Analysis
-
max time kernel
49s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe
Resource
win10v2004-20241007-en
General
-
Target
b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe
-
Size
163KB
-
MD5
b415493e5639712851f2a2ceb3b3ccc0
-
SHA1
d35e8a4156ad063337372b2a1a7092b0ce7316b8
-
SHA256
b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7
-
SHA512
41ff9801c01ebe82c3cfd5eb97750d1ebf84b90bc0fdf999a948787b9a49dd0259e474ea51997bbd82792dc47e043fe7919a0db48e57305d2c73195b9812355d
-
SSDEEP
1536:Pg9IFp6APrCKxZdG1zrp2Bd224Bi+lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:Y9GJjjQ3p2u24BPltOrWKDBr+yJb
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Qdfhlggl.exeEeffpn32.exeMmifiahi.exeFhqfie32.exeLfedlb32.exeGeplpfnh.exePbaide32.exeApeflmjc.exeFhlhmi32.exeIpfnjkgk.exeNmpiicdm.exeOicbma32.exeBqffna32.exeBgcdcjpf.exeKphbmp32.exeFmhaep32.exeOefmid32.exeFclkldqe.exeApglgfde.exeMqgahh32.exeIijdfc32.exeOcglmcdp.exeDjoinbpm.exeBjlkhn32.exeOemjbe32.exeEipjmk32.exeIhaldgak.exeJbhkngcd.exeCpmmkdkn.exeEgkgad32.exeDaplmimi.exePmjaadjm.exeFpfkhbon.exeCdpdpl32.exeFlnnfllf.exeOhncdp32.exeEdidcb32.exeNcbfcq32.exeAecdpmbm.exeDlnjjc32.exePdllci32.exeHbblpf32.exeCabldeik.exeDmffhd32.exeIjmdql32.exeBgqqcd32.exeObakli32.exePbcfie32.exeBdpgai32.exeAajedn32.exeHmfhjmho.exeMbobgfnf.exeCfaaalep.exeIcponb32.exeFmofjj32.exeGgeiooea.exeFondonbc.exeObamebfc.exePmijgn32.exeAicipgqe.exeEeceim32.exeIfgooikk.exeGkchpcoc.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdfhlggl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eeffpn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmifiahi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhqfie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfedlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Geplpfnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbaide32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apeflmjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhlhmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipfnjkgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmpiicdm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oicbma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bqffna32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgcdcjpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kphbmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmhaep32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oefmid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fclkldqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apglgfde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqgahh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iijdfc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocglmcdp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djoinbpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjlkhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oemjbe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eipjmk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihaldgak.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbhkngcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpmmkdkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egkgad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daplmimi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmjaadjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpfkhbon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdpdpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flnnfllf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohncdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edidcb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncbfcq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aecdpmbm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlnjjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdllci32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbblpf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cabldeik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmffhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijmdql32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgqqcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obakli32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbcfie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdpgai32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aajedn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmfhjmho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbobgfnf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfaaalep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icponb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmofjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggeiooea.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fondonbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obamebfc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmijgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aicipgqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eeceim32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apeflmjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifgooikk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkchpcoc.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 2 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Feeilbhg.exe family_bruteratel C:\Windows\SysWOW64\Jckkhplq.exe family_bruteratel -
Gozi family
-
Executes dropped EXE 64 IoCs
Processes:
Qfljmmjl.exeAqanke32.exeAjibckpc.exeAkkokc32.exeAicipgqe.exeBgkbfcck.exeBjlkhn32.exeCpmmkdkn.exeCobjmq32.exeCaepdk32.exeDiencmcj.exeDcpoab32.exeDpdpkfga.exeEeceim32.exeEhdnkh32.exeEgkgad32.exeEcbhfeip.exeFfcahq32.exeFmofjj32.exeFclkldqe.exeGkimff32.exeGqfeom32.exeGgbjag32.exeGnoocq32.exeHbqdldhi.exeHmfhjmho.exeHfajhblm.exeHlpofh32.exeInqhhc32.exeIhkifi32.exeIpfnjkgk.exeIiobcq32.exeIddfqi32.exeJejlca32.exeJcnmme32.exeJacjna32.exeJnjjcbiq.exeKknklg32.exeKcipqi32.exeKdilkllh.exeKldaon32.exeKlfndn32.exeKhmnio32.exeKccbgh32.exeLkngkj32.exeLgehpk32.exeLdihjo32.exeLdkeoo32.exeMmifiahi.exeMjmgbe32.exeMffdmfjd.exeMifmoa32.exeMbobgfnf.exeNiijdq32.exeNnfbmgcj.exeNnhobgag.exeNhpdkm32.exeNmmlccfp.exeNmpiicdm.exeNfhmai32.exeObonfj32.exeOemjbe32.exeObakli32.exeOhncdp32.exepid process 2932 Qfljmmjl.exe 2884 Aqanke32.exe 2344 Ajibckpc.exe 1016 Akkokc32.exe 2912 Aicipgqe.exe 2792 Bgkbfcck.exe 2556 Bjlkhn32.exe 2268 Cpmmkdkn.exe 1888 Cobjmq32.exe 2096 Caepdk32.exe 3032 Diencmcj.exe 2296 Dcpoab32.exe 788 Dpdpkfga.exe 2836 Eeceim32.exe 2512 Ehdnkh32.exe 1956 Egkgad32.exe 708 Ecbhfeip.exe 1952 Ffcahq32.exe 1656 Fmofjj32.exe 1596 Fclkldqe.exe 1568 Gkimff32.exe 2376 Gqfeom32.exe 2544 Ggbjag32.exe 2684 Gnoocq32.exe 892 Hbqdldhi.exe 1684 Hmfhjmho.exe 2844 Hfajhblm.exe 2276 Hlpofh32.exe 2832 Inqhhc32.exe 2900 Ihkifi32.exe 3068 Ipfnjkgk.exe 2756 Iiobcq32.exe 2596 Iddfqi32.exe 1600 Jejlca32.exe 2428 Jcnmme32.exe 2340 Jacjna32.exe 3036 Jnjjcbiq.exe 1968 Kknklg32.exe 304 Kcipqi32.exe 1708 Kdilkllh.exe 2080 Kldaon32.exe 2524 Klfndn32.exe 2088 Khmnio32.exe 2164 Kccbgh32.exe 2368 Lkngkj32.exe 1100 Lgehpk32.exe 1532 Ldihjo32.exe 1436 Ldkeoo32.exe 1680 Mmifiahi.exe 948 Mjmgbe32.exe 2680 Mffdmfjd.exe 2408 Mifmoa32.exe 2212 Mbobgfnf.exe 2460 Niijdq32.exe 864 Nnfbmgcj.exe 2744 Nnhobgag.exe 2108 Nhpdkm32.exe 776 Nmmlccfp.exe 1892 Nmpiicdm.exe 1332 Nfhmai32.exe 676 Obonfj32.exe 832 Oemjbe32.exe 2492 Obakli32.exe 1148 Ohncdp32.exe -
Loads dropped DLL 64 IoCs
Processes:
b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exeQfljmmjl.exeAqanke32.exeAjibckpc.exeAkkokc32.exeAicipgqe.exeBgkbfcck.exeBjlkhn32.exeCpmmkdkn.exeCobjmq32.exeCaepdk32.exeDiencmcj.exeDcpoab32.exeDpdpkfga.exeEeceim32.exeEhdnkh32.exeEgkgad32.exeEcbhfeip.exeFfcahq32.exeFmofjj32.exeFclkldqe.exeGkimff32.exeGqfeom32.exeGgbjag32.exeGnoocq32.exeHbqdldhi.exeHmfhjmho.exeHfajhblm.exeHlpofh32.exeInqhhc32.exeIhkifi32.exeIpfnjkgk.exepid process 1820 b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe 1820 b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe 2932 Qfljmmjl.exe 2932 Qfljmmjl.exe 2884 Aqanke32.exe 2884 Aqanke32.exe 2344 Ajibckpc.exe 2344 Ajibckpc.exe 1016 Akkokc32.exe 1016 Akkokc32.exe 2912 Aicipgqe.exe 2912 Aicipgqe.exe 2792 Bgkbfcck.exe 2792 Bgkbfcck.exe 2556 Bjlkhn32.exe 2556 Bjlkhn32.exe 2268 Cpmmkdkn.exe 2268 Cpmmkdkn.exe 1888 Cobjmq32.exe 1888 Cobjmq32.exe 2096 Caepdk32.exe 2096 Caepdk32.exe 3032 Diencmcj.exe 3032 Diencmcj.exe 2296 Dcpoab32.exe 2296 Dcpoab32.exe 788 Dpdpkfga.exe 788 Dpdpkfga.exe 2836 Eeceim32.exe 2836 Eeceim32.exe 2512 Ehdnkh32.exe 2512 Ehdnkh32.exe 1956 Egkgad32.exe 1956 Egkgad32.exe 708 Ecbhfeip.exe 708 Ecbhfeip.exe 1952 Ffcahq32.exe 1952 Ffcahq32.exe 1656 Fmofjj32.exe 1656 Fmofjj32.exe 1596 Fclkldqe.exe 1596 Fclkldqe.exe 1568 Gkimff32.exe 1568 Gkimff32.exe 2376 Gqfeom32.exe 2376 Gqfeom32.exe 2544 Ggbjag32.exe 2544 Ggbjag32.exe 2684 Gnoocq32.exe 2684 Gnoocq32.exe 892 Hbqdldhi.exe 892 Hbqdldhi.exe 1684 Hmfhjmho.exe 1684 Hmfhjmho.exe 2844 Hfajhblm.exe 2844 Hfajhblm.exe 2276 Hlpofh32.exe 2276 Hlpofh32.exe 2832 Inqhhc32.exe 2832 Inqhhc32.exe 2900 Ihkifi32.exe 2900 Ihkifi32.exe 3068 Ipfnjkgk.exe 3068 Ipfnjkgk.exe -
Drops file in System32 directory 64 IoCs
Processes:
Bedene32.exeGkchpcoc.exeIbmmkaik.exeOjnelefl.exeMqgahh32.exePjchjcmf.exeOlnipn32.exeHjplao32.exeLeaallcb.exeNgafdepl.exeQfljmmjl.exeMnlilb32.exeGkiooocb.exeObopobhe.exeNkmkgc32.exeKgqcam32.exeHhnnpolk.exeOhncdp32.exePejcab32.exeHmfkbeoc.exeIjjgkmqh.exeMookod32.exeNkhhie32.exeNcbfcq32.exeGaamobdf.exeIhkifi32.exeCpcpjbah.exeCabldeik.exeGdgcnj32.exeJdbhcfjd.exeMhgpgjoj.exeJbhkngcd.exeAkkokc32.exeGnoocq32.exeDnpedghl.exeGpccgppq.exeGeplpfnh.exeNhalag32.exeJocceo32.exeEfbpihoo.exeHjpnjheg.exePbcooo32.exeBjlkhn32.exeAgmacgcc.exeEccdmmpk.exeGdgoll32.exeDiencmcj.exeNfhmai32.exeOefmid32.exePooaaink.exeLckdcn32.exeFncddc32.exeLgehpk32.exeFcaaloed.exeMcmkoi32.exePelpgb32.exeKlimcf32.exePbnfdpge.exeb30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exeKpcbhlki.exeOmhjejai.exeJjjfbikh.exeMmifiahi.exeKlbfbg32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Bjanfl32.exe Bedene32.exe File created C:\Windows\SysWOW64\Alnhea32.dll Gkchpcoc.exe File opened for modification C:\Windows\SysWOW64\Imcaijia.exe Ibmmkaik.exe File created C:\Windows\SysWOW64\Jjbpfopf.dll Ojnelefl.exe File created C:\Windows\SysWOW64\Mhbflj32.exe Mqgahh32.exe File created C:\Windows\SysWOW64\Pdllci32.exe Pjchjcmf.exe File created C:\Windows\SysWOW64\Peknbgmo.dll Olnipn32.exe File created C:\Windows\SysWOW64\Hfflfp32.exe Hjplao32.exe File created C:\Windows\SysWOW64\Cealdmqc.dll Leaallcb.exe File created C:\Windows\SysWOW64\Nplkhh32.exe Ngafdepl.exe File opened for modification C:\Windows\SysWOW64\Aqanke32.exe Qfljmmjl.exe File created C:\Windows\SysWOW64\Mdeaim32.exe Mnlilb32.exe File created C:\Windows\SysWOW64\Mlnhkclm.dll Gkiooocb.exe File created C:\Windows\SysWOW64\Omddmkhl.exe Obopobhe.exe File opened for modification C:\Windows\SysWOW64\Nhalag32.exe Nkmkgc32.exe File created C:\Windows\SysWOW64\Kgcpgl32.exe Kgqcam32.exe File created C:\Windows\SysWOW64\Mjlejm32.dll Hhnnpolk.exe File created C:\Windows\SysWOW64\Dbhnfkfh.dll Ohncdp32.exe File created C:\Windows\SysWOW64\Pldknmhd.exe Pejcab32.exe File opened for modification C:\Windows\SysWOW64\Hbepplkh.exe Hmfkbeoc.exe File created C:\Windows\SysWOW64\Ijmdql32.exe Ijjgkmqh.exe File created C:\Windows\SysWOW64\Iiicgkof.dll Mookod32.exe File created C:\Windows\SysWOW64\Gdfpegkn.dll Nkhhie32.exe File created C:\Windows\SysWOW64\Dmnicmpm.dll Ncbfcq32.exe File opened for modification C:\Windows\SysWOW64\Ghlell32.exe Gaamobdf.exe File created C:\Windows\SysWOW64\Ipfnjkgk.exe Ihkifi32.exe File opened for modification C:\Windows\SysWOW64\Cjhdgk32.exe Cpcpjbah.exe File created C:\Windows\SysWOW64\Jdokpmcd.dll Cabldeik.exe File created C:\Windows\SysWOW64\Gnphfppi.exe Gdgcnj32.exe File created C:\Windows\SysWOW64\Nakjff32.dll Jdbhcfjd.exe File created C:\Windows\SysWOW64\Nkhhie32.exe Mhgpgjoj.exe File created C:\Windows\SysWOW64\Jchhhjjg.exe Jbhkngcd.exe File opened for modification C:\Windows\SysWOW64\Aicipgqe.exe Akkokc32.exe File created C:\Windows\SysWOW64\Koakpn32.dll Gnoocq32.exe File opened for modification C:\Windows\SysWOW64\Dieiap32.exe Dnpedghl.exe File opened for modification C:\Windows\SysWOW64\Geplpfnh.exe Gpccgppq.exe File created C:\Windows\SysWOW64\Lekjbf32.dll Geplpfnh.exe File opened for modification C:\Windows\SysWOW64\Nbjpjm32.exe Nhalag32.exe File created C:\Windows\SysWOW64\Jlgcncli.exe Jocceo32.exe File opened for modification C:\Windows\SysWOW64\Ebmjihqn.exe Efbpihoo.exe File created C:\Windows\SysWOW64\Agednnhp.dll Hjpnjheg.exe File created C:\Windows\SysWOW64\Qdfhlggl.exe Pbcooo32.exe File created C:\Windows\SysWOW64\Qjibdo32.dll Bjlkhn32.exe File created C:\Windows\SysWOW64\Apeflmjc.exe Agmacgcc.exe File created C:\Windows\SysWOW64\Mkdfdn32.dll Eccdmmpk.exe File opened for modification C:\Windows\SysWOW64\Hcllmi32.exe Gdgoll32.exe File created C:\Windows\SysWOW64\Dlhlca32.dll Diencmcj.exe File created C:\Windows\SysWOW64\Obonfj32.exe Nfhmai32.exe File created C:\Windows\SysWOW64\Pooaaink.exe Oefmid32.exe File created C:\Windows\SysWOW64\Akjlgc32.dll Pooaaink.exe File created C:\Windows\SysWOW64\Ipahob32.dll Lckdcn32.exe File opened for modification C:\Windows\SysWOW64\Fhlhmi32.exe Fncddc32.exe File opened for modification C:\Windows\SysWOW64\Ldihjo32.exe Lgehpk32.exe File created C:\Windows\SysWOW64\Fkmfpabp.exe Fcaaloed.exe File opened for modification C:\Windows\SysWOW64\Nijcgp32.exe Mcmkoi32.exe File created C:\Windows\SysWOW64\Pdgnnfme.dll Pelpgb32.exe File created C:\Windows\SysWOW64\Leaallcb.exe Klimcf32.exe File opened for modification C:\Windows\SysWOW64\Plfjme32.exe Pbnfdpge.exe File created C:\Windows\SysWOW64\Qfljmmjl.exe b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe File created C:\Windows\SysWOW64\Cmeimblp.dll Kpcbhlki.exe File created C:\Windows\SysWOW64\Jgjojj32.dll Omhjejai.exe File created C:\Windows\SysWOW64\Jepjpajn.exe Jjjfbikh.exe File opened for modification C:\Windows\SysWOW64\Mjmgbe32.exe Mmifiahi.exe File created C:\Windows\SysWOW64\Kekkkm32.exe Klbfbg32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Kldaon32.exeBfqaph32.exeLhhjcmpj.exeEnokidgl.exeKnhoig32.exeAhancp32.exeKdoaackf.exeAqanke32.exeFghppa32.exeJcmhmp32.exeIqnlpq32.exeEeceim32.exeDibjcg32.exeAglhph32.exeCinahhff.exeEenabkfk.exeFidkep32.exeHllffmbb.exeFianpp32.exeGkojcgga.exeOlnipn32.exePhoeomjc.exeOdgchjhl.exeBfkakbpp.exeCdmgkl32.exeBjanfl32.exeIhlbih32.exeBhljlnma.exeMkbhco32.exeLdjmkq32.exeLlfcik32.exeMdigakic.exeDieiap32.exeJnncoini.exeLckdcn32.exePmjaadjm.exeJohlpoij.exeJanihlcf.exeIoapnn32.exeKhhpmbeb.exeGkchpcoc.exeAlcqcjgd.exeCnpieceq.exeGlongpao.exeBjomoo32.exeLcieef32.exeBjdqfajl.exeGhlell32.exeNmmlccfp.exePdngpp32.exeNnkekfkd.exeCqqbgoba.exeJiaaaicm.exeJocceo32.exeJijqeg32.exeIqdbqp32.exeJcnmme32.exeOgpkhb32.exeKmphpc32.exeQbkljd32.exeLlnhgn32.exeIhkifi32.exeOkolfkjg.exeIijdfc32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kldaon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfqaph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhhjcmpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enokidgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knhoig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahancp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdoaackf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqanke32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fghppa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcmhmp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iqnlpq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eeceim32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dibjcg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aglhph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cinahhff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eenabkfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fidkep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hllffmbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fianpp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkojcgga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olnipn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phoeomjc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odgchjhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfkakbpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdmgkl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjanfl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihlbih32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhljlnma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkbhco32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldjmkq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llfcik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdigakic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dieiap32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnncoini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lckdcn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmjaadjm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Johlpoij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Janihlcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ioapnn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khhpmbeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkchpcoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alcqcjgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnpieceq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glongpao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjomoo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcieef32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjdqfajl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghlell32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmmlccfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdngpp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nnkekfkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cqqbgoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jiaaaicm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jocceo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jijqeg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iqdbqp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcnmme32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogpkhb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmphpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qbkljd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llnhgn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihkifi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Okolfkjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iijdfc32.exe -
Modifies registry class 64 IoCs
Processes:
Bcbedm32.exePooaaink.exeAqljdclg.exeFghppa32.exeQnoklc32.exeAjlabc32.exeOjoood32.exeAniffaim.exeCjifpdib.exeb30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exeMjmgbe32.exeFblpnepn.exeFeppqc32.exeBnafjo32.exeFmofjj32.exePbnfdpge.exeFeeilbhg.exeLobehpok.exeCdpdpl32.exeKdilkllh.exeKhmnio32.exeNbljfdoh.exeMhgpgjoj.exeMnnhjk32.exeOafclh32.exeBkefcc32.exeIglngj32.exeJcnmme32.exeCakfcfoc.exeJlgcncli.exePdllci32.exePlbaafak.exeHobjia32.exeEckcak32.exeDlnjjc32.exeMhbflj32.exeEeameodq.exeFclkldqe.exePbcooo32.exeNpkaei32.exePoddphee.exeIilalc32.exeChmlfj32.exeCobjmq32.exeQefihg32.exeBmgddcnf.exeDkkmln32.exeAglhph32.exeHqkmahpp.exeBgqqcd32.exeHemeod32.exeCaepdk32.exeDpdpkfga.exeHmlmacfn.exeQdfhlggl.exeEeffpn32.exeNgafdepl.exeImcaijia.exeEijffhjd.exeOmddmkhl.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecdofe32.dll" Bcbedm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akjlgc32.dll" Pooaaink.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aqljdclg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fghppa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qnoklc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajlabc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojoood32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caldepec.dll" Aniffaim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjifpdib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjmgbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fblpnepn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Feppqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmklad32.dll" Bnafjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmofjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbnfdpge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Feeilbhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pepigm32.dll" Lobehpok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdpdpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iociomhg.dll" Fblpnepn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdilkllh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khmnio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gabdbh32.dll" Nbljfdoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iofpmj32.dll" Mhgpgjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aklgck32.dll" Mnnhjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oafclh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onkhggej.dll" Bkefcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iglngj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcnmme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cakfcfoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlgcncli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdllci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plbaafak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fghppa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hobjia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epggabhd.dll" Eckcak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbfbofjn.dll" Iglngj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jipjmena.dll" Dlnjjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bghlof32.dll" Mhbflj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eeameodq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hqifpf32.dll" Fclkldqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbmppilc.dll" Pbcooo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npkaei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Poddphee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iilalc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chmlfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cobjmq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klnigglg.dll" Qefihg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onahokel.dll" Bmgddcnf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkmln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aglhph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eojdod32.dll" Hqkmahpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgqqcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hemeod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fniiae32.dll" Caepdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpdpkfga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmphdjpq.dll" Hmlmacfn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qdfhlggl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eeffpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qegpeh32.dll" Ngafdepl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjifpdib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Imcaijia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eijffhjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omddmkhl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exeQfljmmjl.exeAqanke32.exeAjibckpc.exeAkkokc32.exeAicipgqe.exeBgkbfcck.exeBjlkhn32.exeCpmmkdkn.exeCobjmq32.exeCaepdk32.exeDiencmcj.exeDcpoab32.exeDpdpkfga.exeEeceim32.exeEhdnkh32.exedescription pid process target process PID 1820 wrote to memory of 2932 1820 b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe Qfljmmjl.exe PID 1820 wrote to memory of 2932 1820 b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe Qfljmmjl.exe PID 1820 wrote to memory of 2932 1820 b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe Qfljmmjl.exe PID 1820 wrote to memory of 2932 1820 b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe Qfljmmjl.exe PID 2932 wrote to memory of 2884 2932 Qfljmmjl.exe Aqanke32.exe PID 2932 wrote to memory of 2884 2932 Qfljmmjl.exe Aqanke32.exe PID 2932 wrote to memory of 2884 2932 Qfljmmjl.exe Aqanke32.exe PID 2932 wrote to memory of 2884 2932 Qfljmmjl.exe Aqanke32.exe PID 2884 wrote to memory of 2344 2884 Aqanke32.exe Ajibckpc.exe PID 2884 wrote to memory of 2344 2884 Aqanke32.exe Ajibckpc.exe PID 2884 wrote to memory of 2344 2884 Aqanke32.exe Ajibckpc.exe PID 2884 wrote to memory of 2344 2884 Aqanke32.exe Ajibckpc.exe PID 2344 wrote to memory of 1016 2344 Ajibckpc.exe Akkokc32.exe PID 2344 wrote to memory of 1016 2344 Ajibckpc.exe Akkokc32.exe PID 2344 wrote to memory of 1016 2344 Ajibckpc.exe Akkokc32.exe PID 2344 wrote to memory of 1016 2344 Ajibckpc.exe Akkokc32.exe PID 1016 wrote to memory of 2912 1016 Akkokc32.exe Aicipgqe.exe PID 1016 wrote to memory of 2912 1016 Akkokc32.exe Aicipgqe.exe PID 1016 wrote to memory of 2912 1016 Akkokc32.exe Aicipgqe.exe PID 1016 wrote to memory of 2912 1016 Akkokc32.exe Aicipgqe.exe PID 2912 wrote to memory of 2792 2912 Aicipgqe.exe Bgkbfcck.exe PID 2912 wrote to memory of 2792 2912 Aicipgqe.exe Bgkbfcck.exe PID 2912 wrote to memory of 2792 2912 Aicipgqe.exe Bgkbfcck.exe PID 2912 wrote to memory of 2792 2912 Aicipgqe.exe Bgkbfcck.exe PID 2792 wrote to memory of 2556 2792 Bgkbfcck.exe Bjlkhn32.exe PID 2792 wrote to memory of 2556 2792 Bgkbfcck.exe Bjlkhn32.exe PID 2792 wrote to memory of 2556 2792 Bgkbfcck.exe Bjlkhn32.exe PID 2792 wrote to memory of 2556 2792 Bgkbfcck.exe Bjlkhn32.exe PID 2556 wrote to memory of 2268 2556 Bjlkhn32.exe Cpmmkdkn.exe PID 2556 wrote to memory of 2268 2556 Bjlkhn32.exe Cpmmkdkn.exe PID 2556 wrote to memory of 2268 2556 Bjlkhn32.exe Cpmmkdkn.exe PID 2556 wrote to memory of 2268 2556 Bjlkhn32.exe Cpmmkdkn.exe PID 2268 wrote to memory of 1888 2268 Cpmmkdkn.exe Cobjmq32.exe PID 2268 wrote to memory of 1888 2268 Cpmmkdkn.exe Cobjmq32.exe PID 2268 wrote to memory of 1888 2268 Cpmmkdkn.exe Cobjmq32.exe PID 2268 wrote to memory of 1888 2268 Cpmmkdkn.exe Cobjmq32.exe PID 1888 wrote to memory of 2096 1888 Cobjmq32.exe Caepdk32.exe PID 1888 wrote to memory of 2096 1888 Cobjmq32.exe Caepdk32.exe PID 1888 wrote to memory of 2096 1888 Cobjmq32.exe Caepdk32.exe PID 1888 wrote to memory of 2096 1888 Cobjmq32.exe Caepdk32.exe PID 2096 wrote to memory of 3032 2096 Caepdk32.exe Diencmcj.exe PID 2096 wrote to memory of 3032 2096 Caepdk32.exe Diencmcj.exe PID 2096 wrote to memory of 3032 2096 Caepdk32.exe Diencmcj.exe PID 2096 wrote to memory of 3032 2096 Caepdk32.exe Diencmcj.exe PID 3032 wrote to memory of 2296 3032 Diencmcj.exe Dcpoab32.exe PID 3032 wrote to memory of 2296 3032 Diencmcj.exe Dcpoab32.exe PID 3032 wrote to memory of 2296 3032 Diencmcj.exe Dcpoab32.exe PID 3032 wrote to memory of 2296 3032 Diencmcj.exe Dcpoab32.exe PID 2296 wrote to memory of 788 2296 Dcpoab32.exe Dpdpkfga.exe PID 2296 wrote to memory of 788 2296 Dcpoab32.exe Dpdpkfga.exe PID 2296 wrote to memory of 788 2296 Dcpoab32.exe Dpdpkfga.exe PID 2296 wrote to memory of 788 2296 Dcpoab32.exe Dpdpkfga.exe PID 788 wrote to memory of 2836 788 Dpdpkfga.exe Eeceim32.exe PID 788 wrote to memory of 2836 788 Dpdpkfga.exe Eeceim32.exe PID 788 wrote to memory of 2836 788 Dpdpkfga.exe Eeceim32.exe PID 788 wrote to memory of 2836 788 Dpdpkfga.exe Eeceim32.exe PID 2836 wrote to memory of 2512 2836 Eeceim32.exe Ehdnkh32.exe PID 2836 wrote to memory of 2512 2836 Eeceim32.exe Ehdnkh32.exe PID 2836 wrote to memory of 2512 2836 Eeceim32.exe Ehdnkh32.exe PID 2836 wrote to memory of 2512 2836 Eeceim32.exe Ehdnkh32.exe PID 2512 wrote to memory of 1956 2512 Ehdnkh32.exe Egkgad32.exe PID 2512 wrote to memory of 1956 2512 Ehdnkh32.exe Egkgad32.exe PID 2512 wrote to memory of 1956 2512 Ehdnkh32.exe Egkgad32.exe PID 2512 wrote to memory of 1956 2512 Ehdnkh32.exe Egkgad32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe"C:\Users\Admin\AppData\Local\Temp\b30677d1990722b6f127087ab5038a0c2bb650b4b3508d1eb2758923d77676e7N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\Qfljmmjl.exeC:\Windows\system32\Qfljmmjl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Aqanke32.exeC:\Windows\system32\Aqanke32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Ajibckpc.exeC:\Windows\system32\Ajibckpc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Akkokc32.exeC:\Windows\system32\Akkokc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\Aicipgqe.exeC:\Windows\system32\Aicipgqe.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Bgkbfcck.exeC:\Windows\system32\Bgkbfcck.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\Bjlkhn32.exeC:\Windows\system32\Bjlkhn32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\Cpmmkdkn.exeC:\Windows\system32\Cpmmkdkn.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\Cobjmq32.exeC:\Windows\system32\Cobjmq32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Caepdk32.exeC:\Windows\system32\Caepdk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\Diencmcj.exeC:\Windows\system32\Diencmcj.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Dcpoab32.exeC:\Windows\system32\Dcpoab32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Dpdpkfga.exeC:\Windows\system32\Dpdpkfga.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\Eeceim32.exeC:\Windows\system32\Eeceim32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\Ehdnkh32.exeC:\Windows\system32\Ehdnkh32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\Egkgad32.exeC:\Windows\system32\Egkgad32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Windows\SysWOW64\Ecbhfeip.exeC:\Windows\system32\Ecbhfeip.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:708 -
C:\Windows\SysWOW64\Ffcahq32.exeC:\Windows\system32\Ffcahq32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Windows\SysWOW64\Fmofjj32.exeC:\Windows\system32\Fmofjj32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1656 -
C:\Windows\SysWOW64\Fclkldqe.exeC:\Windows\system32\Fclkldqe.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Gkimff32.exeC:\Windows\system32\Gkimff32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1568 -
C:\Windows\SysWOW64\Gqfeom32.exeC:\Windows\system32\Gqfeom32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376 -
C:\Windows\SysWOW64\Ggbjag32.exeC:\Windows\system32\Ggbjag32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2544 -
C:\Windows\SysWOW64\Gnoocq32.exeC:\Windows\system32\Gnoocq32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2684 -
C:\Windows\SysWOW64\Hbqdldhi.exeC:\Windows\system32\Hbqdldhi.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892 -
C:\Windows\SysWOW64\Hmfhjmho.exeC:\Windows\system32\Hmfhjmho.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Windows\SysWOW64\Hfajhblm.exeC:\Windows\system32\Hfajhblm.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2844 -
C:\Windows\SysWOW64\Hlpofh32.exeC:\Windows\system32\Hlpofh32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276 -
C:\Windows\SysWOW64\Inqhhc32.exeC:\Windows\system32\Inqhhc32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Windows\SysWOW64\Ihkifi32.exeC:\Windows\system32\Ihkifi32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\Ipfnjkgk.exeC:\Windows\system32\Ipfnjkgk.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3068 -
C:\Windows\SysWOW64\Iiobcq32.exeC:\Windows\system32\Iiobcq32.exe33⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\Iddfqi32.exeC:\Windows\system32\Iddfqi32.exe34⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\Jejlca32.exeC:\Windows\system32\Jejlca32.exe35⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\Jcnmme32.exeC:\Windows\system32\Jcnmme32.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2428 -
C:\Windows\SysWOW64\Jacjna32.exeC:\Windows\system32\Jacjna32.exe37⤵
- Executes dropped EXE
PID:2340 -
C:\Windows\SysWOW64\Jnjjcbiq.exeC:\Windows\system32\Jnjjcbiq.exe38⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\Kknklg32.exeC:\Windows\system32\Kknklg32.exe39⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Kcipqi32.exeC:\Windows\system32\Kcipqi32.exe40⤵
- Executes dropped EXE
PID:304 -
C:\Windows\SysWOW64\Kdilkllh.exeC:\Windows\system32\Kdilkllh.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Kldaon32.exeC:\Windows\system32\Kldaon32.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\Klfndn32.exeC:\Windows\system32\Klfndn32.exe43⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\Khmnio32.exeC:\Windows\system32\Khmnio32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:2088 -
C:\Windows\SysWOW64\Kccbgh32.exeC:\Windows\system32\Kccbgh32.exe45⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\Lkngkj32.exeC:\Windows\system32\Lkngkj32.exe46⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Lgehpk32.exeC:\Windows\system32\Lgehpk32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\Ldihjo32.exeC:\Windows\system32\Ldihjo32.exe48⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\Ldkeoo32.exeC:\Windows\system32\Ldkeoo32.exe49⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\SysWOW64\Mmifiahi.exeC:\Windows\system32\Mmifiahi.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Mjmgbe32.exeC:\Windows\system32\Mjmgbe32.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:948 -
C:\Windows\SysWOW64\Mffdmfjd.exeC:\Windows\system32\Mffdmfjd.exe52⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\Mifmoa32.exeC:\Windows\system32\Mifmoa32.exe53⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\Mbobgfnf.exeC:\Windows\system32\Mbobgfnf.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\Niijdq32.exeC:\Windows\system32\Niijdq32.exe55⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\Nnfbmgcj.exeC:\Windows\system32\Nnfbmgcj.exe56⤵
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\Nnhobgag.exeC:\Windows\system32\Nnhobgag.exe57⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\Nhpdkm32.exeC:\Windows\system32\Nhpdkm32.exe58⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\Nmmlccfp.exeC:\Windows\system32\Nmmlccfp.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\Nmpiicdm.exeC:\Windows\system32\Nmpiicdm.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\Nfhmai32.exeC:\Windows\system32\Nfhmai32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1332 -
C:\Windows\SysWOW64\Obonfj32.exeC:\Windows\system32\Obonfj32.exe62⤵
- Executes dropped EXE
PID:676 -
C:\Windows\SysWOW64\Oemjbe32.exeC:\Windows\system32\Oemjbe32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:832 -
C:\Windows\SysWOW64\Obakli32.exeC:\Windows\system32\Obakli32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2492 -
C:\Windows\SysWOW64\Ohncdp32.exeC:\Windows\system32\Ohncdp32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1148 -
C:\Windows\SysWOW64\Oafhmf32.exeC:\Windows\system32\Oafhmf32.exe66⤵PID:1480
-
C:\Windows\SysWOW64\Okolfkjg.exeC:\Windows\system32\Okolfkjg.exe67⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\Olnipn32.exeC:\Windows\system32\Olnipn32.exe68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\Oefmid32.exeC:\Windows\system32\Oefmid32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\Pooaaink.exeC:\Windows\system32\Pooaaink.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:2716 -
C:\Windows\SysWOW64\Pkebgj32.exeC:\Windows\system32\Pkebgj32.exe71⤵PID:576
-
C:\Windows\SysWOW64\Pdngpp32.exeC:\Windows\system32\Pdngpp32.exe72⤵
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\Pnfkheap.exeC:\Windows\system32\Pnfkheap.exe73⤵PID:2992
-
C:\Windows\SysWOW64\Pimlmf32.exeC:\Windows\system32\Pimlmf32.exe74⤵PID:2160
-
C:\Windows\SysWOW64\Pgamgken.exeC:\Windows\system32\Pgamgken.exe75⤵PID:2856
-
C:\Windows\SysWOW64\Polakmbi.exeC:\Windows\system32\Polakmbi.exe76⤵PID:2736
-
C:\Windows\SysWOW64\Qefihg32.exeC:\Windows\system32\Qefihg32.exe77⤵
- Modifies registry class
PID:976 -
C:\Windows\SysWOW64\Qcjjakip.exeC:\Windows\system32\Qcjjakip.exe78⤵PID:876
-
C:\Windows\SysWOW64\Ankabh32.exeC:\Windows\system32\Ankabh32.exe79⤵PID:3044
-
C:\Windows\SysWOW64\Aqljdclg.exeC:\Windows\system32\Aqljdclg.exe80⤵
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Bbocak32.exeC:\Windows\system32\Bbocak32.exe81⤵PID:2092
-
C:\Windows\SysWOW64\Biikne32.exeC:\Windows\system32\Biikne32.exe82⤵PID:2244
-
C:\Windows\SysWOW64\Bbapgknp.exeC:\Windows\system32\Bbapgknp.exe83⤵PID:1644
-
C:\Windows\SysWOW64\Bmgddcnf.exeC:\Windows\system32\Bmgddcnf.exe84⤵
- Modifies registry class
PID:1816 -
C:\Windows\SysWOW64\Bgqeea32.exeC:\Windows\system32\Bgqeea32.exe85⤵PID:2636
-
C:\Windows\SysWOW64\Bedene32.exeC:\Windows\system32\Bedene32.exe86⤵
- Drops file in System32 directory
PID:392 -
C:\Windows\SysWOW64\Bjanfl32.exeC:\Windows\system32\Bjanfl32.exe87⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\Cakfcfoc.exeC:\Windows\system32\Cakfcfoc.exe88⤵
- Modifies registry class
PID:1288 -
C:\Windows\SysWOW64\Cgeopqfp.exeC:\Windows\system32\Cgeopqfp.exe89⤵PID:1144
-
C:\Windows\SysWOW64\Cjfgalcq.exeC:\Windows\system32\Cjfgalcq.exe90⤵PID:1560
-
C:\Windows\SysWOW64\Cpcpjbah.exeC:\Windows\system32\Cpcpjbah.exe91⤵
- Drops file in System32 directory
PID:2948 -
C:\Windows\SysWOW64\Cjhdgk32.exeC:\Windows\system32\Cjhdgk32.exe92⤵PID:2740
-
C:\Windows\SysWOW64\Cabldeik.exeC:\Windows\system32\Cabldeik.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\Cfoellgb.exeC:\Windows\system32\Cfoellgb.exe94⤵PID:1640
-
C:\Windows\SysWOW64\Cinahhff.exeC:\Windows\system32\Cinahhff.exe95⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\Cfaaalep.exeC:\Windows\system32\Cfaaalep.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2432 -
C:\Windows\SysWOW64\Dlnjjc32.exeC:\Windows\system32\Dlnjjc32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1112 -
C:\Windows\SysWOW64\Dibjcg32.exeC:\Windows\system32\Dibjcg32.exe98⤵
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\Dhggdcgh.exeC:\Windows\system32\Dhggdcgh.exe99⤵PID:1084
-
C:\Windows\SysWOW64\Daplmimi.exeC:\Windows\system32\Daplmimi.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:612 -
C:\Windows\SysWOW64\Dmgmbj32.exeC:\Windows\system32\Dmgmbj32.exe101⤵PID:2136
-
C:\Windows\SysWOW64\Dkkmln32.exeC:\Windows\system32\Dkkmln32.exe102⤵
- Modifies registry class
PID:2232 -
C:\Windows\SysWOW64\Dadehh32.exeC:\Windows\system32\Dadehh32.exe103⤵PID:2880
-
C:\Windows\SysWOW64\Eipjmk32.exeC:\Windows\system32\Eipjmk32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2984 -
C:\Windows\SysWOW64\Ekofgnna.exeC:\Windows\system32\Ekofgnna.exe105⤵PID:2780
-
C:\Windows\SysWOW64\Ecjkkp32.exeC:\Windows\system32\Ecjkkp32.exe106⤵PID:2800
-
C:\Windows\SysWOW64\Ecmhqp32.exeC:\Windows\system32\Ecmhqp32.exe107⤵PID:2372
-
C:\Windows\SysWOW64\Eenabkfk.exeC:\Windows\system32\Eenabkfk.exe108⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\Fcaaloed.exeC:\Windows\system32\Fcaaloed.exe109⤵
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\Fkmfpabp.exeC:\Windows\system32\Fkmfpabp.exe110⤵PID:2600
-
C:\Windows\SysWOW64\Fhqfie32.exeC:\Windows\system32\Fhqfie32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2488 -
C:\Windows\SysWOW64\Fokofpif.exeC:\Windows\system32\Fokofpif.exe112⤵PID:960
-
C:\Windows\SysWOW64\Fjdpgnee.exeC:\Windows\system32\Fjdpgnee.exe113⤵PID:1224
-
C:\Windows\SysWOW64\Fghppa32.exeC:\Windows\system32\Fghppa32.exe114⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2668 -
C:\Windows\SysWOW64\Fcoaebjc.exeC:\Windows\system32\Fcoaebjc.exe115⤵PID:2540
-
C:\Windows\SysWOW64\Gjiibm32.exeC:\Windows\system32\Gjiibm32.exe116⤵PID:1884
-
C:\Windows\SysWOW64\Gfpjgn32.exeC:\Windows\system32\Gfpjgn32.exe117⤵PID:2972
-
C:\Windows\SysWOW64\Gohnpcmd.exeC:\Windows\system32\Gohnpcmd.exe118⤵PID:2928
-
C:\Windows\SysWOW64\Gdgcnj32.exeC:\Windows\system32\Gdgcnj32.exe119⤵
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Gnphfppi.exeC:\Windows\system32\Gnphfppi.exe120⤵PID:2580
-
C:\Windows\SysWOW64\Gkchpcoc.exeC:\Windows\system32\Gkchpcoc.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\Helmiiec.exeC:\Windows\system32\Helmiiec.exe122⤵PID:2720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-