0007000000023e54-1204.dat xmrig behavioral1/files/0x0007000000024065-2262.dat xmrig behavioral1/files/0x0007000000024160-2764.dat xmrig behavioral1/files/0x00070000000240b0-2412.dat xmrig behavioral1/files/0x0007000000024208-3100.dat xmrig behavioral1/files/0x0007000000024523-4686.dat xmrig -
Drops file in Drivers directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\SETC77D.tmp rundll32.exe File created C:\Windows\SysWOW64\drivers\is-SJRV7.tmp setup.tmp File created C:\Windows\SysWOW64\drivers\is-349Q4.tmp setup.tmp File created C:\Windows\system32\drivers\is-C5IL4.tmp setup.tmp File opened for modification C:\Windows\SysWOW64\drivers\usbdpfp.sys rundll32.exe File opened for modification C:\Windows\SysWOW64\drivers\SETC77D.tmp rundll32.exe File created C:\Windows\SysWOW64\drivers\is-IF01R.tmp setup.tmp File opened for modification C:\Windows\SysWOW64\drivers\SETC76D.tmp rundll32.exe File created C:\Windows\SysWOW64\drivers\SETC76D.tmp rundll32.exe File opened for modification C:\Windows\SysWOW64\drivers\dpK00701.sys rundll32.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000024062-2256.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation virussign.com_b7b24ccb98b071178b799b13d7f41eb7.vir.exe -
Executes dropped EXE 64 IoCs
pid Process 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 4172 WindowsServiceHandler.exe 6900 setup.exe 6840 setup.tmp 5988 dpinst32.exe 6044 DpHost.exe 6684 iZHost.exe 6092 iZHost.exe 5548 UpdateConnector.exe 2256 UpdateSqliteRemote.exe 1616 UpdateIBMTranslator.exe 4896 virussign.com_a07af14eb529b98e8030ea76f21a49ca.vir.exe 6972 UpdateFMS.exe 7040 InstallSettings.exe 1728 InstallSettings.exe 5144 virussign.com_d985f013485e4af8a424939ed3ddd7ca.vir.exe 5232 Eebgjk32.exe 5864 Fcfhco32.exe 4020 Fpjhmc32.exe 2692 Fjbmfi32.exe 1016 Fckaoneo.exe 3680 Fpoahbdh.exe 624 Fpannb32.exe 3736 Fpckcb32.exe 2400 Gngllfol.exe 5880 Gqhdnaln.exe 5640 Gloecbaa.exe 1400 Gnoame32.exe 812 Gggffkoe.exe 2380 Hmfkda32.exe 6960 Hnehndbl.exe 6912 Hgnlgjim.exe 6860 Hqfqpo32.exe 6832 Hnjaic32.exe 6660 Hjabnd32.exe 6576 Inokdcjb.exe 6688 Ifjohe32.exe 5352 Iekpfmpl.exe 5336 Ijjedc32.exe 5368 Inhmjabg.exe 5952 Jjonobhk.exe 5968 Jjakebfi.exe 6244 Jcllcgjf.exe 5228 Jfmeebgg.exe 6280 Khlaoeoj.exe 1436 Kepbhjmd.exe 4968 Kmkgmlko.exe 2892 Kjogfp32.exe 6224 Kdhlofpi.exe 5796 Kfhdqa32.exe 6232 Ljfmgocq.exe 2756 Lhjnpc32.exe 6444 Lhmjfc32.exe 1488 Ldckkdfl.exe 1544 Lmlpcjll.exe 5708 Lgddlo32.exe 6496 Meedjgkl.exe 5472 Mmqioi32.exe 6072 Mdmnacna.exe 6412 Mdokfb32.exe 5308 Mmgoohbo.exe 5056 Nkkpilai.exe 5652 Nhppbq32.exe 6744 Najaqe32.exe -
Loads dropped DLL 64 IoCs
pid Process 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 6684 iZHost.exe 6684 iZHost.exe 2888 regsvr32.exe 2888 regsvr32.exe 5536 regsvr32.exe 5928 regsvr32.exe 5928 regsvr32.exe 6092 iZHost.exe 6092 iZHost.exe 6120 regsvr32.exe 6332 regsvr32.exe 6332 regsvr32.exe 6420 regsvr32.exe 5580 regsvr32.exe 5580 regsvr32.exe 5580 regsvr32.exe 5580 regsvr32.exe 6132 regsvr32.exe 6132 regsvr32.exe 6132 regsvr32.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe 5548 UpdateConnector.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeP9\\xoptiloc.exe" virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax7O\\dobxec.exe" virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Task Manager = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Task Manager\\taskmgr.exe" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini InstallSettings.exe File opened for modification C:\Windows\assembly\Desktop.ini InstallSettings.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Jfgeom32.exe Jgbhnqci.exe File opened for modification C:\Windows\SysWOW64\Bqpble32.exe Bqnefe32.exe File created C:\Windows\SysWOW64\Dgmpelbl.exe Dbphmedd.exe File created C:\Windows\SysWOW64\Npfcapdm.exe Npdglq32.exe File opened for modification C:\Windows\SysWOW64\Epehgnhg.exe Eflcoh32.exe File created C:\Windows\SysWOW64\Ggoike32.exe Ghnimn32.exe File opened for modification C:\Windows\SysWOW64\Hifacieo.exe Hammllfo.exe File created C:\Windows\SysWOW64\Ojoldkmd.dll Jchaik32.exe File created C:\Windows\SysWOW64\Lbhgfoml.dll Acmofleo.exe File created C:\Windows\SysWOW64\Kdnqalco.exe Kamhoafn.exe File opened for modification C:\Windows\SysWOW64\Omajlc32.exe Oblfnk32.exe File opened for modification C:\Windows\SysWOW64\Nqdlibib.exe Ndnlda32.exe File created C:\Windows\SysWOW64\Jgmlhl32.dll Ggdbfeml.exe File opened for modification C:\Windows\SysWOW64\Jgpkiq32.exe Jjlkom32.exe File created C:\Windows\SysWOW64\Kcfnji32.exe Kjniacba.exe File opened for modification C:\Windows\SysWOW64\Cjlbkm32.exe Clhbai32.exe File created C:\Windows\SysWOW64\Fgamjgna.exe Ehpmlpeb.exe File created C:\Windows\SysWOW64\Cqghld32.exe Cgodcnnl.exe File created C:\Windows\SysWOW64\Jihnaheb.exe Jopihbna.exe File opened for modification C:\Windows\SysWOW64\Nhoihjlf.exe Nkkinfnm.exe File created C:\Windows\SysWOW64\Bcmaei32.dll Bcmqcc32.exe File created C:\Windows\SysWOW64\Dcmjjadn.exe Dckmdagq.exe File opened for modification C:\Windows\SysWOW64\Kgpona32.exe Kpdjlgeg.exe File created C:\Windows\SysWOW64\Feifilom.dll Mbfmbg32.exe File created C:\Windows\SysWOW64\SETC77E.tmp rundll32.exe File opened for modification C:\Windows\SysWOW64\Lmlpcjll.exe Ldckkdfl.exe File created C:\Windows\SysWOW64\Qjficd32.dll Njjbdpja.exe File created C:\Windows\SysWOW64\Kfmmkojb.exe Kdnqalco.exe File created C:\Windows\SysWOW64\is-9J76E.tmp setup.tmp File opened for modification C:\Windows\SysWOW64\Hoefqp32.exe Hifacieo.exe File created C:\Windows\SysWOW64\Qddfomkd.exe Pohngfml.exe File created C:\Windows\SysWOW64\Konddabm.dll Jfbdjghk.exe File opened for modification C:\Windows\SysWOW64\Omkdlhip.exe Opgccd32.exe File created C:\Windows\SysWOW64\Egelqefe.exe Eaignkak.exe File created C:\Windows\SysWOW64\Bojoaf32.exe Bohblfbb.exe File created C:\Windows\SysWOW64\Eokqpa32.exe Dqfcnepb.exe File created C:\Windows\SysWOW64\is-H66MC.tmp setup.tmp File created C:\Windows\SysWOW64\Nmgjmi32.dll Odpcmpnl.exe File created C:\Windows\SysWOW64\Cqmbkkgi.dll Ceaobicd.exe File created C:\Windows\SysWOW64\Niehcjji.dll Ghmbbh32.exe File created C:\Windows\SysWOW64\Pkpgef32.dll Mohgpb32.exe File created C:\Windows\SysWOW64\Fplifofg.exe Fqfleb32.exe File created C:\Windows\SysWOW64\Hbjkabdh.dll Eebgjk32.exe File opened for modification C:\Windows\SysWOW64\Gqhdnaln.exe Gngllfol.exe File opened for modification C:\Windows\SysWOW64\Nfeldplp.exe Nmmgkj32.exe File created C:\Windows\SysWOW64\Lbigkplq.exe Khpbbj32.exe File created C:\Windows\SysWOW64\Mfpbgmjl.exe Lmgnogcl.exe File created C:\Windows\SysWOW64\Pmacba32.exe Pmofmaao.exe File created C:\Windows\SysWOW64\Idlccb32.dll Cjlbkm32.exe File opened for modification C:\Windows\SysWOW64\Gggffkoe.exe Gnoame32.exe File created C:\Windows\SysWOW64\Npgepaac.dll Ijpkcnpp.exe File opened for modification C:\Windows\SysWOW64\Iddedp32.exe Hkicekeo.exe File created C:\Windows\SysWOW64\Ibogjd32.dll Kfmmkojb.exe File opened for modification C:\Windows\SysWOW64\Ficlfl32.exe Flmoghhm.exe File created C:\Windows\SysWOW64\Bmobag32.dll Opgccd32.exe File opened for modification C:\Windows\SysWOW64\Khlaoeoj.exe Jfmeebgg.exe File created C:\Windows\SysWOW64\Clmcdc32.exe Cbeokmbn.exe File opened for modification C:\Windows\SysWOW64\Qjagmnfp.exe Qphcdh32.exe File created C:\Windows\SysWOW64\Eihlknoa.exe Eieoenad.exe File opened for modification C:\Windows\SysWOW64\Ifiachpe.exe Iefenibh.exe File created C:\Windows\SysWOW64\Cdbmbljj.exe Ccbahibg.exe File created C:\Windows\SysWOW64\is-HSSQO.tmp setup.tmp File created C:\Windows\SysWOW64\Gloecbaa.exe Gqhdnaln.exe File opened for modification C:\Windows\SysWOW64\Pfcakh32.exe Oioaacmk.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 6872 set thread context of 1284 6872 taskmgr.exe 592 PID 6872 set thread context of 5640 6872 taskmgr.exe 593 -
resource yara_rule behavioral1/files/0x0007000000023c93-306.dat upx behavioral1/files/0x0007000000023ce6-472.dat upx behavioral1/files/0x0007000000023d9e-840.dat upx behavioral1/files/0x0007000000023de4-980.dat upx behavioral1/files/0x0007000000023dd0-940.dat upx behavioral1/files/0x0007000000023e54-1204.dat upx behavioral1/files/0x0007000000024062-2256.dat upx behavioral1/files/0x00070000000240f3-2546.dat upx behavioral1/files/0x0007000000024160-2764.dat upx behavioral1/files/0x0007000000024255-3254.dat upx behavioral1/files/0x0007000000024208-3100.dat upx behavioral1/files/0x00070000000241e9-3038.dat upx behavioral1/files/0x0007000000024523-4686.dat upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\TimeForge\Bridge\temp\SQLiteningS.Dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\WindowsServiceFMS.exe UpdateFMS.exe File created C:\Program Files (x86)\TimeForge\Bridge\UpdateFMS.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\Iesi.Collections.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\temp\Castle.Core.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\VerifyEmployee.pdb virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\WServiceIBMTranslator.InstallState UpdateIBMTranslator.exe File created C:\Program Files (x86)\TimeForge\Bridge\SQLiteningS.Dll UpdateConnector.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\installService.log UpdateFMS.exe File created C:\Program Files (x86)\TimeForge\Bridge\UpdateFMS.pdb virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\Castle.Core.dll UpdateConnector.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\NHibernate.dll UpdateConnector.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\Castle.DynamicProxy2.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\Common.Logging.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\UpdateSqliteRemote.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\UpdateFMS.exe.config virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\Uninstaller.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\UpdateConnector.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\Castle.DynamicProxy2.dll UpdateConnector.exe File created C:\Program Files (x86)\TimeForge\Bridge\InstallSettings.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\FPSensor\is-DV7PD.tmp setup.tmp File opened for modification C:\Program Files (x86)\FPSensor\unins000.dat setup.tmp File created C:\Program Files (x86)\TimeForge\Bridge\tempWS\WServiceConnector.pdb virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\tempWSIBM\WServiceIBMTranslator.pdb virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\Quartz.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\Castle.DynamicProxy2.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\FPSensor\bin\is-FL64A.tmp setup.tmp File created C:\Program Files (x86)\TimeForge\Bridge\Connector.exe.config UpdateConnector.exe File created C:\Program Files (x86)\TimeForge\Bridge\temp\SqliteningWrapper.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\WindowsServiceHandler.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\FMSTranslator.exe.config virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\setup.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\Uninstaller.pdb virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\temp\Common.Logging.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\Quartz.dll UpdateConnector.exe File created C:\Program Files (x86)\TimeForge\Bridge\InstallWService.exe.config virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\tempWSIBM\WServiceIBMTranslator.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\UpdateSqliteRemote.pdb virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\Connector.exe UpdateConnector.exe File created C:\Program Files (x86)\TimeForge\Bridge\tempWSFMS\WindowsServiceFMS.pdb virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\temp\Connector.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\temp\System.Data.SQLite.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\WServiceConnector.exe.config UpdateConnector.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\installService.log UpdateIBMTranslator.exe File created C:\Program Files (x86)\TimeForge\Bridge\tempWSFMS\WindowsServiceFMS.exe.config virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\temp\en\Connector.resources.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\System.Data.SQLite.dll UpdateConnector.exe File created C:\Program Files (x86)\TimeForge\Bridge\SqliteningWrapper.dll UpdateConnector.exe File created C:\Program Files (x86)\TimeForge\Bridge\WindowsServiceHandler.pdb virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\FPSensor\unins000.dat setup.tmp File created C:\Program Files (x86)\TimeForge\Bridge\temp\Castle.DynamicProxy2.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\Zlib.Dll UpdateConnector.exe File created C:\Program Files (x86)\TimeForge\Bridge\WServiceConnector.pdb UpdateConnector.exe File created C:\Program Files (x86)\TimeForge\Bridge\tempWS\WServiceConnector.exe.config virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File opened for modification C:\Program Files (x86)\TimeForge\Bridge\log4net.dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\temp\Connector.exe.config virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\SQLiteningClient.Dll UpdateConnector.exe File created C:\Program Files (x86)\TimeForge\Bridge\FMSTranslator.exe virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\temp\Zlib.Dll virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe File created C:\Program Files (x86)\TimeForge\Bridge\Connector.ico UpdateConnector.exe File created C:\Program Files (x86)\FPSensor\bin\is-91CUI.tmp setup.tmp File opened for modification C:\Program Files (x86)\TimeForge\Bridge\WServiceIBMTranslator.exe UpdateIBMTranslator.exe File created C:\Program Files (x86)\TimeForge\Bridge\WServiceIBMTranslator.exe.config UpdateIBMTranslator.exe File created C:\Program Files (x86)\TimeForge\Bridge\IBMTranslator.pdb virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\System\xaLNETm.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\LcJnyko.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\XpWZYOL.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\PSoEXuK.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\dpdrv\is-U6I7L.tmp setup.tmp File created C:\Windows\System\bCBOcFQ.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\AgwAZrY.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\khotvqF.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\CsFHjFH.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\gpgPljM.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\hFMVjvj.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\uYjRxhC.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\VixzsjA.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\QliBvmW.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\LNpnEqS.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\wBeOKdj.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\SabDpZF.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\vnRZdFo.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\EloVPXU.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\qIzLeCM.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\LSxCRqQ.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\xKRrRSD.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\cPoRKnA.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\tqFqKCm.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\jtcKeQz.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\vrmzoxe.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\UnISuVA.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\wMXuamI.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\gjHQsjX.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\pdRYIiS.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\JzsTVTH.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\dtYzOBS.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\ERnnnNb.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\EGZCbiY.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\ZYTOeNm.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\vDDnssl.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\ZmblQag.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\Cpxsfoo.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\vhhVfvN.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\MuhIwxb.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\nBYllXw.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\QLUOQla.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\SLWTOiK.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\mwbLrGO.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\wtvWxLV.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\TKzEVPS.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\rJwVFil.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\GCgIjYB.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\gBgoSOa.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\YruveYp.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\rnztbaG.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\YMbzXxj.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\zKXoSVW.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\tqaoPpq.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\gmGAPGM.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File opened for modification C:\Windows\assembly InstallSettings.exe File created C:\Windows\System\HuoFLen.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\afXVIvF.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\DgyOfYs.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\nXfTweO.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\KwchVNh.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\fGyknMA.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\WERnBiu.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe File created C:\Windows\System\hxOcOYd.exe virussign.com_6bc821f8b25d1312c809bea2c04d66eb.vir.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023e60-1228.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 9112 8644 WerFault.exe 573 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppepdbnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qmflnqkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ipaeojem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iZHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adllplel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ophjmjna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjlbkm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qmipnfmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccbahibg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgodcnnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffolbjcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpbhjijq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jakkja32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Elpiqp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adfeppbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfgeom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpnnpndo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iaahccpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldfmmegi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virussign.com_a07af14eb529b98e8030ea76f21a49ca.vir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgbhnqci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgkbppkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkombnfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnhnmpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkmicl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jknoma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpdateFMS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifjohe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdjkck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virussign.com_c736d489bfe83727c5a28b0a62c20962.vir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdmnacna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pohngfml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijpkcnpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcfnji32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dqcgie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fiilladj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cifmif32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hcmpqe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjjgqkjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnfokihk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmobco32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nliafhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijjedc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjogfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gadifqep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldiibdef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnehndbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljjpgh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjfnined.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gokmpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccomhc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flmoghhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnikak32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pookqgeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gndgol32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfmmkojb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmlhjf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkadkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oemopfkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkkpilai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dglijfop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aochag32.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023fa6-5696.dat nsis_installer_1 behavioral1/files/0x0007000000023fa6-5696.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags Process not Found -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found -
Modifies data under HKEY_USERS 25 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Process not Found Key created \REGISTRY\USER\.DEFAULT\Software Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Process not Found Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum iZHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft iZHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie iZHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" iZHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates Process not Found Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133828747707239061" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software iZHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Process not Found -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A1C21100-CAA1-11D2-8B02-0090270750C4}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5B19592-145E-11D3-9F04-006008039E37}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfnjlh32.dll" Fjbmfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihqocb32.dll" Bkefinkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{84141C7B-3FA0-11D3-8B9A-00104BB056F7}\NumMethods\ = "10" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{63B23890-C79C-11D2-8B01-0090270750C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qedit.GrfCache\ = "GrfCache Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Piikbhhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnncel32.dll" Fhallclh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppbldl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clhbai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0A6709B1-4FA5-11D5-87D3-00010242D7FF}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5462CE51-DBD0-11D2-8B4A-00104BB056F7}\ = "IADDeviceManager" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1F400A0-3F08-11D3-9F0B-006008039E37}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pabfbnbl.dll" Adfeppbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ilbcfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgchmjkn.dll" Khlaoeoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkefinkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jhcmkbel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jibfhbpn.dll" Ifiachpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D5747D0-8C99-11D3-8790-0050DA196B82}\ = "IDPUnkCollection" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{253AF648-E194-49D0-95CD-E5071519517E}\TypeLib\ = "{1CD59645-9CC5-4C0E-AA37-5E5BADE3AC5D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbpdkf32.dll" Kjogfp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfeeijhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{258A3C21-1DE3-4C47-B9CD-C50BDD0C881E}\ProxyStubClsid32\ = "{02D3EE00-2AD1-11D3-8029-00105A0D0A49}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0A167181-1855-4908-9972-09BC92B36A4F}\NumMethods\ = "4" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{63B23891-C79C-11D2-8B01-0090270750C4}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jakkja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kamhoafn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppkfcmbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{84141C7E-3FA0-11D3-8B9A-00104BB056F7}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZKFPEngXControl.ZKFPEngX\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgddlo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Niooel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbilde32.dll" Ghohna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aipjhaoh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95A3F7B0-0578-11D2-92F7-5CEB20524153}\LocalServer32 DpHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{54DE7CA0-25EE-11D3-8B48-0090270750C4}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{63B23890-C79C-11D2-8B01-0090270750C4}\ProxyStubClsid32\ = "{02D3EE00-2AD1-11D3-8029-00105A0D0A49}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA69969C-2F27-41D3-954D-A48B941C3BA7}\MiscStatus\ = "0" virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iddedp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0A167181-1855-4908-9972-09BC92B36A4F}\ProxyStubClsid32\ = "{02D3EE00-2AD1-11D3-8029-00105A0D0A49}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F6822A20-E182-11D2-8B65-00104BB056F7}\NumMethods\ = "7" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78530B75-61F9-11D2-8CAD-00A024580902} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8AEE2E53-7EBE-4B51-A964-009ADC68D107} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpddpihn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{431CC142-EDFC-11D2-8B71-00104BB056F7}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C95FEF21-5435-11D5-87D4-00010242D7FF}\ProxyStubClsid32\ = "{02D3EE00-2AD1-11D3-8029-00105A0D0A49}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0000DF16-F1CD-11D2-95C8-009027121A80}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{882B6AAA-0C75-11D3-8B81-00104BB056F7}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EDFE0580-96D1-11D3-8792-0050DA196B82} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ilmikmhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amdiooof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0A6709B1-4FA5-11D5-87D3-00010242D7FF}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eflcoh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgqbee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhnelg32.dll" Jdajkhjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F7C9C61-123D-11D5-87C4-00010242D7FF}\ = "IDBDomainList" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qedit.DxtAlphaSetter\ = "DxtAlphaSetter Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Agfnak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cklqpckj.dll" Lckgehel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npkplefh.dll" Lnadeppb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abcoji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnpbagpq.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3896 chrome.exe 3896 chrome.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7144 virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 748 xoptiloc.exe 748 xoptiloc.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 748 xoptiloc.exe 748 xoptiloc.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 748 xoptiloc.exe 748 xoptiloc.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 748 xoptiloc.exe 748 xoptiloc.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 748 xoptiloc.exe 748 xoptiloc.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 7456 virussign.com_292e6cfdf70193a3153aa82141e4cde2.vir.exe 748 xoptiloc.exe 748 xoptiloc.exe 5868 virussign.com_a86b72d475aaf207ecf39ed6b7917b7b.vir.exe 5868 virussign.com_a86b72d475aaf207ecf39ed6b7917b7b.vir.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found 12972 Process not Found -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 4288 OpenWith.exe 4288 OpenWith.exe 4288 OpenWith.exe 4288 OpenWith.exe 4288 OpenWith.exe 4288 OpenWith.exe 4288 OpenWith.exe 4288 OpenWith.exe 4288 OpenWith.exe 4288 OpenWith.exe 4288 OpenWith.exe 5432 virussign.com_7fa42e33493e26aac40c4c0c84278538.vir.exe 5432 virussign.com_7fa42e33493e26aac40c4c0c84278538.vir.exe 5432 virussign.com_7fa42e33493e26aac40c4c0c84278538.vir.exe 7164 virussign.com_b7b24ccb98b071178b799b13d7f41eb7.vir.exe 6872 taskmgr.exe 5640 taskmgr.exe 1664 Process not Found 6400 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 820 3896 chrome.exe 82 PID 3896 wrote to memory of 820 3896 chrome.exe 82 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 4600 3896 chrome.exe 83 PID 3896 wrote to memory of 2432 3896 chrome.exe 84 PID 3896 wrote to memory of 2432 3896 chrome.exe 84 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85 PID 3896 wrote to memory of 2112 3896 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mini-01-s3.vx-underground.org/samples/Samples/VirusSign%20Collection/2024.08/Virussign.2024.08.17.7z1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe4ce2cc40,0x7ffe4ce2cc4c,0x7ffe4ce2cc582⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1988,i,7753144017374681658,849556238051839902,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1804,i,7753144017374681658,849556238051839902,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2064 /prefetch:32⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,7753144017374681658,849556238051839902,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,7753144017374681658,849556238051839902,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,7753144017374681658,849556238051839902,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4480,i,7753144017374681658,849556238051839902,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4888,i,7753144017374681658,849556238051839902,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4740,i,7753144017374681658,849556238051839902,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3520
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3952
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4288
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Virussign.2024.08.17\" -spe -an -ai#7zMap22758:100:7zEvent104261⤵PID:2308
-
C:\Users\Admin\Desktop\virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe"C:\Users\Admin\Desktop\virussign.com_60100bd8e2e3acc1f5b8a52ef83198f0.vi.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:7144 -
C:\Program Files (x86)\TimeForge\Bridge\WindowsServiceHandler.exe"C:\Program Files (x86)\TimeForge\Bridge\WindowsServiceHandler.exe" stop2⤵
- Executes dropped EXE
PID:4172
-
-
C:\Program Files (x86)\TimeForge\Bridge\setup.exe"C:\Program Files (x86)\TimeForge\Bridge\setup.exe" /SP_ /VERYSILENT /NORESTART2⤵
- Executes dropped EXE
PID:6900 -
C:\Users\Admin\AppData\Local\Temp\is-8L176.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-8L176.tmp\setup.tmp" /SL5="$9003C,5626842,54272,C:\Program Files (x86)\TimeForge\Bridge\setup.exe" /SP_ /VERYSILENT /NORESTART3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:6840 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection Model_Uru4000.NT 132 C:\Windows\dpdrv\dpersona.inf4⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
PID:6208 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r5⤵
- Checks processor information in registry
PID:4936 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o6⤵PID:6328
-
-
-
-
C:\Windows\dpdrv\dpinst32.exe"C:\Windows\dpdrv\dpinst32.exe" /s4⤵
- Executes dropped EXE
PID:5988
-
-
C:\Program Files (x86)\FPSensor\bin\DpHost.exe"C:\Program Files (x86)\FPSensor\bin\DpHost.exe" /RegServer4⤵
- Executes dropped EXE
- Modifies registry class
PID:6044
-
-
C:\Program Files (x86)\FPSensor\bin\iZHost.exe"C:\Program Files (x86)\FPSensor\bin\iZHost.exe" /Service4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6684
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" start "iZHost"4⤵PID:508
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "iZHost"5⤵PID:5944
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\FPSensor\bin\DpCmpMgt.dll"4⤵
- Loads dropped DLL
PID:2888
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\FPSensor\bin\DPDevAgt.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:5536
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\FPSensor\bin\DpDtObjs.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:5928
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\FPSensor\bin\DPPS.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:6120
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u "biokey.ocx"4⤵
- Loads dropped DLL
PID:6332
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\biokey.ocx"4⤵
- Loads dropped DLL
- Modifies registry class
PID:6420
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u "zkonline.ocx"4⤵PID:4988
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\zkonline.ocx"4⤵PID:5196
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u "FPCom.dll"4⤵
- Loads dropped DLL
PID:5580
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\FPCom.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:6132
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\qedit.dll"4⤵
- Modifies registry class
PID:4484
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\ksuser.dll"4⤵PID:5388
-
-
-
-
C:\Program Files (x86)\TimeForge\Bridge\UpdateConnector.exe"C:\Program Files (x86)\TimeForge\Bridge\UpdateConnector.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:5548
-
-
C:\Program Files (x86)\TimeForge\Bridge\UpdateSqliteRemote.exe"C:\Program Files (x86)\TimeForge\Bridge\UpdateSqliteRemote.exe"2⤵
- Executes dropped EXE
PID:2256
-
-
C:\Program Files (x86)\TimeForge\Bridge\UpdateIBMTranslator.exe"C:\Program Files (x86)\TimeForge\Bridge\UpdateIBMTranslator.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1616
-
-
C:\Program Files (x86)\TimeForge\Bridge\UpdateFMS.exe"C:\Program Files (x86)\TimeForge\Bridge\UpdateFMS.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:6972
-
-
C:\Program Files (x86)\TimeForge\Bridge\InstallSettings.exe"C:\Program Files (x86)\TimeForge\Bridge\InstallSettings.exe" Connector2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
PID:7040 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\t2l9snpq.cmdline"3⤵
- System Location Discovery: System Language Discovery
PID:7080 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEBEE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEBED.tmp"4⤵PID:7008
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\x98wxvk1.cmdline"3⤵PID:3528
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEC8A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEC89.tmp"4⤵PID:540
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pwx9quhg.cmdline"3⤵PID:3684
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFE9B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFE9A.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
-
-
C:\Program Files (x86)\TimeForge\Bridge\InstallSettings.exe"C:\Program Files (x86)\TimeForge\Bridge\InstallSettings.exe" IBM2⤵
- Executes dropped EXE
PID:1728
-
-
C:\Program Files (x86)\FPSensor\bin\iZHost.exe"C:\Program Files (x86)\FPSensor\bin\iZHost.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:6092
-
C:\Users\Admin\Desktop\virussign.com_a07af14eb529b98e8030ea76f21a49ca.vir.exe"C:\Users\Admin\Desktop\virussign.com_a07af14eb529b98e8030ea76f21a49ca.vir.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4896
-
C:\Users\Admin\Desktop\virussign.com_d985f013485e4af8a424939ed3ddd7ca.vir.exe"C:\Users\Admin\Desktop\virussign.com_d985f013485e4af8a424939ed3ddd7ca.vir.exe"1⤵
- Executes dropped EXE
PID:5144 -
C:\Windows\SysWOW64\Eebgjk32.exeC:\Windows\system32\Eebgjk32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5232 -
C:\Windows\SysWOW64\Fcfhco32.exeC:\Windows\system32\Fcfhco32.exe3⤵
- Executes dropped EXE
PID:5864 -
C:\Windows\SysWOW64\Fpjhmc32.exeC:\Windows\system32\Fpjhmc32.exe4⤵
- Executes dropped EXE
PID:4020 -
C:\Windows\SysWOW64\Fjbmfi32.exeC:\Windows\system32\Fjbmfi32.exe5⤵
- Executes dropped EXE
- Modifies registry class
PID:2692 -
C:\Windows\SysWOW64\Fckaoneo.exeC:\Windows\system32\Fckaoneo.exe6⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\Fpoahbdh.exeC:\Windows\system32\Fpoahbdh.exe7⤵
- Executes dropped EXE
PID:3680 -
C:\Windows\SysWOW64\Fpannb32.exeC:\Windows\system32\Fpannb32.exe8⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Fpckcb32.exeC:\Windows\system32\Fpckcb32.exe9⤵
- Executes dropped EXE
PID:3736 -
C:\Windows\SysWOW64\Gngllfol.exeC:\Windows\system32\Gngllfol.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\Gqhdnaln.exeC:\Windows\system32\Gqhdnaln.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5880 -
C:\Windows\SysWOW64\Gloecbaa.exeC:\Windows\system32\Gloecbaa.exe12⤵
- Executes dropped EXE
PID:5640 -
C:\Windows\SysWOW64\Gnoame32.exeC:\Windows\system32\Gnoame32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1400 -
C:\Windows\SysWOW64\Gggffkoe.exeC:\Windows\system32\Gggffkoe.exe14⤵
- Executes dropped EXE
PID:812 -
C:\Windows\SysWOW64\Hmfkda32.exeC:\Windows\system32\Hmfkda32.exe15⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Hnehndbl.exeC:\Windows\system32\Hnehndbl.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6960 -
C:\Windows\SysWOW64\Hgnlgjim.exeC:\Windows\system32\Hgnlgjim.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:6912 -
C:\Windows\SysWOW64\Hqfqpo32.exeC:\Windows\system32\Hqfqpo32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:6860 -
C:\Windows\SysWOW64\Hnjaic32.exeC:\Windows\system32\Hnjaic32.exe19⤵
- Executes dropped EXE
PID:6832 -
C:\Windows\SysWOW64\Hjabnd32.exeC:\Windows\system32\Hjabnd32.exe20⤵
- Executes dropped EXE
PID:6660 -
C:\Windows\SysWOW64\Inokdcjb.exeC:\Windows\system32\Inokdcjb.exe21⤵
- Executes dropped EXE
PID:6576 -
C:\Windows\SysWOW64\Ifjohe32.exeC:\Windows\system32\Ifjohe32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6688 -
C:\Windows\SysWOW64\Iekpfmpl.exeC:\Windows\system32\Iekpfmpl.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5352 -
C:\Windows\SysWOW64\Ijjedc32.exeC:\Windows\system32\Ijjedc32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5336 -
C:\Windows\SysWOW64\Inhmjabg.exeC:\Windows\system32\Inhmjabg.exe25⤵
- Executes dropped EXE
PID:5368 -
C:\Windows\SysWOW64\Jjonobhk.exeC:\Windows\system32\Jjonobhk.exe26⤵
- Executes dropped EXE
PID:5952 -
C:\Windows\SysWOW64\Jjakebfi.exeC:\Windows\system32\Jjakebfi.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5968 -
C:\Windows\SysWOW64\Jcllcgjf.exeC:\Windows\system32\Jcllcgjf.exe28⤵
- Executes dropped EXE
PID:6244 -
C:\Windows\SysWOW64\Jfmeebgg.exeC:\Windows\system32\Jfmeebgg.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5228 -
C:\Windows\SysWOW64\Khlaoeoj.exeC:\Windows\system32\Khlaoeoj.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:6280 -
C:\Windows\SysWOW64\Kepbhjmd.exeC:\Windows\system32\Kepbhjmd.exe31⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\SysWOW64\Kmkgmlko.exeC:\Windows\system32\Kmkgmlko.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4968 -
C:\Windows\SysWOW64\Kjogfp32.exeC:\Windows\system32\Kjogfp32.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Kdhlofpi.exeC:\Windows\system32\Kdhlofpi.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:6224 -
C:\Windows\SysWOW64\Kfhdqa32.exeC:\Windows\system32\Kfhdqa32.exe35⤵
- Executes dropped EXE
PID:5796 -
C:\Windows\SysWOW64\Ljfmgocq.exeC:\Windows\system32\Ljfmgocq.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:6232 -
C:\Windows\SysWOW64\Lhjnpc32.exeC:\Windows\system32\Lhjnpc32.exe37⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\Lhmjfc32.exeC:\Windows\system32\Lhmjfc32.exe38⤵
- Executes dropped EXE
PID:6444 -
C:\Windows\SysWOW64\Ldckkdfl.exeC:\Windows\system32\Ldckkdfl.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1488 -
C:\Windows\SysWOW64\Lmlpcjll.exeC:\Windows\system32\Lmlpcjll.exe40⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\Lgddlo32.exeC:\Windows\system32\Lgddlo32.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:5708 -
C:\Windows\SysWOW64\Meedjgkl.exeC:\Windows\system32\Meedjgkl.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:6496 -
C:\Windows\SysWOW64\Mmqioi32.exeC:\Windows\system32\Mmqioi32.exe43⤵
- Executes dropped EXE
PID:5472 -
C:\Windows\SysWOW64\Mdmnacna.exeC:\Windows\system32\Mdmnacna.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6072 -
C:\Windows\SysWOW64\Mdokfb32.exeC:\Windows\system32\Mdokfb32.exe45⤵
- Executes dropped EXE
PID:6412 -
C:\Windows\SysWOW64\Mmgoohbo.exeC:\Windows\system32\Mmgoohbo.exe46⤵
- Executes dropped EXE
PID:5308 -
C:\Windows\SysWOW64\Nkkpilai.exeC:\Windows\system32\Nkkpilai.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\Nhppbq32.exeC:\Windows\system32\Nhppbq32.exe48⤵
- Executes dropped EXE
PID:5652 -
C:\Windows\SysWOW64\Najaqe32.exeC:\Windows\system32\Najaqe32.exe49⤵
- Executes dropped EXE
PID:6744 -
C:\Windows\SysWOW64\Namnfe32.exeC:\Windows\system32\Namnfe32.exe50⤵PID:1052
-
C:\Windows\SysWOW64\Ohicho32.exeC:\Windows\system32\Ohicho32.exe51⤵PID:5220
-
C:\Windows\SysWOW64\Odpcmpnl.exeC:\Windows\system32\Odpcmpnl.exe52⤵
- Drops file in System32 directory
PID:5460 -
C:\Windows\SysWOW64\Ohnlcndb.exeC:\Windows\system32\Ohnlcndb.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5944 -
C:\Windows\SysWOW64\Oeammbbl.exeC:\Windows\system32\Oeammbbl.exe54⤵PID:5296
-
C:\Windows\SysWOW64\Oahnbc32.exeC:\Windows\system32\Oahnbc32.exe55⤵PID:6152
-
C:\Windows\SysWOW64\Offfhb32.exeC:\Windows\system32\Offfhb32.exe56⤵PID:5892
-
C:\Windows\SysWOW64\Pookqgeg.exeC:\Windows\system32\Pookqgeg.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:5804 -
C:\Windows\SysWOW64\Pgjoejbb.exeC:\Windows\system32\Pgjoejbb.exe58⤵PID:4928
-
C:\Windows\SysWOW64\Philomje.exeC:\Windows\system32\Philomje.exe59⤵PID:2108
-
C:\Windows\SysWOW64\Pgnipi32.exeC:\Windows\system32\Pgnipi32.exe60⤵PID:6256
-
C:\Windows\SysWOW64\Pohngfml.exeC:\Windows\system32\Pohngfml.exe61⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:6604 -
C:\Windows\SysWOW64\Qddfomkd.exeC:\Windows\system32\Qddfomkd.exe62⤵PID:4476
-
C:\Windows\SysWOW64\Qgeoah32.exeC:\Windows\system32\Qgeoah32.exe63⤵PID:4368
-
C:\Windows\SysWOW64\Aooche32.exeC:\Windows\system32\Aooche32.exe64⤵PID:3148
-
C:\Windows\SysWOW64\Adllplel.exeC:\Windows\system32\Adllplel.exe65⤵
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\SysWOW64\Abpmipde.exeC:\Windows\system32\Abpmipde.exe66⤵PID:4980
-
C:\Windows\SysWOW64\Agleagbm.exeC:\Windows\system32\Agleagbm.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2816 -
C:\Windows\SysWOW64\Aepekk32.exeC:\Windows\system32\Aepekk32.exe68⤵PID:5068
-
C:\Windows\SysWOW64\Ainnajgm.exeC:\Windows\system32\Ainnajgm.exe69⤵PID:4776
-
C:\Windows\SysWOW64\Beeofk32.exeC:\Windows\system32\Beeofk32.exe70⤵PID:6804
-
C:\Windows\SysWOW64\Bbippolk.exeC:\Windows\system32\Bbippolk.exe71⤵PID:7032
-
C:\Windows\SysWOW64\Bpmpickd.exeC:\Windows\system32\Bpmpickd.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5028 -
C:\Windows\SysWOW64\Bkdqndqi.exeC:\Windows\system32\Bkdqndqi.exe73⤵PID:4848
-
C:\Windows\SysWOW64\Bpaidb32.exeC:\Windows\system32\Bpaidb32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:8 -
C:\Windows\SysWOW64\Blhjic32.exeC:\Windows\system32\Blhjic32.exe75⤵PID:1688
-
C:\Windows\SysWOW64\Ceaobicd.exeC:\Windows\system32\Ceaobicd.exe76⤵
- Drops file in System32 directory
PID:632 -
C:\Windows\SysWOW64\Cbeokmbn.exeC:\Windows\system32\Cbeokmbn.exe77⤵
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\Clmcdc32.exeC:\Windows\system32\Clmcdc32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5064 -
C:\Windows\SysWOW64\Ceehmh32.exeC:\Windows\system32\Ceehmh32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4140 -
C:\Windows\SysWOW64\Cnnlfneo.exeC:\Windows\system32\Cnnlfneo.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3684 -
C:\Windows\SysWOW64\Clbmobdi.exeC:\Windows\system32\Clbmobdi.exe81⤵PID:7000
-
C:\Windows\SysWOW64\Cifmif32.exeC:\Windows\system32\Cifmif32.exe82⤵
- System Location Discovery: System Language Discovery
PID:7140 -
C:\Windows\SysWOW64\Demnngif.exeC:\Windows\system32\Demnngif.exe83⤵PID:4688
-
C:\Windows\SysWOW64\Dfngmjnf.exeC:\Windows\system32\Dfngmjnf.exe84⤵PID:4488
-
C:\Windows\SysWOW64\Dpglfp32.exeC:\Windows\system32\Dpglfp32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6800 -
C:\Windows\SysWOW64\Dpihlobd.exeC:\Windows\system32\Dpihlobd.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5208 -
C:\Windows\SysWOW64\Elpiqp32.exeC:\Windows\system32\Elpiqp32.exe87⤵
- System Location Discovery: System Language Discovery
PID:6636 -
C:\Windows\SysWOW64\Elbffpff.exeC:\Windows\system32\Elbffpff.exe88⤵PID:6028
-
C:\Windows\SysWOW64\Eppoln32.exeC:\Windows\system32\Eppoln32.exe89⤵PID:1776
-
C:\Windows\SysWOW64\Ehkcqqjg.exeC:\Windows\system32\Ehkcqqjg.exe90⤵PID:3260
-
C:\Windows\SysWOW64\Eflcoh32.exeC:\Windows\system32\Eflcoh32.exe91⤵
- Drops file in System32 directory
- Modifies registry class
PID:2904 -
C:\Windows\SysWOW64\Epehgnhg.exeC:\Windows\system32\Epehgnhg.exe92⤵PID:2764
-
C:\Windows\SysWOW64\Ehpmlpeb.exeC:\Windows\system32\Ehpmlpeb.exe93⤵
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\Fgamjgna.exeC:\Windows\system32\Fgamjgna.exe94⤵PID:6940
-
C:\Windows\SysWOW64\Fgcjoglo.exeC:\Windows\system32\Fgcjoglo.exe95⤵PID:3932
-
C:\Windows\SysWOW64\Fidbab32.exeC:\Windows\system32\Fidbab32.exe96⤵PID:6692
-
C:\Windows\SysWOW64\Fcmgjhop.exeC:\Windows\system32\Fcmgjhop.exe97⤵PID:6548
-
C:\Windows\SysWOW64\Flekbm32.exeC:\Windows\system32\Flekbm32.exe98⤵PID:4056
-
C:\Windows\SysWOW64\Fiilladj.exeC:\Windows\system32\Fiilladj.exe99⤵
- System Location Discovery: System Language Discovery
PID:5464 -
C:\Windows\SysWOW64\Gcaqeg32.exeC:\Windows\system32\Gcaqeg32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5936 -
C:\Windows\SysWOW64\Ghnimn32.exeC:\Windows\system32\Ghnimn32.exe101⤵
- Drops file in System32 directory
PID:5088 -
C:\Windows\SysWOW64\Ggoike32.exeC:\Windows\system32\Ggoike32.exe102⤵PID:5916
-
C:\Windows\SysWOW64\Gpgndkhb.exeC:\Windows\system32\Gpgndkhb.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3116 -
C:\Windows\SysWOW64\Ghbbhmem.exeC:\Windows\system32\Ghbbhmem.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6100 -
C:\Windows\SysWOW64\Ggdbfeml.exeC:\Windows\system32\Ggdbfeml.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5540 -
C:\Windows\SysWOW64\Gplgoj32.exeC:\Windows\system32\Gplgoj32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6796 -
C:\Windows\SysWOW64\Hjdkhpjm.exeC:\Windows\system32\Hjdkhpjm.exe107⤵PID:6560
-
C:\Windows\SysWOW64\Hcmpqe32.exeC:\Windows\system32\Hcmpqe32.exe108⤵
- System Location Discovery: System Language Discovery
PID:5328 -
C:\Windows\SysWOW64\Hodqef32.exeC:\Windows\system32\Hodqef32.exe109⤵PID:6056
-
C:\Windows\SysWOW64\Hlhaok32.exeC:\Windows\system32\Hlhaok32.exe110⤵PID:5096
-
C:\Windows\SysWOW64\Hqhfki32.exeC:\Windows\system32\Hqhfki32.exe111⤵PID:5956
-
C:\Windows\SysWOW64\Ijpkcnpp.exeC:\Windows\system32\Ijpkcnpp.exe112⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\Igdkmb32.exeC:\Windows\system32\Igdkmb32.exe113⤵PID:2520
-
C:\Windows\SysWOW64\Imadei32.exeC:\Windows\system32\Imadei32.exe114⤵PID:1180
-
C:\Windows\SysWOW64\Ifihnoda.exeC:\Windows\system32\Ifihnoda.exe115⤵PID:4036
-
C:\Windows\SysWOW64\Iijapj32.exeC:\Windows\system32\Iijapj32.exe116⤵PID:7072
-
C:\Windows\SysWOW64\Jjlkom32.exeC:\Windows\system32\Jjlkom32.exe117⤵
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\Jgpkiq32.exeC:\Windows\system32\Jgpkiq32.exe118⤵PID:4396
-
C:\Windows\SysWOW64\Jgbhnqci.exeC:\Windows\system32\Jgbhnqci.exe119⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:852 -
C:\Windows\SysWOW64\Jfgeom32.exeC:\Windows\system32\Jfgeom32.exe120⤵
- System Location Discovery: System Language Discovery
PID:5468 -
C:\Windows\SysWOW64\Jopihbna.exeC:\Windows\system32\Jopihbna.exe121⤵
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Jihnaheb.exeC:\Windows\system32\Jihnaheb.exe122⤵PID:4648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-