Analysis
-
max time kernel
40s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 20:45
Behavioral task
behavioral1
Sample
b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe
Resource
win10v2004-20241007-en
General
-
Target
b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe
-
Size
163KB
-
MD5
528bb4dae214c722d1738985ae4ae060
-
SHA1
719125dac2fb72cb3bb48b81eaca0cc85311af7b
-
SHA256
b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4
-
SHA512
7b8005d81c83a4cb020e3ed29d3da8081acc12a7b9533b30769d73aab81cacc828fcf3fb09db6316570f9a539bf0732547407b24876d8c4f96f691618d32e111
-
SSDEEP
1536:Pyd3sSw8gANoKVlIfudlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:A3sSw8gANoKVlIWdltOrWKDBr+yJb
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Cinahhff.exeGfpjgn32.exePobgjhgh.exeBdbkaoce.exeHchbcmlh.exeAjoebigm.exeDadehh32.exeAenileon.exeFeeilbhg.exeCqfdem32.exeNnfeep32.exePmijgn32.exeEenckc32.exeGomhkb32.exeLlfcik32.exeAaeiqf32.exeCgpjin32.exeGdfmccfm.exeFofhdidp.exeLegcjjjm.exeCfhjjp32.exeGmgenh32.exeQdkpomkb.exeDckdio32.exeGcifdj32.exeNnnbqeib.exeAoijjjcl.exeOnmgeb32.exeCconcjae.exeDknehe32.exeImkqmh32.exeLkafib32.exeOnggom32.exeDkhpfo32.exePieobaiq.exeCkgmon32.exeFejjah32.exeAecdpmbm.exeFakhhk32.exeBnemlf32.exeFldbnb32.exeOnhnjclg.exeCbdkdffm.exeCqneaodd.exeOelcho32.exeBcbedm32.exeEbghkjjc.exeObopobhe.exeBhljlnma.exeIgioiacg.exeMfoqephq.exeCmgblphf.exeEphhmn32.exeIbplji32.exeJekoljgo.exeJoepjokm.exeAlknnodh.exeLllihf32.exeCkopch32.exePciiccbm.exeCfknjfbl.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cinahhff.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfpjgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pobgjhgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdbkaoce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hchbcmlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajoebigm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dadehh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aenileon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feeilbhg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cqfdem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnfeep32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmijgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eenckc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gomhkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llfcik32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaeiqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgpjin32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdfmccfm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fofhdidp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Legcjjjm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfhjjp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmgenh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qdkpomkb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dckdio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcifdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnnbqeib.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aoijjjcl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onmgeb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cconcjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknehe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imkqmh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkafib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onggom32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkhpfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkhpfo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pieobaiq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckgmon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fejjah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aecdpmbm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fakhhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnemlf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fldbnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onhnjclg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbdkdffm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cqneaodd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Legcjjjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oelcho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcbedm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebghkjjc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obopobhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhljlnma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igioiacg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfoqephq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmgblphf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ephhmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibplji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jekoljgo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joepjokm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcifdj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alknnodh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lllihf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckopch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pciiccbm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfknjfbl.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 2 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Mliibj32.exe family_bruteratel C:\Windows\SysWOW64\Feeilbhg.exe family_bruteratel -
Executes dropped EXE 64 IoCs
Processes:
Nfhmai32.exeObonfj32.exeOlgboogb.exeOikcicfl.exeOefmid32.exePpbkoabf.exePlildb32.exeQjbehfbo.exeQfifmghc.exeAhllda32.exeAjoebigm.exeAgcekn32.exeBjdnmi32.exeBikhce32.exeBbdmljln.exeBphmfo32.exeCappnf32.exeCinahhff.exeCbfeam32.exeDeikhhhe.exeDoapanne.exeDkhpfo32.exeDadehh32.exeEchoepmo.exeEcjkkp32.exeEcmhqp32.exeEpqhjdhc.exeFofekp32.exeFakhhk32.exeGmgenh32.exeGfpjgn32.exeGomhkb32.exeGfgpgmql.exeGkchpcoc.exeHgmfjdbe.exeHminbkql.exeHnikmnho.exeHiblmldn.exeImqdcjkd.exeIfiilp32.exeIpcjje32.exeIhooog32.exeIlmgef32.exeIeelnkpd.exeJonqfq32.exeJkfnaa32.exeJbbbed32.exeJpfcohfk.exeJeblgodb.exeKokppd32.exeKhcdijac.exeKdjenkgh.exeKopikdgn.exeKhhndi32.exeKdooij32.exeKkigfdjo.exeKcdljghj.exeLnipgp32.exeLfedlb32.exeLpjiik32.exeLlainlje.exeLbnbfb32.exeLlcfck32.exeLbpolb32.exepid process 2616 Nfhmai32.exe 2156 Obonfj32.exe 2980 Olgboogb.exe 2968 Oikcicfl.exe 2912 Oefmid32.exe 2804 Ppbkoabf.exe 1384 Plildb32.exe 1036 Qjbehfbo.exe 1524 Qfifmghc.exe 2436 Ahllda32.exe 2396 Ajoebigm.exe 2032 Agcekn32.exe 1692 Bjdnmi32.exe 1316 Bikhce32.exe 2700 Bbdmljln.exe 1980 Bphmfo32.exe 2160 Cappnf32.exe 2568 Cinahhff.exe 1340 Cbfeam32.exe 1540 Deikhhhe.exe 616 Doapanne.exe 1388 Dkhpfo32.exe 1748 Dadehh32.exe 2632 Echoepmo.exe 928 Ecjkkp32.exe 1824 Ecmhqp32.exe 1624 Epqhjdhc.exe 2984 Fofekp32.exe 2956 Fakhhk32.exe 2972 Gmgenh32.exe 3004 Gfpjgn32.exe 2336 Gomhkb32.exe 2644 Gfgpgmql.exe 2332 Gkchpcoc.exe 2364 Hgmfjdbe.exe 2216 Hminbkql.exe 568 Hnikmnho.exe 2000 Hiblmldn.exe 2044 Imqdcjkd.exe 1380 Ifiilp32.exe 2068 Ipcjje32.exe 2256 Ihooog32.exe 2416 Ilmgef32.exe 712 Ieelnkpd.exe 1064 Jonqfq32.exe 1008 Jkfnaa32.exe 2688 Jbbbed32.exe 916 Jpfcohfk.exe 1504 Jeblgodb.exe 2432 Kokppd32.exe 2276 Khcdijac.exe 844 Kdjenkgh.exe 2712 Kopikdgn.exe 2828 Khhndi32.exe 2236 Kdooij32.exe 3008 Kkigfdjo.exe 2224 Kcdljghj.exe 676 Lnipgp32.exe 112 Lfedlb32.exe 2924 Lpjiik32.exe 1192 Llainlje.exe 892 Lbnbfb32.exe 956 Llcfck32.exe 2464 Lbpolb32.exe -
Loads dropped DLL 64 IoCs
Processes:
b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exeNfhmai32.exeObonfj32.exeOlgboogb.exeOikcicfl.exeOefmid32.exePpbkoabf.exePlildb32.exeQjbehfbo.exeQfifmghc.exeAhllda32.exeAjoebigm.exeAgcekn32.exeBjdnmi32.exeBikhce32.exeBbdmljln.exeBphmfo32.exeCappnf32.exeCinahhff.exeCbfeam32.exeDeikhhhe.exeDoapanne.exeDkhpfo32.exeDadehh32.exeEchoepmo.exeEcjkkp32.exeEcmhqp32.exeEpqhjdhc.exeFofekp32.exeFakhhk32.exeGmgenh32.exeGfpjgn32.exepid process 2200 b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe 2200 b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe 2616 Nfhmai32.exe 2616 Nfhmai32.exe 2156 Obonfj32.exe 2156 Obonfj32.exe 2980 Olgboogb.exe 2980 Olgboogb.exe 2968 Oikcicfl.exe 2968 Oikcicfl.exe 2912 Oefmid32.exe 2912 Oefmid32.exe 2804 Ppbkoabf.exe 2804 Ppbkoabf.exe 1384 Plildb32.exe 1384 Plildb32.exe 1036 Qjbehfbo.exe 1036 Qjbehfbo.exe 1524 Qfifmghc.exe 1524 Qfifmghc.exe 2436 Ahllda32.exe 2436 Ahllda32.exe 2396 Ajoebigm.exe 2396 Ajoebigm.exe 2032 Agcekn32.exe 2032 Agcekn32.exe 1692 Bjdnmi32.exe 1692 Bjdnmi32.exe 1316 Bikhce32.exe 1316 Bikhce32.exe 2700 Bbdmljln.exe 2700 Bbdmljln.exe 1980 Bphmfo32.exe 1980 Bphmfo32.exe 2160 Cappnf32.exe 2160 Cappnf32.exe 2568 Cinahhff.exe 2568 Cinahhff.exe 1340 Cbfeam32.exe 1340 Cbfeam32.exe 1540 Deikhhhe.exe 1540 Deikhhhe.exe 616 Doapanne.exe 616 Doapanne.exe 1388 Dkhpfo32.exe 1388 Dkhpfo32.exe 1748 Dadehh32.exe 1748 Dadehh32.exe 2632 Echoepmo.exe 2632 Echoepmo.exe 928 Ecjkkp32.exe 928 Ecjkkp32.exe 1824 Ecmhqp32.exe 1824 Ecmhqp32.exe 1624 Epqhjdhc.exe 1624 Epqhjdhc.exe 2984 Fofekp32.exe 2984 Fofekp32.exe 2956 Fakhhk32.exe 2956 Fakhhk32.exe 2972 Gmgenh32.exe 2972 Gmgenh32.exe 3004 Gfpjgn32.exe 3004 Gfpjgn32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kokppd32.exeHbhmfk32.exeMliibj32.exeFpgmak32.exeEcjkkp32.exeNnkekfkd.exeHfiofefm.exeBgpnjkgi.exeCkijdm32.exeMnqdpj32.exeChickknc.exeMhaobd32.exeNodnmb32.exeGfpjgn32.exeKhcdijac.exePapmlmbp.exeCmgblphf.exeAhllda32.exeEpqhjdhc.exeOaiglnih.exeLlalgdbj.exeNffcebdd.exeObopobhe.exeAbbknb32.exeBpieli32.exeFoacmg32.exeJocceo32.exeNpngng32.exeOnmgeb32.exeEoanij32.exeAflkiapg.exeOmekgakg.exeEoqeekme.exeImkqmh32.exeMchadifq.exeIbhieo32.exeOnggom32.exeOpkpme32.exeLknbjlnn.exeObniel32.exeMcendc32.exeLpkkbcle.exeCqfdem32.exePlildb32.exeMqhhbn32.exeNhdjdk32.exeKpiihgoh.exeNfcfob32.exeQdieaf32.exeNijcgp32.exeNaokbq32.exeJoepjokm.exeBlcmbmip.exeMcknjidn.exeLihifhoq.exeEbcqicem.exeHqhiab32.exeObonfj32.exeJfadoaih.exeNdbjgjqh.exedescription ioc process File created C:\Windows\SysWOW64\Jdcihfiq.dll Kokppd32.exe File created C:\Windows\SysWOW64\Ibjikk32.exe Hbhmfk32.exe File opened for modification C:\Windows\SysWOW64\Mjmiknng.exe Mliibj32.exe File opened for modification C:\Windows\SysWOW64\Fmknko32.exe Fpgmak32.exe File created C:\Windows\SysWOW64\Iafkhioi.dll Ecjkkp32.exe File created C:\Windows\SysWOW64\Ajoaoj32.dll Nnkekfkd.exe File opened for modification C:\Windows\SysWOW64\Hobcok32.exe Hfiofefm.exe File created C:\Windows\SysWOW64\Kjgkiddo.dll Bgpnjkgi.exe File created C:\Windows\SysWOW64\Cgpjin32.exe Ckijdm32.exe File created C:\Windows\SysWOW64\Nodnmb32.exe Mnqdpj32.exe File opened for modification C:\Windows\SysWOW64\Cbagdq32.exe Chickknc.exe File opened for modification C:\Windows\SysWOW64\Mnnhjk32.exe Mhaobd32.exe File created C:\Windows\SysWOW64\Nhmbfhfd.exe Nodnmb32.exe File created C:\Windows\SysWOW64\Edicfeme.dll Gfpjgn32.exe File opened for modification C:\Windows\SysWOW64\Kdjenkgh.exe Khcdijac.exe File created C:\Windows\SysWOW64\Kcghhg32.dll Papmlmbp.exe File created C:\Windows\SysWOW64\Fkopgd32.dll Cmgblphf.exe File created C:\Windows\SysWOW64\Ajoebigm.exe Ahllda32.exe File created C:\Windows\SysWOW64\Pbenfb32.dll Epqhjdhc.exe File opened for modification C:\Windows\SysWOW64\Onmgeb32.exe Oaiglnih.exe File opened for modification C:\Windows\SysWOW64\Lejppj32.exe Llalgdbj.exe File created C:\Windows\SysWOW64\Npngng32.exe Nffcebdd.exe File opened for modification C:\Windows\SysWOW64\Opcaiggo.exe Obopobhe.exe File created C:\Windows\SysWOW64\Alkpgh32.exe Abbknb32.exe File created C:\Windows\SysWOW64\Cfhjjp32.exe Bpieli32.exe File created C:\Windows\SysWOW64\Iiogbn32.dll Foacmg32.exe File created C:\Windows\SysWOW64\Iohcpqfg.dll Jocceo32.exe File created C:\Windows\SysWOW64\Plgojd32.dll Npngng32.exe File created C:\Windows\SysWOW64\Faolhkaf.dll Onmgeb32.exe File created C:\Windows\SysWOW64\Kafopn32.dll Eoanij32.exe File created C:\Windows\SysWOW64\Nghjkn32.dll Aflkiapg.exe File created C:\Windows\SysWOW64\Oelcho32.exe Omekgakg.exe File opened for modification C:\Windows\SysWOW64\Ekgfkl32.exe Eoqeekme.exe File opened for modification C:\Windows\SysWOW64\Ibhieo32.exe Imkqmh32.exe File opened for modification C:\Windows\SysWOW64\Cbdkdffm.exe Cmgblphf.exe File opened for modification C:\Windows\SysWOW64\Mnneabff.exe Mchadifq.exe File created C:\Windows\SysWOW64\Jnojjp32.exe Ibhieo32.exe File created C:\Windows\SysWOW64\Ebenhifo.dll Onggom32.exe File created C:\Windows\SysWOW64\Oemmad32.dll Opkpme32.exe File opened for modification C:\Windows\SysWOW64\Nfbmlckg.exe Nnkekfkd.exe File opened for modification C:\Windows\SysWOW64\Lpkkbcle.exe Lknbjlnn.exe File created C:\Windows\SysWOW64\Omhjejai.exe Obniel32.exe File created C:\Windows\SysWOW64\Eehkmm32.dll Mcendc32.exe File created C:\Windows\SysWOW64\Opcaiggo.exe Obopobhe.exe File created C:\Windows\SysWOW64\Djdkcf32.dll Lpkkbcle.exe File opened for modification C:\Windows\SysWOW64\Djoinbpm.exe Cqfdem32.exe File opened for modification C:\Windows\SysWOW64\Qjbehfbo.exe Plildb32.exe File opened for modification C:\Windows\SysWOW64\Mnlilb32.exe Mqhhbn32.exe File created C:\Windows\SysWOW64\Nnnbqeib.exe Nhdjdk32.exe File created C:\Windows\SysWOW64\Kdgane32.exe Kpiihgoh.exe File created C:\Windows\SysWOW64\Gaijph32.dll Nfcfob32.exe File created C:\Windows\SysWOW64\Eedmheda.dll Qdieaf32.exe File created C:\Windows\SysWOW64\Jqngde32.dll Nijcgp32.exe File created C:\Windows\SysWOW64\Ohhcokmp.exe Naokbq32.exe File created C:\Windows\SysWOW64\Jdbhcfjd.exe Joepjokm.exe File opened for modification C:\Windows\SysWOW64\Bfkakbpp.exe Blcmbmip.exe File opened for modification C:\Windows\SysWOW64\Mmcbbo32.exe Mcknjidn.exe File created C:\Windows\SysWOW64\Coledgje.dll Lihifhoq.exe File created C:\Windows\SysWOW64\Eijhke32.dll Ebcqicem.exe File created C:\Windows\SysWOW64\Hfdbji32.exe Hqhiab32.exe File created C:\Windows\SysWOW64\Ccnbppgg.dll Obonfj32.exe File created C:\Windows\SysWOW64\Ofmhcg32.dll Jfadoaih.exe File opened for modification C:\Windows\SysWOW64\Nfcfob32.exe Ndbjgjqh.exe File opened for modification C:\Windows\SysWOW64\Ehjbaooe.exe Eoanij32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3564 4196 WerFault.exe Gmmgobfd.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Annpaq32.exeGhaeaaki.exeNijcgp32.exeGemfghek.exeGgbljogc.exeOnhnjclg.exeObniel32.exeOikcicfl.exeAgcekn32.exeOaiglnih.exePegpamoo.exeHqhiab32.exeNhmbfhfd.exeBcgoolln.exeCgpjin32.exeImkqmh32.exeGeplpfnh.exeKcdljghj.exePoinkg32.exeDjemfibq.exeJmhile32.exeIhooog32.exeJpfcohfk.exeKpiihgoh.exeLpodmb32.exeDifplf32.exeOikeal32.exeFgibijkb.exeNfppfcmj.exeDfegjknm.exeBhljlnma.exeGadidabc.exeHkdkhl32.exeNbegonmd.exeNhalag32.exeEgbffj32.exeImqdcjkd.exeIfiilp32.exeGjolpkhj.exePfobjdoe.exeNehjmppo.exeDijjgegh.exeKekkkm32.exeBfkakbpp.exeJonqfq32.exeAbbknb32.exeEbcqicem.exeEhgoaiml.exeLpjiik32.exeEpmahmcm.exeOeobfgak.exeGfpjgn32.exeHchbcmlh.exeMhaobd32.exeMnqdpj32.exeJbbbed32.exeObopobhe.exeOmhjejai.exeBdmklico.exeFoacmg32.exeLlcfck32.exeBnemlf32.exeEoanij32.exeKbikokin.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Annpaq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghaeaaki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nijcgp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemfghek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggbljogc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onhnjclg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obniel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oikcicfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agcekn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oaiglnih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pegpamoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hqhiab32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhmbfhfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bcgoolln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgpjin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imkqmh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Geplpfnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcdljghj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Poinkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djemfibq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmhile32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihooog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jpfcohfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpiihgoh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpodmb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Difplf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oikeal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgibijkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfppfcmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfegjknm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhljlnma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gadidabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkdkhl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbegonmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhalag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Egbffj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imqdcjkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifiilp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjolpkhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfobjdoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nehjmppo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dijjgegh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kekkkm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfkakbpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jonqfq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abbknb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ebcqicem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehgoaiml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpjiik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Epmahmcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oeobfgak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfpjgn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hchbcmlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhaobd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnqdpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbbbed32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obopobhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omhjejai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdmklico.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Foacmg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llcfck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnemlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eoanij32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbikokin.exe -
Modifies registry class 64 IoCs
Processes:
Ebghkjjc.exeLihifhoq.exeNbegonmd.exeb577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exeJbbbed32.exeConpdm32.exeCqneaodd.exeGifhkpgk.exeLlainlje.exeFcbjon32.exeIggbdb32.exeLnaokn32.exeIhooog32.exeEkgfkl32.exeDnmhogjo.exeFncddc32.exeObniel32.exeImqdcjkd.exeJpfcohfk.exeNnkekfkd.exeMeojkide.exeJoepjokm.exeLnmfpnqn.exeNgfhbd32.exeDmdkkm32.exeQfifmghc.exeOaiglnih.exeAaeiqf32.exeOnggom32.exeAlkpgh32.exeEhgoaiml.exeLmjbphod.exeKopikdgn.exeMjmiknng.exeGhaeaaki.exeAhllda32.exeNpngng32.exeMnneabff.exeFldbnb32.exeKdgane32.exeCfknjfbl.exeNlabjj32.exeKjdpcnfi.exeGaamobdf.exeOpicgenj.exeAefaemqj.exeBgpnjkgi.exeCkgmon32.exeFpkdca32.exeLkafib32.exeCfhjjp32.exeEchoepmo.exeAenileon.exeEhpgha32.exeGdfmccfm.exeKhcdijac.exeNhdjdk32.exeEibbqmhd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebghkjjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lihifhoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbegonmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbbbed32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Conpdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Deacbgdc.dll" Conpdm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cqneaodd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odjoeplp.dll" Gifhkpgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jicfkpch.dll" Llainlje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhbaqhmq.dll" Fcbjon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iggbdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnaokn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihooog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcdoefdh.dll" Ekgfkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnllio32.dll" Dnmhogjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmgejpfh.dll" Fncddc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obniel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gifhkpgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgofgcik.dll" Imqdcjkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jpfcohfk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnkekfkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Meojkide.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Joepjokm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnmfpnqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngfhbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmdkkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qfifmghc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iggbdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oaiglnih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efahjm32.dll" Aaeiqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onggom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Melmba32.dll" Alkpgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epggabhd.dll" Ehgoaiml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmjbphod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kopikdgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjmiknng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cqneaodd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghaeaaki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgjhbpic.dll" Ahllda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plgojd32.dll" Npngng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnneabff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fldbnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdgane32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfknjfbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imqdcjkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlabjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppaldc32.dll" Kjdpcnfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gaamobdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oaiglnih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmnkma32.dll" Opicgenj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aefaemqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgpnjkgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qcdgffab.dll" Ckgmon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hokemgkj.dll" Fpkdca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkafib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfhjjp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Echoepmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aenileon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ococgpfb.dll" Ehpgha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gdfmccfm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khcdijac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nhdjdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eibbqmhd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exeNfhmai32.exeObonfj32.exeOlgboogb.exeOikcicfl.exeOefmid32.exePpbkoabf.exePlildb32.exeQjbehfbo.exeQfifmghc.exeAhllda32.exeAjoebigm.exeAgcekn32.exeBjdnmi32.exeBikhce32.exeBbdmljln.exedescription pid process target process PID 2200 wrote to memory of 2616 2200 b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe Nfhmai32.exe PID 2200 wrote to memory of 2616 2200 b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe Nfhmai32.exe PID 2200 wrote to memory of 2616 2200 b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe Nfhmai32.exe PID 2200 wrote to memory of 2616 2200 b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe Nfhmai32.exe PID 2616 wrote to memory of 2156 2616 Nfhmai32.exe Obonfj32.exe PID 2616 wrote to memory of 2156 2616 Nfhmai32.exe Obonfj32.exe PID 2616 wrote to memory of 2156 2616 Nfhmai32.exe Obonfj32.exe PID 2616 wrote to memory of 2156 2616 Nfhmai32.exe Obonfj32.exe PID 2156 wrote to memory of 2980 2156 Obonfj32.exe Olgboogb.exe PID 2156 wrote to memory of 2980 2156 Obonfj32.exe Olgboogb.exe PID 2156 wrote to memory of 2980 2156 Obonfj32.exe Olgboogb.exe PID 2156 wrote to memory of 2980 2156 Obonfj32.exe Olgboogb.exe PID 2980 wrote to memory of 2968 2980 Olgboogb.exe Oikcicfl.exe PID 2980 wrote to memory of 2968 2980 Olgboogb.exe Oikcicfl.exe PID 2980 wrote to memory of 2968 2980 Olgboogb.exe Oikcicfl.exe PID 2980 wrote to memory of 2968 2980 Olgboogb.exe Oikcicfl.exe PID 2968 wrote to memory of 2912 2968 Oikcicfl.exe Oefmid32.exe PID 2968 wrote to memory of 2912 2968 Oikcicfl.exe Oefmid32.exe PID 2968 wrote to memory of 2912 2968 Oikcicfl.exe Oefmid32.exe PID 2968 wrote to memory of 2912 2968 Oikcicfl.exe Oefmid32.exe PID 2912 wrote to memory of 2804 2912 Oefmid32.exe Ppbkoabf.exe PID 2912 wrote to memory of 2804 2912 Oefmid32.exe Ppbkoabf.exe PID 2912 wrote to memory of 2804 2912 Oefmid32.exe Ppbkoabf.exe PID 2912 wrote to memory of 2804 2912 Oefmid32.exe Ppbkoabf.exe PID 2804 wrote to memory of 1384 2804 Ppbkoabf.exe Plildb32.exe PID 2804 wrote to memory of 1384 2804 Ppbkoabf.exe Plildb32.exe PID 2804 wrote to memory of 1384 2804 Ppbkoabf.exe Plildb32.exe PID 2804 wrote to memory of 1384 2804 Ppbkoabf.exe Plildb32.exe PID 1384 wrote to memory of 1036 1384 Plildb32.exe Qjbehfbo.exe PID 1384 wrote to memory of 1036 1384 Plildb32.exe Qjbehfbo.exe PID 1384 wrote to memory of 1036 1384 Plildb32.exe Qjbehfbo.exe PID 1384 wrote to memory of 1036 1384 Plildb32.exe Qjbehfbo.exe PID 1036 wrote to memory of 1524 1036 Qjbehfbo.exe Qfifmghc.exe PID 1036 wrote to memory of 1524 1036 Qjbehfbo.exe Qfifmghc.exe PID 1036 wrote to memory of 1524 1036 Qjbehfbo.exe Qfifmghc.exe PID 1036 wrote to memory of 1524 1036 Qjbehfbo.exe Qfifmghc.exe PID 1524 wrote to memory of 2436 1524 Qfifmghc.exe Ahllda32.exe PID 1524 wrote to memory of 2436 1524 Qfifmghc.exe Ahllda32.exe PID 1524 wrote to memory of 2436 1524 Qfifmghc.exe Ahllda32.exe PID 1524 wrote to memory of 2436 1524 Qfifmghc.exe Ahllda32.exe PID 2436 wrote to memory of 2396 2436 Ahllda32.exe Ajoebigm.exe PID 2436 wrote to memory of 2396 2436 Ahllda32.exe Ajoebigm.exe PID 2436 wrote to memory of 2396 2436 Ahllda32.exe Ajoebigm.exe PID 2436 wrote to memory of 2396 2436 Ahllda32.exe Ajoebigm.exe PID 2396 wrote to memory of 2032 2396 Ajoebigm.exe Agcekn32.exe PID 2396 wrote to memory of 2032 2396 Ajoebigm.exe Agcekn32.exe PID 2396 wrote to memory of 2032 2396 Ajoebigm.exe Agcekn32.exe PID 2396 wrote to memory of 2032 2396 Ajoebigm.exe Agcekn32.exe PID 2032 wrote to memory of 1692 2032 Agcekn32.exe Bjdnmi32.exe PID 2032 wrote to memory of 1692 2032 Agcekn32.exe Bjdnmi32.exe PID 2032 wrote to memory of 1692 2032 Agcekn32.exe Bjdnmi32.exe PID 2032 wrote to memory of 1692 2032 Agcekn32.exe Bjdnmi32.exe PID 1692 wrote to memory of 1316 1692 Bjdnmi32.exe Bikhce32.exe PID 1692 wrote to memory of 1316 1692 Bjdnmi32.exe Bikhce32.exe PID 1692 wrote to memory of 1316 1692 Bjdnmi32.exe Bikhce32.exe PID 1692 wrote to memory of 1316 1692 Bjdnmi32.exe Bikhce32.exe PID 1316 wrote to memory of 2700 1316 Bikhce32.exe Bbdmljln.exe PID 1316 wrote to memory of 2700 1316 Bikhce32.exe Bbdmljln.exe PID 1316 wrote to memory of 2700 1316 Bikhce32.exe Bbdmljln.exe PID 1316 wrote to memory of 2700 1316 Bikhce32.exe Bbdmljln.exe PID 2700 wrote to memory of 1980 2700 Bbdmljln.exe Bphmfo32.exe PID 2700 wrote to memory of 1980 2700 Bbdmljln.exe Bphmfo32.exe PID 2700 wrote to memory of 1980 2700 Bbdmljln.exe Bphmfo32.exe PID 2700 wrote to memory of 1980 2700 Bbdmljln.exe Bphmfo32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe"C:\Users\Admin\AppData\Local\Temp\b577975a8a43000109d4dbc6b8745f642eca93dfed690095c4d72e50fa591eb4N.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\Nfhmai32.exeC:\Windows\system32\Nfhmai32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Obonfj32.exeC:\Windows\system32\Obonfj32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\Olgboogb.exeC:\Windows\system32\Olgboogb.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Oikcicfl.exeC:\Windows\system32\Oikcicfl.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Oefmid32.exeC:\Windows\system32\Oefmid32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Ppbkoabf.exeC:\Windows\system32\Ppbkoabf.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Plildb32.exeC:\Windows\system32\Plildb32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Qjbehfbo.exeC:\Windows\system32\Qjbehfbo.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\Qfifmghc.exeC:\Windows\system32\Qfifmghc.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\Ahllda32.exeC:\Windows\system32\Ahllda32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\Ajoebigm.exeC:\Windows\system32\Ajoebigm.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\Agcekn32.exeC:\Windows\system32\Agcekn32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\Bjdnmi32.exeC:\Windows\system32\Bjdnmi32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\Bikhce32.exeC:\Windows\system32\Bikhce32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\Bbdmljln.exeC:\Windows\system32\Bbdmljln.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\Bphmfo32.exeC:\Windows\system32\Bphmfo32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1980 -
C:\Windows\SysWOW64\Cappnf32.exeC:\Windows\system32\Cappnf32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160 -
C:\Windows\SysWOW64\Cinahhff.exeC:\Windows\system32\Cinahhff.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2568 -
C:\Windows\SysWOW64\Cbfeam32.exeC:\Windows\system32\Cbfeam32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1340 -
C:\Windows\SysWOW64\Deikhhhe.exeC:\Windows\system32\Deikhhhe.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1540 -
C:\Windows\SysWOW64\Doapanne.exeC:\Windows\system32\Doapanne.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:616 -
C:\Windows\SysWOW64\Dkhpfo32.exeC:\Windows\system32\Dkhpfo32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1388 -
C:\Windows\SysWOW64\Dadehh32.exeC:\Windows\system32\Dadehh32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Windows\SysWOW64\Echoepmo.exeC:\Windows\system32\Echoepmo.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2632 -
C:\Windows\SysWOW64\Ecjkkp32.exeC:\Windows\system32\Ecjkkp32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:928 -
C:\Windows\SysWOW64\Ecmhqp32.exeC:\Windows\system32\Ecmhqp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824 -
C:\Windows\SysWOW64\Epqhjdhc.exeC:\Windows\system32\Epqhjdhc.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\Fofekp32.exeC:\Windows\system32\Fofekp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Windows\SysWOW64\Fakhhk32.exeC:\Windows\system32\Fakhhk32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2956 -
C:\Windows\SysWOW64\Gmgenh32.exeC:\Windows\system32\Gmgenh32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2972 -
C:\Windows\SysWOW64\Gfpjgn32.exeC:\Windows\system32\Gfpjgn32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\Gomhkb32.exeC:\Windows\system32\Gomhkb32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Gfgpgmql.exeC:\Windows\system32\Gfgpgmql.exe34⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\Gkchpcoc.exeC:\Windows\system32\Gkchpcoc.exe35⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Hgmfjdbe.exeC:\Windows\system32\Hgmfjdbe.exe36⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\Hminbkql.exeC:\Windows\system32\Hminbkql.exe37⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\Hnikmnho.exeC:\Windows\system32\Hnikmnho.exe38⤵
- Executes dropped EXE
PID:568 -
C:\Windows\SysWOW64\Hiblmldn.exeC:\Windows\system32\Hiblmldn.exe39⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\Imqdcjkd.exeC:\Windows\system32\Imqdcjkd.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\Ifiilp32.exeC:\Windows\system32\Ifiilp32.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\Ipcjje32.exeC:\Windows\system32\Ipcjje32.exe42⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Ihooog32.exeC:\Windows\system32\Ihooog32.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Ilmgef32.exeC:\Windows\system32\Ilmgef32.exe44⤵
- Executes dropped EXE
PID:2416 -
C:\Windows\SysWOW64\Ieelnkpd.exeC:\Windows\system32\Ieelnkpd.exe45⤵
- Executes dropped EXE
PID:712 -
C:\Windows\SysWOW64\Jonqfq32.exeC:\Windows\system32\Jonqfq32.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\Jkfnaa32.exeC:\Windows\system32\Jkfnaa32.exe47⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\Jbbbed32.exeC:\Windows\system32\Jbbbed32.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Jpfcohfk.exeC:\Windows\system32\Jpfcohfk.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:916 -
C:\Windows\SysWOW64\Jeblgodb.exeC:\Windows\system32\Jeblgodb.exe50⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\Kokppd32.exeC:\Windows\system32\Kokppd32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Khcdijac.exeC:\Windows\system32\Khcdijac.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Kdjenkgh.exeC:\Windows\system32\Kdjenkgh.exe53⤵
- Executes dropped EXE
PID:844 -
C:\Windows\SysWOW64\Kopikdgn.exeC:\Windows\system32\Kopikdgn.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Khhndi32.exeC:\Windows\system32\Khhndi32.exe55⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Kdooij32.exeC:\Windows\system32\Kdooij32.exe56⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\Kkigfdjo.exeC:\Windows\system32\Kkigfdjo.exe57⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\Kcdljghj.exeC:\Windows\system32\Kcdljghj.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\Lnipgp32.exeC:\Windows\system32\Lnipgp32.exe59⤵
- Executes dropped EXE
PID:676 -
C:\Windows\SysWOW64\Lfedlb32.exeC:\Windows\system32\Lfedlb32.exe60⤵
- Executes dropped EXE
PID:112 -
C:\Windows\SysWOW64\Lpjiik32.exeC:\Windows\system32\Lpjiik32.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\Llainlje.exeC:\Windows\system32\Llainlje.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:1192 -
C:\Windows\SysWOW64\Lbnbfb32.exeC:\Windows\system32\Lbnbfb32.exe63⤵
- Executes dropped EXE
PID:892 -
C:\Windows\SysWOW64\Llcfck32.exeC:\Windows\system32\Llcfck32.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\SysWOW64\Lbpolb32.exeC:\Windows\system32\Lbpolb32.exe65⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Llfcik32.exeC:\Windows\system32\Llfcik32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2392 -
C:\Windows\SysWOW64\Mfngbq32.exeC:\Windows\system32\Mfngbq32.exe67⤵PID:2380
-
C:\Windows\SysWOW64\Mqhhbn32.exeC:\Windows\system32\Mqhhbn32.exe68⤵
- Drops file in System32 directory
PID:2152 -
C:\Windows\SysWOW64\Mnlilb32.exeC:\Windows\system32\Mnlilb32.exe69⤵PID:1060
-
C:\Windows\SysWOW64\Mchadifq.exeC:\Windows\system32\Mchadifq.exe70⤵
- Drops file in System32 directory
PID:1220 -
C:\Windows\SysWOW64\Mnneabff.exeC:\Windows\system32\Mnneabff.exe71⤵
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Mcknjidn.exeC:\Windows\system32\Mcknjidn.exe72⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\Mmcbbo32.exeC:\Windows\system32\Mmcbbo32.exe73⤵PID:1616
-
C:\Windows\SysWOW64\Nijcgp32.exeC:\Windows\system32\Nijcgp32.exe74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\Ncpgeh32.exeC:\Windows\system32\Ncpgeh32.exe75⤵PID:3012
-
C:\Windows\SysWOW64\Nfppfcmj.exeC:\Windows\system32\Nfppfcmj.exe76⤵
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\Nmjicn32.exeC:\Windows\system32\Nmjicn32.exe77⤵PID:2880
-
C:\Windows\SysWOW64\Nnkekfkd.exeC:\Windows\system32\Nnkekfkd.exe78⤵
- Drops file in System32 directory
- Modifies registry class
PID:1496 -
C:\Windows\SysWOW64\Nfbmlckg.exeC:\Windows\system32\Nfbmlckg.exe79⤵PID:3048
-
C:\Windows\SysWOW64\Nhdjdk32.exeC:\Windows\system32\Nhdjdk32.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:1180 -
C:\Windows\SysWOW64\Nnnbqeib.exeC:\Windows\system32\Nnnbqeib.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1040 -
C:\Windows\SysWOW64\Nehjmppo.exeC:\Windows\system32\Nehjmppo.exe82⤵
- System Location Discovery: System Language Discovery
PID:908 -
C:\Windows\SysWOW64\Nlabjj32.exeC:\Windows\system32\Nlabjj32.exe83⤵
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Naokbq32.exeC:\Windows\system32\Naokbq32.exe84⤵
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\Ohhcokmp.exeC:\Windows\system32\Ohhcokmp.exe85⤵PID:2708
-
C:\Windows\SysWOW64\Omekgakg.exeC:\Windows\system32\Omekgakg.exe86⤵
- Drops file in System32 directory
PID:1828 -
C:\Windows\SysWOW64\Oelcho32.exeC:\Windows\system32\Oelcho32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1408 -
C:\Windows\SysWOW64\Pieobaiq.exeC:\Windows\system32\Pieobaiq.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1724 -
C:\Windows\SysWOW64\Pobgjhgh.exeC:\Windows\system32\Pobgjhgh.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2260 -
C:\Windows\SysWOW64\Pkihpi32.exeC:\Windows\system32\Pkihpi32.exe90⤵PID:1996
-
C:\Windows\SysWOW64\Pdamhocm.exeC:\Windows\system32\Pdamhocm.exe91⤵PID:2684
-
C:\Windows\SysWOW64\Pmjaadjm.exeC:\Windows\system32\Pmjaadjm.exe92⤵PID:2900
-
C:\Windows\SysWOW64\Poinkg32.exeC:\Windows\system32\Poinkg32.exe93⤵
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\Qkpnph32.exeC:\Windows\system32\Qkpnph32.exe94⤵PID:2584
-
C:\Windows\SysWOW64\Qnoklc32.exeC:\Windows\system32\Qnoklc32.exe95⤵PID:3036
-
C:\Windows\SysWOW64\Qggoeilh.exeC:\Windows\system32\Qggoeilh.exe96⤵PID:3064
-
C:\Windows\SysWOW64\Qdkpomkb.exeC:\Windows\system32\Qdkpomkb.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2316 -
C:\Windows\SysWOW64\Alfdcp32.exeC:\Windows\system32\Alfdcp32.exe98⤵PID:2296
-
C:\Windows\SysWOW64\Aenileon.exeC:\Windows\system32\Aenileon.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2424 -
C:\Windows\SysWOW64\Aaeiqf32.exeC:\Windows\system32\Aaeiqf32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:852 -
C:\Windows\SysWOW64\Alknnodh.exeC:\Windows\system32\Alknnodh.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:236 -
C:\Windows\SysWOW64\Aoijjjcl.exeC:\Windows\system32\Aoijjjcl.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:304 -
C:\Windows\SysWOW64\Anngkg32.exeC:\Windows\system32\Anngkg32.exe103⤵PID:2220
-
C:\Windows\SysWOW64\Ahdkhp32.exeC:\Windows\system32\Ahdkhp32.exe104⤵PID:932
-
C:\Windows\SysWOW64\Bblpae32.exeC:\Windows\system32\Bblpae32.exe105⤵PID:2100
-
C:\Windows\SysWOW64\Bncpffdn.exeC:\Windows\system32\Bncpffdn.exe106⤵PID:2060
-
C:\Windows\SysWOW64\Bnemlf32.exeC:\Windows\system32\Bnemlf32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\Bcbedm32.exeC:\Windows\system32\Bcbedm32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1304 -
C:\Windows\SysWOW64\Bnhjae32.exeC:\Windows\system32\Bnhjae32.exe109⤵PID:3000
-
C:\Windows\SysWOW64\Bgpnjkgi.exeC:\Windows\system32\Bgpnjkgi.exe110⤵
- Drops file in System32 directory
- Modifies registry class
PID:1924 -
C:\Windows\SysWOW64\Bcgoolln.exeC:\Windows\system32\Bcgoolln.exe111⤵
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\Conpdm32.exeC:\Windows\system32\Conpdm32.exe112⤵
- Modifies registry class
PID:2820 -
C:\Windows\SysWOW64\Cncmei32.exeC:\Windows\system32\Cncmei32.exe113⤵PID:1752
-
C:\Windows\SysWOW64\Ckgmon32.exeC:\Windows\system32\Ckgmon32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2596 -
C:\Windows\SysWOW64\Cbqekhmp.exeC:\Windows\system32\Cbqekhmp.exe115⤵PID:1756
-
C:\Windows\SysWOW64\Ckijdm32.exeC:\Windows\system32\Ckijdm32.exe116⤵
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\Cgpjin32.exeC:\Windows\system32\Cgpjin32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:948 -
C:\Windows\SysWOW64\Cnjbfhqa.exeC:\Windows\system32\Cnjbfhqa.exe118⤵PID:2292
-
C:\Windows\SysWOW64\Dfegjknm.exeC:\Windows\system32\Dfegjknm.exe119⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\Dajlhc32.exeC:\Windows\system32\Dajlhc32.exe120⤵PID:1720
-
C:\Windows\SysWOW64\Difplf32.exeC:\Windows\system32\Difplf32.exe121⤵
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\Dckdio32.exeC:\Windows\system32\Dckdio32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2944
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-