Analysis
-
max time kernel
90s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe
Resource
win7-20240729-en
General
-
Target
e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe
-
Size
163KB
-
MD5
871e50b7442954cede652fceff7dd2a1
-
SHA1
267b47cb85f9eec7b98a6eb94ac098104956b89c
-
SHA256
e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001
-
SHA512
d51e503f5d0487e527f1c0f92b9784eb1e9781806259e306d12516608c12f66c8bf0e395bc952e96984b9de2c6784b239e16c4eab93e11fa739042bca5637d06
-
SSDEEP
1536:PZ285DVKFbA+b/RS2B9ulProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:MWVS/RSUAltOrWKDBr+yJb
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fpkchm32.exeIijfoh32.exeLhklha32.exeNacmpj32.exeJjqiok32.exeJnlepioj.exeNpkfff32.exeGbnenk32.exeJnjhjj32.exeNpppaejj.exee619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exeQpaohjkk.exeInhoegqc.exeNahfkigd.exeCeqjla32.exeEmhnqbjo.exeHkbmil32.exeNoepdo32.exeFfboohnm.exeIjampgde.exeLmckeidj.exeIgpdnlgd.exeJqfhqe32.exeNcjbba32.exeLadpagin.exeAegkfpah.exeAdmgglep.exeEdeclabl.exeIcgdcm32.exeEfpbih32.exeKimlqfeq.exeAmglgn32.exeFeobac32.exeIphhgb32.exeMhikae32.exeDncdqcbl.exeIkicikap.exeNggkipci.exeGhmnmo32.exeIdbgbahq.exeKkilgb32.exeMonjcp32.exeFladmn32.exeHbghdj32.exeNobpmb32.exeGpafgp32.exeHpdbmooo.exeKcimhpma.exeKgdiho32.exeLpddgd32.exeLfnlcnih.exeMmmnkglp.exeEdofbpja.exeFnejdiep.exeHeonpf32.exeKioiffcn.exeMbopon32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpkchm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iijfoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhklha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nacmpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjqiok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnlepioj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npkfff32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbnenk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnjhjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npkfff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npppaejj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpaohjkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inhoegqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nahfkigd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceqjla32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emhnqbjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkbmil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noepdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffboohnm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceqjla32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iijfoh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijampgde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmckeidj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igpdnlgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jqfhqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncjbba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ladpagin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aegkfpah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Admgglep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edeclabl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icgdcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efpbih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kimlqfeq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amglgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feobac32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iphhgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhikae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dncdqcbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikicikap.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nggkipci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghmnmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idbgbahq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkilgb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Monjcp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fladmn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbghdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nobpmb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghmnmo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpafgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpdbmooo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcimhpma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgdiho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpddgd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfnlcnih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmmnkglp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edofbpja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnejdiep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbghdj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikicikap.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Heonpf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icgdcm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kioiffcn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbopon32.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Ikicikap.exe family_bruteratel -
Gozi family
-
Executes dropped EXE 64 IoCs
Processes:
Qcjoci32.exeQfikod32.exeQpaohjkk.exeQfkgdd32.exeAmglgn32.exeAljmbknm.exeAfpapcnc.exeAphehidc.exeAeenapck.exeAnmbje32.exeAegkfpah.exeAnpooe32.exeAankkqfl.exeAdmgglep.exeBaqhapdj.exeBacefpbg.exeBhmmcjjd.exeBphaglgo.exeBdcnhk32.exeBdfjnkne.exeBgdfjfmi.exeBopknhjd.exeCbkgog32.exeCpohhk32.exeCcnddg32.exeClfhml32.exeCabaec32.exeCofaog32.exeCeqjla32.exeCkmbdh32.exeCagjqbam.exeChabmm32.exeDnnkec32.exeDckcnj32.exeDpodgocb.exeDcmpcjcf.exeDncdqcbl.exeDleelp32.exeDfniee32.exeDlhaaogd.exeDcbjni32.exeDfpfke32.exeDkmncl32.exeDcdfdi32.exeEdeclabl.exeElmkmo32.exeEbicee32.exeEdhpaa32.exeEkbhnkhf.exeEnpdjfgj.exeEkddck32.exeEjiadgkl.exeEmhnqbjo.exeEdofbpja.exeEfpbih32.exeEngjkeab.exeFqffgapf.exeFcdbcloi.exeFfboohnm.exeFjnkpf32.exeFqhclqnc.exeFpkchm32.exeFfeldglk.exeFjqhef32.exepid process 2216 Qcjoci32.exe 2896 Qfikod32.exe 3032 Qpaohjkk.exe 3000 Qfkgdd32.exe 2716 Amglgn32.exe 2740 Aljmbknm.exe 2916 Afpapcnc.exe 2276 Aphehidc.exe 1036 Aeenapck.exe 3004 Anmbje32.exe 2012 Aegkfpah.exe 2724 Anpooe32.exe 944 Aankkqfl.exe 1612 Admgglep.exe 2304 Baqhapdj.exe 1940 Bacefpbg.exe 1060 Bhmmcjjd.exe 1016 Bphaglgo.exe 2496 Bdcnhk32.exe 1468 Bdfjnkne.exe 2228 Bgdfjfmi.exe 1172 Bopknhjd.exe 1596 Cbkgog32.exe 2032 Cpohhk32.exe 1644 Ccnddg32.exe 2788 Clfhml32.exe 2908 Cabaec32.exe 2288 Cofaog32.exe 1132 Ceqjla32.exe 2712 Ckmbdh32.exe 2752 Cagjqbam.exe 1788 Chabmm32.exe 2504 Dnnkec32.exe 2008 Dckcnj32.exe 2984 Dpodgocb.exe 2204 Dcmpcjcf.exe 2372 Dncdqcbl.exe 3040 Dleelp32.exe 772 Dfniee32.exe 2428 Dlhaaogd.exe 2440 Dcbjni32.exe 2132 Dfpfke32.exe 2336 Dkmncl32.exe 896 Dcdfdi32.exe 1668 Edeclabl.exe 1640 Elmkmo32.exe 608 Ebicee32.exe 1896 Edhpaa32.exe 800 Ekbhnkhf.exe 672 Enpdjfgj.exe 1664 Ekddck32.exe 2768 Ejiadgkl.exe 2828 Emhnqbjo.exe 2708 Edofbpja.exe 2224 Efpbih32.exe 696 Engjkeab.exe 1408 Fqffgapf.exe 2920 Fcdbcloi.exe 2972 Ffboohnm.exe 1176 Fjnkpf32.exe 536 Fqhclqnc.exe 2300 Fpkchm32.exe 2412 Ffeldglk.exe 1792 Fjqhef32.exe -
Loads dropped DLL 64 IoCs
Processes:
e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exeQcjoci32.exeQfikod32.exeQpaohjkk.exeQfkgdd32.exeAmglgn32.exeAljmbknm.exeAfpapcnc.exeAphehidc.exeAeenapck.exeAnmbje32.exeAegkfpah.exeAnpooe32.exeAankkqfl.exeAdmgglep.exeBaqhapdj.exeBacefpbg.exeBhmmcjjd.exeBphaglgo.exeBdcnhk32.exeBdfjnkne.exeBgdfjfmi.exeBopknhjd.exeCbkgog32.exeCpohhk32.exeCcnddg32.exeClfhml32.exeCabaec32.exeCofaog32.exeCeqjla32.exeCkmbdh32.exeCagjqbam.exepid process 2744 e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe 2744 e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe 2216 Qcjoci32.exe 2216 Qcjoci32.exe 2896 Qfikod32.exe 2896 Qfikod32.exe 3032 Qpaohjkk.exe 3032 Qpaohjkk.exe 3000 Qfkgdd32.exe 3000 Qfkgdd32.exe 2716 Amglgn32.exe 2716 Amglgn32.exe 2740 Aljmbknm.exe 2740 Aljmbknm.exe 2916 Afpapcnc.exe 2916 Afpapcnc.exe 2276 Aphehidc.exe 2276 Aphehidc.exe 1036 Aeenapck.exe 1036 Aeenapck.exe 3004 Anmbje32.exe 3004 Anmbje32.exe 2012 Aegkfpah.exe 2012 Aegkfpah.exe 2724 Anpooe32.exe 2724 Anpooe32.exe 944 Aankkqfl.exe 944 Aankkqfl.exe 1612 Admgglep.exe 1612 Admgglep.exe 2304 Baqhapdj.exe 2304 Baqhapdj.exe 1940 Bacefpbg.exe 1940 Bacefpbg.exe 1060 Bhmmcjjd.exe 1060 Bhmmcjjd.exe 1016 Bphaglgo.exe 1016 Bphaglgo.exe 2496 Bdcnhk32.exe 2496 Bdcnhk32.exe 1468 Bdfjnkne.exe 1468 Bdfjnkne.exe 2228 Bgdfjfmi.exe 2228 Bgdfjfmi.exe 1172 Bopknhjd.exe 1172 Bopknhjd.exe 1596 Cbkgog32.exe 1596 Cbkgog32.exe 2032 Cpohhk32.exe 2032 Cpohhk32.exe 1644 Ccnddg32.exe 1644 Ccnddg32.exe 2788 Clfhml32.exe 2788 Clfhml32.exe 2908 Cabaec32.exe 2908 Cabaec32.exe 2288 Cofaog32.exe 2288 Cofaog32.exe 1132 Ceqjla32.exe 1132 Ceqjla32.exe 2712 Ckmbdh32.exe 2712 Ckmbdh32.exe 2752 Cagjqbam.exe 2752 Cagjqbam.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fpkchm32.exeGngfjicn.exeJnlepioj.exeMfceom32.exeFfiepg32.exeGddobpbe.exeKqkalenn.exeLckflc32.exeAeenapck.exeEdofbpja.exeKbcddlnd.exeLnnndl32.exeCbkgog32.exeEnpdjfgj.exeEjiadgkl.exeGnicoh32.exeGfdhck32.exeIjopjhfh.exeCagjqbam.exeGecklbih.exeGjemoi32.exeMoqgiopk.exeCabaec32.exeDnnkec32.exeFmaqgaae.exeGjbqjiem.exeLjgkom32.exeKjcedj32.exeKckjmpko.exeKbeqjl32.exeAdmgglep.exeBaqhapdj.exeFjnkpf32.exeHlhfmqge.exeKimlqfeq.exeLfnlcnih.exeMbopon32.exeCkmbdh32.exeFnejdiep.exeGahpkd32.exeJbakpi32.exeLpiacp32.exeNggkipci.exeJkllnn32.exeKcngcp32.exeMeffjjln.exeNoepdo32.exeNmogpj32.exeOihdjk32.exeBgdfjfmi.exeDleelp32.exeIdbgbahq.exeLimhpihl.exeMkggnp32.exeNklaipbj.exeIphhgb32.exeIcgdcm32.exeIjampgde.exeNcjbba32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ffeldglk.exe Fpkchm32.exe File created C:\Windows\SysWOW64\Jeekfpjf.dll Gngfjicn.exe File created C:\Windows\SysWOW64\Efbfbl32.dll Jnlepioj.exe File opened for modification C:\Windows\SysWOW64\Meffjjln.exe Mfceom32.exe File created C:\Windows\SysWOW64\Fihalb32.exe Ffiepg32.exe File opened for modification C:\Windows\SysWOW64\Glkgcmbg.exe Gddobpbe.exe File created C:\Windows\SysWOW64\Kcimhpma.exe Kqkalenn.exe File opened for modification C:\Windows\SysWOW64\Kcimhpma.exe Kqkalenn.exe File created C:\Windows\SysWOW64\Adlqbf32.dll Lckflc32.exe File opened for modification C:\Windows\SysWOW64\Anmbje32.exe Aeenapck.exe File created C:\Windows\SysWOW64\Anmbje32.exe Aeenapck.exe File opened for modification C:\Windows\SysWOW64\Efpbih32.exe Edofbpja.exe File opened for modification C:\Windows\SysWOW64\Kfopdk32.exe Kbcddlnd.exe File created C:\Windows\SysWOW64\Lamjph32.exe Lnnndl32.exe File created C:\Windows\SysWOW64\Cpohhk32.exe Cbkgog32.exe File opened for modification C:\Windows\SysWOW64\Ekddck32.exe Enpdjfgj.exe File created C:\Windows\SysWOW64\Emhnqbjo.exe Ejiadgkl.exe File created C:\Windows\SysWOW64\Cjdfoo32.dll Gnicoh32.exe File created C:\Windows\SysWOW64\Npdmdbpm.dll Gfdhck32.exe File created C:\Windows\SysWOW64\Pcaopfhd.dll Ijopjhfh.exe File created C:\Windows\SysWOW64\Endbib32.dll Cagjqbam.exe File opened for modification C:\Windows\SysWOW64\Gfdhck32.exe Gecklbih.exe File created C:\Windows\SysWOW64\Gmcikd32.exe Gjemoi32.exe File opened for modification C:\Windows\SysWOW64\Maocekoo.exe Moqgiopk.exe File opened for modification C:\Windows\SysWOW64\Cofaog32.exe Cabaec32.exe File created C:\Windows\SysWOW64\Ifefbd32.dll Dnnkec32.exe File opened for modification C:\Windows\SysWOW64\Fnbmoi32.exe Fmaqgaae.exe File created C:\Windows\SysWOW64\Gmamfddp.exe Gjbqjiem.exe File created C:\Windows\SysWOW64\Keokbali.dll Kbcddlnd.exe File created C:\Windows\SysWOW64\Lmfgkh32.exe Ljgkom32.exe File created C:\Windows\SysWOW64\Kmabqf32.exe Kjcedj32.exe File created C:\Windows\SysWOW64\Njlacdcc.dll Kckjmpko.exe File created C:\Windows\SysWOW64\Kioiffcn.exe Kbeqjl32.exe File created C:\Windows\SysWOW64\Anfdhfiq.dll Admgglep.exe File created C:\Windows\SysWOW64\Jfdkkkqh.dll Baqhapdj.exe File opened for modification C:\Windows\SysWOW64\Fqhclqnc.exe Fjnkpf32.exe File opened for modification C:\Windows\SysWOW64\Hpdbmooo.exe Hlhfmqge.exe File created C:\Windows\SysWOW64\Nnbdnonc.dll Kimlqfeq.exe File opened for modification C:\Windows\SysWOW64\Limhpihl.exe Lfnlcnih.exe File created C:\Windows\SysWOW64\Plbbmj32.dll Mbopon32.exe File opened for modification C:\Windows\SysWOW64\Cagjqbam.exe Ckmbdh32.exe File created C:\Windows\SysWOW64\Qddkfopf.dll Ffiepg32.exe File opened for modification C:\Windows\SysWOW64\Feobac32.exe Fnejdiep.exe File created C:\Windows\SysWOW64\Gecklbih.exe Gahpkd32.exe File created C:\Windows\SysWOW64\Mpqaniil.dll Jbakpi32.exe File created C:\Windows\SysWOW64\Lmieogma.dll Lpiacp32.exe File created C:\Windows\SysWOW64\Jhjalgho.dll Nggkipci.exe File created C:\Windows\SysWOW64\Jnjhjj32.exe Jkllnn32.exe File created C:\Windows\SysWOW64\Gqaaok32.dll Jkllnn32.exe File created C:\Windows\SysWOW64\Kflcok32.exe Kcngcp32.exe File opened for modification C:\Windows\SysWOW64\Mmmnkglp.exe Meffjjln.exe File created C:\Windows\SysWOW64\Kcgpfpbq.dll Noepdo32.exe File created C:\Windows\SysWOW64\Nlbgkgcc.exe Nmogpj32.exe File opened for modification C:\Windows\SysWOW64\Opblgehg.exe Oihdjk32.exe File created C:\Windows\SysWOW64\Cbiphidl.dll Bgdfjfmi.exe File opened for modification C:\Windows\SysWOW64\Dfniee32.exe Dleelp32.exe File created C:\Windows\SysWOW64\Gnldgh32.dll Idbgbahq.exe File created C:\Windows\SysWOW64\Ladpagin.exe Limhpihl.exe File opened for modification C:\Windows\SysWOW64\Mbopon32.exe Mkggnp32.exe File created C:\Windows\SysWOW64\Nogmin32.exe Nklaipbj.exe File created C:\Windows\SysWOW64\Ckgcql32.dll Iphhgb32.exe File opened for modification C:\Windows\SysWOW64\Ijampgde.exe Icgdcm32.exe File opened for modification C:\Windows\SysWOW64\Iloilcci.exe Ijampgde.exe File created C:\Windows\SysWOW64\Ngencpel.exe Ncjbba32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3352 3320 WerFault.exe Opblgehg.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Bdfjnkne.exeGmoppefc.exeJgbmco32.exeMioeeifi.exeEdofbpja.exeNknnnoph.exeBacefpbg.exeMbopon32.exeGahpkd32.exeImcfjg32.exeIaladj32.exeJfjjkhhg.exeMfqiingf.exeIdokma32.exeInhoegqc.exeQpaohjkk.exeCbkgog32.exeEmhnqbjo.exeFpbihl32.exeHbekojlp.exeHmqieh32.exeLiaeleak.exeAdmgglep.exeGnicoh32.exeGjemoi32.exeHbpbck32.exeHeonpf32.exeJbcgeilh.exeKckjmpko.exeLjgkom32.exeHhfmbq32.exeKopnma32.exeLpiacp32.exeMfceom32.exeNpkfff32.exeAegkfpah.exeHfnkji32.exeJqfhqe32.exeFcdbcloi.exeGmamfddp.exeLlpaha32.exeAljmbknm.exeFfiepg32.exeIkicikap.exeMlgdhcmb.exeGmcikd32.exeHkbmil32.exeLfnlcnih.exeMeffjjln.exeMlbkmdah.exeGnlpeh32.exeMkggnp32.exeMhikae32.exeEdhpaa32.exeGddobpbe.exeGlkgcmbg.exeLamjph32.exeMaocekoo.exeDpodgocb.exeIjopjhfh.exeNggkipci.exeBdcnhk32.exeIhijhpdo.exeIijfoh32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdfjnkne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmoppefc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgbmco32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mioeeifi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edofbpja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nknnnoph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bacefpbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbopon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gahpkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imcfjg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ialadj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfjjkhhg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfqiingf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idokma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inhoegqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qpaohjkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbkgog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emhnqbjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fpbihl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbekojlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmqieh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Liaeleak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admgglep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnicoh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjemoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbpbck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Heonpf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbcgeilh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kckjmpko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljgkom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhfmbq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kopnma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpiacp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfceom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npkfff32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aegkfpah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hfnkji32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jqfhqe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcdbcloi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmamfddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llpaha32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aljmbknm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffiepg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikicikap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlgdhcmb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmcikd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbmil32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfnlcnih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Meffjjln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlbkmdah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnlpeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkggnp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhikae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edhpaa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gddobpbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glkgcmbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lamjph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maocekoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpodgocb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijopjhfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nggkipci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdcnhk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihijhpdo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iijfoh32.exe -
Modifies registry class 64 IoCs
Processes:
Lgiobadq.exeNpppaejj.exeEfpbih32.exeLpiacp32.exeJqfhqe32.exeKkilgb32.exeKnjdimdh.exeNcjbba32.exeNpppaejj.exeHbekojlp.exeKjhopjqi.exeKkkhmadd.exeMlbkmdah.exeNdiomdde.exeNifgekbm.exeNcnlnaim.exeQpaohjkk.exeDleelp32.exeHhfmbq32.exeIgpdnlgd.exeLjgkom32.exeLhklha32.exeCeqjla32.exeGpmllpef.exeEbicee32.exeGjemoi32.exeHlkcbp32.exee619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exeDncdqcbl.exeKcngcp32.exeImcfjg32.exeJflgph32.exeHmqieh32.exeKopnma32.exeKfopdk32.exeGnlpeh32.exeHfnkji32.exeGfdhck32.exeJopbnn32.exeKgdiho32.exeMidnqh32.exeMemlki32.exeFfiepg32.exeDcdfdi32.exeJddqgdii.exeLamjph32.exeMejoei32.exeQfikod32.exeAphehidc.exeKflcok32.exeMfqiingf.exeNoepdo32.exeCabaec32.exeLiaeleak.exeFcdbcloi.exeEngjkeab.exeFpkchm32.exeJgppmpjp.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgiobadq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npppaejj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efpbih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lpiacp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgefap32.dll" Jqfhqe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhjdeqif.dll" Kkilgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knjdimdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncjbba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npppaejj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hbekojlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjhopjqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkkhmadd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlbkmdah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndiomdde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nifgekbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncnlnaim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qpaohjkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dleelp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhfmbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igpdnlgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljgkom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhklha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnkleo32.dll" Ceqjla32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpmllpef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebicee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldniinja.dll" Gjemoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlkcbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dncdqcbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcngcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Imcfjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjohgc32.dll" Jflgph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmqieh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beofli32.dll" Kopnma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgnigi32.dll" Kjhopjqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijcbdhqk.dll" Kfopdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmdfje32.dll" Gnlpeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfnkji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gfdhck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jopbnn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgdiho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Midnqh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Memlki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qddkfopf.dll" Ffiepg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcdfdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjeman32.dll" Jddqgdii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lamjph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnickdla.dll" Mejoei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ooicngen.dll" Npppaejj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qfikod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aphehidc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kflcok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfqiingf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Noepdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elnlcjph.dll" Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gleaik32.dll" Kcngcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Liaeleak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Godhpb32.dll" Dcdfdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcdbcloi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Engjkeab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpkchm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgppmpjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bchmahjj.dll" e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exeQcjoci32.exeQfikod32.exeQpaohjkk.exeQfkgdd32.exeAmglgn32.exeAljmbknm.exeAfpapcnc.exeAphehidc.exeAeenapck.exeAnmbje32.exeAegkfpah.exeAnpooe32.exeAankkqfl.exeAdmgglep.exeBaqhapdj.exedescription pid process target process PID 2744 wrote to memory of 2216 2744 e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe Qcjoci32.exe PID 2744 wrote to memory of 2216 2744 e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe Qcjoci32.exe PID 2744 wrote to memory of 2216 2744 e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe Qcjoci32.exe PID 2744 wrote to memory of 2216 2744 e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe Qcjoci32.exe PID 2216 wrote to memory of 2896 2216 Qcjoci32.exe Qfikod32.exe PID 2216 wrote to memory of 2896 2216 Qcjoci32.exe Qfikod32.exe PID 2216 wrote to memory of 2896 2216 Qcjoci32.exe Qfikod32.exe PID 2216 wrote to memory of 2896 2216 Qcjoci32.exe Qfikod32.exe PID 2896 wrote to memory of 3032 2896 Qfikod32.exe Qpaohjkk.exe PID 2896 wrote to memory of 3032 2896 Qfikod32.exe Qpaohjkk.exe PID 2896 wrote to memory of 3032 2896 Qfikod32.exe Qpaohjkk.exe PID 2896 wrote to memory of 3032 2896 Qfikod32.exe Qpaohjkk.exe PID 3032 wrote to memory of 3000 3032 Qpaohjkk.exe Qfkgdd32.exe PID 3032 wrote to memory of 3000 3032 Qpaohjkk.exe Qfkgdd32.exe PID 3032 wrote to memory of 3000 3032 Qpaohjkk.exe Qfkgdd32.exe PID 3032 wrote to memory of 3000 3032 Qpaohjkk.exe Qfkgdd32.exe PID 3000 wrote to memory of 2716 3000 Qfkgdd32.exe Amglgn32.exe PID 3000 wrote to memory of 2716 3000 Qfkgdd32.exe Amglgn32.exe PID 3000 wrote to memory of 2716 3000 Qfkgdd32.exe Amglgn32.exe PID 3000 wrote to memory of 2716 3000 Qfkgdd32.exe Amglgn32.exe PID 2716 wrote to memory of 2740 2716 Amglgn32.exe Aljmbknm.exe PID 2716 wrote to memory of 2740 2716 Amglgn32.exe Aljmbknm.exe PID 2716 wrote to memory of 2740 2716 Amglgn32.exe Aljmbknm.exe PID 2716 wrote to memory of 2740 2716 Amglgn32.exe Aljmbknm.exe PID 2740 wrote to memory of 2916 2740 Aljmbknm.exe Afpapcnc.exe PID 2740 wrote to memory of 2916 2740 Aljmbknm.exe Afpapcnc.exe PID 2740 wrote to memory of 2916 2740 Aljmbknm.exe Afpapcnc.exe PID 2740 wrote to memory of 2916 2740 Aljmbknm.exe Afpapcnc.exe PID 2916 wrote to memory of 2276 2916 Afpapcnc.exe Aphehidc.exe PID 2916 wrote to memory of 2276 2916 Afpapcnc.exe Aphehidc.exe PID 2916 wrote to memory of 2276 2916 Afpapcnc.exe Aphehidc.exe PID 2916 wrote to memory of 2276 2916 Afpapcnc.exe Aphehidc.exe PID 2276 wrote to memory of 1036 2276 Aphehidc.exe Aeenapck.exe PID 2276 wrote to memory of 1036 2276 Aphehidc.exe Aeenapck.exe PID 2276 wrote to memory of 1036 2276 Aphehidc.exe Aeenapck.exe PID 2276 wrote to memory of 1036 2276 Aphehidc.exe Aeenapck.exe PID 1036 wrote to memory of 3004 1036 Aeenapck.exe Anmbje32.exe PID 1036 wrote to memory of 3004 1036 Aeenapck.exe Anmbje32.exe PID 1036 wrote to memory of 3004 1036 Aeenapck.exe Anmbje32.exe PID 1036 wrote to memory of 3004 1036 Aeenapck.exe Anmbje32.exe PID 3004 wrote to memory of 2012 3004 Anmbje32.exe Aegkfpah.exe PID 3004 wrote to memory of 2012 3004 Anmbje32.exe Aegkfpah.exe PID 3004 wrote to memory of 2012 3004 Anmbje32.exe Aegkfpah.exe PID 3004 wrote to memory of 2012 3004 Anmbje32.exe Aegkfpah.exe PID 2012 wrote to memory of 2724 2012 Aegkfpah.exe Anpooe32.exe PID 2012 wrote to memory of 2724 2012 Aegkfpah.exe Anpooe32.exe PID 2012 wrote to memory of 2724 2012 Aegkfpah.exe Anpooe32.exe PID 2012 wrote to memory of 2724 2012 Aegkfpah.exe Anpooe32.exe PID 2724 wrote to memory of 944 2724 Anpooe32.exe Aankkqfl.exe PID 2724 wrote to memory of 944 2724 Anpooe32.exe Aankkqfl.exe PID 2724 wrote to memory of 944 2724 Anpooe32.exe Aankkqfl.exe PID 2724 wrote to memory of 944 2724 Anpooe32.exe Aankkqfl.exe PID 944 wrote to memory of 1612 944 Aankkqfl.exe Admgglep.exe PID 944 wrote to memory of 1612 944 Aankkqfl.exe Admgglep.exe PID 944 wrote to memory of 1612 944 Aankkqfl.exe Admgglep.exe PID 944 wrote to memory of 1612 944 Aankkqfl.exe Admgglep.exe PID 1612 wrote to memory of 2304 1612 Admgglep.exe Baqhapdj.exe PID 1612 wrote to memory of 2304 1612 Admgglep.exe Baqhapdj.exe PID 1612 wrote to memory of 2304 1612 Admgglep.exe Baqhapdj.exe PID 1612 wrote to memory of 2304 1612 Admgglep.exe Baqhapdj.exe PID 2304 wrote to memory of 1940 2304 Baqhapdj.exe Bacefpbg.exe PID 2304 wrote to memory of 1940 2304 Baqhapdj.exe Bacefpbg.exe PID 2304 wrote to memory of 1940 2304 Baqhapdj.exe Bacefpbg.exe PID 2304 wrote to memory of 1940 2304 Baqhapdj.exe Bacefpbg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe"C:\Users\Admin\AppData\Local\Temp\e619bb30707c91cc7f7cfb7a87e5e0adedbd9821a1ca2640ee5819a4e9ae1001.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Qcjoci32.exeC:\Windows\system32\Qcjoci32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\Qfikod32.exeC:\Windows\system32\Qfikod32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\Qpaohjkk.exeC:\Windows\system32\Qpaohjkk.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Qfkgdd32.exeC:\Windows\system32\Qfkgdd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\Amglgn32.exeC:\Windows\system32\Amglgn32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Aljmbknm.exeC:\Windows\system32\Aljmbknm.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Afpapcnc.exeC:\Windows\system32\Afpapcnc.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Aphehidc.exeC:\Windows\system32\Aphehidc.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\Aeenapck.exeC:\Windows\system32\Aeenapck.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\Anmbje32.exeC:\Windows\system32\Anmbje32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\Aegkfpah.exeC:\Windows\system32\Aegkfpah.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\Anpooe32.exeC:\Windows\system32\Anpooe32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Aankkqfl.exeC:\Windows\system32\Aankkqfl.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\Admgglep.exeC:\Windows\system32\Admgglep.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Baqhapdj.exeC:\Windows\system32\Baqhapdj.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Bacefpbg.exeC:\Windows\system32\Bacefpbg.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\Bhmmcjjd.exeC:\Windows\system32\Bhmmcjjd.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1060 -
C:\Windows\SysWOW64\Bphaglgo.exeC:\Windows\system32\Bphaglgo.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016 -
C:\Windows\SysWOW64\Bdcnhk32.exeC:\Windows\system32\Bdcnhk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\Bdfjnkne.exeC:\Windows\system32\Bdfjnkne.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\Bgdfjfmi.exeC:\Windows\system32\Bgdfjfmi.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\Bopknhjd.exeC:\Windows\system32\Bopknhjd.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1172 -
C:\Windows\SysWOW64\Cbkgog32.exeC:\Windows\system32\Cbkgog32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Windows\SysWOW64\Cpohhk32.exeC:\Windows\system32\Cpohhk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Windows\SysWOW64\Ccnddg32.exeC:\Windows\system32\Ccnddg32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Windows\SysWOW64\Clfhml32.exeC:\Windows\system32\Clfhml32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Windows\SysWOW64\Cabaec32.exeC:\Windows\system32\Cabaec32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2908 -
C:\Windows\SysWOW64\Cofaog32.exeC:\Windows\system32\Cofaog32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2288 -
C:\Windows\SysWOW64\Ceqjla32.exeC:\Windows\system32\Ceqjla32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1132 -
C:\Windows\SysWOW64\Ckmbdh32.exeC:\Windows\system32\Ckmbdh32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\Cagjqbam.exeC:\Windows\system32\Cagjqbam.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\Chabmm32.exeC:\Windows\system32\Chabmm32.exe33⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\Dnnkec32.exeC:\Windows\system32\Dnnkec32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\Dckcnj32.exeC:\Windows\system32\Dckcnj32.exe35⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\Dpodgocb.exeC:\Windows\system32\Dpodgocb.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\Dcmpcjcf.exeC:\Windows\system32\Dcmpcjcf.exe37⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Dncdqcbl.exeC:\Windows\system32\Dncdqcbl.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Dleelp32.exeC:\Windows\system32\Dleelp32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Dfniee32.exeC:\Windows\system32\Dfniee32.exe40⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SysWOW64\Dlhaaogd.exeC:\Windows\system32\Dlhaaogd.exe41⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\Dcbjni32.exeC:\Windows\system32\Dcbjni32.exe42⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\Dfpfke32.exeC:\Windows\system32\Dfpfke32.exe43⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\Dkmncl32.exeC:\Windows\system32\Dkmncl32.exe44⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Dcdfdi32.exeC:\Windows\system32\Dcdfdi32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:896 -
C:\Windows\SysWOW64\Edeclabl.exeC:\Windows\system32\Edeclabl.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\Elmkmo32.exeC:\Windows\system32\Elmkmo32.exe47⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Ebicee32.exeC:\Windows\system32\Ebicee32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:608 -
C:\Windows\SysWOW64\Edhpaa32.exeC:\Windows\system32\Edhpaa32.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\Ekbhnkhf.exeC:\Windows\system32\Ekbhnkhf.exe50⤵
- Executes dropped EXE
PID:800 -
C:\Windows\SysWOW64\Enpdjfgj.exeC:\Windows\system32\Enpdjfgj.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:672 -
C:\Windows\SysWOW64\Ekddck32.exeC:\Windows\system32\Ekddck32.exe52⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\Ejiadgkl.exeC:\Windows\system32\Ejiadgkl.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2768 -
C:\Windows\SysWOW64\Emhnqbjo.exeC:\Windows\system32\Emhnqbjo.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\Edofbpja.exeC:\Windows\system32\Edofbpja.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\Efpbih32.exeC:\Windows\system32\Efpbih32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2224 -
C:\Windows\SysWOW64\Engjkeab.exeC:\Windows\system32\Engjkeab.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:696 -
C:\Windows\SysWOW64\Fqffgapf.exeC:\Windows\system32\Fqffgapf.exe58⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\Fcdbcloi.exeC:\Windows\system32\Fcdbcloi.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Ffboohnm.exeC:\Windows\system32\Ffboohnm.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\Fjnkpf32.exeC:\Windows\system32\Fjnkpf32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1176 -
C:\Windows\SysWOW64\Fqhclqnc.exeC:\Windows\system32\Fqhclqnc.exe62⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\Fpkchm32.exeC:\Windows\system32\Fpkchm32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2300 -
C:\Windows\SysWOW64\Ffeldglk.exeC:\Windows\system32\Ffeldglk.exe64⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\Fjqhef32.exeC:\Windows\system32\Fjqhef32.exe65⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\Fladmn32.exeC:\Windows\system32\Fladmn32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1124 -
C:\Windows\SysWOW64\Fpmpnmck.exeC:\Windows\system32\Fpmpnmck.exe67⤵PID:660
-
C:\Windows\SysWOW64\Fcilnl32.exeC:\Windows\system32\Fcilnl32.exe68⤵PID:3064
-
C:\Windows\SysWOW64\Fblljhbo.exeC:\Windows\system32\Fblljhbo.exe69⤵PID:2792
-
C:\Windows\SysWOW64\Fejifdab.exeC:\Windows\system32\Fejifdab.exe70⤵PID:1936
-
C:\Windows\SysWOW64\Fmaqgaae.exeC:\Windows\system32\Fmaqgaae.exe71⤵
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Fnbmoi32.exeC:\Windows\system32\Fnbmoi32.exe72⤵PID:2736
-
C:\Windows\SysWOW64\Ffiepg32.exeC:\Windows\system32\Ffiepg32.exe73⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Fihalb32.exeC:\Windows\system32\Fihalb32.exe74⤵PID:2284
-
C:\Windows\SysWOW64\Fhkagonc.exeC:\Windows\system32\Fhkagonc.exe75⤵PID:2492
-
C:\Windows\SysWOW64\Fpbihl32.exeC:\Windows\system32\Fpbihl32.exe76⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\Fnejdiep.exeC:\Windows\system32\Fnejdiep.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\Feobac32.exeC:\Windows\system32\Feobac32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2924 -
C:\Windows\SysWOW64\Ghmnmo32.exeC:\Windows\system32\Ghmnmo32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:532 -
C:\Windows\SysWOW64\Glijnmdj.exeC:\Windows\system32\Glijnmdj.exe80⤵PID:2088
-
C:\Windows\SysWOW64\Gngfjicn.exeC:\Windows\system32\Gngfjicn.exe81⤵
- Drops file in System32 directory
PID:2068 -
C:\Windows\SysWOW64\Gaebfdba.exeC:\Windows\system32\Gaebfdba.exe82⤵PID:1536
-
C:\Windows\SysWOW64\Gddobpbe.exeC:\Windows\system32\Gddobpbe.exe83⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\Glkgcmbg.exeC:\Windows\system32\Glkgcmbg.exe84⤵
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\Gnicoh32.exeC:\Windows\system32\Gnicoh32.exe85⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\Gahpkd32.exeC:\Windows\system32\Gahpkd32.exe86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Windows\SysWOW64\Gecklbih.exeC:\Windows\system32\Gecklbih.exe87⤵
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\Gfdhck32.exeC:\Windows\system32\Gfdhck32.exe88⤵
- Drops file in System32 directory
- Modifies registry class
PID:2624 -
C:\Windows\SysWOW64\Gnlpeh32.exeC:\Windows\system32\Gnlpeh32.exe89⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1572 -
C:\Windows\SysWOW64\Gmoppefc.exeC:\Windows\system32\Gmoppefc.exe90⤵
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\Gpmllpef.exeC:\Windows\system32\Gpmllpef.exe91⤵
- Modifies registry class
PID:2600 -
C:\Windows\SysWOW64\Ghddnnfi.exeC:\Windows\system32\Ghddnnfi.exe92⤵PID:2092
-
C:\Windows\SysWOW64\Gjbqjiem.exeC:\Windows\system32\Gjbqjiem.exe93⤵
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\Gmamfddp.exeC:\Windows\system32\Gmamfddp.exe94⤵
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\Gpoibp32.exeC:\Windows\system32\Gpoibp32.exe95⤵PID:1944
-
C:\Windows\SysWOW64\Gbnenk32.exeC:\Windows\system32\Gbnenk32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2660 -
C:\Windows\SysWOW64\Gjemoi32.exeC:\Windows\system32\Gjemoi32.exe97⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2436 -
C:\Windows\SysWOW64\Gmcikd32.exeC:\Windows\system32\Gmcikd32.exe98⤵
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\Gpafgp32.exeC:\Windows\system32\Gpafgp32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2052 -
C:\Windows\SysWOW64\Hbpbck32.exeC:\Windows\system32\Hbpbck32.exe100⤵
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\Heonpf32.exeC:\Windows\system32\Heonpf32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:552 -
C:\Windows\SysWOW64\Hlhfmqge.exeC:\Windows\system32\Hlhfmqge.exe102⤵
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\Hpdbmooo.exeC:\Windows\system32\Hpdbmooo.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2236 -
C:\Windows\SysWOW64\Hfnkji32.exeC:\Windows\system32\Hfnkji32.exe104⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\Heakefnf.exeC:\Windows\system32\Heakefnf.exe105⤵PID:2340
-
C:\Windows\SysWOW64\Hlkcbp32.exeC:\Windows\system32\Hlkcbp32.exe106⤵
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Hbekojlp.exeC:\Windows\system32\Hbekojlp.exe107⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:824 -
C:\Windows\SysWOW64\Hechkfkc.exeC:\Windows\system32\Hechkfkc.exe108⤵PID:2448
-
C:\Windows\SysWOW64\Hlmphp32.exeC:\Windows\system32\Hlmphp32.exe109⤵PID:1500
-
C:\Windows\SysWOW64\Hbghdj32.exeC:\Windows\system32\Hbghdj32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2772 -
C:\Windows\SysWOW64\Hkbmil32.exeC:\Windows\system32\Hkbmil32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\Hmqieh32.exeC:\Windows\system32\Hmqieh32.exe112⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2836 -
C:\Windows\SysWOW64\Hehafe32.exeC:\Windows\system32\Hehafe32.exe113⤵PID:2652
-
C:\Windows\SysWOW64\Hhfmbq32.exeC:\Windows\system32\Hhfmbq32.exe114⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Iopeoknn.exeC:\Windows\system32\Iopeoknn.exe115⤵PID:2484
-
C:\Windows\SysWOW64\Imcfjg32.exeC:\Windows\system32\Imcfjg32.exe116⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2280 -
C:\Windows\SysWOW64\Ihijhpdo.exeC:\Windows\system32\Ihijhpdo.exe117⤵
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\Iijfoh32.exeC:\Windows\system32\Iijfoh32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\Idokma32.exeC:\Windows\system32\Idokma32.exe119⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\Icbkhnan.exeC:\Windows\system32\Icbkhnan.exe120⤵PID:756
-
C:\Windows\SysWOW64\Ikicikap.exeC:\Windows\system32\Ikicikap.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\Inhoegqc.exeC:\Windows\system32\Inhoegqc.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-