Analysis
-
max time kernel
95s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exe
Resource
win10v2004-20241007-en
General
-
Target
d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exe
-
Size
163KB
-
MD5
9ef6c19942fe9e065aa5fe03c871345a
-
SHA1
a2d891ff7f38d866cdf426196c1a3e321261f637
-
SHA256
d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb
-
SHA512
a2b0fda4f6a2c505bb93d518c79b149d24ca6cf3e4460bdbaac2a96e6715f654a23e06ff27c494ba1b6e648df25340d78f87da40cde7a82fe780039c58e0b460
-
SSDEEP
3072:3jMnO+Wjsunr52gK6CdltOrWKDBr+yJb:zMnOvs62gKpdLOf
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fkggekgm.exeKglamd32.exeLlqhlglf.exeAoeclmpc.exeFifhjjed.exeKlmghb32.exeBichjhfj.exeObpmopdb.exeIoljfe32.exeMfbdmi32.exeBbpocfej.exeGimojipl.exePfpilpio.exeObefjo32.exeFimeclno.exeJjadhk32.exeBoiobpdf.exeHlfchmaf.exeDaojeh32.exeKgqdmmil.exeKdmgllkb.exeJphieo32.exeLdfjbkbg.exeGkniiinf.exeDhndel32.exeGkmbob32.exeJchklcdi.exeOmdgob32.exeBkopfmce.exeBfinoe32.exeFdipacgl.exeMqhchdjb.exeNqojic32.exeGbahibqg.exePpqdni32.exeObbjdp32.exeEomdpajj.exeDhlgpljo.exeEdgapl32.exeHaefmk32.exeIpgpnaif.exeKnfjinhj.exeKqchqmpf.exeQhlqih32.exeLkeljdfo.exeHbchjgfq.exePfhckq32.exeNghfof32.exeEolmek32.exeHieclk32.exeAkofpchm.exeFgenkkgj.exePlpobk32.exePlbkhkfc.exeDpdhdheq.exeHlfmmfmk.exeKjfldmgp.exeDdkilc32.exeJmdlcnli.exeCpcnpf32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkggekgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kglamd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llqhlglf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aoeclmpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fifhjjed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klmghb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bichjhfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obpmopdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioljfe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfbdmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbpocfej.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gimojipl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfpilpio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obefjo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fimeclno.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjadhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boiobpdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlfchmaf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daojeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgqdmmil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdmgllkb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jphieo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldfjbkbg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkniiinf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhndel32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkmbob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jchklcdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omdgob32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkopfmce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfinoe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdipacgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqhchdjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqojic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbahibqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppqdni32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhndel32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obbjdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eomdpajj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhlgpljo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edgapl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Haefmk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipgpnaif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knfjinhj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kqchqmpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhlqih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkeljdfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbchjgfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfhckq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nghfof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eolmek32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hieclk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fimeclno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akofpchm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fifhjjed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgenkkgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plpobk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plbkhkfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpdhdheq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlfmmfmk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjfldmgp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddkilc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmdlcnli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llqhlglf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpcnpf32.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 3 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Acmllbpm.exe family_bruteratel C:\Windows\SysWOW64\Jjadhk32.exe family_bruteratel C:\Windows\SysWOW64\Nabdcoio.exe family_bruteratel -
Gozi family
-
Executes dropped EXE 64 IoCs
Processes:
Fkgbijdn.exeFaqkedkk.exeFelgfb32.exeGeoclb32.exeGhmphn32.exeGoghdhhb.exeGnjhpd32.exeGhommmob.exeGkniiinf.exeGhbicmmp.exeGdhjhnbd.exeGonnegbj.exeHfhfba32.exeHhfbnl32.exeHkeojh32.exeHboggbok.exeHhioclgg.exeHkglpgfk.exeHgnldh32.exeHnhdabcl.exeHgpijhim.exeHnjagb32.exeHgbfphgj.exeIfdfno32.exeIgebegeg.exeIoljfe32.exeIffbcomf.exeInaggaka.exeIdkpdk32.exeIncdma32.exeIdnljkpl.exeIkgdfe32.exeIbamcooe.exeIkjale32.exeJbdiio32.exeJebfej32.exeJnkjnpbg.exeJedbjj32.exeJkokgdaq.exeJbhcdnim.exeJgeklege.exeJffljm32.exeJiehfh32.exeJpopcbfd.exeJbmloneh.exeJigdlhle.exeKndmdojl.exeKfkeelko.exeKglamd32.exeKnfjinhj.exeKepbfh32.exeKpffcapl.exeKbdbpmop.exeKebolhnd.exeKlmghb32.exeKbgoelmm.exeKiqgbf32.exeKpkpoq32.exeKfdhkkcd.exeKicdgfbg.exeLpmldp32.exeLejelg32.exeLlcmia32.exeLnbiem32.exepid process 764 Fkgbijdn.exe 3736 Faqkedkk.exe 1676 Felgfb32.exe 4576 Geoclb32.exe 1716 Ghmphn32.exe 4672 Goghdhhb.exe 2960 Gnjhpd32.exe 3364 Ghommmob.exe 5040 Gkniiinf.exe 4568 Ghbicmmp.exe 4596 Gdhjhnbd.exe 2632 Gonnegbj.exe 2884 Hfhfba32.exe 5028 Hhfbnl32.exe 4000 Hkeojh32.exe 1920 Hboggbok.exe 232 Hhioclgg.exe 4168 Hkglpgfk.exe 2012 Hgnldh32.exe 1588 Hnhdabcl.exe 1312 Hgpijhim.exe 5072 Hnjagb32.exe 3952 Hgbfphgj.exe 3180 Ifdfno32.exe 1632 Igebegeg.exe 1448 Ioljfe32.exe 4584 Iffbcomf.exe 2280 Inaggaka.exe 1836 Idkpdk32.exe 3676 Incdma32.exe 4372 Idnljkpl.exe 2736 Ikgdfe32.exe 2536 Ibamcooe.exe 2864 Ikjale32.exe 1092 Jbdiio32.exe 4696 Jebfej32.exe 1020 Jnkjnpbg.exe 376 Jedbjj32.exe 3616 Jkokgdaq.exe 3996 Jbhcdnim.exe 2320 Jgeklege.exe 2188 Jffljm32.exe 2824 Jiehfh32.exe 5108 Jpopcbfd.exe 4188 Jbmloneh.exe 4908 Jigdlhle.exe 4388 Kndmdojl.exe 220 Kfkeelko.exe 748 Kglamd32.exe 3328 Knfjinhj.exe 4984 Kepbfh32.exe 1040 Kpffcapl.exe 3248 Kbdbpmop.exe 2456 Kebolhnd.exe 724 Klmghb32.exe 1132 Kbgoelmm.exe 448 Kiqgbf32.exe 3380 Kpkpoq32.exe 4172 Kfdhkkcd.exe 3004 Kicdgfbg.exe 4356 Lpmldp32.exe 4312 Lejelg32.exe 3716 Llcmia32.exe 2888 Lnbiem32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Jbhcdnim.exeDaobmb32.exeNjkile32.exePhpamj32.exeDdocgclq.exed50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exePpcqdikg.exeBjbddkmm.exeMmmobl32.exeAdmknn32.exeCaohipan.exeNpnnblmo.exePcqfenfo.exeDjdcfb32.exePcjgoe32.exeBichjhfj.exeDimcgdpm.exeDpakni32.exeChipfj32.exeEigenf32.exeFebonfpg.exeKpffcapl.exeAhekijbj.exeCgpgdndl.exeGpcdfjoj.exeLoodhbkj.exeOjjdnfke.exePmkmpa32.exeOockch32.exeIclkpe32.exeCcghio32.exeQccbkmdl.exeLmeagf32.exeHenafl32.exeOelmeleh.exeLcmmnqaq.exeOpmjpnag.exePppomkqb.exeDkphnn32.exeDggicoal.exeGlhplh32.exeIhojhg32.exeQlkgdc32.exeHkfeea32.exeJemdbqkg.exeBpeaohnj.exeOemcpbid.exeOpbhmk32.exeMjilfe32.exeNkbomd32.exeGklkdl32.exeLnenai32.exeOjlqce32.exeGphfhf32.exeHnjagb32.exeGaemfmdj.exeHalcglnb.exeLpafopeo.exeHgboeado.exeNmhgcc32.exeOjcnmg32.exeJpopcbfd.exeOhbflmbp.exedescription ioc process File created C:\Windows\SysWOW64\Mnbobkgp.dll Jbhcdnim.exe File created C:\Windows\SysWOW64\Fepcfp32.dll Daobmb32.exe File created C:\Windows\SysWOW64\Nbbqmbqb.exe Njkile32.exe File opened for modification C:\Windows\SysWOW64\Pjomie32.exe Phpamj32.exe File created C:\Windows\SysWOW64\Dkikdm32.exe Ddocgclq.exe File opened for modification C:\Windows\SysWOW64\Fkgbijdn.exe d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exe File created C:\Windows\SysWOW64\Pfpilpio.exe Ppcqdikg.exe File created C:\Windows\SysWOW64\Mqoeda32.dll Bjbddkmm.exe File created C:\Windows\SysWOW64\Igfafd32.dll Mmmobl32.exe File created C:\Windows\SysWOW64\Qlnjndqc.dll Admknn32.exe File created C:\Windows\SysWOW64\Chipfj32.exe Caohipan.exe File created C:\Windows\SysWOW64\Nghfof32.exe Npnnblmo.exe File opened for modification C:\Windows\SysWOW64\Peobaiec.exe Pcqfenfo.exe File opened for modification C:\Windows\SysWOW64\Dpakni32.exe Djdcfb32.exe File created C:\Windows\SysWOW64\Pfhckq32.exe Pcjgoe32.exe File created C:\Windows\SysWOW64\Hcppmo32.dll Bichjhfj.exe File created C:\Windows\SysWOW64\Nacjba32.dll Dimcgdpm.exe File created C:\Windows\SysWOW64\Odgpiede.dll Dpakni32.exe File created C:\Windows\SysWOW64\Jkjomo32.dll Chipfj32.exe File opened for modification C:\Windows\SysWOW64\Endnfm32.exe Eigenf32.exe File opened for modification C:\Windows\SysWOW64\Flmhkq32.exe Febonfpg.exe File created C:\Windows\SysWOW64\Kbdbpmop.exe Kpffcapl.exe File created C:\Windows\SysWOW64\Aqlcjgbl.exe Ahekijbj.exe File created C:\Windows\SysWOW64\Eofing32.dll Cgpgdndl.exe File created C:\Windows\SysWOW64\Ghjlhhol.exe Gpcdfjoj.exe File opened for modification C:\Windows\SysWOW64\Lgflip32.exe Loodhbkj.exe File created C:\Windows\SysWOW64\Eqlimdhj.dll Ojjdnfke.exe File created C:\Windows\SysWOW64\Phpamj32.exe Pmkmpa32.exe File created C:\Windows\SysWOW64\Nappibng.dll Oockch32.exe File created C:\Windows\SysWOW64\Fhlqko32.dll Iclkpe32.exe File created C:\Windows\SysWOW64\Ooajlenp.dll Ccghio32.exe File created C:\Windows\SysWOW64\Qeaogicp.exe Qccbkmdl.exe File created C:\Windows\SysWOW64\Locnca32.exe Lmeagf32.exe File created C:\Windows\SysWOW64\Copakf32.dll Henafl32.exe File created C:\Windows\SysWOW64\Oihhfj32.exe Oelmeleh.exe File opened for modification C:\Windows\SysWOW64\Lfkijlqd.exe Lcmmnqaq.exe File created C:\Windows\SysWOW64\Ogdaak32.exe Opmjpnag.exe File opened for modification C:\Windows\SysWOW64\Pjfcjdqh.exe Pppomkqb.exe File opened for modification C:\Windows\SysWOW64\Dokdnmda.exe Dkphnn32.exe File opened for modification C:\Windows\SysWOW64\Donadmbo.exe Dggicoal.exe File created C:\Windows\SysWOW64\Hnoeiphc.dll Glhplh32.exe File created C:\Windows\SysWOW64\Ibdnepqb.exe Ihojhg32.exe File created C:\Windows\SysWOW64\Hhcleh32.dll Qlkgdc32.exe File opened for modification C:\Windows\SysWOW64\Hdoing32.exe Hkfeea32.exe File created C:\Windows\SysWOW64\Jmdlcnli.exe Jemdbqkg.exe File opened for modification C:\Windows\SysWOW64\Bofblpfi.exe Bpeaohnj.exe File opened for modification C:\Windows\SysWOW64\Ohkplnhg.exe Oemcpbid.exe File opened for modification C:\Windows\SysWOW64\Ocadif32.exe Opbhmk32.exe File created C:\Windows\SysWOW64\Jhcpmk32.dll Mjilfe32.exe File created C:\Windows\SysWOW64\Nbigna32.exe Nkbomd32.exe File created C:\Windows\SysWOW64\Gbhpiodj.exe Gklkdl32.exe File created C:\Windows\SysWOW64\Kephjhan.dll Lnenai32.exe File created C:\Windows\SysWOW64\Pmkmpa32.exe Ojlqce32.exe File created C:\Windows\SysWOW64\Ponggima.dll Gphfhf32.exe File created C:\Windows\SysWOW64\Hgbfphgj.exe Hnjagb32.exe File opened for modification C:\Windows\SysWOW64\Gdcjbhcm.exe Gaemfmdj.exe File created C:\Windows\SysWOW64\Hdjpcgme.exe Halcglnb.exe File opened for modification C:\Windows\SysWOW64\Lflnlj32.exe Lpafopeo.exe File created C:\Windows\SysWOW64\Ciadkf32.exe Cgpgdndl.exe File created C:\Windows\SysWOW64\Iknkfp32.exe Hgboeado.exe File opened for modification C:\Windows\SysWOW64\Ncbppnoi.exe Nmhgcc32.exe File created C:\Windows\SysWOW64\Onojneif.exe Ojcnmg32.exe File created C:\Windows\SysWOW64\Kgnfocll.dll Jpopcbfd.exe File created C:\Windows\SysWOW64\Anpeap32.dll Ohbflmbp.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3328 7092 WerFault.exe Ibdnepqb.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Cjkppc32.exeHenafl32.exeIkdafofp.exePabofdin.exeGpojln32.exeJqjejohq.exeLepdbpnh.exeLfgpom32.exeMfelqkij.exeKlloqg32.exeHieclk32.exeNpnnblmo.exeJjlkmkie.exeNljnla32.exeKndmdojl.exeMamdni32.exeDinbhg32.exeNqafnbbg.exePobmoopi.exeFkhnpaki.exeNmhgcc32.exeLapogbjd.exeNkbomd32.exeHelkkc32.exeLjdiek32.exeJqfcje32.exeAnglmc32.exeHlomgngo.exeOckbflgn.exeIdkije32.exeHgboeado.exeKqdokcda.exeGhbicmmp.exeEaieca32.exeLnqkppge.exeGgfoic32.exeKnhpdhck.exeHclidnpd.exeMcicde32.exeEbepfgig.exeMhdqdamb.exeCmlianng.exeJjcqnjbm.exeBhenea32.exeOcbhgk32.exeDdocgclq.exePoagdffg.exeCiigpq32.exePpqdni32.exeLflnlj32.exeMblagi32.exeOpinnjcb.exeAqoppgqj.exeIgdlkaal.exeImmfbo32.exeAfkihnoa.exeDhndel32.exeMkchkb32.exePlfgnmkf.exeHnjagb32.exeGphfhf32.exeLljlojee.exeFcbjad32.exeEgbhon32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjkppc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Henafl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikdafofp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pabofdin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpojln32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jqjejohq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepdbpnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfgpom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfelqkij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klloqg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hieclk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npnnblmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjlkmkie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nljnla32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kndmdojl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mamdni32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dinbhg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqafnbbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pobmoopi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkhnpaki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmhgcc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lapogbjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkbomd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Helkkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljdiek32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jqfcje32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anglmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hlomgngo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ockbflgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idkije32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgboeado.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqdokcda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghbicmmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eaieca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lnqkppge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggfoic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knhpdhck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hclidnpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mcicde32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ebepfgig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhdqdamb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmlianng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjcqnjbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhenea32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocbhgk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddocgclq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Poagdffg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ciigpq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppqdni32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lflnlj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mblagi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opinnjcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqoppgqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igdlkaal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Immfbo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afkihnoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhndel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkchkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plfgnmkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnjagb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gphfhf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lljlojee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcbjad32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Egbhon32.exe -
Modifies registry class 64 IoCs
Processes:
Olleglmk.exeKjlmic32.exeJgjdfc32.exeJhpgqboa.exeLbkafe32.exeMqhchdjb.exeOpmjpnag.exeFikhoofg.exeMblagi32.exeGpcdfjoj.exeCjpikbma.exeJllfjjoo.exeHmojaqna.exeMfpcek32.exeBcdblaje.exeBihaeg32.exeMedfci32.exeOmgjohog.exeEndnfm32.exeQabhlnfb.exeOgaied32.exeQlnkdilf.exeCgdaom32.exeEdgapl32.exeNfeegh32.exeFaddoo32.exeKdmgllkb.exePloqnn32.exeImhmgpff.exeMfbdmi32.exeHoepdhpj.exeJebfej32.exeGabqqmfl.exeQceoqm32.exeDpmqfe32.exeBkhifapc.exePjbbfp32.exeDpakni32.exeKdjkfmmd.exeHelkkc32.exeKohngc32.exeIlnqcbnj.exeDgkbno32.exeJjadhk32.exePeobaiec.exeFppqfdmq.exeGfobnnph.exeHkkgfjjo.exeBkeplf32.exeOhicfnjj.exeEpbdef32.exeCneack32.exeDkphnn32.exeKjiiimem.exeKgqdmmil.exeKnjljg32.exeCocomk32.exeLqmkglhk.exeIidggpge.exeHdnbcqed.exeJkpjhghf.exeFibfiame.exeGiiljp32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olleglmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjlmic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgjdfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjahqj32.dll" Jhpgqboa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbkafe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ombeajfj.dll" Mqhchdjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Helfoqgc.dll" Opmjpnag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fikhoofg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mblagi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnogbjoc.dll" Gpcdfjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjpikbma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jllfjjoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmojaqna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfpcek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bcdblaje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bihaeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgnlif32.dll" Medfci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omgjohog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Endnfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdalqohg.dll" Qabhlnfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Admbfhpo.dll" Ogaied32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgieni32.dll" Qlnkdilf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgdaom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okjbllaf.dll" Edgapl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nfeegh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ignlcf32.dll" Faddoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdmgllkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ploqnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imhmgpff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfbdmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hoepdhpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anlegqbi.dll" Jebfej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnbbabfg.dll" Bcdblaje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Digijadb.dll" Gabqqmfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijckmaeb.dll" Qceoqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmkoee32.dll" Dpmqfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihbipnqf.dll" Bkhifapc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Booejnpn.dll" Pjbbfp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpakni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehnonf32.dll" Kdjkfmmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kckailjg.dll" Helkkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kohngc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ilnqcbnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgkbno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjadhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbfoil32.dll" Peobaiec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fppqfdmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfobnnph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjjahckf.dll" Hkkgfjjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Coneljkn.dll" Bkeplf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfmhmh32.dll" Ohicfnjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emppgojh.dll" Epbdef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cneack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fepbbc32.dll" Dkphnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmejjloi.dll" Kjiiimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgqdmmil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knjljg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cocomk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdmjegli.dll" Lqmkglhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iidggpge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdnbcqed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkpjhghf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fibfiame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llilbdhf.dll" Giiljp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exeFkgbijdn.exeFaqkedkk.exeFelgfb32.exeGeoclb32.exeGhmphn32.exeGoghdhhb.exeGnjhpd32.exeGhommmob.exeGkniiinf.exeGhbicmmp.exeGdhjhnbd.exeGonnegbj.exeHfhfba32.exeHhfbnl32.exeHkeojh32.exeHboggbok.exeHhioclgg.exeHkglpgfk.exeHgnldh32.exeHnhdabcl.exeHgpijhim.exedescription pid process target process PID 4588 wrote to memory of 764 4588 d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exe Fkgbijdn.exe PID 4588 wrote to memory of 764 4588 d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exe Fkgbijdn.exe PID 4588 wrote to memory of 764 4588 d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exe Fkgbijdn.exe PID 764 wrote to memory of 3736 764 Fkgbijdn.exe Faqkedkk.exe PID 764 wrote to memory of 3736 764 Fkgbijdn.exe Faqkedkk.exe PID 764 wrote to memory of 3736 764 Fkgbijdn.exe Faqkedkk.exe PID 3736 wrote to memory of 1676 3736 Faqkedkk.exe Felgfb32.exe PID 3736 wrote to memory of 1676 3736 Faqkedkk.exe Felgfb32.exe PID 3736 wrote to memory of 1676 3736 Faqkedkk.exe Felgfb32.exe PID 1676 wrote to memory of 4576 1676 Felgfb32.exe Geoclb32.exe PID 1676 wrote to memory of 4576 1676 Felgfb32.exe Geoclb32.exe PID 1676 wrote to memory of 4576 1676 Felgfb32.exe Geoclb32.exe PID 4576 wrote to memory of 1716 4576 Geoclb32.exe Ghmphn32.exe PID 4576 wrote to memory of 1716 4576 Geoclb32.exe Ghmphn32.exe PID 4576 wrote to memory of 1716 4576 Geoclb32.exe Ghmphn32.exe PID 1716 wrote to memory of 4672 1716 Ghmphn32.exe Goghdhhb.exe PID 1716 wrote to memory of 4672 1716 Ghmphn32.exe Goghdhhb.exe PID 1716 wrote to memory of 4672 1716 Ghmphn32.exe Goghdhhb.exe PID 4672 wrote to memory of 2960 4672 Goghdhhb.exe Gnjhpd32.exe PID 4672 wrote to memory of 2960 4672 Goghdhhb.exe Gnjhpd32.exe PID 4672 wrote to memory of 2960 4672 Goghdhhb.exe Gnjhpd32.exe PID 2960 wrote to memory of 3364 2960 Gnjhpd32.exe Ghommmob.exe PID 2960 wrote to memory of 3364 2960 Gnjhpd32.exe Ghommmob.exe PID 2960 wrote to memory of 3364 2960 Gnjhpd32.exe Ghommmob.exe PID 3364 wrote to memory of 5040 3364 Ghommmob.exe Gkniiinf.exe PID 3364 wrote to memory of 5040 3364 Ghommmob.exe Gkniiinf.exe PID 3364 wrote to memory of 5040 3364 Ghommmob.exe Gkniiinf.exe PID 5040 wrote to memory of 4568 5040 Gkniiinf.exe Ghbicmmp.exe PID 5040 wrote to memory of 4568 5040 Gkniiinf.exe Ghbicmmp.exe PID 5040 wrote to memory of 4568 5040 Gkniiinf.exe Ghbicmmp.exe PID 4568 wrote to memory of 4596 4568 Ghbicmmp.exe Gdhjhnbd.exe PID 4568 wrote to memory of 4596 4568 Ghbicmmp.exe Gdhjhnbd.exe PID 4568 wrote to memory of 4596 4568 Ghbicmmp.exe Gdhjhnbd.exe PID 4596 wrote to memory of 2632 4596 Gdhjhnbd.exe Gonnegbj.exe PID 4596 wrote to memory of 2632 4596 Gdhjhnbd.exe Gonnegbj.exe PID 4596 wrote to memory of 2632 4596 Gdhjhnbd.exe Gonnegbj.exe PID 2632 wrote to memory of 2884 2632 Gonnegbj.exe Hfhfba32.exe PID 2632 wrote to memory of 2884 2632 Gonnegbj.exe Hfhfba32.exe PID 2632 wrote to memory of 2884 2632 Gonnegbj.exe Hfhfba32.exe PID 2884 wrote to memory of 5028 2884 Hfhfba32.exe Hhfbnl32.exe PID 2884 wrote to memory of 5028 2884 Hfhfba32.exe Hhfbnl32.exe PID 2884 wrote to memory of 5028 2884 Hfhfba32.exe Hhfbnl32.exe PID 5028 wrote to memory of 4000 5028 Hhfbnl32.exe Hkeojh32.exe PID 5028 wrote to memory of 4000 5028 Hhfbnl32.exe Hkeojh32.exe PID 5028 wrote to memory of 4000 5028 Hhfbnl32.exe Hkeojh32.exe PID 4000 wrote to memory of 1920 4000 Hkeojh32.exe Hboggbok.exe PID 4000 wrote to memory of 1920 4000 Hkeojh32.exe Hboggbok.exe PID 4000 wrote to memory of 1920 4000 Hkeojh32.exe Hboggbok.exe PID 1920 wrote to memory of 232 1920 Hboggbok.exe Hhioclgg.exe PID 1920 wrote to memory of 232 1920 Hboggbok.exe Hhioclgg.exe PID 1920 wrote to memory of 232 1920 Hboggbok.exe Hhioclgg.exe PID 232 wrote to memory of 4168 232 Hhioclgg.exe Hkglpgfk.exe PID 232 wrote to memory of 4168 232 Hhioclgg.exe Hkglpgfk.exe PID 232 wrote to memory of 4168 232 Hhioclgg.exe Hkglpgfk.exe PID 4168 wrote to memory of 2012 4168 Hkglpgfk.exe Hgnldh32.exe PID 4168 wrote to memory of 2012 4168 Hkglpgfk.exe Hgnldh32.exe PID 4168 wrote to memory of 2012 4168 Hkglpgfk.exe Hgnldh32.exe PID 2012 wrote to memory of 1588 2012 Hgnldh32.exe Hnhdabcl.exe PID 2012 wrote to memory of 1588 2012 Hgnldh32.exe Hnhdabcl.exe PID 2012 wrote to memory of 1588 2012 Hgnldh32.exe Hnhdabcl.exe PID 1588 wrote to memory of 1312 1588 Hnhdabcl.exe Hgpijhim.exe PID 1588 wrote to memory of 1312 1588 Hnhdabcl.exe Hgpijhim.exe PID 1588 wrote to memory of 1312 1588 Hnhdabcl.exe Hgpijhim.exe PID 1312 wrote to memory of 5072 1312 Hgpijhim.exe Hnjagb32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exe"C:\Users\Admin\AppData\Local\Temp\d50c894f04ff539be8e8fc8628e74206ac7a979a15fcf505f9cd4f464615e8eb.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\Fkgbijdn.exeC:\Windows\system32\Fkgbijdn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\Faqkedkk.exeC:\Windows\system32\Faqkedkk.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\Felgfb32.exeC:\Windows\system32\Felgfb32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\Geoclb32.exeC:\Windows\system32\Geoclb32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\Ghmphn32.exeC:\Windows\system32\Ghmphn32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\Goghdhhb.exeC:\Windows\system32\Goghdhhb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\Gnjhpd32.exeC:\Windows\system32\Gnjhpd32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Ghommmob.exeC:\Windows\system32\Ghommmob.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\Gkniiinf.exeC:\Windows\system32\Gkniiinf.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\Ghbicmmp.exeC:\Windows\system32\Ghbicmmp.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\Gdhjhnbd.exeC:\Windows\system32\Gdhjhnbd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\Gonnegbj.exeC:\Windows\system32\Gonnegbj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\Hfhfba32.exeC:\Windows\system32\Hfhfba32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Hhfbnl32.exeC:\Windows\system32\Hhfbnl32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\Hkeojh32.exeC:\Windows\system32\Hkeojh32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\Hboggbok.exeC:\Windows\system32\Hboggbok.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\Hhioclgg.exeC:\Windows\system32\Hhioclgg.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\Hkglpgfk.exeC:\Windows\system32\Hkglpgfk.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\Hgnldh32.exeC:\Windows\system32\Hgnldh32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\Hnhdabcl.exeC:\Windows\system32\Hnhdabcl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\Hgpijhim.exeC:\Windows\system32\Hgpijhim.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\Hnjagb32.exeC:\Windows\system32\Hnjagb32.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5072 -
C:\Windows\SysWOW64\Hgbfphgj.exeC:\Windows\system32\Hgbfphgj.exe24⤵
- Executes dropped EXE
PID:3952 -
C:\Windows\SysWOW64\Ifdfno32.exeC:\Windows\system32\Ifdfno32.exe25⤵
- Executes dropped EXE
PID:3180 -
C:\Windows\SysWOW64\Igebegeg.exeC:\Windows\system32\Igebegeg.exe26⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\Ioljfe32.exeC:\Windows\system32\Ioljfe32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1448 -
C:\Windows\SysWOW64\Iffbcomf.exeC:\Windows\system32\Iffbcomf.exe28⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\Inaggaka.exeC:\Windows\system32\Inaggaka.exe29⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\Idkpdk32.exeC:\Windows\system32\Idkpdk32.exe30⤵
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\Incdma32.exeC:\Windows\system32\Incdma32.exe31⤵
- Executes dropped EXE
PID:3676 -
C:\Windows\SysWOW64\Idnljkpl.exeC:\Windows\system32\Idnljkpl.exe32⤵
- Executes dropped EXE
PID:4372 -
C:\Windows\SysWOW64\Ikgdfe32.exeC:\Windows\system32\Ikgdfe32.exe33⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\Ibamcooe.exeC:\Windows\system32\Ibamcooe.exe34⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\Ikjale32.exeC:\Windows\system32\Ikjale32.exe35⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\Jbdiio32.exeC:\Windows\system32\Jbdiio32.exe36⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Jebfej32.exeC:\Windows\system32\Jebfej32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:4696 -
C:\Windows\SysWOW64\Jnkjnpbg.exeC:\Windows\system32\Jnkjnpbg.exe38⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\Jedbjj32.exeC:\Windows\system32\Jedbjj32.exe39⤵
- Executes dropped EXE
PID:376 -
C:\Windows\SysWOW64\Jkokgdaq.exeC:\Windows\system32\Jkokgdaq.exe40⤵
- Executes dropped EXE
PID:3616 -
C:\Windows\SysWOW64\Jbhcdnim.exeC:\Windows\system32\Jbhcdnim.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3996 -
C:\Windows\SysWOW64\Jgeklege.exeC:\Windows\system32\Jgeklege.exe42⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Jffljm32.exeC:\Windows\system32\Jffljm32.exe43⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\Jiehfh32.exeC:\Windows\system32\Jiehfh32.exe44⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Jpopcbfd.exeC:\Windows\system32\Jpopcbfd.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5108 -
C:\Windows\SysWOW64\Jbmloneh.exeC:\Windows\system32\Jbmloneh.exe46⤵
- Executes dropped EXE
PID:4188 -
C:\Windows\SysWOW64\Jigdlhle.exeC:\Windows\system32\Jigdlhle.exe47⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\Kndmdojl.exeC:\Windows\system32\Kndmdojl.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\SysWOW64\Kfkeelko.exeC:\Windows\system32\Kfkeelko.exe49⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Kglamd32.exeC:\Windows\system32\Kglamd32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\Knfjinhj.exeC:\Windows\system32\Knfjinhj.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3328 -
C:\Windows\SysWOW64\Kepbfh32.exeC:\Windows\system32\Kepbfh32.exe52⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\Kpffcapl.exeC:\Windows\system32\Kpffcapl.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\Kbdbpmop.exeC:\Windows\system32\Kbdbpmop.exe54⤵
- Executes dropped EXE
PID:3248 -
C:\Windows\SysWOW64\Kebolhnd.exeC:\Windows\system32\Kebolhnd.exe55⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\SysWOW64\Klmghb32.exeC:\Windows\system32\Klmghb32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:724 -
C:\Windows\SysWOW64\Kbgoelmm.exeC:\Windows\system32\Kbgoelmm.exe57⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Kiqgbf32.exeC:\Windows\system32\Kiqgbf32.exe58⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\Kpkpoq32.exeC:\Windows\system32\Kpkpoq32.exe59⤵
- Executes dropped EXE
PID:3380 -
C:\Windows\SysWOW64\Kfdhkkcd.exeC:\Windows\system32\Kfdhkkcd.exe60⤵
- Executes dropped EXE
PID:4172 -
C:\Windows\SysWOW64\Kicdgfbg.exeC:\Windows\system32\Kicdgfbg.exe61⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\Lpmldp32.exeC:\Windows\system32\Lpmldp32.exe62⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\Lejelg32.exeC:\Windows\system32\Lejelg32.exe63⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\SysWOW64\Llcmia32.exeC:\Windows\system32\Llcmia32.exe64⤵
- Executes dropped EXE
PID:3716 -
C:\Windows\SysWOW64\Lnbiem32.exeC:\Windows\system32\Lnbiem32.exe65⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\SysWOW64\Lpafopeo.exeC:\Windows\system32\Lpafopeo.exe66⤵
- Drops file in System32 directory
PID:4100 -
C:\Windows\SysWOW64\Lflnlj32.exeC:\Windows\system32\Lflnlj32.exe67⤵
- System Location Discovery: System Language Discovery
PID:3872 -
C:\Windows\SysWOW64\Llhfdq32.exeC:\Windows\system32\Llhfdq32.exe68⤵PID:2584
-
C:\Windows\SysWOW64\Lbboak32.exeC:\Windows\system32\Lbboak32.exe69⤵PID:436
-
C:\Windows\SysWOW64\Lilgnejm.exeC:\Windows\system32\Lilgnejm.exe70⤵PID:2980
-
C:\Windows\SysWOW64\Lpfojo32.exeC:\Windows\system32\Lpfojo32.exe71⤵PID:3144
-
C:\Windows\SysWOW64\Lbekfj32.exeC:\Windows\system32\Lbekfj32.exe72⤵PID:2908
-
C:\Windows\SysWOW64\Lhadoa32.exeC:\Windows\system32\Lhadoa32.exe73⤵PID:3108
-
C:\Windows\SysWOW64\Mfbdmi32.exeC:\Windows\system32\Mfbdmi32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1764 -
C:\Windows\SysWOW64\Mhdqdamb.exeC:\Windows\system32\Mhdqdamb.exe75⤵
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Windows\SysWOW64\Mpkhenmd.exeC:\Windows\system32\Mpkhenmd.exe76⤵PID:1276
-
C:\Windows\SysWOW64\Mlaijo32.exeC:\Windows\system32\Mlaijo32.exe77⤵PID:1700
-
C:\Windows\SysWOW64\Mblagi32.exeC:\Windows\system32\Mblagi32.exe78⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3480 -
C:\Windows\SysWOW64\Mifjdcbb.exeC:\Windows\system32\Mifjdcbb.exe79⤵PID:2492
-
C:\Windows\SysWOW64\Mppbqn32.exeC:\Windows\system32\Mppbqn32.exe80⤵PID:3688
-
C:\Windows\SysWOW64\Mbnnmi32.exeC:\Windows\system32\Mbnnmi32.exe81⤵PID:2008
-
C:\Windows\SysWOW64\Meljid32.exeC:\Windows\system32\Meljid32.exe82⤵PID:3100
-
C:\Windows\SysWOW64\Mpbofm32.exeC:\Windows\system32\Mpbofm32.exe83⤵PID:3164
-
C:\Windows\SysWOW64\Mflgcg32.exeC:\Windows\system32\Mflgcg32.exe84⤵PID:3876
-
C:\Windows\SysWOW64\Nliokn32.exeC:\Windows\system32\Nliokn32.exe85⤵PID:4504
-
C:\Windows\SysWOW64\Neadddca.exeC:\Windows\system32\Neadddca.exe86⤵PID:1696
-
C:\Windows\SysWOW64\Noihmi32.exeC:\Windows\system32\Noihmi32.exe87⤵PID:400
-
C:\Windows\SysWOW64\Nbedmhbk.exeC:\Windows\system32\Nbedmhbk.exe88⤵PID:3992
-
C:\Windows\SysWOW64\Nlmifnik.exeC:\Windows\system32\Nlmifnik.exe89⤵PID:3652
-
C:\Windows\SysWOW64\Npiegl32.exeC:\Windows\system32\Npiegl32.exe90⤵PID:4604
-
C:\Windows\SysWOW64\Ngcmcfha.exeC:\Windows\system32\Ngcmcfha.exe91⤵PID:3076
-
C:\Windows\SysWOW64\Nhdiko32.exeC:\Windows\system32\Nhdiko32.exe92⤵PID:3748
-
C:\Windows\SysWOW64\Npkall32.exeC:\Windows\system32\Npkall32.exe93⤵PID:2680
-
C:\Windows\SysWOW64\Ncjnhg32.exeC:\Windows\system32\Ncjnhg32.exe94⤵PID:3488
-
C:\Windows\SysWOW64\Nehjdc32.exeC:\Windows\system32\Nehjdc32.exe95⤵PID:3976
-
C:\Windows\SysWOW64\Nhffqnlm.exeC:\Windows\system32\Nhffqnlm.exe96⤵PID:4880
-
C:\Windows\SysWOW64\Npnnblmo.exeC:\Windows\system32\Npnnblmo.exe97⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\Nghfof32.exeC:\Windows\system32\Nghfof32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1768 -
C:\Windows\SysWOW64\Ohicfnjj.exeC:\Windows\system32\Ohicfnjj.exe99⤵
- Modifies registry class
PID:4744 -
C:\Windows\SysWOW64\Oockch32.exeC:\Windows\system32\Oockch32.exe100⤵
- Drops file in System32 directory
PID:2028 -
C:\Windows\SysWOW64\Oemcpbid.exeC:\Windows\system32\Oemcpbid.exe101⤵
- Drops file in System32 directory
PID:5128 -
C:\Windows\SysWOW64\Ohkplnhg.exeC:\Windows\system32\Ohkplnhg.exe102⤵PID:5176
-
C:\Windows\SysWOW64\Opbhmk32.exeC:\Windows\system32\Opbhmk32.exe103⤵
- Drops file in System32 directory
PID:5228 -
C:\Windows\SysWOW64\Ocadif32.exeC:\Windows\system32\Ocadif32.exe104⤵PID:5292
-
C:\Windows\SysWOW64\Oeopeb32.exeC:\Windows\system32\Oeopeb32.exe105⤵PID:5344
-
C:\Windows\SysWOW64\Oiklfqpj.exeC:\Windows\system32\Oiklfqpj.exe106⤵PID:5384
-
C:\Windows\SysWOW64\Olihblon.exeC:\Windows\system32\Olihblon.exe107⤵PID:5440
-
C:\Windows\SysWOW64\Occqof32.exeC:\Windows\system32\Occqof32.exe108⤵PID:5492
-
C:\Windows\SysWOW64\Oeamka32.exeC:\Windows\system32\Oeamka32.exe109⤵PID:5540
-
C:\Windows\SysWOW64\Olleglmk.exeC:\Windows\system32\Olleglmk.exe110⤵
- Modifies registry class
PID:5584 -
C:\Windows\SysWOW64\Oojacg32.exeC:\Windows\system32\Oojacg32.exe111⤵PID:5648
-
C:\Windows\SysWOW64\Ogaied32.exeC:\Windows\system32\Ogaied32.exe112⤵
- Modifies registry class
PID:5700 -
C:\Windows\SysWOW64\Oedipacl.exeC:\Windows\system32\Oedipacl.exe113⤵PID:5756
-
C:\Windows\SysWOW64\Ohbflmbp.exeC:\Windows\system32\Ohbflmbp.exe114⤵
- Drops file in System32 directory
PID:5828 -
C:\Windows\SysWOW64\Opinnjcb.exeC:\Windows\system32\Opinnjcb.exe115⤵
- System Location Discovery: System Language Discovery
PID:5876 -
C:\Windows\SysWOW64\Ochjjebe.exeC:\Windows\system32\Ochjjebe.exe116⤵PID:5912
-
C:\Windows\SysWOW64\Ogcfjd32.exeC:\Windows\system32\Ogcfjd32.exe117⤵PID:5964
-
C:\Windows\SysWOW64\Pjbbfp32.exeC:\Windows\system32\Pjbbfp32.exe118⤵
- Modifies registry class
PID:6012 -
C:\Windows\SysWOW64\Plpobk32.exeC:\Windows\system32\Plpobk32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6056 -
C:\Windows\SysWOW64\Pookof32.exeC:\Windows\system32\Pookof32.exe120⤵PID:6100
-
C:\Windows\SysWOW64\Pcjgoe32.exeC:\Windows\system32\Pcjgoe32.exe121⤵
- Drops file in System32 directory
PID:3660 -
C:\Windows\SysWOW64\Pfhckq32.exeC:\Windows\system32\Pfhckq32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5188
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-