Analysis
-
max time kernel
26s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe
Resource
win10v2004-20241007-en
General
-
Target
441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe
-
Size
96KB
-
MD5
df7d2cdae9a320ad36f27912f059e050
-
SHA1
7fc14ee719716deec44820e4bc77669a73909992
-
SHA256
441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0
-
SHA512
396e505683f2222b938920cb0c71614c06ffbc1e8ba747b9a5e80a6ffa64b5293db9ed04eb38d8221378304b3973a2bac753231aedd34a3f7d1902850d511620
-
SSDEEP
1536:NaGUhn7QpCJhCpFXMNq7kflezaIiVrd2LO7RZObZUUWaegPYA:NaRNCjcK3zaIisOClUUWae
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Qifpqi32.exeHagepa32.exeOmeini32.exeOpebpdad.exeMoqgiopk.exeAicfgn32.exeCkmbdh32.exeHehafe32.exeBpfebmia.exeLnqkjl32.exeMpimbcnf.exeOgddhmdl.exeQcmnaaji.exeBgkbfcck.exeLgdfgbhf.exeKioiffcn.exeAmplklmj.exeIgcjgk32.exeQnpeijla.exeJaonji32.exeEqamla32.exeBaqhapdj.exeJknicnpf.exeKomjmk32.exeDjeljd32.exeNkbcgnie.exeDhaefepn.exeIencdc32.exeKcpcho32.exeIlmlfcel.exeAplkah32.exeJljeeqfn.exeKjihci32.exeMfqiingf.exeLmfgkh32.exeAgqfme32.exeDpdpkfga.exeIhdmld32.exeIdbgbahq.exeLomglo32.exeGdmbhnjj.exeLbhmok32.exeJkgbcofn.exeDdbolkac.exeKdjceb32.exeDgildi32.exeOknjmb32.exePccahc32.exeEjfnda32.exeIhijhpdo.exeHdhdlbpk.exeLadpagin.exePkepnalk.exeGfogneop.exeMalpee32.exeGhpkbn32.exeJpnkep32.exeNbbegl32.exeAofklbnj.exeDajiok32.exeAjjinaco.exeAmmoel32.exeBimbql32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qifpqi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hagepa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omeini32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opebpdad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moqgiopk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aicfgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckmbdh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hehafe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omeini32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpfebmia.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnqkjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpimbcnf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogddhmdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcmnaaji.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgkbfcck.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgdfgbhf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kioiffcn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amplklmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Igcjgk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qnpeijla.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaonji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqamla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baqhapdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jknicnpf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Komjmk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djeljd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkbcgnie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhaefepn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iencdc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcpcho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilmlfcel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aplkah32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jljeeqfn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjihci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfqiingf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmfgkh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agqfme32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpdpkfga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihdmld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idbgbahq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lomglo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdmbhnjj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbhmok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkgbcofn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddbolkac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdjceb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgildi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oknjmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pccahc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejfnda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihijhpdo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdhdlbpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ladpagin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkepnalk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfogneop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Malpee32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghpkbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpnkep32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbbegl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aofklbnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dajiok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajjinaco.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ammoel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bimbql32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Opccallb.exeOabplobe.exeOjpaeq32.exeOhengmcf.exePcmoie32.exePfnhkq32.exePbdipa32.exePeeabm32.exePmqffonj.exeQpaohjkk.exeAcohnhab.exeAinmlomf.exeAhcjmkbo.exeAicfgn32.exeAhhchk32.exeBaqhapdj.exeBpfebmia.exeBaealp32.exeBlobmm32.exeBeggec32.exeBlaobmkq.exeCpohhk32.exeClfhml32.exeCdamao32.exeCkmbdh32.exeCpjklo32.exeDjeljd32.exeDgildi32.exeDodahk32.exeDcbjni32.exeDkmncl32.exeEkpkhkji.exeEkbhnkhf.exeEgihcl32.exeEqamla32.exeEjiadgkl.exeEngjkeab.exeFblljhbo.exeFlfnhnfm.exeFijnabef.exeGhpkbn32.exeGahpkd32.exeGmoppefc.exeGmamfddp.exeGbnenk32.exeGmcikd32.exeGdmbhnjj.exeHijjpeha.exeHogcil32.exeHilgfe32.exeHlkcbp32.exeHahljg32.exeHhadgakg.exeHbghdj32.exeHdhdlbpk.exeHoniikpa.exeHehafe32.exeHkejnl32.exeIhijhpdo.exeIijfoh32.exeIdokma32.exeIgngim32.exeIdbgbahq.exeIecdji32.exepid process 2784 Opccallb.exe 2864 Oabplobe.exe 2936 Ojpaeq32.exe 2932 Ohengmcf.exe 2428 Pcmoie32.exe 944 Pfnhkq32.exe 2612 Pbdipa32.exe 2940 Peeabm32.exe 3008 Pmqffonj.exe 2776 Qpaohjkk.exe 2416 Acohnhab.exe 332 Ainmlomf.exe 2376 Ahcjmkbo.exe 1220 Aicfgn32.exe 2220 Ahhchk32.exe 2024 Baqhapdj.exe 584 Bpfebmia.exe 1748 Baealp32.exe 1464 Blobmm32.exe 2240 Beggec32.exe 1308 Blaobmkq.exe 236 Cpohhk32.exe 1668 Clfhml32.exe 2316 Cdamao32.exe 1440 Ckmbdh32.exe 2560 Cpjklo32.exe 1076 Djeljd32.exe 1532 Dgildi32.exe 2916 Dodahk32.exe 2700 Dcbjni32.exe 2740 Dkmncl32.exe 1456 Ekpkhkji.exe 1652 Ekbhnkhf.exe 2388 Egihcl32.exe 3000 Eqamla32.exe 2212 Ejiadgkl.exe 368 Engjkeab.exe 580 Fblljhbo.exe 1844 Flfnhnfm.exe 1916 Fijnabef.exe 1576 Ghpkbn32.exe 1328 Gahpkd32.exe 940 Gmoppefc.exe 2084 Gmamfddp.exe 1872 Gbnenk32.exe 904 Gmcikd32.exe 2772 Gdmbhnjj.exe 2140 Hijjpeha.exe 1436 Hogcil32.exe 1396 Hilgfe32.exe 2808 Hlkcbp32.exe 2976 Hahljg32.exe 2812 Hhadgakg.exe 2752 Hbghdj32.exe 1500 Hdhdlbpk.exe 1468 Honiikpa.exe 2344 Hehafe32.exe 1756 Hkejnl32.exe 688 Ihijhpdo.exe 2404 Iijfoh32.exe 1944 Idokma32.exe 1796 Igngim32.exe 1020 Idbgbahq.exe 1656 Iecdji32.exe -
Loads dropped DLL 64 IoCs
Processes:
441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exeOpccallb.exeOabplobe.exeOjpaeq32.exeOhengmcf.exePcmoie32.exePfnhkq32.exePbdipa32.exePeeabm32.exePmqffonj.exeQpaohjkk.exeAcohnhab.exeAinmlomf.exeAhcjmkbo.exeAicfgn32.exeAhhchk32.exeBaqhapdj.exeBpfebmia.exeBaealp32.exeBlobmm32.exeBeggec32.exeBlaobmkq.exeCpohhk32.exeClfhml32.exeCdamao32.exeCkmbdh32.exeDajgfboj.exeDjeljd32.exeDgildi32.exeDodahk32.exeDcbjni32.exeDkmncl32.exepid process 3032 441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe 3032 441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe 2784 Opccallb.exe 2784 Opccallb.exe 2864 Oabplobe.exe 2864 Oabplobe.exe 2936 Ojpaeq32.exe 2936 Ojpaeq32.exe 2932 Ohengmcf.exe 2932 Ohengmcf.exe 2428 Pcmoie32.exe 2428 Pcmoie32.exe 944 Pfnhkq32.exe 944 Pfnhkq32.exe 2612 Pbdipa32.exe 2612 Pbdipa32.exe 2940 Peeabm32.exe 2940 Peeabm32.exe 3008 Pmqffonj.exe 3008 Pmqffonj.exe 2776 Qpaohjkk.exe 2776 Qpaohjkk.exe 2416 Acohnhab.exe 2416 Acohnhab.exe 332 Ainmlomf.exe 332 Ainmlomf.exe 2376 Ahcjmkbo.exe 2376 Ahcjmkbo.exe 1220 Aicfgn32.exe 1220 Aicfgn32.exe 2220 Ahhchk32.exe 2220 Ahhchk32.exe 2024 Baqhapdj.exe 2024 Baqhapdj.exe 584 Bpfebmia.exe 584 Bpfebmia.exe 1748 Baealp32.exe 1748 Baealp32.exe 1464 Blobmm32.exe 1464 Blobmm32.exe 2240 Beggec32.exe 2240 Beggec32.exe 1308 Blaobmkq.exe 1308 Blaobmkq.exe 236 Cpohhk32.exe 236 Cpohhk32.exe 1668 Clfhml32.exe 1668 Clfhml32.exe 2316 Cdamao32.exe 2316 Cdamao32.exe 1440 Ckmbdh32.exe 1440 Ckmbdh32.exe 2920 Dajgfboj.exe 2920 Dajgfboj.exe 1076 Djeljd32.exe 1076 Djeljd32.exe 1532 Dgildi32.exe 1532 Dgildi32.exe 2916 Dodahk32.exe 2916 Dodahk32.exe 2700 Dcbjni32.exe 2700 Dcbjni32.exe 2740 Dkmncl32.exe 2740 Dkmncl32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kdjceb32.exeKdlpkb32.exeOpebpdad.exeBneancnc.exeCapmemci.exeDooqceid.exeDdbolkac.exeNoplmlok.exeAialjgbh.exeBjgbmoda.exeBmhkojab.exeHkejnl32.exePdndggcl.exeHffjng32.exeNkbcgnie.exeBmoaoikj.exeJfhmehji.exeJqfhqe32.exeFqkieogp.exeDkmncl32.exeHogcil32.exeHbghdj32.exeIdbgbahq.exeMalpee32.exeBpkqfdmp.exeOjfcdo32.exeAebjaj32.exeJpnkep32.exeJgmlmj32.exeEnkdda32.exeFgcdlj32.exeIencdc32.exeMajcoepi.exeHilgfe32.exeIhijhpdo.exeMoccnoni.exeGbnenk32.exeNmogpj32.exeElejqm32.exeKfdfdf32.exeBedcembk.exeDdliklgk.exeFmgcepio.exeIgcjgk32.exeEqamla32.exeFijnabef.exeIpkema32.exePipjpj32.exeMcfbfaao.exeOnlooh32.exeDpdpkfga.exeClnhajlc.exeBpfebmia.exeDodahk32.exeKikokf32.exeGmoppefc.exeOknjmb32.exeCddlpg32.exeKjihci32.exedescription ioc process File created C:\Windows\SysWOW64\Kdlpkb32.exe Kdjceb32.exe File opened for modification C:\Windows\SysWOW64\Kdlpkb32.exe Kdjceb32.exe File created C:\Windows\SysWOW64\Kjihci32.exe Kdlpkb32.exe File opened for modification C:\Windows\SysWOW64\Ollcee32.exe Opebpdad.exe File created C:\Windows\SysWOW64\Bepjjn32.exe Bneancnc.exe File created C:\Windows\SysWOW64\Cmfnjnin.exe Capmemci.exe File created C:\Windows\SysWOW64\Dbfknmkp.dll Dooqceid.exe File opened for modification C:\Windows\SysWOW64\Enkdda32.exe Ddbolkac.exe File opened for modification C:\Windows\SysWOW64\Omeini32.exe Noplmlok.exe File opened for modification C:\Windows\SysWOW64\Aalaoipc.exe Aialjgbh.exe File opened for modification C:\Windows\SysWOW64\Bgkbfcck.exe Bjgbmoda.exe File created C:\Windows\SysWOW64\Lgddiilp.dll Bmhkojab.exe File opened for modification C:\Windows\SysWOW64\Ihijhpdo.exe Hkejnl32.exe File created C:\Windows\SysWOW64\Fnklgh32.dll Pdndggcl.exe File created C:\Windows\SysWOW64\Hpoofm32.exe Hffjng32.exe File created C:\Windows\SysWOW64\Neghdg32.exe Nkbcgnie.exe File opened for modification C:\Windows\SysWOW64\Cpmmkdkn.exe Bmoaoikj.exe File opened for modification C:\Windows\SysWOW64\Jaonji32.exe Jfhmehji.exe File opened for modification C:\Windows\SysWOW64\Jbedkhie.exe Jqfhqe32.exe File opened for modification C:\Windows\SysWOW64\Cmfnjnin.exe Capmemci.exe File created C:\Windows\SysWOW64\Ioienjgm.dll Fqkieogp.exe File created C:\Windows\SysWOW64\Ekpkhkji.exe Dkmncl32.exe File opened for modification C:\Windows\SysWOW64\Hilgfe32.exe Hogcil32.exe File created C:\Windows\SysWOW64\Hdhdlbpk.exe Hbghdj32.exe File created C:\Windows\SysWOW64\Mcgiogam.dll Idbgbahq.exe File opened for modification C:\Windows\SysWOW64\Mmcpjfcj.exe Malpee32.exe File opened for modification C:\Windows\SysWOW64\Bmoaoikj.exe Bpkqfdmp.exe File created C:\Windows\SysWOW64\Pqplqile.exe Ojfcdo32.exe File created C:\Windows\SysWOW64\Bijnecld.dll Aebjaj32.exe File created C:\Windows\SysWOW64\Jnbkodci.exe Jpnkep32.exe File opened for modification C:\Windows\SysWOW64\Jljeeqfn.exe Jgmlmj32.exe File created C:\Windows\SysWOW64\Egchmfnd.exe Enkdda32.exe File created C:\Windows\SysWOW64\Miafbgjl.dll Fgcdlj32.exe File opened for modification C:\Windows\SysWOW64\Ilhlan32.exe Iencdc32.exe File opened for modification C:\Windows\SysWOW64\Malpee32.exe Majcoepi.exe File opened for modification C:\Windows\SysWOW64\Hlkcbp32.exe Hilgfe32.exe File created C:\Windows\SysWOW64\Iijfoh32.exe Ihijhpdo.exe File created C:\Windows\SysWOW64\Bfnihd32.dll Moccnoni.exe File created C:\Windows\SysWOW64\Njaagp32.dll Ojfcdo32.exe File opened for modification C:\Windows\SysWOW64\Gmcikd32.exe Gbnenk32.exe File created C:\Windows\SysWOW64\Oklmhcdf.exe Nmogpj32.exe File created C:\Windows\SysWOW64\Kgqlke32.dll Elejqm32.exe File created C:\Windows\SysWOW64\Komjmk32.exe Kfdfdf32.exe File opened for modification C:\Windows\SysWOW64\Blnkbg32.exe Bedcembk.exe File created C:\Windows\SysWOW64\Dkeahf32.exe Ddliklgk.exe File opened for modification C:\Windows\SysWOW64\Gfogneop.exe Fmgcepio.exe File opened for modification C:\Windows\SysWOW64\Jkabmi32.exe Igcjgk32.exe File created C:\Windows\SysWOW64\Ejiadgkl.exe Eqamla32.exe File created C:\Windows\SysWOW64\Ghpkbn32.exe Fijnabef.exe File opened for modification C:\Windows\SysWOW64\Jfhmehji.exe Ipkema32.exe File created C:\Windows\SysWOW64\Pcenmcea.exe Pipjpj32.exe File created C:\Windows\SysWOW64\Majcoepi.exe Mcfbfaao.exe File created C:\Windows\SysWOW64\Ogddhmdl.exe Onlooh32.exe File created C:\Windows\SysWOW64\Dilddl32.exe Dpdpkfga.exe File created C:\Windows\SysWOW64\Defljp32.exe Clnhajlc.exe File created C:\Windows\SysWOW64\Jhenggfi.dll Majcoepi.exe File created C:\Windows\SysWOW64\Mjhdbb32.dll Bpfebmia.exe File created C:\Windows\SysWOW64\Lklfdlbn.dll Dodahk32.exe File opened for modification C:\Windows\SysWOW64\Ejiadgkl.exe Eqamla32.exe File created C:\Windows\SysWOW64\Kcpcho32.exe Kikokf32.exe File created C:\Windows\SysWOW64\Gmamfddp.exe Gmoppefc.exe File created C:\Windows\SysWOW64\Mbggjj32.dll Oknjmb32.exe File opened for modification C:\Windows\SysWOW64\Dhaefepn.exe Cddlpg32.exe File created C:\Windows\SysWOW64\Bklomf32.dll Kjihci32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3548 3388 WerFault.exe Eceimadb.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Ahcjmkbo.exeIijfoh32.exeMfqiingf.exeJcocgkbp.exeMalpee32.exeHhadgakg.exeOpebpdad.exePhhmeehg.exeOhengmcf.exeKggfnoch.exePfoanp32.exeJgmlmj32.exeGhpkbn32.exeHogcil32.exeMejoei32.exeKdlpkb32.exeAialjgbh.exeEngjkeab.exeJkgbcofn.exeBppdlgjk.exeGmlmpo32.exeBpfebmia.exeHkejnl32.exeOhdglfoj.exeEoajgh32.exeOgddhmdl.exeEqamla32.exeIhijhpdo.exeFcoolj32.exeDajiok32.exeGfadcemm.exeHffjng32.exeQnalcqpm.exeEfmoib32.exeKfdfdf32.exeKobkbaac.exeAoihaa32.exeBphdpe32.exePfnhkq32.exeLbhmok32.exeNahfkigd.exeAplkah32.exeClnhajlc.exeQnpeijla.exeCbpcbo32.exeEceimadb.exeDjeljd32.exeIpkema32.exeAjapoqmf.exeEgchmfnd.exeFblljhbo.exeBgkbfcck.exeCddlpg32.exeAhhchk32.exeOklmhcdf.exeDpdfemkm.exeAinmlomf.exeKqmnadlk.exeBedcembk.exeDdbolkac.exeAaondi32.exeEkbhnkhf.exePkepnalk.exeAmplklmj.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahcjmkbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iijfoh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfqiingf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcocgkbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Malpee32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhadgakg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opebpdad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phhmeehg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohengmcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kggfnoch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfoanp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgmlmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghpkbn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hogcil32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mejoei32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdlpkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aialjgbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Engjkeab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkgbcofn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bppdlgjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmlmpo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpfebmia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkejnl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohdglfoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eoajgh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogddhmdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eqamla32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihijhpdo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcoolj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dajiok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfadcemm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hffjng32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnalcqpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efmoib32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfdfdf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kobkbaac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aoihaa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bphdpe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfnhkq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbhmok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nahfkigd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aplkah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clnhajlc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnpeijla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbpcbo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eceimadb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djeljd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ipkema32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajapoqmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Egchmfnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fblljhbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgkbfcck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cddlpg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahhchk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oklmhcdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpdfemkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ainmlomf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqmnadlk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bedcembk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddbolkac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aaondi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekbhnkhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkepnalk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amplklmj.exe -
Modifies registry class 64 IoCs
Processes:
Keappgmg.exeOhdglfoj.exeBnhncclq.exeAcohnhab.exeAicfgn32.exeFijnabef.exeHbghdj32.exeJfhmehji.exeCedpdpdf.exeKdjceb32.exeGahpkd32.exeMiaaki32.exeMidnqh32.exeKfdfdf32.exeQmahog32.exeJllakpdk.exePbdipa32.exeLnqkjl32.exeCppakj32.exeEbdoocdk.exeJljeeqfn.exeDpdfemkm.exeOhjmlaci.exeBlobmm32.exeFblljhbo.exeKqkalenn.exeOjfcdo32.exeAmplklmj.exeMalpee32.exeNbbegl32.exeHogcil32.exeIgngim32.exeOnocon32.exeFkldgi32.exePhhmeehg.exeAofklbnj.exeJcocgkbp.exeGbnenk32.exeMdplfflp.exePfoanp32.exeBneancnc.exeDdliklgk.exeDdbolkac.exeHpoofm32.exeQpaohjkk.exeCkmbdh32.exeHahljg32.exeLgabgl32.exeAaondi32.exeCapmemci.exeGfadcemm.exeNlmffa32.exeHehafe32.exeKikokf32.exeMonjcp32.exeMoccnoni.exeAjjinaco.exePanehkaj.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Keappgmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ohdglfoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Piffca32.dll" Bnhncclq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acohnhab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khfhio32.dll" Aicfgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fijnabef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hbghdj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfhmehji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipghcl32.dll" Cedpdpdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdjceb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmdfje32.dll" Gahpkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Miaaki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Midnqh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfdfdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Biepbeqa.dll" Qmahog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jllakpdk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbdipa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnqkjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlcjoc32.dll" Cppakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebdoocdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgdomige.dll" Jljeeqfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cppakj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpdfemkm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ohjmlaci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbmamh32.dll" Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hilkhl32.dll" Fblljhbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qbbbol32.dll" Kqkalenn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojfcdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amplklmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jljeeqfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Malpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hipdajoc.dll" Nbbegl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dngbdiei.dll" Hogcil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njlekk32.dll" Igngim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kqkalenn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Onocon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkldgi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phhmeehg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdinjj32.dll" Aofklbnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fejhdhpb.dll" Jcocgkbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbnenk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdplfflp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfoanp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bneancnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogmmfl32.dll" Bneancnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddliklgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldchnbji.dll" Ddbolkac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpoofm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcming32.dll" Pbdipa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qpaohjkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckmbdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffffpb32.dll" Hahljg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnhncclq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgabgl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aaondi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opqcibco.dll" Capmemci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkihmn32.dll" Gfadcemm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlmffa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhalab32.dll" Hehafe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caolfcmm.dll" Kikokf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikcpoa32.dll" Monjcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Moccnoni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajjinaco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajdnie32.dll" Panehkaj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exeOpccallb.exeOabplobe.exeOjpaeq32.exeOhengmcf.exePcmoie32.exePfnhkq32.exePbdipa32.exePeeabm32.exePmqffonj.exeQpaohjkk.exeAcohnhab.exeAinmlomf.exeAhcjmkbo.exeAicfgn32.exeAhhchk32.exedescription pid process target process PID 3032 wrote to memory of 2784 3032 441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe Opccallb.exe PID 3032 wrote to memory of 2784 3032 441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe Opccallb.exe PID 3032 wrote to memory of 2784 3032 441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe Opccallb.exe PID 3032 wrote to memory of 2784 3032 441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe Opccallb.exe PID 2784 wrote to memory of 2864 2784 Opccallb.exe Oabplobe.exe PID 2784 wrote to memory of 2864 2784 Opccallb.exe Oabplobe.exe PID 2784 wrote to memory of 2864 2784 Opccallb.exe Oabplobe.exe PID 2784 wrote to memory of 2864 2784 Opccallb.exe Oabplobe.exe PID 2864 wrote to memory of 2936 2864 Oabplobe.exe Ojpaeq32.exe PID 2864 wrote to memory of 2936 2864 Oabplobe.exe Ojpaeq32.exe PID 2864 wrote to memory of 2936 2864 Oabplobe.exe Ojpaeq32.exe PID 2864 wrote to memory of 2936 2864 Oabplobe.exe Ojpaeq32.exe PID 2936 wrote to memory of 2932 2936 Ojpaeq32.exe Ohengmcf.exe PID 2936 wrote to memory of 2932 2936 Ojpaeq32.exe Ohengmcf.exe PID 2936 wrote to memory of 2932 2936 Ojpaeq32.exe Ohengmcf.exe PID 2936 wrote to memory of 2932 2936 Ojpaeq32.exe Ohengmcf.exe PID 2932 wrote to memory of 2428 2932 Ohengmcf.exe Pcmoie32.exe PID 2932 wrote to memory of 2428 2932 Ohengmcf.exe Pcmoie32.exe PID 2932 wrote to memory of 2428 2932 Ohengmcf.exe Pcmoie32.exe PID 2932 wrote to memory of 2428 2932 Ohengmcf.exe Pcmoie32.exe PID 2428 wrote to memory of 944 2428 Pcmoie32.exe Pfnhkq32.exe PID 2428 wrote to memory of 944 2428 Pcmoie32.exe Pfnhkq32.exe PID 2428 wrote to memory of 944 2428 Pcmoie32.exe Pfnhkq32.exe PID 2428 wrote to memory of 944 2428 Pcmoie32.exe Pfnhkq32.exe PID 944 wrote to memory of 2612 944 Pfnhkq32.exe Pbdipa32.exe PID 944 wrote to memory of 2612 944 Pfnhkq32.exe Pbdipa32.exe PID 944 wrote to memory of 2612 944 Pfnhkq32.exe Pbdipa32.exe PID 944 wrote to memory of 2612 944 Pfnhkq32.exe Pbdipa32.exe PID 2612 wrote to memory of 2940 2612 Pbdipa32.exe Peeabm32.exe PID 2612 wrote to memory of 2940 2612 Pbdipa32.exe Peeabm32.exe PID 2612 wrote to memory of 2940 2612 Pbdipa32.exe Peeabm32.exe PID 2612 wrote to memory of 2940 2612 Pbdipa32.exe Peeabm32.exe PID 2940 wrote to memory of 3008 2940 Peeabm32.exe Pmqffonj.exe PID 2940 wrote to memory of 3008 2940 Peeabm32.exe Pmqffonj.exe PID 2940 wrote to memory of 3008 2940 Peeabm32.exe Pmqffonj.exe PID 2940 wrote to memory of 3008 2940 Peeabm32.exe Pmqffonj.exe PID 3008 wrote to memory of 2776 3008 Pmqffonj.exe Qpaohjkk.exe PID 3008 wrote to memory of 2776 3008 Pmqffonj.exe Qpaohjkk.exe PID 3008 wrote to memory of 2776 3008 Pmqffonj.exe Qpaohjkk.exe PID 3008 wrote to memory of 2776 3008 Pmqffonj.exe Qpaohjkk.exe PID 2776 wrote to memory of 2416 2776 Qpaohjkk.exe Acohnhab.exe PID 2776 wrote to memory of 2416 2776 Qpaohjkk.exe Acohnhab.exe PID 2776 wrote to memory of 2416 2776 Qpaohjkk.exe Acohnhab.exe PID 2776 wrote to memory of 2416 2776 Qpaohjkk.exe Acohnhab.exe PID 2416 wrote to memory of 332 2416 Acohnhab.exe Ainmlomf.exe PID 2416 wrote to memory of 332 2416 Acohnhab.exe Ainmlomf.exe PID 2416 wrote to memory of 332 2416 Acohnhab.exe Ainmlomf.exe PID 2416 wrote to memory of 332 2416 Acohnhab.exe Ainmlomf.exe PID 332 wrote to memory of 2376 332 Ainmlomf.exe Ahcjmkbo.exe PID 332 wrote to memory of 2376 332 Ainmlomf.exe Ahcjmkbo.exe PID 332 wrote to memory of 2376 332 Ainmlomf.exe Ahcjmkbo.exe PID 332 wrote to memory of 2376 332 Ainmlomf.exe Ahcjmkbo.exe PID 2376 wrote to memory of 1220 2376 Ahcjmkbo.exe Aicfgn32.exe PID 2376 wrote to memory of 1220 2376 Ahcjmkbo.exe Aicfgn32.exe PID 2376 wrote to memory of 1220 2376 Ahcjmkbo.exe Aicfgn32.exe PID 2376 wrote to memory of 1220 2376 Ahcjmkbo.exe Aicfgn32.exe PID 1220 wrote to memory of 2220 1220 Aicfgn32.exe Ahhchk32.exe PID 1220 wrote to memory of 2220 1220 Aicfgn32.exe Ahhchk32.exe PID 1220 wrote to memory of 2220 1220 Aicfgn32.exe Ahhchk32.exe PID 1220 wrote to memory of 2220 1220 Aicfgn32.exe Ahhchk32.exe PID 2220 wrote to memory of 2024 2220 Ahhchk32.exe Baqhapdj.exe PID 2220 wrote to memory of 2024 2220 Ahhchk32.exe Baqhapdj.exe PID 2220 wrote to memory of 2024 2220 Ahhchk32.exe Baqhapdj.exe PID 2220 wrote to memory of 2024 2220 Ahhchk32.exe Baqhapdj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe"C:\Users\Admin\AppData\Local\Temp\441836b571dc4c9fc8b33e050ab357041df4f01ba8e20dc1a1a1c3b59109fad0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Opccallb.exeC:\Windows\system32\Opccallb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Oabplobe.exeC:\Windows\system32\Oabplobe.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Ojpaeq32.exeC:\Windows\system32\Ojpaeq32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Ohengmcf.exeC:\Windows\system32\Ohengmcf.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Pcmoie32.exeC:\Windows\system32\Pcmoie32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\Pfnhkq32.exeC:\Windows\system32\Pfnhkq32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\Pbdipa32.exeC:\Windows\system32\Pbdipa32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\Peeabm32.exeC:\Windows\system32\Peeabm32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\Pmqffonj.exeC:\Windows\system32\Pmqffonj.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Qpaohjkk.exeC:\Windows\system32\Qpaohjkk.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\Acohnhab.exeC:\Windows\system32\Acohnhab.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\Ainmlomf.exeC:\Windows\system32\Ainmlomf.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\Ahcjmkbo.exeC:\Windows\system32\Ahcjmkbo.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Aicfgn32.exeC:\Windows\system32\Aicfgn32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\Ahhchk32.exeC:\Windows\system32\Ahhchk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Baqhapdj.exeC:\Windows\system32\Baqhapdj.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Windows\SysWOW64\Bpfebmia.exeC:\Windows\system32\Bpfebmia.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:584 -
C:\Windows\SysWOW64\Baealp32.exeC:\Windows\system32\Baealp32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Windows\SysWOW64\Blobmm32.exeC:\Windows\system32\Blobmm32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1464 -
C:\Windows\SysWOW64\Beggec32.exeC:\Windows\system32\Beggec32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Windows\SysWOW64\Blaobmkq.exeC:\Windows\system32\Blaobmkq.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Windows\SysWOW64\Cpohhk32.exeC:\Windows\system32\Cpohhk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:236 -
C:\Windows\SysWOW64\Clfhml32.exeC:\Windows\system32\Clfhml32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Windows\SysWOW64\Cdamao32.exeC:\Windows\system32\Cdamao32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Windows\SysWOW64\Ckmbdh32.exeC:\Windows\system32\Ckmbdh32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1440 -
C:\Windows\SysWOW64\Cpjklo32.exeC:\Windows\system32\Cpjklo32.exe27⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\SysWOW64\Dajgfboj.exeC:\Windows\system32\Dajgfboj.exe28⤵
- Loads dropped DLL
PID:2920 -
C:\Windows\SysWOW64\Djeljd32.exeC:\Windows\system32\Djeljd32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\Dgildi32.exeC:\Windows\system32\Dgildi32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1532 -
C:\Windows\SysWOW64\Dodahk32.exeC:\Windows\system32\Dodahk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\Dcbjni32.exeC:\Windows\system32\Dcbjni32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2700 -
C:\Windows\SysWOW64\Dkmncl32.exeC:\Windows\system32\Dkmncl32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\Ekpkhkji.exeC:\Windows\system32\Ekpkhkji.exe34⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\Ekbhnkhf.exeC:\Windows\system32\Ekbhnkhf.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\Egihcl32.exeC:\Windows\system32\Egihcl32.exe36⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\Eqamla32.exeC:\Windows\system32\Eqamla32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\Ejiadgkl.exeC:\Windows\system32\Ejiadgkl.exe38⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\Engjkeab.exeC:\Windows\system32\Engjkeab.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:368 -
C:\Windows\SysWOW64\Fblljhbo.exeC:\Windows\system32\Fblljhbo.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:580 -
C:\Windows\SysWOW64\Flfnhnfm.exeC:\Windows\system32\Flfnhnfm.exe41⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\Fijnabef.exeC:\Windows\system32\Fijnabef.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1916 -
C:\Windows\SysWOW64\Ghpkbn32.exeC:\Windows\system32\Ghpkbn32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\Gahpkd32.exeC:\Windows\system32\Gahpkd32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:1328 -
C:\Windows\SysWOW64\Gmoppefc.exeC:\Windows\system32\Gmoppefc.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:940 -
C:\Windows\SysWOW64\Gmamfddp.exeC:\Windows\system32\Gmamfddp.exe46⤵
- Executes dropped EXE
PID:2084 -
C:\Windows\SysWOW64\Gbnenk32.exeC:\Windows\system32\Gbnenk32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1872 -
C:\Windows\SysWOW64\Gmcikd32.exeC:\Windows\system32\Gmcikd32.exe48⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Gdmbhnjj.exeC:\Windows\system32\Gdmbhnjj.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2772 -
C:\Windows\SysWOW64\Hijjpeha.exeC:\Windows\system32\Hijjpeha.exe50⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\Hogcil32.exeC:\Windows\system32\Hogcil32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1436 -
C:\Windows\SysWOW64\Hilgfe32.exeC:\Windows\system32\Hilgfe32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1396 -
C:\Windows\SysWOW64\Hlkcbp32.exeC:\Windows\system32\Hlkcbp32.exe53⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Hahljg32.exeC:\Windows\system32\Hahljg32.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2976 -
C:\Windows\SysWOW64\Hhadgakg.exeC:\Windows\system32\Hhadgakg.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\Hbghdj32.exeC:\Windows\system32\Hbghdj32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Hdhdlbpk.exeC:\Windows\system32\Hdhdlbpk.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\Honiikpa.exeC:\Windows\system32\Honiikpa.exe58⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\Hehafe32.exeC:\Windows\system32\Hehafe32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Hkejnl32.exeC:\Windows\system32\Hkejnl32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\Ihijhpdo.exeC:\Windows\system32\Ihijhpdo.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:688 -
C:\Windows\SysWOW64\Iijfoh32.exeC:\Windows\system32\Iijfoh32.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\Idokma32.exeC:\Windows\system32\Idokma32.exe63⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\SysWOW64\Igngim32.exeC:\Windows\system32\Igngim32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Idbgbahq.exeC:\Windows\system32\Idbgbahq.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1020 -
C:\Windows\SysWOW64\Iecdji32.exeC:\Windows\system32\Iecdji32.exe66⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Ilmlfcel.exeC:\Windows\system32\Ilmlfcel.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1648 -
C:\Windows\SysWOW64\Ihdmld32.exeC:\Windows\system32\Ihdmld32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1708 -
C:\Windows\SysWOW64\Ipkema32.exeC:\Windows\system32\Ipkema32.exe69⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\Jfhmehji.exeC:\Windows\system32\Jfhmehji.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\Jaonji32.exeC:\Windows\system32\Jaonji32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2832 -
C:\Windows\SysWOW64\Jkgbcofn.exeC:\Windows\system32\Jkgbcofn.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\Jhkclc32.exeC:\Windows\system32\Jhkclc32.exe73⤵PID:2964
-
C:\Windows\SysWOW64\Jqfhqe32.exeC:\Windows\system32\Jqfhqe32.exe74⤵
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\Jbedkhie.exeC:\Windows\system32\Jbedkhie.exe75⤵PID:1768
-
C:\Windows\SysWOW64\Jknicnpf.exeC:\Windows\system32\Jknicnpf.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2188 -
C:\Windows\SysWOW64\Kqkalenn.exeC:\Windows\system32\Kqkalenn.exe77⤵
- Modifies registry class
PID:3036 -
C:\Windows\SysWOW64\Kfgjdlme.exeC:\Windows\system32\Kfgjdlme.exe78⤵PID:1564
-
C:\Windows\SysWOW64\Kqmnadlk.exeC:\Windows\system32\Kqmnadlk.exe79⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\Kggfnoch.exeC:\Windows\system32\Kggfnoch.exe80⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\Kobkbaac.exeC:\Windows\system32\Kobkbaac.exe81⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\Kikokf32.exeC:\Windows\system32\Kikokf32.exe82⤵
- Drops file in System32 directory
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Kcpcho32.exeC:\Windows\system32\Kcpcho32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:700 -
C:\Windows\SysWOW64\Keappgmg.exeC:\Windows\system32\Keappgmg.exe84⤵
- Modifies registry class
PID:1252 -
C:\Windows\SysWOW64\Kbeqjl32.exeC:\Windows\system32\Kbeqjl32.exe85⤵PID:2232
-
C:\Windows\SysWOW64\Kioiffcn.exeC:\Windows\system32\Kioiffcn.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2236 -
C:\Windows\SysWOW64\Lbhmok32.exeC:\Windows\system32\Lbhmok32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\Lgdfgbhf.exeC:\Windows\system32\Lgdfgbhf.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2824 -
C:\Windows\SysWOW64\Lbjjekhl.exeC:\Windows\system32\Lbjjekhl.exe89⤵PID:2712
-
C:\Windows\SysWOW64\Lggbmbfc.exeC:\Windows\system32\Lggbmbfc.exe90⤵PID:2704
-
C:\Windows\SysWOW64\Lnqkjl32.exeC:\Windows\system32\Lnqkjl32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Lmfgkh32.exeC:\Windows\system32\Lmfgkh32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2068 -
C:\Windows\SysWOW64\Ljjhdm32.exeC:\Windows\system32\Ljjhdm32.exe93⤵PID:3004
-
C:\Windows\SysWOW64\Ladpagin.exeC:\Windows\system32\Ladpagin.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2196 -
C:\Windows\SysWOW64\Mfqiingf.exeC:\Windows\system32\Mfqiingf.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:560 -
C:\Windows\SysWOW64\Mioeeifi.exeC:\Windows\system32\Mioeeifi.exe96⤵PID:572
-
C:\Windows\SysWOW64\Mpimbcnf.exeC:\Windows\system32\Mpimbcnf.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:976 -
C:\Windows\SysWOW64\Miaaki32.exeC:\Windows\system32\Miaaki32.exe98⤵
- Modifies registry class
PID:2136 -
C:\Windows\SysWOW64\Monjcp32.exeC:\Windows\system32\Monjcp32.exe99⤵
- Modifies registry class
PID:2028 -
C:\Windows\SysWOW64\Midnqh32.exeC:\Windows\system32\Midnqh32.exe100⤵
- Modifies registry class
PID:2260 -
C:\Windows\SysWOW64\Moqgiopk.exeC:\Windows\system32\Moqgiopk.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:884 -
C:\Windows\SysWOW64\Mejoei32.exeC:\Windows\system32\Mejoei32.exe102⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\Moccnoni.exeC:\Windows\system32\Moccnoni.exe103⤵
- Drops file in System32 directory
- Modifies registry class
PID:2732 -
C:\Windows\SysWOW64\Mdplfflp.exeC:\Windows\system32\Mdplfflp.exe104⤵
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\Nhnemdbf.exeC:\Windows\system32\Nhnemdbf.exe105⤵PID:2608
-
C:\Windows\SysWOW64\Nmjmekan.exeC:\Windows\system32\Nmjmekan.exe106⤵PID:1280
-
C:\Windows\SysWOW64\Nahfkigd.exeC:\Windows\system32\Nahfkigd.exe107⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\Nmogpj32.exeC:\Windows\system32\Nmogpj32.exe108⤵
- Drops file in System32 directory
PID:1840 -
C:\Windows\SysWOW64\Oklmhcdf.exeC:\Windows\system32\Oklmhcdf.exe109⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\Oknjmb32.exeC:\Windows\system32\Oknjmb32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2644 -
C:\Windows\SysWOW64\Ohbjgg32.exeC:\Windows\system32\Ohbjgg32.exe111⤵PID:2564
-
C:\Windows\SysWOW64\Onocon32.exeC:\Windows\system32\Onocon32.exe112⤵
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Ohdglfoj.exeC:\Windows\system32\Ohdglfoj.exe113⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2872 -
C:\Windows\SysWOW64\Ojfcdo32.exeC:\Windows\system32\Ojfcdo32.exe114⤵
- Drops file in System32 directory
- Modifies registry class
PID:1508 -
C:\Windows\SysWOW64\Pqplqile.exeC:\Windows\system32\Pqplqile.exe115⤵PID:2748
-
C:\Windows\SysWOW64\Pkepnalk.exeC:\Windows\system32\Pkepnalk.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1120 -
C:\Windows\SysWOW64\Pdndggcl.exeC:\Windows\system32\Pdndggcl.exe117⤵
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\Pfoanp32.exeC:\Windows\system32\Pfoanp32.exe118⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2176 -
C:\Windows\SysWOW64\Pccahc32.exeC:\Windows\system32\Pccahc32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1956 -
C:\Windows\SysWOW64\Pipjpj32.exeC:\Windows\system32\Pipjpj32.exe120⤵
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\Pcenmcea.exeC:\Windows\system32\Pcenmcea.exe121⤵PID:1044
-
C:\Windows\SysWOW64\Pkpcbecl.exeC:\Windows\system32\Pkpcbecl.exe122⤵PID:1340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-