Analysis
-
max time kernel
78s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 12:01
Behavioral task
behavioral1
Sample
960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe
Resource
win10v2004-20241007-en
General
-
Target
960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe
-
Size
163KB
-
MD5
a56842e3acadbe8ecccd4939e2b46510
-
SHA1
09a001ab204b53851bb91f65b7f8dc181471e2a2
-
SHA256
960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0
-
SHA512
e17f345c4ebf22a7cc8e34db0e9bd8d5c7afad253c6bb0aa9372e8f61ec53fa950dfb1938c231c2bbddcb7d4b7870fa2f84c8658ced52a9dbc98e561a9f56ce4
-
SSDEEP
3072:PWfFg1W10L79VgD5nrtdPUfltOrWKDBr+yJb:PWdg1W10LAlxmfLOf
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dglkba32.exeDdhaie32.exeKimjhnnl.exeHoniikpa.exeDiencmcj.exeAeghng32.exeDdnfql32.exeBlkmdodf.exeLlcehg32.exeOlkjaflh.exeQbmhdp32.exeEfppqoil.exeGdnkkmej.exeKkhdml32.exeHbknmicj.exeBgahkngh.exePfqlkfoc.exeFeipbefb.exePijgbl32.exePnfpjc32.exeBedcembk.exeEhkcpc32.exeApkihofl.exeFppmcmah.exeKqemeb32.exeDbnblb32.exeNjchfc32.exeBeogaenl.exeCfcmlg32.exeJbfkeo32.exeMdepmh32.exeNgencpel.exeBabbng32.exeGhddnnfi.exeCaokmd32.exeFpemhb32.exeGmlckehe.exeJbakpi32.exeBpbabf32.exeIoheci32.exeDcemnopj.exeEgpena32.exeGedbfimc.exeNpechhgd.exeOjbnkp32.exeFeiaknmg.exeLbagpp32.exeNdjfgkha.exeEfeoedjo.exeBboahbio.exeQoaaqb32.exe960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exeNobndj32.exeIdemkp32.exeMfkebkjk.exeMpngmb32.exeGlcfgk32.exeManljd32.exeMffkgl32.exeEfjpkj32.exeAjociq32.exeBhpclica.exeFjfjcdln.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dglkba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddhaie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kimjhnnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Honiikpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Diencmcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aeghng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddnfql32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blkmdodf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llcehg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Olkjaflh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbmhdp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efppqoil.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdnkkmej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkhdml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbknmicj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgahkngh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfqlkfoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feipbefb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pijgbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnfpjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bedcembk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehkcpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apkihofl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fppmcmah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kqemeb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbnblb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njchfc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beogaenl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfcmlg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbfkeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdepmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngencpel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Babbng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghddnnfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caokmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpemhb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmlckehe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbakpi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpbabf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioheci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcemnopj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egpena32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gedbfimc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npechhgd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojbnkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feiaknmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbagpp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndjfgkha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efeoedjo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bboahbio.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qoaaqb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nobndj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idemkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfkebkjk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpngmb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glcfgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Manljd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mffkgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efjpkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajociq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhpclica.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddnfql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjfjcdln.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Ncgcdi32.exe family_bruteratel -
Executes dropped EXE 64 IoCs
Processes:
Qmbqcf32.exeAinkcf32.exeAeghng32.exeAdleoc32.exeBabbng32.exeBphooc32.exeBgahkngh.exeBfiabjjm.exeCoafko32.exeCfnkmi32.exeCkkcep32.exeDdhaie32.exeDmcfngde.exeDjicmk32.exeDcageqgm.exeEgfjdchi.exeEejjnhgc.exeEhkcpc32.exeEfppqoil.exeFiqibj32.exeFpmned32.exeFobkfqpo.exeFodgkp32.exeGaeqmk32.exeGhaeoe32.exeGieommdc.exeGlfgnh32.exeHijhhl32.exeHeqimm32.exeHonfqb32.exeIqapnjli.exeIjlaloaf.exeIianmlfn.exeJfjhbo32.exeJoblkegc.exeJijacjnc.exeJmlfmn32.exeKjbclamj.exeKamlhl32.exeKjepaa32.exeKpdeoh32.exeKimjhnnl.exeKecjmodq.exeLbgkfbbj.exeLonlkcho.exeLfippfej.exeLhimji32.exeLaaabo32.exeLilfgq32.exeLdbjdj32.exeMmjomogn.exeMokkegmm.exeMaldfbjn.exeMkdioh32.exeMhhiiloh.exeMaanab32.exeMhkfnlme.exeNdafcmci.exeNklopg32.exeNcgcdi32.exeNlohmonb.exeNjchfc32.exeNggipg32.exeNobndj32.exepid process 2788 Qmbqcf32.exe 2492 Ainkcf32.exe 2252 Aeghng32.exe 2340 Adleoc32.exe 2616 Babbng32.exe 1820 Bphooc32.exe 2480 Bgahkngh.exe 1260 Bfiabjjm.exe 2260 Coafko32.exe 1596 Cfnkmi32.exe 3004 Ckkcep32.exe 332 Ddhaie32.exe 2216 Dmcfngde.exe 2452 Djicmk32.exe 3068 Dcageqgm.exe 1160 Egfjdchi.exe 900 Eejjnhgc.exe 1700 Ehkcpc32.exe 1568 Efppqoil.exe 2016 Fiqibj32.exe 2100 Fpmned32.exe 960 Fobkfqpo.exe 2424 Fodgkp32.exe 1948 Gaeqmk32.exe 1936 Ghaeoe32.exe 2848 Gieommdc.exe 2852 Glfgnh32.exe 2796 Hijhhl32.exe 2664 Heqimm32.exe 2688 Honfqb32.exe 2476 Iqapnjli.exe 2472 Ijlaloaf.exe 772 Iianmlfn.exe 1400 Jfjhbo32.exe 2920 Joblkegc.exe 544 Jijacjnc.exe 2376 Jmlfmn32.exe 584 Kjbclamj.exe 2464 Kamlhl32.exe 2388 Kjepaa32.exe 1896 Kpdeoh32.exe 3012 Kimjhnnl.exe 1504 Kecjmodq.exe 2132 Lbgkfbbj.exe 1800 Lonlkcho.exe 2236 Lfippfej.exe 1108 Lhimji32.exe 2580 Laaabo32.exe 2576 Lilfgq32.exe 2560 Ldbjdj32.exe 888 Mmjomogn.exe 2320 Mokkegmm.exe 2836 Maldfbjn.exe 2952 Mkdioh32.exe 2012 Mhhiiloh.exe 2676 Maanab32.exe 2256 Mhkfnlme.exe 2904 Ndafcmci.exe 1616 Nklopg32.exe 524 Ncgcdi32.exe 2248 Nlohmonb.exe 3060 Njchfc32.exe 760 Nggipg32.exe 2400 Nobndj32.exe -
Loads dropped DLL 64 IoCs
Processes:
960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exeQmbqcf32.exeAinkcf32.exeAeghng32.exeAdleoc32.exeBabbng32.exeBphooc32.exeBgahkngh.exeBfiabjjm.exeCoafko32.exeCfnkmi32.exeCkkcep32.exeDdhaie32.exeDmcfngde.exeDjicmk32.exeDcageqgm.exeEgfjdchi.exeEejjnhgc.exeEhkcpc32.exeEfppqoil.exeFiqibj32.exeFpmned32.exeFobkfqpo.exeFodgkp32.exeGaeqmk32.exeGhaeoe32.exeGieommdc.exeGlfgnh32.exeHijhhl32.exeHeqimm32.exeHonfqb32.exeIqapnjli.exepid process 2872 960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe 2872 960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe 2788 Qmbqcf32.exe 2788 Qmbqcf32.exe 2492 Ainkcf32.exe 2492 Ainkcf32.exe 2252 Aeghng32.exe 2252 Aeghng32.exe 2340 Adleoc32.exe 2340 Adleoc32.exe 2616 Babbng32.exe 2616 Babbng32.exe 1820 Bphooc32.exe 1820 Bphooc32.exe 2480 Bgahkngh.exe 2480 Bgahkngh.exe 1260 Bfiabjjm.exe 1260 Bfiabjjm.exe 2260 Coafko32.exe 2260 Coafko32.exe 1596 Cfnkmi32.exe 1596 Cfnkmi32.exe 3004 Ckkcep32.exe 3004 Ckkcep32.exe 332 Ddhaie32.exe 332 Ddhaie32.exe 2216 Dmcfngde.exe 2216 Dmcfngde.exe 2452 Djicmk32.exe 2452 Djicmk32.exe 3068 Dcageqgm.exe 3068 Dcageqgm.exe 1160 Egfjdchi.exe 1160 Egfjdchi.exe 900 Eejjnhgc.exe 900 Eejjnhgc.exe 1700 Ehkcpc32.exe 1700 Ehkcpc32.exe 1568 Efppqoil.exe 1568 Efppqoil.exe 2016 Fiqibj32.exe 2016 Fiqibj32.exe 2100 Fpmned32.exe 2100 Fpmned32.exe 960 Fobkfqpo.exe 960 Fobkfqpo.exe 2424 Fodgkp32.exe 2424 Fodgkp32.exe 1948 Gaeqmk32.exe 1948 Gaeqmk32.exe 1936 Ghaeoe32.exe 1936 Ghaeoe32.exe 2848 Gieommdc.exe 2848 Gieommdc.exe 2852 Glfgnh32.exe 2852 Glfgnh32.exe 2796 Hijhhl32.exe 2796 Hijhhl32.exe 2664 Heqimm32.exe 2664 Heqimm32.exe 2688 Honfqb32.exe 2688 Honfqb32.exe 2476 Iqapnjli.exe 2476 Iqapnjli.exe -
Drops file in System32 directory 64 IoCs
Processes:
Bfjkphjd.exeDgnminke.exeHdgkicek.exeEgpena32.exeAfndjdpe.exeLaogfg32.exeNhfdqb32.exePqhkdg32.exeGampaipe.exeHgoadp32.exeAbldccka.exeJgmlmj32.exeNomphm32.exeApfici32.exeOahbjmjp.exeKpdeoh32.exeCeickb32.exeDnqhkcdo.exeGpafgp32.exeDcbjni32.exeOhmalgeb.exeAinkcf32.exeIqapnjli.exeOnjgkf32.exeFjhdpk32.exeNaimepkp.exeCkkenikc.exeDhlogjko.exeEclfhgaf.exeFbfldc32.exeDiencmcj.exeLpanne32.exeAmjiln32.exeJbakpi32.exeOlkjaflh.exeEcjibgdh.exeCaccnllf.exeBphooc32.exeMaiqfl32.exePipjpj32.exeQoaaqb32.exeOcfiif32.exeLnlaomae.exeLgdfgbhf.exeOafedmlb.exeEhinpnpm.exeCbljgpja.exeKkckblgq.exePfqlkfoc.exeOjbnkp32.exeAmkbpm32.exeBfmjoqoe.exeDglkba32.exeQqldpfmh.exeJijacjnc.exeNpechhgd.exeAepnkjcd.exeDkmghe32.exeGfadcemm.exeIainddpg.exeFodgkp32.exeJmlfmn32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Blgcio32.exe Bfjkphjd.exe File opened for modification C:\Windows\SysWOW64\Dcemnopj.exe Dgnminke.exe File created C:\Windows\SysWOW64\Hnppaill.exe Hdgkicek.exe File created C:\Windows\SysWOW64\Kfadkk32.dll Egpena32.exe File created C:\Windows\SysWOW64\Apfici32.exe Afndjdpe.exe File created C:\Windows\SysWOW64\Ljgkom32.exe Laogfg32.exe File created C:\Windows\SysWOW64\Okhbco32.dll Nhfdqb32.exe File created C:\Windows\SysWOW64\Klhejn32.dll Pqhkdg32.exe File opened for modification C:\Windows\SysWOW64\Glbdnbpk.exe Gampaipe.exe File opened for modification C:\Windows\SysWOW64\Hmijajbd.exe Hgoadp32.exe File created C:\Windows\SysWOW64\Bboahbio.exe Abldccka.exe File created C:\Windows\SysWOW64\Jjkiie32.exe Jgmlmj32.exe File opened for modification C:\Windows\SysWOW64\Nhfdqb32.exe Nomphm32.exe File created C:\Windows\SysWOW64\Oeficpoq.dll Apfici32.exe File opened for modification C:\Windows\SysWOW64\Okqgcb32.exe Oahbjmjp.exe File created C:\Windows\SysWOW64\Kimjhnnl.exe Kpdeoh32.exe File created C:\Windows\SysWOW64\Capdpcge.exe Ceickb32.exe File opened for modification C:\Windows\SysWOW64\Djghpd32.exe Dnqhkcdo.exe File opened for modification C:\Windows\SysWOW64\Heonpf32.exe Gpafgp32.exe File created C:\Windows\SysWOW64\Fofdcm32.dll Dcbjni32.exe File created C:\Windows\SysWOW64\Oafedmlb.exe Ohmalgeb.exe File opened for modification C:\Windows\SysWOW64\Aeghng32.exe Ainkcf32.exe File opened for modification C:\Windows\SysWOW64\Ijlaloaf.exe Iqapnjli.exe File created C:\Windows\SysWOW64\Dfaakfpk.dll Onjgkf32.exe File created C:\Windows\SysWOW64\Ajgpacpe.dll Fjhdpk32.exe File opened for modification C:\Windows\SysWOW64\Nhcebj32.exe Naimepkp.exe File opened for modification C:\Windows\SysWOW64\Caenkc32.exe Ckkenikc.exe File created C:\Windows\SysWOW64\Epkglngn.dll Dhlogjko.exe File opened for modification C:\Windows\SysWOW64\Ehinpnpm.exe Eclfhgaf.exe File created C:\Windows\SysWOW64\Fdgefn32.exe Fbfldc32.exe File opened for modification C:\Windows\SysWOW64\Dbnblb32.exe Diencmcj.exe File opened for modification C:\Windows\SysWOW64\Liibgkoo.exe Lpanne32.exe File created C:\Windows\SysWOW64\Afbnec32.exe Amjiln32.exe File opened for modification C:\Windows\SysWOW64\Jqfhqe32.exe Jbakpi32.exe File created C:\Windows\SysWOW64\Jmnbbmon.dll Olkjaflh.exe File created C:\Windows\SysWOW64\Eclfhgaf.exe Ecjibgdh.exe File opened for modification C:\Windows\SysWOW64\Cmjdcm32.exe Caccnllf.exe File created C:\Windows\SysWOW64\Bgahkngh.exe Bphooc32.exe File created C:\Windows\SysWOW64\Mgfiocfl.exe Maiqfl32.exe File created C:\Windows\SysWOW64\Pfcjiodd.exe Pipjpj32.exe File created C:\Windows\SysWOW64\Aijfihip.exe Qoaaqb32.exe File created C:\Windows\SysWOW64\Pjeimkch.dll Ocfiif32.exe File created C:\Windows\SysWOW64\Geqoad32.dll Lnlaomae.exe File created C:\Windows\SysWOW64\Jhnlnf32.dll Lgdfgbhf.exe File created C:\Windows\SysWOW64\Olkjaflh.exe Oafedmlb.exe File opened for modification C:\Windows\SysWOW64\Ebabicfn.exe Ehinpnpm.exe File created C:\Windows\SysWOW64\Eodpobjn.dll Cbljgpja.exe File created C:\Windows\SysWOW64\Fhihab32.dll Lpanne32.exe File created C:\Windows\SysWOW64\Khglkqfj.exe Kkckblgq.exe File created C:\Windows\SysWOW64\Hajdhd32.dll Pfqlkfoc.exe File created C:\Windows\SysWOW64\Ooofcg32.exe Ojbnkp32.exe File opened for modification C:\Windows\SysWOW64\Ooofcg32.exe Ojbnkp32.exe File created C:\Windows\SysWOW64\Ajociq32.exe Amkbpm32.exe File created C:\Windows\SysWOW64\Bpengf32.exe Bfmjoqoe.exe File opened for modification C:\Windows\SysWOW64\Dmecokhm.exe Dglkba32.exe File created C:\Windows\SysWOW64\Qfimhmlo.exe Qqldpfmh.exe File created C:\Windows\SysWOW64\Eciljg32.dll Jijacjnc.exe File created C:\Windows\SysWOW64\Ninhamne.exe Npechhgd.exe File created C:\Windows\SysWOW64\Iqkcelpl.dll Aepnkjcd.exe File opened for modification C:\Windows\SysWOW64\Edelakoq.exe Dkmghe32.exe File created C:\Windows\SysWOW64\Glomllkd.exe Gfadcemm.exe File opened for modification C:\Windows\SysWOW64\Jkabmi32.exe Iainddpg.exe File created C:\Windows\SysWOW64\Gedhkkno.dll Fodgkp32.exe File opened for modification C:\Windows\SysWOW64\Kjbclamj.exe Jmlfmn32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 576 2476 WerFault.exe Eceimadb.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Dhlogjko.exeDmcgik32.exeOnldqejb.exeDcemnopj.exeJqfhqe32.exeMoccnoni.exeMokkegmm.exePfnhkq32.exeFdgefn32.exeKhglkqfj.exeCfnkmi32.exeCgnpjkhj.exePiemih32.exeOfobgc32.exeKimlqfeq.exeLgdfgbhf.exeAnndbnao.exeBmjhdi32.exeMkdioh32.exeOmnmal32.exeEcjibgdh.exeKnaeeo32.exeJddqgdii.exeBboahbio.exeBiahijec.exeCaccnllf.exeDmecokhm.exeApkihofl.exeHilgfe32.exeJjkiie32.exeOmjbihpn.exeFacfpddd.exeFeipbefb.exeGpjfcali.exeEblpke32.exeLjcbcngi.exeMhdpnm32.exeLlbnnq32.exeKkalcdao.exeBeadgdli.exeDpgckm32.exeHeqimm32.exeKnoaeimg.exeNgencpel.exeIainddpg.exeAcbglq32.exeBphooc32.exeNobndj32.exePmcgmkil.exeAfndjdpe.exeIaaoqf32.exeIcgdcm32.exeKfdfdf32.exePfqlkfoc.exeEiilge32.exePalbgn32.exeKfbemi32.exePcmabnhm.exeEgfjdchi.exeJfjhbo32.exeDoijcjde.exeLhimji32.exeIloilcci.exeJmlfmn32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhlogjko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmcgik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onldqejb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcemnopj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jqfhqe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moccnoni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mokkegmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfnhkq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdgefn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khglkqfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfnkmi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgnpjkhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Piemih32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofobgc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kimlqfeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgdfgbhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anndbnao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmjhdi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkdioh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omnmal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ecjibgdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knaeeo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jddqgdii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bboahbio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Biahijec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caccnllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmecokhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apkihofl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hilgfe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjkiie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omjbihpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Facfpddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Feipbefb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpjfcali.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eblpke32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljcbcngi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhdpnm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llbnnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkalcdao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beadgdli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpgckm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Heqimm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knoaeimg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ngencpel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iainddpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acbglq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bphooc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nobndj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmcgmkil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afndjdpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iaaoqf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icgdcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfdfdf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfqlkfoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eiilge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Palbgn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfbemi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcmabnhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Egfjdchi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfjhbo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doijcjde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhimji32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iloilcci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmlfmn32.exe -
Modifies registry class 64 IoCs
Processes:
Ckkcep32.exeFpemhb32.exeHgoadp32.exeJfojpn32.exeMalmllfb.exeEcjibgdh.exeFaijggao.exeMoccnoni.exeOafedmlb.exeAbldccka.exeBhbmip32.exeDmmbge32.exeHchoop32.exeDjghpd32.exeIainddpg.exeGedbfimc.exeBpmkbl32.exeDljngoea.exeMaocekoo.exeNgencpel.exeBedcembk.exeIekgod32.exeKimjhnnl.exeHmijajbd.exeOgjhnp32.exeHjoiiffo.exeCppjadhk.exeDbkffc32.exeGhaeoe32.exeNoagjc32.exeCapdpcge.exeHpdbmooo.exeLjcbcngi.exeMlhmkbhb.exeBjiljf32.exeGhddnnfi.exeCcecheeb.exeFfpkob32.exeQoaaqb32.exeDbnblb32.exePfqlkfoc.exeKiemmh32.exePalbgn32.exeMcjlap32.exePcmabnhm.exeMhkfnlme.exeOcfiif32.exeNdiomdde.exeJjkiie32.exeJkobgm32.exeFiqibj32.exeOkbapi32.exeNdlbmk32.exePmcgmkil.exeLgdfgbhf.exeGdnkkmej.exeBgahkngh.exePmmqmpdm.exeHeonpf32.exeLighjd32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jajdfk32.dll" Ckkcep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpemhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgoadp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfojpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpmodqio.dll" Malmllfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhmgakjn.dll" Ecjibgdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nldeka32.dll" Faijggao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkbafe32.dll" Moccnoni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oafedmlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epbilc32.dll" Abldccka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akbieg32.dll" Bhbmip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmmbge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hchoop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmgbpm32.dll" Djghpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iainddpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gedbfimc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpmkbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dljngoea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Maocekoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngencpel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bedcembk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iekgod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kimjhnnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmijajbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogjhnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjoiiffo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cppjadhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fniiae32.dll" Dbkffc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghaeoe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Noagjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Capdpcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dngbdiei.dll" Hpdbmooo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ljcbcngi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlhmkbhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cppjadhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjnhlm32.dll" Bjiljf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghddnnfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghhomaie.dll" Ccecheeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhonin32.dll" Ffpkob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfjjhnge.dll" Qoaaqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Modipl32.dll" Dbnblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hajdhd32.dll" Pfqlkfoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibfmgg32.dll" Kiemmh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Palbgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcjlap32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcmabnhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhkfnlme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocfiif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhjalgho.dll" Ndiomdde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjkiie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkobgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fiqibj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okbapi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndlbmk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmcgmkil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhnlnf32.dll" Lgdfgbhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjdhaj32.dll" Bedcembk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gdnkkmej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgahkngh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmmqmpdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Leeeoale.dll" Heonpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpgdad32.dll" Jkobgm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lighjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcmabnhm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exeQmbqcf32.exeAinkcf32.exeAeghng32.exeAdleoc32.exeBabbng32.exeBphooc32.exeBgahkngh.exeBfiabjjm.exeCoafko32.exeCfnkmi32.exeCkkcep32.exeDdhaie32.exeDmcfngde.exeDjicmk32.exeDcageqgm.exedescription pid process target process PID 2872 wrote to memory of 2788 2872 960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe Qmbqcf32.exe PID 2872 wrote to memory of 2788 2872 960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe Qmbqcf32.exe PID 2872 wrote to memory of 2788 2872 960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe Qmbqcf32.exe PID 2872 wrote to memory of 2788 2872 960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe Qmbqcf32.exe PID 2788 wrote to memory of 2492 2788 Qmbqcf32.exe Ainkcf32.exe PID 2788 wrote to memory of 2492 2788 Qmbqcf32.exe Ainkcf32.exe PID 2788 wrote to memory of 2492 2788 Qmbqcf32.exe Ainkcf32.exe PID 2788 wrote to memory of 2492 2788 Qmbqcf32.exe Ainkcf32.exe PID 2492 wrote to memory of 2252 2492 Ainkcf32.exe Aeghng32.exe PID 2492 wrote to memory of 2252 2492 Ainkcf32.exe Aeghng32.exe PID 2492 wrote to memory of 2252 2492 Ainkcf32.exe Aeghng32.exe PID 2492 wrote to memory of 2252 2492 Ainkcf32.exe Aeghng32.exe PID 2252 wrote to memory of 2340 2252 Aeghng32.exe Adleoc32.exe PID 2252 wrote to memory of 2340 2252 Aeghng32.exe Adleoc32.exe PID 2252 wrote to memory of 2340 2252 Aeghng32.exe Adleoc32.exe PID 2252 wrote to memory of 2340 2252 Aeghng32.exe Adleoc32.exe PID 2340 wrote to memory of 2616 2340 Adleoc32.exe Babbng32.exe PID 2340 wrote to memory of 2616 2340 Adleoc32.exe Babbng32.exe PID 2340 wrote to memory of 2616 2340 Adleoc32.exe Babbng32.exe PID 2340 wrote to memory of 2616 2340 Adleoc32.exe Babbng32.exe PID 2616 wrote to memory of 1820 2616 Babbng32.exe Bphooc32.exe PID 2616 wrote to memory of 1820 2616 Babbng32.exe Bphooc32.exe PID 2616 wrote to memory of 1820 2616 Babbng32.exe Bphooc32.exe PID 2616 wrote to memory of 1820 2616 Babbng32.exe Bphooc32.exe PID 1820 wrote to memory of 2480 1820 Bphooc32.exe Bgahkngh.exe PID 1820 wrote to memory of 2480 1820 Bphooc32.exe Bgahkngh.exe PID 1820 wrote to memory of 2480 1820 Bphooc32.exe Bgahkngh.exe PID 1820 wrote to memory of 2480 1820 Bphooc32.exe Bgahkngh.exe PID 2480 wrote to memory of 1260 2480 Bgahkngh.exe Bfiabjjm.exe PID 2480 wrote to memory of 1260 2480 Bgahkngh.exe Bfiabjjm.exe PID 2480 wrote to memory of 1260 2480 Bgahkngh.exe Bfiabjjm.exe PID 2480 wrote to memory of 1260 2480 Bgahkngh.exe Bfiabjjm.exe PID 1260 wrote to memory of 2260 1260 Bfiabjjm.exe Coafko32.exe PID 1260 wrote to memory of 2260 1260 Bfiabjjm.exe Coafko32.exe PID 1260 wrote to memory of 2260 1260 Bfiabjjm.exe Coafko32.exe PID 1260 wrote to memory of 2260 1260 Bfiabjjm.exe Coafko32.exe PID 2260 wrote to memory of 1596 2260 Coafko32.exe Cfnkmi32.exe PID 2260 wrote to memory of 1596 2260 Coafko32.exe Cfnkmi32.exe PID 2260 wrote to memory of 1596 2260 Coafko32.exe Cfnkmi32.exe PID 2260 wrote to memory of 1596 2260 Coafko32.exe Cfnkmi32.exe PID 1596 wrote to memory of 3004 1596 Cfnkmi32.exe Ckkcep32.exe PID 1596 wrote to memory of 3004 1596 Cfnkmi32.exe Ckkcep32.exe PID 1596 wrote to memory of 3004 1596 Cfnkmi32.exe Ckkcep32.exe PID 1596 wrote to memory of 3004 1596 Cfnkmi32.exe Ckkcep32.exe PID 3004 wrote to memory of 332 3004 Ckkcep32.exe Ddhaie32.exe PID 3004 wrote to memory of 332 3004 Ckkcep32.exe Ddhaie32.exe PID 3004 wrote to memory of 332 3004 Ckkcep32.exe Ddhaie32.exe PID 3004 wrote to memory of 332 3004 Ckkcep32.exe Ddhaie32.exe PID 332 wrote to memory of 2216 332 Ddhaie32.exe Dmcfngde.exe PID 332 wrote to memory of 2216 332 Ddhaie32.exe Dmcfngde.exe PID 332 wrote to memory of 2216 332 Ddhaie32.exe Dmcfngde.exe PID 332 wrote to memory of 2216 332 Ddhaie32.exe Dmcfngde.exe PID 2216 wrote to memory of 2452 2216 Dmcfngde.exe Djicmk32.exe PID 2216 wrote to memory of 2452 2216 Dmcfngde.exe Djicmk32.exe PID 2216 wrote to memory of 2452 2216 Dmcfngde.exe Djicmk32.exe PID 2216 wrote to memory of 2452 2216 Dmcfngde.exe Djicmk32.exe PID 2452 wrote to memory of 3068 2452 Djicmk32.exe Dcageqgm.exe PID 2452 wrote to memory of 3068 2452 Djicmk32.exe Dcageqgm.exe PID 2452 wrote to memory of 3068 2452 Djicmk32.exe Dcageqgm.exe PID 2452 wrote to memory of 3068 2452 Djicmk32.exe Dcageqgm.exe PID 3068 wrote to memory of 1160 3068 Dcageqgm.exe Egfjdchi.exe PID 3068 wrote to memory of 1160 3068 Dcageqgm.exe Egfjdchi.exe PID 3068 wrote to memory of 1160 3068 Dcageqgm.exe Egfjdchi.exe PID 3068 wrote to memory of 1160 3068 Dcageqgm.exe Egfjdchi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe"C:\Users\Admin\AppData\Local\Temp\960d8a901ecd245418ea233b8dc3714ff2c7b9cd53bf703964bab2fd7e9cfda0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\Qmbqcf32.exeC:\Windows\system32\Qmbqcf32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Ainkcf32.exeC:\Windows\system32\Ainkcf32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\Aeghng32.exeC:\Windows\system32\Aeghng32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Adleoc32.exeC:\Windows\system32\Adleoc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\Babbng32.exeC:\Windows\system32\Babbng32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Bphooc32.exeC:\Windows\system32\Bphooc32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\Bgahkngh.exeC:\Windows\system32\Bgahkngh.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\Bfiabjjm.exeC:\Windows\system32\Bfiabjjm.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\Coafko32.exeC:\Windows\system32\Coafko32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Cfnkmi32.exeC:\Windows\system32\Cfnkmi32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\Ckkcep32.exeC:\Windows\system32\Ckkcep32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\Ddhaie32.exeC:\Windows\system32\Ddhaie32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\Dmcfngde.exeC:\Windows\system32\Dmcfngde.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\Djicmk32.exeC:\Windows\system32\Djicmk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\Dcageqgm.exeC:\Windows\system32\Dcageqgm.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\Egfjdchi.exeC:\Windows\system32\Egfjdchi.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\SysWOW64\Eejjnhgc.exeC:\Windows\system32\Eejjnhgc.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900 -
C:\Windows\SysWOW64\Ehkcpc32.exeC:\Windows\system32\Ehkcpc32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Windows\SysWOW64\Efppqoil.exeC:\Windows\system32\Efppqoil.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1568 -
C:\Windows\SysWOW64\Fiqibj32.exeC:\Windows\system32\Fiqibj32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Fpmned32.exeC:\Windows\system32\Fpmned32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2100 -
C:\Windows\SysWOW64\Fobkfqpo.exeC:\Windows\system32\Fobkfqpo.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960 -
C:\Windows\SysWOW64\Fodgkp32.exeC:\Windows\system32\Fodgkp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2424 -
C:\Windows\SysWOW64\Gaeqmk32.exeC:\Windows\system32\Gaeqmk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Windows\SysWOW64\Ghaeoe32.exeC:\Windows\system32\Ghaeoe32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1936 -
C:\Windows\SysWOW64\Gieommdc.exeC:\Windows\system32\Gieommdc.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2848 -
C:\Windows\SysWOW64\Glfgnh32.exeC:\Windows\system32\Glfgnh32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Windows\SysWOW64\Hijhhl32.exeC:\Windows\system32\Hijhhl32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2796 -
C:\Windows\SysWOW64\Heqimm32.exeC:\Windows\system32\Heqimm32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\Honfqb32.exeC:\Windows\system32\Honfqb32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688 -
C:\Windows\SysWOW64\Iqapnjli.exeC:\Windows\system32\Iqapnjli.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2476 -
C:\Windows\SysWOW64\Ijlaloaf.exeC:\Windows\system32\Ijlaloaf.exe33⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\Iianmlfn.exeC:\Windows\system32\Iianmlfn.exe34⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SysWOW64\Jfjhbo32.exeC:\Windows\system32\Jfjhbo32.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1400 -
C:\Windows\SysWOW64\Joblkegc.exeC:\Windows\system32\Joblkegc.exe36⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\Jijacjnc.exeC:\Windows\system32\Jijacjnc.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:544 -
C:\Windows\SysWOW64\Jmlfmn32.exeC:\Windows\system32\Jmlfmn32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\Kjbclamj.exeC:\Windows\system32\Kjbclamj.exe39⤵
- Executes dropped EXE
PID:584 -
C:\Windows\SysWOW64\Kamlhl32.exeC:\Windows\system32\Kamlhl32.exe40⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Kjepaa32.exeC:\Windows\system32\Kjepaa32.exe41⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\Kpdeoh32.exeC:\Windows\system32\Kpdeoh32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1896 -
C:\Windows\SysWOW64\Kimjhnnl.exeC:\Windows\system32\Kimjhnnl.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3012 -
C:\Windows\SysWOW64\Kecjmodq.exeC:\Windows\system32\Kecjmodq.exe44⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\Lbgkfbbj.exeC:\Windows\system32\Lbgkfbbj.exe45⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\Lonlkcho.exeC:\Windows\system32\Lonlkcho.exe46⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\Lfippfej.exeC:\Windows\system32\Lfippfej.exe47⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\Lhimji32.exeC:\Windows\system32\Lhimji32.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Windows\SysWOW64\Laaabo32.exeC:\Windows\system32\Laaabo32.exe49⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\Lilfgq32.exeC:\Windows\system32\Lilfgq32.exe50⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\Ldbjdj32.exeC:\Windows\system32\Ldbjdj32.exe51⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\SysWOW64\Mmjomogn.exeC:\Windows\system32\Mmjomogn.exe52⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\Mokkegmm.exeC:\Windows\system32\Mokkegmm.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\Mhdpnm32.exeC:\Windows\system32\Mhdpnm32.exe54⤵
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\Maldfbjn.exeC:\Windows\system32\Maldfbjn.exe55⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Mkdioh32.exeC:\Windows\system32\Mkdioh32.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\Mhhiiloh.exeC:\Windows\system32\Mhhiiloh.exe57⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\Maanab32.exeC:\Windows\system32\Maanab32.exe58⤵
- Executes dropped EXE
PID:2676 -
C:\Windows\SysWOW64\Mhkfnlme.exeC:\Windows\system32\Mhkfnlme.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Ndafcmci.exeC:\Windows\system32\Ndafcmci.exe60⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\Nklopg32.exeC:\Windows\system32\Nklopg32.exe61⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Ncgcdi32.exeC:\Windows\system32\Ncgcdi32.exe62⤵
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\Nlohmonb.exeC:\Windows\system32\Nlohmonb.exe63⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\Njchfc32.exeC:\Windows\system32\Njchfc32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\Nggipg32.exeC:\Windows\system32\Nggipg32.exe65⤵
- Executes dropped EXE
PID:760 -
C:\Windows\SysWOW64\Nobndj32.exeC:\Windows\system32\Nobndj32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\Njhbabif.exeC:\Windows\system32\Njhbabif.exe67⤵PID:1472
-
C:\Windows\SysWOW64\Ofobgc32.exeC:\Windows\system32\Ofobgc32.exe68⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\Onjgkf32.exeC:\Windows\system32\Onjgkf32.exe69⤵
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\Ogbldk32.exeC:\Windows\system32\Ogbldk32.exe70⤵PID:2280
-
C:\Windows\SysWOW64\Onldqejb.exeC:\Windows\system32\Onldqejb.exe71⤵
- System Location Discovery: System Language Discovery
PID:1396 -
C:\Windows\SysWOW64\Ogdhik32.exeC:\Windows\system32\Ogdhik32.exe72⤵PID:2892
-
C:\Windows\SysWOW64\Onoqfehp.exeC:\Windows\system32\Onoqfehp.exe73⤵PID:2204
-
C:\Windows\SysWOW64\Okbapi32.exeC:\Windows\system32\Okbapi32.exe74⤵
- Modifies registry class
PID:2220 -
C:\Windows\SysWOW64\Oekehomj.exeC:\Windows\system32\Oekehomj.exe75⤵PID:2572
-
C:\Windows\SysWOW64\Paafmp32.exeC:\Windows\system32\Paafmp32.exe76⤵PID:1268
-
C:\Windows\SysWOW64\Pjjkfe32.exeC:\Windows\system32\Pjjkfe32.exe77⤵PID:2000
-
C:\Windows\SysWOW64\Pfqlkfoc.exeC:\Windows\system32\Pfqlkfoc.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1448 -
C:\Windows\SysWOW64\Ppipdl32.exeC:\Windows\system32\Ppipdl32.exe79⤵PID:1976
-
C:\Windows\SysWOW64\Pmmqmpdm.exeC:\Windows\system32\Pmmqmpdm.exe80⤵
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\Pehebbbh.exeC:\Windows\system32\Pehebbbh.exe81⤵PID:1556
-
C:\Windows\SysWOW64\Qblfkgqb.exeC:\Windows\system32\Qblfkgqb.exe82⤵PID:2384
-
C:\Windows\SysWOW64\Afqhjj32.exeC:\Windows\system32\Afqhjj32.exe83⤵PID:2080
-
C:\Windows\SysWOW64\Addhcn32.exeC:\Windows\system32\Addhcn32.exe84⤵PID:1732
-
C:\Windows\SysWOW64\Apkihofl.exeC:\Windows\system32\Apkihofl.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\Ajamfh32.exeC:\Windows\system32\Ajamfh32.exe86⤵PID:852
-
C:\Windows\SysWOW64\Apnfno32.exeC:\Windows\system32\Apnfno32.exe87⤵PID:2052
-
C:\Windows\SysWOW64\Afgnkilf.exeC:\Windows\system32\Afgnkilf.exe88⤵PID:2720
-
C:\Windows\SysWOW64\Appbcn32.exeC:\Windows\system32\Appbcn32.exe89⤵PID:2868
-
C:\Windows\SysWOW64\Bfjkphjd.exeC:\Windows\system32\Bfjkphjd.exe90⤵
- Drops file in System32 directory
PID:1552 -
C:\Windows\SysWOW64\Blgcio32.exeC:\Windows\system32\Blgcio32.exe91⤵PID:2948
-
C:\Windows\SysWOW64\Beogaenl.exeC:\Windows\system32\Beogaenl.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1136 -
C:\Windows\SysWOW64\Bogljj32.exeC:\Windows\system32\Bogljj32.exe93⤵PID:1068
-
C:\Windows\SysWOW64\Beadgdli.exeC:\Windows\system32\Beadgdli.exe94⤵
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\Blkmdodf.exeC:\Windows\system32\Blkmdodf.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3000 -
C:\Windows\SysWOW64\Bedamd32.exeC:\Windows\system32\Bedamd32.exe96⤵PID:1924
-
C:\Windows\SysWOW64\Bhbmip32.exeC:\Windows\system32\Bhbmip32.exe97⤵
- Modifies registry class
PID:2076 -
C:\Windows\SysWOW64\Befnbd32.exeC:\Windows\system32\Befnbd32.exe98⤵PID:2552
-
C:\Windows\SysWOW64\Boobki32.exeC:\Windows\system32\Boobki32.exe99⤵PID:948
-
C:\Windows\SysWOW64\Cdkkcp32.exeC:\Windows\system32\Cdkkcp32.exe100⤵PID:1920
-
C:\Windows\SysWOW64\Caokmd32.exeC:\Windows\system32\Caokmd32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:884 -
C:\Windows\SysWOW64\Clilmbhd.exeC:\Windows\system32\Clilmbhd.exe102⤵PID:2412
-
C:\Windows\SysWOW64\Cgnpjkhj.exeC:\Windows\system32\Cgnpjkhj.exe103⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\Cpgecq32.exeC:\Windows\system32\Cpgecq32.exe104⤵PID:2116
-
C:\Windows\SysWOW64\Cfcmlg32.exeC:\Windows\system32\Cfcmlg32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1348 -
C:\Windows\SysWOW64\Coladm32.exeC:\Windows\system32\Coladm32.exe106⤵PID:1624
-
C:\Windows\SysWOW64\Donojm32.exeC:\Windows\system32\Donojm32.exe107⤵PID:2936
-
C:\Windows\SysWOW64\Dhgccbhp.exeC:\Windows\system32\Dhgccbhp.exe108⤵PID:2960
-
C:\Windows\SysWOW64\Dochelmj.exeC:\Windows\system32\Dochelmj.exe109⤵PID:2184
-
C:\Windows\SysWOW64\Dgnminke.exeC:\Windows\system32\Dgnminke.exe110⤵
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\Dcemnopj.exeC:\Windows\system32\Dcemnopj.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\Dmmbge32.exeC:\Windows\system32\Dmmbge32.exe112⤵
- Modifies registry class
PID:1028 -
C:\Windows\SysWOW64\Efffpjmk.exeC:\Windows\system32\Efffpjmk.exe113⤵PID:2152
-
C:\Windows\SysWOW64\Eqkjmcmq.exeC:\Windows\system32\Eqkjmcmq.exe114⤵PID:1760
-
C:\Windows\SysWOW64\Eifobe32.exeC:\Windows\system32\Eifobe32.exe115⤵PID:580
-
C:\Windows\SysWOW64\Efjpkj32.exeC:\Windows\system32\Efjpkj32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1704 -
C:\Windows\SysWOW64\Eiilge32.exeC:\Windows\system32\Eiilge32.exe117⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\Eepmlf32.exeC:\Windows\system32\Eepmlf32.exe118⤵PID:2760
-
C:\Windows\SysWOW64\Elieipej.exeC:\Windows\system32\Elieipej.exe119⤵PID:2620
-
C:\Windows\SysWOW64\Egpena32.exeC:\Windows\system32\Egpena32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\Faijggao.exeC:\Windows\system32\Faijggao.exe121⤵
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Fbhfajia.exeC:\Windows\system32\Fbhfajia.exe122⤵PID:2812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-