Analysis
-
max time kernel
84s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe
Resource
win7-20241010-en
General
-
Target
60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe
-
Size
163KB
-
MD5
c6037e67ba9a4ebf7616e80595bb8734
-
SHA1
6c2eef2edfcb90359d208594a2c1b8ab4529c91c
-
SHA256
60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242
-
SHA512
1355bec476626bc54e4c3503058e742b86ede6a484e0070dd383fb06768817505938e0a71d4ad2b234c4edead20d095db45392b89719bcc03a819ce42e3d243c
-
SSDEEP
1536:PRfyJqLVhYMeXHL+V8lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:A8EjHI8ltOrWKDBr+yJb
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Iniebmfg.exeNjeikpij.exeGepjgaid.exeFeofpqkn.exeIbaonfll.exeOhleappp.exeIanambhc.exeNhhdiknb.exeAplppela.exeGngdcpjl.exeCchfek32.exeGjjcqpbj.exeGeibin32.exeMljnoo32.exeIccqedfa.exeJfffmo32.exeDmhcgd32.exeHejaon32.exeLhehnlqf.exeKlkjbf32.exeMpkehbjm.exeHkhdfhmc.exePapogbef.exeFfcdlncp.exeNchkjhdh.exeJgbboa32.exeIhkkanlf.exePconjjql.exeEjcjfgbk.exeGkehhlef.exeKabbehjb.exeDjdenoif.exeCojlfckj.exeBbpdmp32.exeCeeibbgn.exeNmlgcbei.exeCqokoeig.exeAkadmnlg.exeOkamjh32.exeHncjiecj.exeDoipoldo.exeJfkphnmj.exeFqhegf32.exeFlbgak32.exeFjpbeecn.exeNjnion32.exeOghnoi32.exeInopce32.exeKhgidhlh.exeLegmpdga.exeAbadeh32.exeBdbfpafn.exeImgmonga.exeNjikba32.exeJppbkoaf.exeKqomai32.exeAhcoli32.exeJohpcgap.exeDmqgmcba.exeMamjchoa.exeDppiddie.exeIlneef32.exeKdehmb32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iniebmfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njeikpij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gepjgaid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feofpqkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibaonfll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohleappp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ianambhc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhhdiknb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aplppela.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gngdcpjl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cchfek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gjjcqpbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Geibin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mljnoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iccqedfa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfffmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmhcgd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hejaon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhehnlqf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klkjbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpkehbjm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkhdfhmc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Papogbef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffcdlncp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nchkjhdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgbboa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihkkanlf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pconjjql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejcjfgbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkehhlef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kabbehjb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djdenoif.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cojlfckj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbpdmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceeibbgn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmlgcbei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cqokoeig.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akadmnlg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okamjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hncjiecj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doipoldo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfkphnmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fqhegf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flbgak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjpbeecn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njnion32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oghnoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inopce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khgidhlh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Legmpdga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pconjjql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abadeh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdbfpafn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imgmonga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njikba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jppbkoaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kqomai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahcoli32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Johpcgap.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmqgmcba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mamjchoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dppiddie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilneef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdehmb32.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 3 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Phacnm32.exe family_bruteratel C:\Windows\SysWOW64\Ajladp32.exe family_bruteratel C:\Windows\SysWOW64\Pidhjg32.exe family_bruteratel -
Executes dropped EXE 64 IoCs
Processes:
Flbgak32.exeFaopib32.exeGhnaaljp.exeGpiffngk.exeGkojcgga.exeHemeod32.exeHoeigi32.exeHahoodqi.exeInopce32.exeIgjabj32.exeIqdbqp32.exeIjmfiefj.exeJollgl32.exeJfhqiegh.exeJkeialfp.exeKmkodd32.exeKjopnh32.exeKfkjnh32.exeKpcngnob.exeLhqpqp32.exeLedpjdid.exeLegmpdga.exeLgjfmlkm.exeMcafbm32.exeMebpchmb.exeMomqbm32.exeMamjchoa.exeNapfihmn.exeNpecjdaf.exeOjgkih32.exeOkjdfq32.exeOqiidg32.exePjdjbl32.exePfmgmm32.exePcahga32.exePfpdcm32.exeQfbahldf.exeQpjeaa32.exeAanonj32.exeAnbohn32.exeAndlmnki.exeAaeeoihj.exeApjbpemb.exeAkpfmnmh.exeBbkkbpjc.exeBbpdmp32.exeBlhifemo.exeBnkbcmaj.exeChafpfqp.exeChccfe32.exeCalgoken.exeCpadpg32.exeCpcaeghc.exeCjlenm32.exeDohnfc32.exeDllnphkd.exeDfecim32.exeDnpgmp32.exeDkdhfdnj.exeDgkike32.exeDbpmin32.exeEkiaac32.exeEdafjiqe.exeEqhfoj32.exepid process 2172 Flbgak32.exe 1144 Faopib32.exe 1476 Ghnaaljp.exe 3036 Gpiffngk.exe 2928 Gkojcgga.exe 2780 Hemeod32.exe 2120 Hoeigi32.exe 2588 Hahoodqi.exe 2092 Inopce32.exe 1984 Igjabj32.exe 1904 Iqdbqp32.exe 1900 Ijmfiefj.exe 1400 Jollgl32.exe 2464 Jfhqiegh.exe 3060 Jkeialfp.exe 1888 Kmkodd32.exe 2544 Kjopnh32.exe 280 Kfkjnh32.exe 1044 Kpcngnob.exe 1816 Lhqpqp32.exe 2000 Ledpjdid.exe 1292 Legmpdga.exe 1364 Lgjfmlkm.exe 1516 Mcafbm32.exe 804 Mebpchmb.exe 2240 Momqbm32.exe 1728 Mamjchoa.exe 2288 Napfihmn.exe 2932 Npecjdaf.exe 2892 Ojgkih32.exe 2800 Okjdfq32.exe 2744 Oqiidg32.exe 2788 Pjdjbl32.exe 1496 Pfmgmm32.exe 2412 Pcahga32.exe 1508 Pfpdcm32.exe 2996 Qfbahldf.exe 2912 Qpjeaa32.exe 776 Aanonj32.exe 780 Anbohn32.exe 2236 Andlmnki.exe 2424 Aaeeoihj.exe 2452 Apjbpemb.exe 2532 Akpfmnmh.exe 1068 Bbkkbpjc.exe 1440 Bbpdmp32.exe 1772 Blhifemo.exe 1212 Bnkbcmaj.exe 2020 Chafpfqp.exe 1580 Chccfe32.exe 2616 Calgoken.exe 2592 Cpadpg32.exe 2776 Cpcaeghc.exe 2188 Cjlenm32.exe 3032 Dohnfc32.exe 2664 Dllnphkd.exe 2688 Dfecim32.exe 1156 Dnpgmp32.exe 2984 Dkdhfdnj.exe 700 Dgkike32.exe 1908 Dbpmin32.exe 3052 Ekiaac32.exe 3056 Edafjiqe.exe 712 Eqhfoj32.exe -
Loads dropped DLL 64 IoCs
Processes:
60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exeFlbgak32.exeFaopib32.exeGhnaaljp.exeGpiffngk.exeGkojcgga.exeHemeod32.exeHoeigi32.exeHahoodqi.exeInopce32.exeIgjabj32.exeIqdbqp32.exeIjmfiefj.exeJollgl32.exeJfhqiegh.exeJkeialfp.exeKmkodd32.exeKjopnh32.exeKfkjnh32.exeKpcngnob.exeLhqpqp32.exeLedpjdid.exeLegmpdga.exeLgjfmlkm.exeMcafbm32.exeMebpchmb.exeMomqbm32.exeMamjchoa.exeNapfihmn.exeNpecjdaf.exeOjgkih32.exeOkjdfq32.exepid process 2396 60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe 2396 60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe 2172 Flbgak32.exe 2172 Flbgak32.exe 1144 Faopib32.exe 1144 Faopib32.exe 1476 Ghnaaljp.exe 1476 Ghnaaljp.exe 3036 Gpiffngk.exe 3036 Gpiffngk.exe 2928 Gkojcgga.exe 2928 Gkojcgga.exe 2780 Hemeod32.exe 2780 Hemeod32.exe 2120 Hoeigi32.exe 2120 Hoeigi32.exe 2588 Hahoodqi.exe 2588 Hahoodqi.exe 2092 Inopce32.exe 2092 Inopce32.exe 1984 Igjabj32.exe 1984 Igjabj32.exe 1904 Iqdbqp32.exe 1904 Iqdbqp32.exe 1900 Ijmfiefj.exe 1900 Ijmfiefj.exe 1400 Jollgl32.exe 1400 Jollgl32.exe 2464 Jfhqiegh.exe 2464 Jfhqiegh.exe 3060 Jkeialfp.exe 3060 Jkeialfp.exe 1888 Kmkodd32.exe 1888 Kmkodd32.exe 2544 Kjopnh32.exe 2544 Kjopnh32.exe 280 Kfkjnh32.exe 280 Kfkjnh32.exe 1044 Kpcngnob.exe 1044 Kpcngnob.exe 1816 Lhqpqp32.exe 1816 Lhqpqp32.exe 2000 Ledpjdid.exe 2000 Ledpjdid.exe 1292 Legmpdga.exe 1292 Legmpdga.exe 1364 Lgjfmlkm.exe 1364 Lgjfmlkm.exe 1516 Mcafbm32.exe 1516 Mcafbm32.exe 804 Mebpchmb.exe 804 Mebpchmb.exe 2240 Momqbm32.exe 2240 Momqbm32.exe 1728 Mamjchoa.exe 1728 Mamjchoa.exe 2288 Napfihmn.exe 2288 Napfihmn.exe 2932 Npecjdaf.exe 2932 Npecjdaf.exe 2892 Ojgkih32.exe 2892 Ojgkih32.exe 2800 Okjdfq32.exe 2800 Okjdfq32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Lbbodk32.exeCcfoah32.exeCcikghel.exeMlhaip32.exeDkdhfdnj.exeLbbmlbej.exeBknani32.exeBmfdfpih.exeHfmcapna.exeOfdicodf.exeBeoekl32.exeMqfajdpe.exeFipdci32.exeOoabjbdn.exeHfiloiik.exeHfmfjh32.exeNjikba32.exeEkiaac32.exeIegaha32.exeBoohgk32.exeAaegha32.exeOeloin32.exeDhnahl32.exeLdhcjn32.exeAbmkjiqg.exeDkkhdbdc.exeMdbocl32.exeMeolcb32.exeOiebej32.exeKlniao32.exeIfndbd32.exeMammfa32.exePlqjilia.exeIanambhc.exeNhbnjpic.exeMmepboin.exeAkfdcckn.exeNapdpchk.exeDjjlmj32.exeDfcigk32.exeHoeigi32.exeDoipoldo.exeHaggkf32.exeCflcglho.exeDiqabd32.exeMoanpe32.exeCfnmhnhm.exeFecool32.exeAahkhgag.exeDdbbod32.exeGmdapoil.exeAbfonl32.exeBqnidh32.exeBonepo32.exeIibgmk32.exeInciaamj.exeAfgmldhe.exePjdeaohb.exeKhgnff32.exeHlmpjl32.exeAkadmnlg.exeOelecd32.exedescription ioc process File created C:\Windows\SysWOW64\Iphdha32.dll Lbbodk32.exe File created C:\Windows\SysWOW64\Ccikghel.exe Ccfoah32.exe File created C:\Windows\SysWOW64\Cnnpdaeb.exe Ccikghel.exe File created C:\Windows\SysWOW64\Nafkmmgl.dll Mlhaip32.exe File opened for modification C:\Windows\SysWOW64\Dgkike32.exe Dkdhfdnj.exe File opened for modification C:\Windows\SysWOW64\Lpfmefdc.exe Lbbmlbej.exe File opened for modification C:\Windows\SysWOW64\Bbhikcpn.exe Bknani32.exe File opened for modification C:\Windows\SysWOW64\Cceenilo.exe Bmfdfpih.exe File opened for modification C:\Windows\SysWOW64\Hinlck32.exe Hfmcapna.exe File created C:\Windows\SysWOW64\Nlknhnfg.dll Ofdicodf.exe File created C:\Windows\SysWOW64\Mdngapdg.dll Beoekl32.exe File opened for modification C:\Windows\SysWOW64\Mjoecjgf.exe Mqfajdpe.exe File created C:\Windows\SysWOW64\Ffcdlncp.exe Fipdci32.exe File created C:\Windows\SysWOW64\Omfoko32.exe Ooabjbdn.exe File created C:\Windows\SysWOW64\Hpaaho32.exe Hfiloiik.exe File created C:\Windows\SysWOW64\Hljnbo32.exe Hfmfjh32.exe File opened for modification C:\Windows\SysWOW64\Nohpph32.exe Njikba32.exe File opened for modification C:\Windows\SysWOW64\Edafjiqe.exe Ekiaac32.exe File created C:\Windows\SysWOW64\Ilaieljl.exe Iegaha32.exe File created C:\Windows\SysWOW64\Bfjmkn32.exe Boohgk32.exe File created C:\Windows\SysWOW64\Kkkeeb32.dll Aaegha32.exe File created C:\Windows\SysWOW64\Omgcmp32.exe Oeloin32.exe File created C:\Windows\SysWOW64\Qhbeqckl.dll Dhnahl32.exe File opened for modification C:\Windows\SysWOW64\Ljelbeke.exe Ldhcjn32.exe File created C:\Windows\SysWOW64\Madhgj32.dll Abmkjiqg.exe File opened for modification C:\Windows\SysWOW64\Dknejb32.exe Dkkhdbdc.exe File created C:\Windows\SysWOW64\Mjohlb32.exe Mdbocl32.exe File created C:\Windows\SysWOW64\Mafmhcam.exe Meolcb32.exe File opened for modification C:\Windows\SysWOW64\Oobkna32.exe Oiebej32.exe File created C:\Windows\SysWOW64\Kchaniho.exe Klniao32.exe File created C:\Windows\SysWOW64\Jdcbfbbl.dll Ifndbd32.exe File created C:\Windows\SysWOW64\Ndjqeogf.dll Mammfa32.exe File created C:\Windows\SysWOW64\Hojnkcbk.dll Plqjilia.exe File created C:\Windows\SysWOW64\Iobbfggm.exe Ianambhc.exe File created C:\Windows\SysWOW64\Najbbepc.exe Nhbnjpic.exe File opened for modification C:\Windows\SysWOW64\Mcoioi32.exe Mmepboin.exe File created C:\Windows\SysWOW64\Kqbdpb32.dll Akfdcckn.exe File opened for modification C:\Windows\SysWOW64\Nikide32.exe Napdpchk.exe File created C:\Windows\SysWOW64\Qaeklljj.dll Djjlmj32.exe File opened for modification C:\Windows\SysWOW64\Diaecf32.exe Dfcigk32.exe File created C:\Windows\SysWOW64\Hahoodqi.exe Hoeigi32.exe File opened for modification C:\Windows\SysWOW64\Dphmiokb.exe Doipoldo.exe File created C:\Windows\SysWOW64\Oiikjkdg.dll Haggkf32.exe File created C:\Windows\SysWOW64\Dodhpa32.exe Cflcglho.exe File opened for modification C:\Windows\SysWOW64\Donijk32.exe Diqabd32.exe File created C:\Windows\SysWOW64\Maohcojj.dll Moanpe32.exe File opened for modification C:\Windows\SysWOW64\Cpcaeghc.exe Cfnmhnhm.exe File opened for modification C:\Windows\SysWOW64\Fnkchahn.exe Fecool32.exe File created C:\Windows\SysWOW64\Gcdmgnjh.dll Aahkhgag.exe File opened for modification C:\Windows\SysWOW64\Dnkggjpj.exe Ddbbod32.exe File opened for modification C:\Windows\SysWOW64\Ggifmgia.exe Gmdapoil.exe File created C:\Windows\SysWOW64\Hcnech32.dll Gmdapoil.exe File created C:\Windows\SysWOW64\Nonlon32.dll Abfonl32.exe File created C:\Windows\SysWOW64\Bnbinl32.exe Bqnidh32.exe File opened for modification C:\Windows\SysWOW64\Bjcimhab.exe Bonepo32.exe File created C:\Windows\SysWOW64\Icgkkc32.exe Iibgmk32.exe File created C:\Windows\SysWOW64\Qcinmkpj.dll Inciaamj.exe File created C:\Windows\SysWOW64\Moifmnie.dll Iegaha32.exe File created C:\Windows\SysWOW64\Abnmae32.exe Afgmldhe.exe File opened for modification C:\Windows\SysWOW64\Pcljjd32.exe Pjdeaohb.exe File created C:\Windows\SysWOW64\Jjdbbkpk.dll Khgnff32.exe File opened for modification C:\Windows\SysWOW64\Hddgkj32.exe Hlmpjl32.exe File created C:\Windows\SysWOW64\Adjhfcbh.exe Akadmnlg.exe File opened for modification C:\Windows\SysWOW64\Opbjpm32.exe Oelecd32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4784 4412 WerFault.exe Dbmpejph.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Caofmc32.exeGakjcp32.exeGeoegm32.exeQjkpegic.exeLgjfmlkm.exeJfkphnmj.exePconjjql.exeFmbninke.exeEpgqddoh.exeGnhlgoia.exeDmhcgd32.exeKnicjipf.exeEjjhlmqa.exeHdkhihdn.exeIcenedep.exeCfnmhnhm.exeKikfbm32.exeNapibq32.exeJpbmhf32.exeMnefpq32.exeBdghpggf.exeHkgmkbih.exeKnnagehi.exeApakdmpp.exeDkkhdbdc.exeGjeckk32.exeOoabjbdn.exeQpfmageg.exeHjlhcegl.exeKakdbngn.exeAbpjgekf.exePemdic32.exeIcgkkc32.exeIlaieljl.exeFlhnqf32.exeHenipenb.exeFinhinmd.exeNpecjdaf.exeAkadmnlg.exeHecedmaa.exeIkmmqg32.exeCnjhbjql.exeEdieng32.exeHnpkkm32.exeIalpfeno.exeCjmcnmmc.exeBnlihgln.exeFeqbilcq.exeHnedfljc.exeJlcmhann.exeImppciin.exeBjgoff32.exePofnok32.exeIdligq32.exeNknmplji.exeGpbkca32.exeEgedebgc.exeJqakompl.exeIhkihe32.exeIikgkq32.exePbpbklpd.exeLpejnj32.exeLpfmefdc.exePlpehj32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caofmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gakjcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Geoegm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qjkpegic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgjfmlkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfkphnmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pconjjql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmbninke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Epgqddoh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnhlgoia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmhcgd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knicjipf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ejjhlmqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdkhihdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icenedep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfnmhnhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kikfbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Napibq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jpbmhf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnefpq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdghpggf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkgmkbih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knnagehi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apakdmpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkhdbdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjeckk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ooabjbdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qpfmageg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjlhcegl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kakdbngn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abpjgekf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pemdic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icgkkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilaieljl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flhnqf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Henipenb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Finhinmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npecjdaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akadmnlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hecedmaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikmmqg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnjhbjql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edieng32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnpkkm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ialpfeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjmcnmmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnlihgln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Feqbilcq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnedfljc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlcmhann.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imppciin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjgoff32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pofnok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idligq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nknmplji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpbkca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Egedebgc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jqakompl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihkihe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iikgkq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pbpbklpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpejnj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpfmefdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plpehj32.exe -
Modifies registry class 64 IoCs
Processes:
Njnion32.exeBcaqdl32.exeNpecjdaf.exeOqibjq32.exeIopqoi32.exeHcjpcmjg.exeGkojcgga.exeDppiddie.exeLbieejff.exeIniebmfg.exeMhippbem.exeDpqlmm32.exeLjelbeke.exeDbjjll32.exeBhdpjaga.exeJgbkdkdk.exeEhiojb32.exeKmnnblmj.exeQcdgei32.exeDiqabd32.exeIcenedep.exeMlenijej.exeJknlfg32.exeJqonjmbn.exeGenkhidc.exePbkbff32.exeOhleappp.exeKkchkd32.exeOjgkih32.exeQdbpml32.exeNedfofig.exeInqjbhhh.exeNglhghgj.exeOdkkdqmd.exeMcoioi32.exeFdkheh32.exeHolcka32.exeIkmmqg32.exeGhmach32.exeHinlck32.exeBbbckh32.exeJgjkhi32.exeNlkonhkb.exeEhklpbam.exePofnok32.exeKjhajo32.exeDaidojeh.exeBkheal32.exeAjladp32.exeGhnaaljp.exeCjlenm32.exeAcnqen32.exeFogmaoib.exeJgbboa32.exeOiebej32.exeKjimafji.exeFjkgampo.exeGffmqq32.exeMjgfol32.exeOlnnlpqd.exeKjopnh32.exeMcafbm32.exeEkiaac32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njnion32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bcaqdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npecjdaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oqibjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pljmgd32.dll" Iopqoi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcjpcmjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkojcgga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apddce32.dll" Dppiddie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pklnfalh.dll" Lbieejff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iniebmfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfjoeg32.dll" Mhippbem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpqlmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljelbeke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lphngp32.dll" Dbjjll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhdpjaga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oohacfma.dll" Jgbkdkdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmbnkp32.dll" Ehiojb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmnnblmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qcdgei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Diqabd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ennlmb32.dll" Icenedep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nanalgmf.dll" Mlenijej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jknlfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jqonjmbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Genkhidc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbkbff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfginimg.dll" Ohleappp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Loadpe32.dll" Kkchkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojgkih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qdbpml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nedfofig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Inqjbhhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nglhghgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odkkdqmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dohbgg32.dll" Mcoioi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdkheh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Holcka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oogolo32.dll" Ikmmqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mplcca32.dll" Ghmach32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Finqaibj.dll" Hinlck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbbckh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cogomh32.dll" Jgjkhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlkonhkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehklpbam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngpndm32.dll" Pofnok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjhajo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daidojeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkheal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajladp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghnaaljp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Faamni32.dll" Cjlenm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acnqen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fogmaoib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocibno32.dll" Jgbboa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oiebej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjimafji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caiiik32.dll" Jqonjmbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjkgampo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edqjld32.dll" Gffmqq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjgfol32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olnnlpqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnhich32.dll" Kjopnh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcafbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkammkgj.dll" Ekiaac32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exeFlbgak32.exeFaopib32.exeGhnaaljp.exeGpiffngk.exeGkojcgga.exeHemeod32.exeHoeigi32.exeHahoodqi.exeInopce32.exeIgjabj32.exeIqdbqp32.exeIjmfiefj.exeJollgl32.exeJfhqiegh.exeJkeialfp.exedescription pid process target process PID 2396 wrote to memory of 2172 2396 60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe Flbgak32.exe PID 2396 wrote to memory of 2172 2396 60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe Flbgak32.exe PID 2396 wrote to memory of 2172 2396 60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe Flbgak32.exe PID 2396 wrote to memory of 2172 2396 60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe Flbgak32.exe PID 2172 wrote to memory of 1144 2172 Flbgak32.exe Faopib32.exe PID 2172 wrote to memory of 1144 2172 Flbgak32.exe Faopib32.exe PID 2172 wrote to memory of 1144 2172 Flbgak32.exe Faopib32.exe PID 2172 wrote to memory of 1144 2172 Flbgak32.exe Faopib32.exe PID 1144 wrote to memory of 1476 1144 Faopib32.exe Ghnaaljp.exe PID 1144 wrote to memory of 1476 1144 Faopib32.exe Ghnaaljp.exe PID 1144 wrote to memory of 1476 1144 Faopib32.exe Ghnaaljp.exe PID 1144 wrote to memory of 1476 1144 Faopib32.exe Ghnaaljp.exe PID 1476 wrote to memory of 3036 1476 Ghnaaljp.exe Gpiffngk.exe PID 1476 wrote to memory of 3036 1476 Ghnaaljp.exe Gpiffngk.exe PID 1476 wrote to memory of 3036 1476 Ghnaaljp.exe Gpiffngk.exe PID 1476 wrote to memory of 3036 1476 Ghnaaljp.exe Gpiffngk.exe PID 3036 wrote to memory of 2928 3036 Gpiffngk.exe Gkojcgga.exe PID 3036 wrote to memory of 2928 3036 Gpiffngk.exe Gkojcgga.exe PID 3036 wrote to memory of 2928 3036 Gpiffngk.exe Gkojcgga.exe PID 3036 wrote to memory of 2928 3036 Gpiffngk.exe Gkojcgga.exe PID 2928 wrote to memory of 2780 2928 Gkojcgga.exe Hemeod32.exe PID 2928 wrote to memory of 2780 2928 Gkojcgga.exe Hemeod32.exe PID 2928 wrote to memory of 2780 2928 Gkojcgga.exe Hemeod32.exe PID 2928 wrote to memory of 2780 2928 Gkojcgga.exe Hemeod32.exe PID 2780 wrote to memory of 2120 2780 Hemeod32.exe Hoeigi32.exe PID 2780 wrote to memory of 2120 2780 Hemeod32.exe Hoeigi32.exe PID 2780 wrote to memory of 2120 2780 Hemeod32.exe Hoeigi32.exe PID 2780 wrote to memory of 2120 2780 Hemeod32.exe Hoeigi32.exe PID 2120 wrote to memory of 2588 2120 Hoeigi32.exe Hahoodqi.exe PID 2120 wrote to memory of 2588 2120 Hoeigi32.exe Hahoodqi.exe PID 2120 wrote to memory of 2588 2120 Hoeigi32.exe Hahoodqi.exe PID 2120 wrote to memory of 2588 2120 Hoeigi32.exe Hahoodqi.exe PID 2588 wrote to memory of 2092 2588 Hahoodqi.exe Inopce32.exe PID 2588 wrote to memory of 2092 2588 Hahoodqi.exe Inopce32.exe PID 2588 wrote to memory of 2092 2588 Hahoodqi.exe Inopce32.exe PID 2588 wrote to memory of 2092 2588 Hahoodqi.exe Inopce32.exe PID 2092 wrote to memory of 1984 2092 Inopce32.exe Igjabj32.exe PID 2092 wrote to memory of 1984 2092 Inopce32.exe Igjabj32.exe PID 2092 wrote to memory of 1984 2092 Inopce32.exe Igjabj32.exe PID 2092 wrote to memory of 1984 2092 Inopce32.exe Igjabj32.exe PID 1984 wrote to memory of 1904 1984 Igjabj32.exe Iqdbqp32.exe PID 1984 wrote to memory of 1904 1984 Igjabj32.exe Iqdbqp32.exe PID 1984 wrote to memory of 1904 1984 Igjabj32.exe Iqdbqp32.exe PID 1984 wrote to memory of 1904 1984 Igjabj32.exe Iqdbqp32.exe PID 1904 wrote to memory of 1900 1904 Iqdbqp32.exe Ijmfiefj.exe PID 1904 wrote to memory of 1900 1904 Iqdbqp32.exe Ijmfiefj.exe PID 1904 wrote to memory of 1900 1904 Iqdbqp32.exe Ijmfiefj.exe PID 1904 wrote to memory of 1900 1904 Iqdbqp32.exe Ijmfiefj.exe PID 1900 wrote to memory of 1400 1900 Ijmfiefj.exe Jollgl32.exe PID 1900 wrote to memory of 1400 1900 Ijmfiefj.exe Jollgl32.exe PID 1900 wrote to memory of 1400 1900 Ijmfiefj.exe Jollgl32.exe PID 1900 wrote to memory of 1400 1900 Ijmfiefj.exe Jollgl32.exe PID 1400 wrote to memory of 2464 1400 Jollgl32.exe Jfhqiegh.exe PID 1400 wrote to memory of 2464 1400 Jollgl32.exe Jfhqiegh.exe PID 1400 wrote to memory of 2464 1400 Jollgl32.exe Jfhqiegh.exe PID 1400 wrote to memory of 2464 1400 Jollgl32.exe Jfhqiegh.exe PID 2464 wrote to memory of 3060 2464 Jfhqiegh.exe Jkeialfp.exe PID 2464 wrote to memory of 3060 2464 Jfhqiegh.exe Jkeialfp.exe PID 2464 wrote to memory of 3060 2464 Jfhqiegh.exe Jkeialfp.exe PID 2464 wrote to memory of 3060 2464 Jfhqiegh.exe Jkeialfp.exe PID 3060 wrote to memory of 1888 3060 Jkeialfp.exe Kmkodd32.exe PID 3060 wrote to memory of 1888 3060 Jkeialfp.exe Kmkodd32.exe PID 3060 wrote to memory of 1888 3060 Jkeialfp.exe Kmkodd32.exe PID 3060 wrote to memory of 1888 3060 Jkeialfp.exe Kmkodd32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe"C:\Users\Admin\AppData\Local\Temp\60e59a677e31a8da94cc96de674fa276901f066a0e2333c026a1820a9b95a242.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\Flbgak32.exeC:\Windows\system32\Flbgak32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\Faopib32.exeC:\Windows\system32\Faopib32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\Ghnaaljp.exeC:\Windows\system32\Ghnaaljp.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\Gpiffngk.exeC:\Windows\system32\Gpiffngk.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\Gkojcgga.exeC:\Windows\system32\Gkojcgga.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\Hemeod32.exeC:\Windows\system32\Hemeod32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Hoeigi32.exeC:\Windows\system32\Hoeigi32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Hahoodqi.exeC:\Windows\system32\Hahoodqi.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Inopce32.exeC:\Windows\system32\Inopce32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Igjabj32.exeC:\Windows\system32\Igjabj32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Iqdbqp32.exeC:\Windows\system32\Iqdbqp32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\Ijmfiefj.exeC:\Windows\system32\Ijmfiefj.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\Jollgl32.exeC:\Windows\system32\Jollgl32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\Jfhqiegh.exeC:\Windows\system32\Jfhqiegh.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\Jkeialfp.exeC:\Windows\system32\Jkeialfp.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\Kmkodd32.exeC:\Windows\system32\Kmkodd32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1888 -
C:\Windows\SysWOW64\Kjopnh32.exeC:\Windows\system32\Kjopnh32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2544 -
C:\Windows\SysWOW64\Kfkjnh32.exeC:\Windows\system32\Kfkjnh32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:280 -
C:\Windows\SysWOW64\Kpcngnob.exeC:\Windows\system32\Kpcngnob.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Windows\SysWOW64\Lhqpqp32.exeC:\Windows\system32\Lhqpqp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1816 -
C:\Windows\SysWOW64\Ledpjdid.exeC:\Windows\system32\Ledpjdid.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2000 -
C:\Windows\SysWOW64\Legmpdga.exeC:\Windows\system32\Legmpdga.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1292 -
C:\Windows\SysWOW64\Lgjfmlkm.exeC:\Windows\system32\Lgjfmlkm.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1364 -
C:\Windows\SysWOW64\Mcafbm32.exeC:\Windows\system32\Mcafbm32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1516 -
C:\Windows\SysWOW64\Mebpchmb.exeC:\Windows\system32\Mebpchmb.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:804 -
C:\Windows\SysWOW64\Momqbm32.exeC:\Windows\system32\Momqbm32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Windows\SysWOW64\Mamjchoa.exeC:\Windows\system32\Mamjchoa.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1728 -
C:\Windows\SysWOW64\Napfihmn.exeC:\Windows\system32\Napfihmn.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2288 -
C:\Windows\SysWOW64\Npecjdaf.exeC:\Windows\system32\Npecjdaf.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2932 -
C:\Windows\SysWOW64\Ojgkih32.exeC:\Windows\system32\Ojgkih32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Okjdfq32.exeC:\Windows\system32\Okjdfq32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800 -
C:\Windows\SysWOW64\Oqiidg32.exeC:\Windows\system32\Oqiidg32.exe33⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\Pjdjbl32.exeC:\Windows\system32\Pjdjbl32.exe34⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Pfmgmm32.exeC:\Windows\system32\Pfmgmm32.exe35⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\Pcahga32.exeC:\Windows\system32\Pcahga32.exe36⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\Pfpdcm32.exeC:\Windows\system32\Pfpdcm32.exe37⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\Qfbahldf.exeC:\Windows\system32\Qfbahldf.exe38⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\Qpjeaa32.exeC:\Windows\system32\Qpjeaa32.exe39⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\Aanonj32.exeC:\Windows\system32\Aanonj32.exe40⤵
- Executes dropped EXE
PID:776 -
C:\Windows\SysWOW64\Anbohn32.exeC:\Windows\system32\Anbohn32.exe41⤵
- Executes dropped EXE
PID:780 -
C:\Windows\SysWOW64\Andlmnki.exeC:\Windows\system32\Andlmnki.exe42⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\Aaeeoihj.exeC:\Windows\system32\Aaeeoihj.exe43⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\Apjbpemb.exeC:\Windows\system32\Apjbpemb.exe44⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Akpfmnmh.exeC:\Windows\system32\Akpfmnmh.exe45⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\Bbkkbpjc.exeC:\Windows\system32\Bbkkbpjc.exe46⤵
- Executes dropped EXE
PID:1068 -
C:\Windows\SysWOW64\Bbpdmp32.exeC:\Windows\system32\Bbpdmp32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1440 -
C:\Windows\SysWOW64\Blhifemo.exeC:\Windows\system32\Blhifemo.exe48⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\Bnkbcmaj.exeC:\Windows\system32\Bnkbcmaj.exe49⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\SysWOW64\Chafpfqp.exeC:\Windows\system32\Chafpfqp.exe50⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Chccfe32.exeC:\Windows\system32\Chccfe32.exe51⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\Calgoken.exeC:\Windows\system32\Calgoken.exe52⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\Cpadpg32.exeC:\Windows\system32\Cpadpg32.exe53⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\Cfnmhnhm.exeC:\Windows\system32\Cfnmhnhm.exe54⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\Cpcaeghc.exeC:\Windows\system32\Cpcaeghc.exe55⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Cjlenm32.exeC:\Windows\system32\Cjlenm32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\Dohnfc32.exeC:\Windows\system32\Dohnfc32.exe57⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\Dllnphkd.exeC:\Windows\system32\Dllnphkd.exe58⤵
- Executes dropped EXE
PID:2664 -
C:\Windows\SysWOW64\Dfecim32.exeC:\Windows\system32\Dfecim32.exe59⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Dnpgmp32.exeC:\Windows\system32\Dnpgmp32.exe60⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\SysWOW64\Dkdhfdnj.exeC:\Windows\system32\Dkdhfdnj.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2984 -
C:\Windows\SysWOW64\Dgkike32.exeC:\Windows\system32\Dgkike32.exe62⤵
- Executes dropped EXE
PID:700 -
C:\Windows\SysWOW64\Dbpmin32.exeC:\Windows\system32\Dbpmin32.exe63⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\Ekiaac32.exeC:\Windows\system32\Ekiaac32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3052 -
C:\Windows\SysWOW64\Edafjiqe.exeC:\Windows\system32\Edafjiqe.exe65⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\Eqhfoj32.exeC:\Windows\system32\Eqhfoj32.exe66⤵
- Executes dropped EXE
PID:712 -
C:\Windows\SysWOW64\Egaoldnf.exeC:\Windows\system32\Egaoldnf.exe67⤵PID:1732
-
C:\Windows\SysWOW64\Echpaecj.exeC:\Windows\system32\Echpaecj.exe68⤵PID:316
-
C:\Windows\SysWOW64\Ekcdegqe.exeC:\Windows\system32\Ekcdegqe.exe69⤵PID:2024
-
C:\Windows\SysWOW64\Eelinm32.exeC:\Windows\system32\Eelinm32.exe70⤵PID:2440
-
C:\Windows\SysWOW64\Epamlegl.exeC:\Windows\system32\Epamlegl.exe71⤵PID:1792
-
C:\Windows\SysWOW64\Flhnqf32.exeC:\Windows\system32\Flhnqf32.exe72⤵
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\Feqbilcq.exeC:\Windows\system32\Feqbilcq.exe73⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\Fnifbaja.exeC:\Windows\system32\Fnifbaja.exe74⤵PID:2512
-
C:\Windows\SysWOW64\Fecool32.exeC:\Windows\system32\Fecool32.exe75⤵
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\Fnkchahn.exeC:\Windows\system32\Fnkchahn.exe76⤵PID:2292
-
C:\Windows\SysWOW64\Fjbdmbmb.exeC:\Windows\system32\Fjbdmbmb.exe77⤵PID:2632
-
C:\Windows\SysWOW64\Fdkheh32.exeC:\Windows\system32\Fdkheh32.exe78⤵
- Modifies registry class
PID:2648 -
C:\Windows\SysWOW64\Gigano32.exeC:\Windows\system32\Gigano32.exe79⤵PID:1560
-
C:\Windows\SysWOW64\Gmejdm32.exeC:\Windows\system32\Gmejdm32.exe80⤵PID:1760
-
C:\Windows\SysWOW64\Gpdfph32.exeC:\Windows\system32\Gpdfph32.exe81⤵PID:1072
-
C:\Windows\SysWOW64\Gfnnmboa.exeC:\Windows\system32\Gfnnmboa.exe82⤵PID:820
-
C:\Windows\SysWOW64\Goicaell.exeC:\Windows\system32\Goicaell.exe83⤵PID:1376
-
C:\Windows\SysWOW64\Geckno32.exeC:\Windows\system32\Geckno32.exe84⤵PID:2044
-
C:\Windows\SysWOW64\Hejaon32.exeC:\Windows\system32\Hejaon32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1092 -
C:\Windows\SysWOW64\Hacoio32.exeC:\Windows\system32\Hacoio32.exe86⤵PID:1716
-
C:\Windows\SysWOW64\Hdakej32.exeC:\Windows\system32\Hdakej32.exe87⤵PID:936
-
C:\Windows\SysWOW64\Hlmpjl32.exeC:\Windows\system32\Hlmpjl32.exe88⤵
- Drops file in System32 directory
PID:1964 -
C:\Windows\SysWOW64\Hddgkj32.exeC:\Windows\system32\Hddgkj32.exe89⤵PID:2272
-
C:\Windows\SysWOW64\Heedbbdb.exeC:\Windows\system32\Heedbbdb.exe90⤵PID:1668
-
C:\Windows\SysWOW64\Iegaha32.exeC:\Windows\system32\Iegaha32.exe91⤵
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\Ilaieljl.exeC:\Windows\system32\Ilaieljl.exe92⤵
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\Iopeagip.exeC:\Windows\system32\Iopeagip.exe93⤵PID:2832
-
C:\Windows\SysWOW64\Ianambhc.exeC:\Windows\system32\Ianambhc.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2732 -
C:\Windows\SysWOW64\Iobbfggm.exeC:\Windows\system32\Iobbfggm.exe95⤵PID:1552
-
C:\Windows\SysWOW64\Iodolf32.exeC:\Windows\system32\Iodolf32.exe96⤵PID:1720
-
C:\Windows\SysWOW64\Iogkaf32.exeC:\Windows\system32\Iogkaf32.exe97⤵PID:2084
-
C:\Windows\SysWOW64\Jknlfg32.exeC:\Windows\system32\Jknlfg32.exe98⤵
- Modifies registry class
PID:584 -
C:\Windows\SysWOW64\Jciaki32.exeC:\Windows\system32\Jciaki32.exe99⤵PID:1684
-
C:\Windows\SysWOW64\Jqmadn32.exeC:\Windows\system32\Jqmadn32.exe100⤵PID:2224
-
C:\Windows\SysWOW64\Jqonjmbn.exeC:\Windows\system32\Jqonjmbn.exe101⤵
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\Jqakompl.exeC:\Windows\system32\Jqakompl.exe102⤵
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\Jjjohbgl.exeC:\Windows\system32\Jjjohbgl.exe103⤵PID:2604
-
C:\Windows\SysWOW64\Kbedmedg.exeC:\Windows\system32\Kbedmedg.exe104⤵PID:2940
-
C:\Windows\SysWOW64\Kmjhjndm.exeC:\Windows\system32\Kmjhjndm.exe105⤵PID:2696
-
C:\Windows\SysWOW64\Kefmnp32.exeC:\Windows\system32\Kefmnp32.exe106⤵PID:1080
-
C:\Windows\SysWOW64\Knnagehi.exeC:\Windows\system32\Knnagehi.exe107⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\Kkbbqjgb.exeC:\Windows\system32\Kkbbqjgb.exe108⤵PID:2736
-
C:\Windows\SysWOW64\Kejfio32.exeC:\Windows\system32\Kejfio32.exe109⤵PID:2968
-
C:\Windows\SysWOW64\Knckbe32.exeC:\Windows\system32\Knckbe32.exe110⤵PID:964
-
C:\Windows\SysWOW64\Lmhhcaik.exeC:\Windows\system32\Lmhhcaik.exe111⤵PID:2248
-
C:\Windows\SysWOW64\Ljlhme32.exeC:\Windows\system32\Ljlhme32.exe112⤵PID:980
-
C:\Windows\SysWOW64\Lcdmekne.exeC:\Windows\system32\Lcdmekne.exe113⤵PID:2080
-
C:\Windows\SysWOW64\Ldgikklb.exeC:\Windows\system32\Ldgikklb.exe114⤵PID:960
-
C:\Windows\SysWOW64\Lmondpbc.exeC:\Windows\system32\Lmondpbc.exe115⤵PID:2276
-
C:\Windows\SysWOW64\Lejbhbpn.exeC:\Windows\system32\Lejbhbpn.exe116⤵PID:1744
-
C:\Windows\SysWOW64\Mihkoa32.exeC:\Windows\system32\Mihkoa32.exe117⤵PID:1628
-
C:\Windows\SysWOW64\Meolcb32.exeC:\Windows\system32\Meolcb32.exe118⤵
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\Mafmhcam.exeC:\Windows\system32\Mafmhcam.exe119⤵PID:2824
-
C:\Windows\SysWOW64\Mgbeqjpd.exeC:\Windows\system32\Mgbeqjpd.exe120⤵PID:2068
-
C:\Windows\SysWOW64\Mhbakmgg.exeC:\Windows\system32\Mhbakmgg.exe121⤵PID:2672
-
C:\Windows\SysWOW64\Majfcb32.exeC:\Windows\system32\Majfcb32.exe122⤵PID:2256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-