Analysis
-
max time kernel
91s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 15:22
Behavioral task
behavioral1
Sample
e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe
Resource
win7-20241010-en
General
-
Target
e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe
-
Size
337KB
-
MD5
9cd29076d2c80ede270505e0ed287260
-
SHA1
1beff1cb8014fe2a30baed7fb30c9bde2403f8b9
-
SHA256
e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564
-
SHA512
3b7f58400f68178220f530c5f9edb458dd4fd84b6ba0d648cd95d66746614dc61029e43ee169a3f2777a7adac3dca7c3d1505b254554966cfd3857055b017263
-
SSDEEP
3072:49zfWgHINXSO2gYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:49rz1O21+fIyG5jZkCwi8r
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Iamjghnm.exeOncpmf32.exeAfhcgjkq.exeCancif32.exeDkhpfo32.exeMbfbfe32.exeNdnncf32.exeHfmbfkhf.exeFbflfomj.exeDljdcqek.exeFndhed32.exeIdnako32.exeOoaflp32.exeDheljhof.exeJeofnpke.exeFgnfpm32.exeGigjch32.exeJlfahgpf.exeGonlld32.exeHdjedk32.exeHpaaho32.exeFlmecm32.exeJeenfd32.exeMjgclcjh.exeKpnbcfkc.exeIdjjih32.exeJcjffc32.exeNpjonlee.exeJpppbf32.exeLojclibo.exeHaejcj32.exeCboljemb.exeGoekpm32.exeNjaoeq32.exeIfndph32.exeIlhnjfmi.exeJfkphnmj.exeOcpfmd32.exeOindpd32.exeHbagaa32.exeOcpakg32.exeInjnfl32.exeIddfqi32.exeOpfdim32.exePoegde32.exeKnicjipf.exeKamncagl.exeIpkkhckl.exeMppiod32.exeEikmkbeg.exeFamhqclj.exeFopole32.exeEndmgb32.exeFpkdca32.exeBplofekp.exeFillabde.exeNojljcjf.exeHcjpcmjg.exeCgjhkpbj.exeAhmehqna.exeCefpmiji.exeCampbj32.exeNjcibgcf.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iamjghnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oncpmf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afhcgjkq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cancif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkhpfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbfbfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndnncf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfmbfkhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbflfomj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dljdcqek.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fndhed32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idnako32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ooaflp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dheljhof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jeofnpke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgnfpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gigjch32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlfahgpf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gonlld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdjedk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpaaho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flmecm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jeenfd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjgclcjh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpnbcfkc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idjjih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcjffc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npjonlee.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpppbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lojclibo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Haejcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cboljemb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goekpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njaoeq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifndph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilhnjfmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfkphnmj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocpfmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oindpd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbagaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocpakg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Injnfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iddfqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opfdim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Poegde32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knicjipf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kamncagl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipkkhckl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mppiod32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eikmkbeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Famhqclj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fopole32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilhnjfmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Endmgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpkdca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bplofekp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fillabde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nojljcjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcjpcmjg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgjhkpbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahmehqna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cefpmiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Campbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njcibgcf.exe -
Berbew family
-
Njrat family
-
Executes dropped EXE 64 IoCs
Processes:
Kdgfpbaf.exeKqcqpc32.exeLfdbcing.exeLelljepm.exeLgmekpmn.exeMganfp32.exeMjddnjdf.exeMiiaogio.exeNepach32.exeNomphm32.exeNlapaapg.exeOiljcj32.exeOdckfb32.exeOophlpag.exePlcied32.exePngbcldl.exePgacaaij.exeQqldpfmh.exeQfimhmlo.exeQfljmmjl.exeAkkokc32.exeAnkhmncb.exeAgdlfd32.exeAnpahn32.exeBphdpe32.exeBbimbpld.exeDalfdjdl.exeDlhdjh32.exeEoimlc32.exeEokiabjf.exeEdkopifk.exeEaooin32.exeEaalom32.exeFnjiin32.exeFcgaae32.exeFonbff32.exeFopole32.exeFkgpaf32.exeGimmpj32.exeGednek32.exeGmobin32.exeGjccbb32.exeGggclfkj.exeHaohel32.exeHjhlnahk.exeHfnmbbnp.exeHnjagdlj.exeHpinagbm.exeHajkip32.exeHjcoaeol.exeIlblkh32.exeIflmlfcn.exeIdpmejag.exeImhanp32.exeIiobcq32.exeIddfqi32.exeIpkgejcf.exeJoqdfghn.exeJifhdphd.exeJlgaek32.exeJeofnpke.exeJklnggjm.exeJddbpmpm.exeKahciaog.exepid Process 2716 Kdgfpbaf.exe 2656 Kqcqpc32.exe 3060 Lfdbcing.exe 424 Lelljepm.exe 1384 Lgmekpmn.exe 2596 Mganfp32.exe 1488 Mjddnjdf.exe 1576 Miiaogio.exe 616 Nepach32.exe 2540 Nomphm32.exe 2692 Nlapaapg.exe 1596 Oiljcj32.exe 2436 Odckfb32.exe 1884 Oophlpag.exe 2416 Plcied32.exe 1504 Pngbcldl.exe 1800 Pgacaaij.exe 1496 Qqldpfmh.exe 2628 Qfimhmlo.exe 1632 Qfljmmjl.exe 1004 Akkokc32.exe 2072 Ankhmncb.exe 1216 Agdlfd32.exe 2536 Anpahn32.exe 2264 Bphdpe32.exe 1644 Bbimbpld.exe 2212 Dalfdjdl.exe 3020 Dlhdjh32.exe 2920 Eoimlc32.exe 2948 Eokiabjf.exe 2820 Edkopifk.exe 2552 Eaooin32.exe 776 Eaalom32.exe 2044 Fnjiin32.exe 524 Fcgaae32.exe 932 Fonbff32.exe 1764 Fopole32.exe 456 Fkgpaf32.exe 2420 Gimmpj32.exe 1960 Gednek32.exe 1512 Gmobin32.exe 672 Gjccbb32.exe 2108 Gggclfkj.exe 2568 Haohel32.exe 1732 Hjhlnahk.exe 2728 Hfnmbbnp.exe 2364 Hnjagdlj.exe 2268 Hpinagbm.exe 2712 Hajkip32.exe 2980 Hjcoaeol.exe 3012 Ilblkh32.exe 2956 Iflmlfcn.exe 580 Idpmejag.exe 1448 Imhanp32.exe 1444 Iiobcq32.exe 1612 Iddfqi32.exe 2684 Ipkgejcf.exe 1760 Joqdfghn.exe 2400 Jifhdphd.exe 2376 Jlgaek32.exe 1976 Jeofnpke.exe 2664 Jklnggjm.exe 2380 Jddbpmpm.exe 2460 Kahciaog.exe -
Loads dropped DLL 64 IoCs
Processes:
e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exeKdgfpbaf.exeKqcqpc32.exeLfdbcing.exeLelljepm.exeLgmekpmn.exeMganfp32.exeMjddnjdf.exeMiiaogio.exeNepach32.exeNomphm32.exeNlapaapg.exeOiljcj32.exeOdckfb32.exeOophlpag.exePlcied32.exePngbcldl.exePgacaaij.exeQqldpfmh.exeQfimhmlo.exeQfljmmjl.exeAkkokc32.exeAnkhmncb.exeAgdlfd32.exeAnpahn32.exeBphdpe32.exeBbimbpld.exeDalfdjdl.exeDlhdjh32.exeEoimlc32.exeEokiabjf.exeEdkopifk.exepid Process 1084 e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe 1084 e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe 2716 Kdgfpbaf.exe 2716 Kdgfpbaf.exe 2656 Kqcqpc32.exe 2656 Kqcqpc32.exe 3060 Lfdbcing.exe 3060 Lfdbcing.exe 424 Lelljepm.exe 424 Lelljepm.exe 1384 Lgmekpmn.exe 1384 Lgmekpmn.exe 2596 Mganfp32.exe 2596 Mganfp32.exe 1488 Mjddnjdf.exe 1488 Mjddnjdf.exe 1576 Miiaogio.exe 1576 Miiaogio.exe 616 Nepach32.exe 616 Nepach32.exe 2540 Nomphm32.exe 2540 Nomphm32.exe 2692 Nlapaapg.exe 2692 Nlapaapg.exe 1596 Oiljcj32.exe 1596 Oiljcj32.exe 2436 Odckfb32.exe 2436 Odckfb32.exe 1884 Oophlpag.exe 1884 Oophlpag.exe 2416 Plcied32.exe 2416 Plcied32.exe 1504 Pngbcldl.exe 1504 Pngbcldl.exe 1800 Pgacaaij.exe 1800 Pgacaaij.exe 1496 Qqldpfmh.exe 1496 Qqldpfmh.exe 2628 Qfimhmlo.exe 2628 Qfimhmlo.exe 1632 Qfljmmjl.exe 1632 Qfljmmjl.exe 1004 Akkokc32.exe 1004 Akkokc32.exe 2072 Ankhmncb.exe 2072 Ankhmncb.exe 1216 Agdlfd32.exe 1216 Agdlfd32.exe 2536 Anpahn32.exe 2536 Anpahn32.exe 2264 Bphdpe32.exe 2264 Bphdpe32.exe 1644 Bbimbpld.exe 1644 Bbimbpld.exe 2212 Dalfdjdl.exe 2212 Dalfdjdl.exe 3020 Dlhdjh32.exe 3020 Dlhdjh32.exe 2920 Eoimlc32.exe 2920 Eoimlc32.exe 2948 Eokiabjf.exe 2948 Eokiabjf.exe 2820 Edkopifk.exe 2820 Edkopifk.exe -
Drops file in System32 directory 64 IoCs
Processes:
Bgichoqj.exeKhlkba32.exeBdknfiea.exeCioohh32.exeEqjenb32.exeGgicdo32.exeLgmekpmn.exeHjhlnahk.exeKpnbcfkc.exeBapejd32.exeBjlnaghp.exePnebgcqb.exeJkjbml32.exeAipickfe.exeJciaki32.exeLpfdpmho.exeCnacbj32.exeJbooen32.exeOifelfni.exeGbbbld32.exeKeekeg32.exeGkhenlcd.exeIeglfd32.exeMmlmmdga.exeAmdkam32.exeChigmlml.exeJmejmm32.exeMgodjico.exeQiekadkl.exeKbgqbdbd.exeOeeeeehe.exeBjphff32.exeMemagk32.exeBnagecdp.exeJklnggjm.exeNgolgn32.exeDoqmjaac.exeQnmaka32.exeNqjmec32.exeHmefcp32.exeOamaan32.exePddlggin.exeBdiaqj32.exeQjoheb32.exeEoeiniea.exeGijplg32.exeAdppdckh.exeGaajfi32.exeJoepjokm.exeNhlndj32.exeEcdhonoc.exeIiiapg32.exeBbimbpld.exeEgljjmkp.exeKemgqm32.exeIomaaa32.exeMgbeqjpd.exeGpfeoqmf.exeMjddnjdf.exeJifhdphd.exePedmbg32.exeFmnakege.exeJjcigcmd.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\Bbpdmp32.exe Bgichoqj.exe File opened for modification C:\Windows\SysWOW64\Knicjipf.exe Khlkba32.exe File opened for modification C:\Windows\SysWOW64\Bncboo32.exe Bdknfiea.exe File opened for modification C:\Windows\SysWOW64\Clnkdc32.exe Cioohh32.exe File created C:\Windows\SysWOW64\Lkhcil32.dll Eqjenb32.exe File created C:\Windows\SysWOW64\Gijplg32.exe Ggicdo32.exe File opened for modification C:\Windows\SysWOW64\Mganfp32.exe Lgmekpmn.exe File opened for modification C:\Windows\SysWOW64\Hfnmbbnp.exe Hjhlnahk.exe File created C:\Windows\SysWOW64\Nfdgdh32.dll Kpnbcfkc.exe File created C:\Windows\SysWOW64\Bfnnpbnn.exe Bapejd32.exe File created C:\Windows\SysWOW64\Banndk32.dll Bjlnaghp.exe File created C:\Windows\SysWOW64\Ikndhp32.dll Pnebgcqb.exe File created C:\Windows\SysWOW64\Kgqcam32.exe Jkjbml32.exe File created C:\Windows\SysWOW64\Aibfik32.exe Aipickfe.exe File opened for modification C:\Windows\SysWOW64\Jjcigcmd.exe Jciaki32.exe File opened for modification C:\Windows\SysWOW64\Lmjdia32.exe Lpfdpmho.exe File created C:\Windows\SysWOW64\Cgjhkpbj.exe Cnacbj32.exe File created C:\Windows\SysWOW64\Joepjokm.exe Jbooen32.exe File created C:\Windows\SysWOW64\Flkmlgnl.dll Oifelfni.exe File created C:\Windows\SysWOW64\Ioqjok32.dll Gbbbld32.exe File created C:\Windows\SysWOW64\Kekgleob.dll Keekeg32.exe File created C:\Windows\SysWOW64\Bandoqmk.dll Gkhenlcd.exe File opened for modification C:\Windows\SysWOW64\Ianmke32.exe Ieglfd32.exe File created C:\Windows\SysWOW64\Mhbakmgg.exe Mmlmmdga.exe File opened for modification C:\Windows\SysWOW64\Afmokbop.exe Amdkam32.exe File created C:\Windows\SysWOW64\Cboljemb.exe Chigmlml.exe File created C:\Windows\SysWOW64\Pkjpacdo.dll Jmejmm32.exe File opened for modification C:\Windows\SysWOW64\Mdcdcmai.exe Mgodjico.exe File created C:\Windows\SysWOW64\Acnpjj32.exe Qiekadkl.exe File created C:\Windows\SysWOW64\Klhegdbg.dll Kbgqbdbd.exe File created C:\Windows\SysWOW64\Pegaje32.exe Oeeeeehe.exe File created C:\Windows\SysWOW64\Bchmolkm.exe Bjphff32.exe File opened for modification C:\Windows\SysWOW64\Mbabpodi.exe Memagk32.exe File opened for modification C:\Windows\SysWOW64\Bapcaocc.exe Bnagecdp.exe File opened for modification C:\Windows\SysWOW64\Jddbpmpm.exe Jklnggjm.exe File created C:\Windows\SysWOW64\Dolcmd32.dll Ngolgn32.exe File created C:\Windows\SysWOW64\Dlahmcbg.dll Doqmjaac.exe File created C:\Windows\SysWOW64\Bfmkddkn.dll Qnmaka32.exe File opened for modification C:\Windows\SysWOW64\Nlpmjdce.exe Nqjmec32.exe File created C:\Windows\SysWOW64\Hhkjpi32.exe Hmefcp32.exe File created C:\Windows\SysWOW64\Filfpd32.dll Oamaan32.exe File opened for modification C:\Windows\SysWOW64\Qfedhb32.exe Pddlggin.exe File opened for modification C:\Windows\SysWOW64\Bdknfiea.exe Bdiaqj32.exe File created C:\Windows\SysWOW64\Dmmboc32.dll Qjoheb32.exe File created C:\Windows\SysWOW64\Mghgbeni.dll Eoeiniea.exe File created C:\Windows\SysWOW64\Gimmbg32.exe Gijplg32.exe File created C:\Windows\SysWOW64\Ajmhljip.exe Adppdckh.exe File created C:\Windows\SysWOW64\Goekpm32.exe Gaajfi32.exe File opened for modification C:\Windows\SysWOW64\Johlpoij.exe Joepjokm.exe File opened for modification C:\Windows\SysWOW64\Hhkjpi32.exe Hmefcp32.exe File created C:\Windows\SysWOW64\Nkkjpf32.exe Nhlndj32.exe File opened for modification C:\Windows\SysWOW64\Ejnqkh32.exe Ecdhonoc.exe File created C:\Windows\SysWOW64\Ipcjlaqd.exe Iiiapg32.exe File created C:\Windows\SysWOW64\Kcclakie.dll Bbimbpld.exe File created C:\Windows\SysWOW64\Fgnfpm32.exe Egljjmkp.exe File opened for modification C:\Windows\SysWOW64\Koelibnh.exe Kemgqm32.exe File created C:\Windows\SysWOW64\Idjjih32.exe Iomaaa32.exe File opened for modification C:\Windows\SysWOW64\Mmlmmdga.exe Mgbeqjpd.exe File opened for modification C:\Windows\SysWOW64\Gnlbpman.exe Gpfeoqmf.exe File created C:\Windows\SysWOW64\Miiaogio.exe Mjddnjdf.exe File opened for modification C:\Windows\SysWOW64\Jlgaek32.exe Jifhdphd.exe File created C:\Windows\SysWOW64\Qefihg32.exe Pedmbg32.exe File opened for modification C:\Windows\SysWOW64\Fmpnpe32.exe Fmnakege.exe File created C:\Windows\SysWOW64\Jqmadn32.exe Jjcigcmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Dqqqokla.exeEfeaqi32.exeKlmghfio.exeOoeolkff.exeQhejed32.exeAnbohn32.exeAfhcgjkq.exeDgqokp32.exee9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exeKlimcf32.exeIfndph32.exeJidppaio.exeDlcceboa.exePddlggin.exeFoacmg32.exeCfnmhnhm.exePghmeikh.exeGlbcpokl.exeOgfdpfjo.exeJedlph32.exeGoekpm32.exeKfcadq32.exeIdqpjg32.exeBclbhkdj.exeJnncoini.exeDgfkoh32.exeFnjiin32.exeBdiaqj32.exeFbhfcf32.exeFhfdffll.exeFimgmj32.exeNikflm32.exeJadnoc32.exeLcjodiep.exeKjfhgp32.exeEbnokjpf.exeOimpnc32.exeEelfedpa.exeJeenfd32.exeKmjfae32.exePembpkfi.exeGepeep32.exeMemncbmj.exeBelfldoh.exeLgpkobnb.exeNqjmec32.exeKgibeklf.exeHfnmbbnp.exeNijdcdgn.exeIaaqkkme.exeCnacbj32.exeJlpmndba.exeOmbhgljn.exeBgichoqj.exeLgbdpena.exeFccncknc.exeIeglfd32.exeFmpnpe32.exeKkiiom32.exeJgjman32.exeKjchmclb.exeAdeiobgc.exeNnknqpgi.exeIkhqbo32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dqqqokla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efeaqi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klmghfio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ooeolkff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qhejed32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anbohn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afhcgjkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgqokp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klimcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifndph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jidppaio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dlcceboa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pddlggin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Foacmg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfnmhnhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pghmeikh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glbcpokl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogfdpfjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jedlph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Goekpm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfcadq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idqpjg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bclbhkdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnncoini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgfkoh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fnjiin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdiaqj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fbhfcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fhfdffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fimgmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nikflm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jadnoc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcjodiep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjfhgp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ebnokjpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oimpnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eelfedpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jeenfd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmjfae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pembpkfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gepeep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Memncbmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Belfldoh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgpkobnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqjmec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgibeklf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hfnmbbnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nijdcdgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iaaqkkme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnacbj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlpmndba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ombhgljn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgichoqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgbdpena.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fccncknc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ieglfd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmpnpe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkiiom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgjman32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjchmclb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adeiobgc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nnknqpgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikhqbo32.exe -
Modifies registry class 64 IoCs
Processes:
Deikhhhe.exeNbodpo32.exeBlklfk32.exeGepeep32.exeEcdhonoc.exeEemded32.exeJfoookfn.exeFcgaae32.exeOmbhgljn.exePlheil32.exeMhbhecjc.exeJjefmc32.exeEoefea32.exeIdjjih32.exeKgcbpemp.exeJoomnm32.exeImcaijia.exeKhlkba32.exePolbemck.exeAfhcgjkq.exeBbcjfn32.exeBgbemjqh.exeFndhed32.exeHidledja.exeNbgcdmjb.exeHcfceeff.exeGklkdn32.exeHaadlh32.exeKcebpqcn.exeOmoehf32.exeCcjbobnf.exeNccmng32.exeLelmei32.exeOophlpag.exeLheilofe.exeCpccnp32.exeBebiifka.exeMibeofaf.exeHbepplkh.exeEpnldd32.exeFqqdigko.exeBfieec32.exeDndoof32.exeAkjhcimg.exeNdehjnpo.exeMpmpeiqg.exeFbeimf32.exeCofohkgi.exeEelfedpa.exeDohnfc32.exeDechlfkl.exeBibagmhk.exeDjcpqidc.exeFgnfpm32.exeDpbgghhl.exeIpkkhckl.exeBbkfpb32.exePdpcep32.exeGonlld32.exeLaifbnho.exeMabihm32.exePfhlie32.exeBnemlf32.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdfqfd32.dll" Deikhhhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbodpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blklfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gepeep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmafge32.dll" Ecdhonoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eemded32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfoookfn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcgaae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ombhgljn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plheil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhbhecjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpojog32.dll" Jjefmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eoefea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idjjih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghnhpm32.dll" Kgcbpemp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpfcaoap.dll" Joomnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imcaijia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khlkba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmhdamkj.dll" Polbemck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edghoc32.dll" Afhcgjkq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbcjfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgbemjqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fndhed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hidledja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Offlpgfp.dll" Nbgcdmjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcfceeff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gklkdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Haadlh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcebpqcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcfifk32.dll" Omoehf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccjbobnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nccmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lelmei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qqbhmi32.dll" Oophlpag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lheilofe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpccnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkfomk32.dll" Bebiifka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gilojo32.dll" Mibeofaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Benhai32.dll" Hbepplkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfegfg32.dll" Epnldd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqqdigko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfieec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdgphqgg.dll" Dndoof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akjhcimg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klbdig32.dll" Ndehjnpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehpeibla.dll" Mpmpeiqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbeimf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cofohkgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnbbgfli.dll" Eelfedpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dohnfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dechlfkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bibagmhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nccmng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djcpqidc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgnfpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhpbdd32.dll" Dpbgghhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Homkcdlb.dll" Ipkkhckl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkcabaad.dll" Bbkfpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcmomb32.dll" Pdpcep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qaihao32.dll" Gonlld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aafhafjm.dll" Laifbnho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mabihm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppencmog.dll" Pfhlie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnemlf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exeKdgfpbaf.exeKqcqpc32.exeLfdbcing.exeLelljepm.exeLgmekpmn.exeMganfp32.exeMjddnjdf.exeMiiaogio.exeNepach32.exeNomphm32.exeNlapaapg.exeOiljcj32.exeOdckfb32.exeOophlpag.exePlcied32.exedescription pid Process procid_target PID 1084 wrote to memory of 2716 1084 e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe 30 PID 1084 wrote to memory of 2716 1084 e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe 30 PID 1084 wrote to memory of 2716 1084 e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe 30 PID 1084 wrote to memory of 2716 1084 e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe 30 PID 2716 wrote to memory of 2656 2716 Kdgfpbaf.exe 31 PID 2716 wrote to memory of 2656 2716 Kdgfpbaf.exe 31 PID 2716 wrote to memory of 2656 2716 Kdgfpbaf.exe 31 PID 2716 wrote to memory of 2656 2716 Kdgfpbaf.exe 31 PID 2656 wrote to memory of 3060 2656 Kqcqpc32.exe 32 PID 2656 wrote to memory of 3060 2656 Kqcqpc32.exe 32 PID 2656 wrote to memory of 3060 2656 Kqcqpc32.exe 32 PID 2656 wrote to memory of 3060 2656 Kqcqpc32.exe 32 PID 3060 wrote to memory of 424 3060 Lfdbcing.exe 33 PID 3060 wrote to memory of 424 3060 Lfdbcing.exe 33 PID 3060 wrote to memory of 424 3060 Lfdbcing.exe 33 PID 3060 wrote to memory of 424 3060 Lfdbcing.exe 33 PID 424 wrote to memory of 1384 424 Lelljepm.exe 34 PID 424 wrote to memory of 1384 424 Lelljepm.exe 34 PID 424 wrote to memory of 1384 424 Lelljepm.exe 34 PID 424 wrote to memory of 1384 424 Lelljepm.exe 34 PID 1384 wrote to memory of 2596 1384 Lgmekpmn.exe 35 PID 1384 wrote to memory of 2596 1384 Lgmekpmn.exe 35 PID 1384 wrote to memory of 2596 1384 Lgmekpmn.exe 35 PID 1384 wrote to memory of 2596 1384 Lgmekpmn.exe 35 PID 2596 wrote to memory of 1488 2596 Mganfp32.exe 36 PID 2596 wrote to memory of 1488 2596 Mganfp32.exe 36 PID 2596 wrote to memory of 1488 2596 Mganfp32.exe 36 PID 2596 wrote to memory of 1488 2596 Mganfp32.exe 36 PID 1488 wrote to memory of 1576 1488 Mjddnjdf.exe 37 PID 1488 wrote to memory of 1576 1488 Mjddnjdf.exe 37 PID 1488 wrote to memory of 1576 1488 Mjddnjdf.exe 37 PID 1488 wrote to memory of 1576 1488 Mjddnjdf.exe 37 PID 1576 wrote to memory of 616 1576 Miiaogio.exe 38 PID 1576 wrote to memory of 616 1576 Miiaogio.exe 38 PID 1576 wrote to memory of 616 1576 Miiaogio.exe 38 PID 1576 wrote to memory of 616 1576 Miiaogio.exe 38 PID 616 wrote to memory of 2540 616 Nepach32.exe 39 PID 616 wrote to memory of 2540 616 Nepach32.exe 39 PID 616 wrote to memory of 2540 616 Nepach32.exe 39 PID 616 wrote to memory of 2540 616 Nepach32.exe 39 PID 2540 wrote to memory of 2692 2540 Nomphm32.exe 40 PID 2540 wrote to memory of 2692 2540 Nomphm32.exe 40 PID 2540 wrote to memory of 2692 2540 Nomphm32.exe 40 PID 2540 wrote to memory of 2692 2540 Nomphm32.exe 40 PID 2692 wrote to memory of 1596 2692 Nlapaapg.exe 41 PID 2692 wrote to memory of 1596 2692 Nlapaapg.exe 41 PID 2692 wrote to memory of 1596 2692 Nlapaapg.exe 41 PID 2692 wrote to memory of 1596 2692 Nlapaapg.exe 41 PID 1596 wrote to memory of 2436 1596 Oiljcj32.exe 42 PID 1596 wrote to memory of 2436 1596 Oiljcj32.exe 42 PID 1596 wrote to memory of 2436 1596 Oiljcj32.exe 42 PID 1596 wrote to memory of 2436 1596 Oiljcj32.exe 42 PID 2436 wrote to memory of 1884 2436 Odckfb32.exe 43 PID 2436 wrote to memory of 1884 2436 Odckfb32.exe 43 PID 2436 wrote to memory of 1884 2436 Odckfb32.exe 43 PID 2436 wrote to memory of 1884 2436 Odckfb32.exe 43 PID 1884 wrote to memory of 2416 1884 Oophlpag.exe 44 PID 1884 wrote to memory of 2416 1884 Oophlpag.exe 44 PID 1884 wrote to memory of 2416 1884 Oophlpag.exe 44 PID 1884 wrote to memory of 2416 1884 Oophlpag.exe 44 PID 2416 wrote to memory of 1504 2416 Plcied32.exe 45 PID 2416 wrote to memory of 1504 2416 Plcied32.exe 45 PID 2416 wrote to memory of 1504 2416 Plcied32.exe 45 PID 2416 wrote to memory of 1504 2416 Plcied32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe"C:\Users\Admin\AppData\Local\Temp\e9937991d29dea91c58dc22bc5544421d2733f0c41a4c9db111d0b69d47df564N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\Kdgfpbaf.exeC:\Windows\system32\Kdgfpbaf.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Kqcqpc32.exeC:\Windows\system32\Kqcqpc32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Lfdbcing.exeC:\Windows\system32\Lfdbcing.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\Lelljepm.exeC:\Windows\system32\Lelljepm.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\Lgmekpmn.exeC:\Windows\system32\Lgmekpmn.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Mganfp32.exeC:\Windows\system32\Mganfp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\Mjddnjdf.exeC:\Windows\system32\Mjddnjdf.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\Miiaogio.exeC:\Windows\system32\Miiaogio.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\Nepach32.exeC:\Windows\system32\Nepach32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\Nomphm32.exeC:\Windows\system32\Nomphm32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Nlapaapg.exeC:\Windows\system32\Nlapaapg.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\Oiljcj32.exeC:\Windows\system32\Oiljcj32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\Odckfb32.exeC:\Windows\system32\Odckfb32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\Oophlpag.exeC:\Windows\system32\Oophlpag.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\Plcied32.exeC:\Windows\system32\Plcied32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\Pngbcldl.exeC:\Windows\system32\Pngbcldl.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Windows\SysWOW64\Pgacaaij.exeC:\Windows\system32\Pgacaaij.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Windows\SysWOW64\Qqldpfmh.exeC:\Windows\system32\Qqldpfmh.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1496 -
C:\Windows\SysWOW64\Qfimhmlo.exeC:\Windows\system32\Qfimhmlo.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628 -
C:\Windows\SysWOW64\Qfljmmjl.exeC:\Windows\system32\Qfljmmjl.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Windows\SysWOW64\Akkokc32.exeC:\Windows\system32\Akkokc32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1004 -
C:\Windows\SysWOW64\Ankhmncb.exeC:\Windows\system32\Ankhmncb.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2072 -
C:\Windows\SysWOW64\Agdlfd32.exeC:\Windows\system32\Agdlfd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1216 -
C:\Windows\SysWOW64\Anpahn32.exeC:\Windows\system32\Anpahn32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536 -
C:\Windows\SysWOW64\Bphdpe32.exeC:\Windows\system32\Bphdpe32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Windows\SysWOW64\Bbimbpld.exeC:\Windows\system32\Bbimbpld.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\Dalfdjdl.exeC:\Windows\system32\Dalfdjdl.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212 -
C:\Windows\SysWOW64\Dlhdjh32.exeC:\Windows\system32\Dlhdjh32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020 -
C:\Windows\SysWOW64\Eoimlc32.exeC:\Windows\system32\Eoimlc32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920 -
C:\Windows\SysWOW64\Eokiabjf.exeC:\Windows\system32\Eokiabjf.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948 -
C:\Windows\SysWOW64\Edkopifk.exeC:\Windows\system32\Edkopifk.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820 -
C:\Windows\SysWOW64\Eaooin32.exeC:\Windows\system32\Eaooin32.exe33⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\Eaalom32.exeC:\Windows\system32\Eaalom32.exe34⤵
- Executes dropped EXE
PID:776 -
C:\Windows\SysWOW64\Fnjiin32.exeC:\Windows\system32\Fnjiin32.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\Fcgaae32.exeC:\Windows\system32\Fcgaae32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:524 -
C:\Windows\SysWOW64\Fonbff32.exeC:\Windows\system32\Fonbff32.exe37⤵
- Executes dropped EXE
PID:932 -
C:\Windows\SysWOW64\Fopole32.exeC:\Windows\system32\Fopole32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\Fkgpaf32.exeC:\Windows\system32\Fkgpaf32.exe39⤵
- Executes dropped EXE
PID:456 -
C:\Windows\SysWOW64\Gimmpj32.exeC:\Windows\system32\Gimmpj32.exe40⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\Gednek32.exeC:\Windows\system32\Gednek32.exe41⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Gmobin32.exeC:\Windows\system32\Gmobin32.exe42⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\Gjccbb32.exeC:\Windows\system32\Gjccbb32.exe43⤵
- Executes dropped EXE
PID:672 -
C:\Windows\SysWOW64\Gggclfkj.exeC:\Windows\system32\Gggclfkj.exe44⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\Haohel32.exeC:\Windows\system32\Haohel32.exe45⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Hjhlnahk.exeC:\Windows\system32\Hjhlnahk.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1732 -
C:\Windows\SysWOW64\Hfnmbbnp.exeC:\Windows\system32\Hfnmbbnp.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\Hnjagdlj.exeC:\Windows\system32\Hnjagdlj.exe48⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\Hpinagbm.exeC:\Windows\system32\Hpinagbm.exe49⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\Hajkip32.exeC:\Windows\system32\Hajkip32.exe50⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\Hjcoaeol.exeC:\Windows\system32\Hjcoaeol.exe51⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Ilblkh32.exeC:\Windows\system32\Ilblkh32.exe52⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\Iflmlfcn.exeC:\Windows\system32\Iflmlfcn.exe53⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\Idpmejag.exeC:\Windows\system32\Idpmejag.exe54⤵
- Executes dropped EXE
PID:580 -
C:\Windows\SysWOW64\Imhanp32.exeC:\Windows\system32\Imhanp32.exe55⤵
- Executes dropped EXE
PID:1448 -
C:\Windows\SysWOW64\Iiobcq32.exeC:\Windows\system32\Iiobcq32.exe56⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\Iddfqi32.exeC:\Windows\system32\Iddfqi32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Ipkgejcf.exeC:\Windows\system32\Ipkgejcf.exe58⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\Joqdfghn.exeC:\Windows\system32\Joqdfghn.exe59⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\Jifhdphd.exeC:\Windows\system32\Jifhdphd.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\Jlgaek32.exeC:\Windows\system32\Jlgaek32.exe61⤵
- Executes dropped EXE
PID:2376 -
C:\Windows\SysWOW64\Jeofnpke.exeC:\Windows\system32\Jeofnpke.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\Jklnggjm.exeC:\Windows\system32\Jklnggjm.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\Jddbpmpm.exeC:\Windows\system32\Jddbpmpm.exe64⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Kahciaog.exeC:\Windows\system32\Kahciaog.exe65⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\Kjchmclb.exeC:\Windows\system32\Kjchmclb.exe66⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\Kgghgg32.exeC:\Windows\system32\Kgghgg32.exe67⤵PID:1752
-
C:\Windows\SysWOW64\Kcnilhap.exeC:\Windows\system32\Kcnilhap.exe68⤵PID:2244
-
C:\Windows\SysWOW64\Kjhahb32.exeC:\Windows\system32\Kjhahb32.exe69⤵PID:1564
-
C:\Windows\SysWOW64\Kfobmc32.exeC:\Windows\system32\Kfobmc32.exe70⤵PID:3008
-
C:\Windows\SysWOW64\Lbfcbdce.exeC:\Windows\system32\Lbfcbdce.exe71⤵PID:1452
-
C:\Windows\SysWOW64\Lojclibo.exeC:\Windows\system32\Lojclibo.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2944 -
C:\Windows\SysWOW64\Lolpah32.exeC:\Windows\system32\Lolpah32.exe73⤵PID:2304
-
C:\Windows\SysWOW64\Mmkcoq32.exeC:\Windows\system32\Mmkcoq32.exe74⤵PID:1484
-
C:\Windows\SysWOW64\Memncbmj.exeC:\Windows\system32\Memncbmj.exe75⤵
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\Ndehjnpo.exeC:\Windows\system32\Ndehjnpo.exe76⤵
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\Ndgdpn32.exeC:\Windows\system32\Ndgdpn32.exe77⤵PID:112
-
C:\Windows\SysWOW64\Nmpiicdm.exeC:\Windows\system32\Nmpiicdm.exe78⤵PID:2032
-
C:\Windows\SysWOW64\Njcibgcf.exeC:\Windows\system32\Njcibgcf.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2008 -
C:\Windows\SysWOW64\Oemjbe32.exeC:\Windows\system32\Oemjbe32.exe80⤵PID:1980
-
C:\Windows\SysWOW64\Ooeolkff.exeC:\Windows\system32\Ooeolkff.exe81⤵
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\Opekenmh.exeC:\Windows\system32\Opekenmh.exe82⤵PID:2632
-
C:\Windows\SysWOW64\Oimpnc32.exeC:\Windows\system32\Oimpnc32.exe83⤵
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\Oojhfj32.exeC:\Windows\system32\Oojhfj32.exe84⤵PID:868
-
C:\Windows\SysWOW64\Odgqoa32.exeC:\Windows\system32\Odgqoa32.exe85⤵PID:2724
-
C:\Windows\SysWOW64\Omoehf32.exeC:\Windows\system32\Omoehf32.exe86⤵
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Pkcfak32.exeC:\Windows\system32\Pkcfak32.exe87⤵PID:2800
-
C:\Windows\SysWOW64\Pgjfflkf.exeC:\Windows\system32\Pgjfflkf.exe88⤵PID:916
-
C:\Windows\SysWOW64\Pmdocf32.exeC:\Windows\system32\Pmdocf32.exe89⤵PID:2444
-
C:\Windows\SysWOW64\Pikohg32.exeC:\Windows\system32\Pikohg32.exe90⤵PID:896
-
C:\Windows\SysWOW64\Pdpcep32.exeC:\Windows\system32\Pdpcep32.exe91⤵
- Modifies registry class
PID:2984 -
C:\Windows\SysWOW64\Ppgdjqna.exeC:\Windows\system32\Ppgdjqna.exe92⤵PID:2248
-
C:\Windows\SysWOW64\Pedmbg32.exeC:\Windows\system32\Pedmbg32.exe93⤵
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Qefihg32.exeC:\Windows\system32\Qefihg32.exe94⤵PID:1940
-
C:\Windows\SysWOW64\Qamjmh32.exeC:\Windows\system32\Qamjmh32.exe95⤵PID:1492
-
C:\Windows\SysWOW64\Aoakfl32.exeC:\Windows\system32\Aoakfl32.exe96⤵PID:1052
-
C:\Windows\SysWOW64\Agloko32.exeC:\Windows\system32\Agloko32.exe97⤵PID:1616
-
C:\Windows\SysWOW64\Adppdckh.exeC:\Windows\system32\Adppdckh.exe98⤵
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Ajmhljip.exeC:\Windows\system32\Ajmhljip.exe99⤵PID:2116
-
C:\Windows\SysWOW64\Agaifnhi.exeC:\Windows\system32\Agaifnhi.exe100⤵PID:2128
-
C:\Windows\SysWOW64\Adeiobgc.exeC:\Windows\system32\Adeiobgc.exe101⤵
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\Ampncd32.exeC:\Windows\system32\Ampncd32.exe102⤵PID:1148
-
C:\Windows\SysWOW64\Bmbkid32.exeC:\Windows\system32\Bmbkid32.exe103⤵PID:2608
-
C:\Windows\SysWOW64\Bbocak32.exeC:\Windows\system32\Bbocak32.exe104⤵PID:1788
-
C:\Windows\SysWOW64\Bikhce32.exeC:\Windows\system32\Bikhce32.exe105⤵PID:2752
-
C:\Windows\SysWOW64\Bnhqll32.exeC:\Windows\system32\Bnhqll32.exe106⤵PID:1168
-
C:\Windows\SysWOW64\Bebiifka.exeC:\Windows\system32\Bebiifka.exe107⤵
- Modifies registry class
PID:2236 -
C:\Windows\SysWOW64\Bnkmakbb.exeC:\Windows\system32\Bnkmakbb.exe108⤵PID:924
-
C:\Windows\SysWOW64\Bjanfl32.exeC:\Windows\system32\Bjanfl32.exe109⤵PID:1116
-
C:\Windows\SysWOW64\Ccjbobnf.exeC:\Windows\system32\Ccjbobnf.exe110⤵
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Cancif32.exeC:\Windows\system32\Cancif32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2056 -
C:\Windows\SysWOW64\Cnacbj32.exeC:\Windows\system32\Cnacbj32.exe112⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\Cgjhkpbj.exeC:\Windows\system32\Cgjhkpbj.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2936 -
C:\Windows\SysWOW64\Cbcikn32.exeC:\Windows\system32\Cbcikn32.exe114⤵PID:1892
-
C:\Windows\SysWOW64\Ccceeqfl.exeC:\Windows\system32\Ccceeqfl.exe115⤵PID:2864
-
C:\Windows\SysWOW64\Dmljnfll.exeC:\Windows\system32\Dmljnfll.exe116⤵PID:1636
-
C:\Windows\SysWOW64\Dlqgob32.exeC:\Windows\system32\Dlqgob32.exe117⤵PID:1440
-
C:\Windows\SysWOW64\Deikhhhe.exeC:\Windows\system32\Deikhhhe.exe118⤵
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Dlcceboa.exeC:\Windows\system32\Dlcceboa.exe119⤵
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\Ddnhidmm.exeC:\Windows\system32\Ddnhidmm.exe120⤵PID:272
-
C:\Windows\SysWOW64\Dkhpfo32.exeC:\Windows\system32\Dkhpfo32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1016 -
C:\Windows\SysWOW64\Dgoakpjn.exeC:\Windows\system32\Dgoakpjn.exe122⤵PID:1908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-