Analysis
-
max time kernel
71s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe
Resource
win7-20241010-en
General
-
Target
1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe
-
Size
163KB
-
MD5
ffb75652432f5b13412bd3281504e6f3
-
SHA1
fb55c4df661ae04787f236d8d4c1bab8e26b7bbd
-
SHA256
1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f
-
SHA512
8a4e684916dd8438edf28f72a6dbda327b75c2e3801ba460d377575ecced14ee2688e24fd5be024093d736e6b49a55952533db20d453feba24a417f82d0cf12d
-
SSDEEP
1536:PN/47nidENgNaG7ldAY5rIi/MC6UwdlT17CBlProNVU4qNVUrk/9QbfBr+7GwKrE:lnwaaokY5xMC6UECBltOrWKDBr+yJbA
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Knoaeimg.exePdigkk32.exePbepkh32.exeOckbdebl.exeGpafgp32.exeEgeecf32.exeFgqhgjbb.exeKkhdml32.exeMfebdm32.exeBakdjn32.exeHidfjckg.exeNdoelpid.exeEnmnahnm.exeFbfjkj32.exeLehfafgp.exeNepokogo.exeKqokgd32.exeFihalb32.exeQifpqi32.exeNlocka32.exeHgfheodo.exeLaogfg32.exeCdnjaibm.exeJcmgal32.exeJafmngde.exeDkjhjm32.exeFjaoplho.exeGhekhd32.exeIlkpac32.exeLmnhgjmp.exeDgildi32.exeGbnenk32.exeKcajceke.exeGfgdij32.exeNdiomdde.exeAgnjge32.exeHlbpme32.exeIdekbgji.exeJjijkmbi.exeDbadagln.exeKheofahm.exeBafkookd.exeEkjgbi32.exeBedamd32.exeDnqhkcdo.exeNhcebj32.exeMaocekoo.exeGmipko32.exeMkibjgli.exeGbjpem32.exeMkfojakp.exeNhnemdbf.exePdkhag32.exeCgaoic32.exeOiokholk.exeLaackgka.exeMdplfflp.exeMebpakbq.exeHkbmil32.exeIokahhac.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knoaeimg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdigkk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbepkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ockbdebl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpafgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egeecf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgqhgjbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkhdml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfebdm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bakdjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hidfjckg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndoelpid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enmnahnm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbfjkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lehfafgp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nepokogo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kqokgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fihalb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qifpqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlocka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgfheodo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laogfg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdnjaibm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcmgal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jafmngde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkjhjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjaoplho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghekhd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilkpac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmnhgjmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgildi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbnenk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcajceke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfgdij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndiomdde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agnjge32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlbpme32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idekbgji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjijkmbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbadagln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kheofahm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bafkookd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekjgbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bedamd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnqhkcdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kqokgd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhcebj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Maocekoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmipko32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkibjgli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbjpem32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkfojakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhnemdbf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdkhag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdkhag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgaoic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oiokholk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laackgka.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdplfflp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mebpakbq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkbmil32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpafgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkbmil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iokahhac.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Klmbjh32.exeLdhgnk32.exeLglmefcg.exeLaaabo32.exeMokkegmm.exeMaldfbjn.exeMkibjgli.exeNddcimag.exeNgbpehpj.exeNnodgbed.exeObcffefa.exeOnjgkf32.exeOiokholk.exePpdfimji.exePbepkh32.exePefhlcdk.exeQaofgc32.exeAjjgei32.exeApkihofl.exeAmoibc32.exeBaclaf32.exeBlipno32.exeBimphc32.exeBedamd32.exeBoleejag.exeCnhhge32.exeCpiaipmh.exeDdkgbc32.exeDbadagln.exeDkjhjm32.exeDklepmal.exeEnmnahnm.exeEpcddopf.exeEikimeff.exeEfoifiep.exeFbfjkj32.exeFjaoplho.exeFakglf32.exeGbcien32.exeGdcfoq32.exeGedbfimc.exeGhekhd32.exeGbjpem32.exeGkedjo32.exeGekhgh32.exeHmfmkjdf.exeHgoadp32.exeHdbbnd32.exeHafbghhj.exeHgckoofa.exeHlpchfdi.exeHgfheodo.exeHlbpme32.exeIjfqfj32.exeIocioq32.exeIhlnhffh.exeIcabeo32.exeIlifndlo.exeIdekbgji.exeInmpklpj.exeIhbdhepp.exeIbkhak32.exeJghqia32.exeJdlacfca.exepid process 2832 Klmbjh32.exe 2884 Ldhgnk32.exe 2932 Lglmefcg.exe 2676 Laaabo32.exe 2080 Mokkegmm.exe 1916 Maldfbjn.exe 2204 Mkibjgli.exe 2424 Nddcimag.exe 2956 Ngbpehpj.exe 1816 Nnodgbed.exe 564 Obcffefa.exe 2024 Onjgkf32.exe 2368 Oiokholk.exe 2128 Ppdfimji.exe 2396 Pbepkh32.exe 1676 Pefhlcdk.exe 1596 Qaofgc32.exe 1468 Ajjgei32.exe 1756 Apkihofl.exe 2596 Amoibc32.exe 2220 Baclaf32.exe 2540 Blipno32.exe 2360 Bimphc32.exe 1040 Bedamd32.exe 2728 Boleejag.exe 2744 Cnhhge32.exe 2436 Cpiaipmh.exe 1552 Ddkgbc32.exe 2792 Dbadagln.exe 1936 Dkjhjm32.exe 2276 Dklepmal.exe 3016 Enmnahnm.exe 2328 Epcddopf.exe 2608 Eikimeff.exe 1696 Efoifiep.exe 864 Fbfjkj32.exe 760 Fjaoplho.exe 940 Fakglf32.exe 2164 Gbcien32.exe 2332 Gdcfoq32.exe 2492 Gedbfimc.exe 2512 Ghekhd32.exe 1768 Gbjpem32.exe 1652 Gkedjo32.exe 1332 Gekhgh32.exe 1588 Hmfmkjdf.exe 1276 Hgoadp32.exe 2548 Hdbbnd32.exe 3000 Hafbghhj.exe 2524 Hgckoofa.exe 2892 Hlpchfdi.exe 2900 Hgfheodo.exe 1784 Hlbpme32.exe 2616 Ijfqfj32.exe 604 Iocioq32.exe 1800 Ihlnhffh.exe 948 Icabeo32.exe 1008 Ilifndlo.exe 2008 Idekbgji.exe 1632 Inmpklpj.exe 1780 Ihbdhepp.exe 2244 Ibkhak32.exe 1616 Jghqia32.exe 1728 Jdlacfca.exe -
Loads dropped DLL 64 IoCs
Processes:
1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exeKlmbjh32.exeLdhgnk32.exeLglmefcg.exeLaaabo32.exeMokkegmm.exeMaldfbjn.exeMkibjgli.exeNddcimag.exeNgbpehpj.exeNnodgbed.exeObcffefa.exeOnjgkf32.exeOiokholk.exePpdfimji.exePbepkh32.exePefhlcdk.exeQaofgc32.exeAjjgei32.exeApkihofl.exeAmoibc32.exeBaclaf32.exeBlipno32.exeBimphc32.exeBedamd32.exeBoleejag.exeCnhhge32.exeCpiaipmh.exeDdkgbc32.exeDbadagln.exeDkjhjm32.exeDklepmal.exepid process 2448 1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe 2448 1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe 2832 Klmbjh32.exe 2832 Klmbjh32.exe 2884 Ldhgnk32.exe 2884 Ldhgnk32.exe 2932 Lglmefcg.exe 2932 Lglmefcg.exe 2676 Laaabo32.exe 2676 Laaabo32.exe 2080 Mokkegmm.exe 2080 Mokkegmm.exe 1916 Maldfbjn.exe 1916 Maldfbjn.exe 2204 Mkibjgli.exe 2204 Mkibjgli.exe 2424 Nddcimag.exe 2424 Nddcimag.exe 2956 Ngbpehpj.exe 2956 Ngbpehpj.exe 1816 Nnodgbed.exe 1816 Nnodgbed.exe 564 Obcffefa.exe 564 Obcffefa.exe 2024 Onjgkf32.exe 2024 Onjgkf32.exe 2368 Oiokholk.exe 2368 Oiokholk.exe 2128 Ppdfimji.exe 2128 Ppdfimji.exe 2396 Pbepkh32.exe 2396 Pbepkh32.exe 1676 Pefhlcdk.exe 1676 Pefhlcdk.exe 1596 Qaofgc32.exe 1596 Qaofgc32.exe 1468 Ajjgei32.exe 1468 Ajjgei32.exe 1756 Apkihofl.exe 1756 Apkihofl.exe 2596 Amoibc32.exe 2596 Amoibc32.exe 2220 Baclaf32.exe 2220 Baclaf32.exe 2540 Blipno32.exe 2540 Blipno32.exe 2360 Bimphc32.exe 2360 Bimphc32.exe 1040 Bedamd32.exe 1040 Bedamd32.exe 2728 Boleejag.exe 2728 Boleejag.exe 2744 Cnhhge32.exe 2744 Cnhhge32.exe 2436 Cpiaipmh.exe 2436 Cpiaipmh.exe 1552 Ddkgbc32.exe 1552 Ddkgbc32.exe 2792 Dbadagln.exe 2792 Dbadagln.exe 1936 Dkjhjm32.exe 1936 Dkjhjm32.exe 2276 Dklepmal.exe 2276 Dklepmal.exe -
Drops file in System32 directory 64 IoCs
Processes:
Jfagemej.exeKbcddlnd.exeDammoahg.exeEnmnahnm.exeJafmngde.exeMeeopdhb.exeNiqgof32.exeOiokholk.exeFihalb32.exeLaackgka.exeNkjdcp32.exeDgalhgpg.exeOhengmcf.exeOmgfdhbq.exeDjmknb32.exeKlonqpbi.exePpdfimji.exeDbadagln.exeBfpmog32.exeAmkbpm32.exeEoajgh32.exeBimphc32.exeIdekbgji.exeIbkhak32.exeKimlqfeq.exeFclbgj32.exe1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exeOngckp32.exeOgdaod32.exeAjdcofop.exeOlalpdbc.exeBoleejag.exeBlibghmm.exeJghqia32.exeNkqjdo32.exeEbabicfn.exeJofdll32.exeLaeidfdn.exeKndbko32.exeMdgmbhgh.exeBbfnchfb.exeJhmpbc32.exeKnoaeimg.exeNokcbm32.exeNegeln32.exeDnqhkcdo.exeChgimh32.exeNhqhmj32.exeMcfbfaao.exeDklepmal.exeInmpklpj.exeJdlacfca.exeMkfojakp.exeCgaoic32.exeIokahhac.exeLqjfpbmm.exeBhbpahan.exeCdnjaibm.exeEgeecf32.exeChabmm32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Jojloc32.exe Jfagemej.exe File created C:\Windows\SysWOW64\Kimlqfeq.exe Kbcddlnd.exe File opened for modification C:\Windows\SysWOW64\Dapjdq32.exe Dammoahg.exe File opened for modification C:\Windows\SysWOW64\Epcddopf.exe Enmnahnm.exe File opened for modification C:\Windows\SysWOW64\Jcfjhj32.exe Jafmngde.exe File created C:\Windows\SysWOW64\Mpoppadq.exe Meeopdhb.exe File opened for modification C:\Windows\SysWOW64\Nlocka32.exe Niqgof32.exe File created C:\Windows\SysWOW64\Ppdfimji.exe Oiokholk.exe File opened for modification C:\Windows\SysWOW64\Ghmnmo32.exe Fihalb32.exe File created C:\Windows\SysWOW64\Lpgqlc32.exe Laackgka.exe File opened for modification C:\Windows\SysWOW64\Nhnemdbf.exe Nkjdcp32.exe File created C:\Windows\SysWOW64\Edelakoq.exe Dgalhgpg.exe File created C:\Windows\SysWOW64\Pmibhn32.dll Jafmngde.exe File opened for modification C:\Windows\SysWOW64\Ockbdebl.exe Ohengmcf.exe File created C:\Windows\SysWOW64\Ejegcc32.dll Omgfdhbq.exe File created C:\Windows\SysWOW64\Nlaeee32.dll Djmknb32.exe File created C:\Windows\SysWOW64\Kicqkb32.dll Klonqpbi.exe File opened for modification C:\Windows\SysWOW64\Pbepkh32.exe Ppdfimji.exe File created C:\Windows\SysWOW64\Khqplf32.dll Dbadagln.exe File created C:\Windows\SysWOW64\Flffpf32.dll Bfpmog32.exe File created C:\Windows\SysWOW64\Bijnecld.dll Amkbpm32.exe File opened for modification C:\Windows\SysWOW64\Ebabicfn.exe Eoajgh32.exe File created C:\Windows\SysWOW64\Fkbhkj32.dll Bimphc32.exe File opened for modification C:\Windows\SysWOW64\Inmpklpj.exe Idekbgji.exe File opened for modification C:\Windows\SysWOW64\Jghqia32.exe Ibkhak32.exe File created C:\Windows\SysWOW64\Kbeqjl32.exe Kimlqfeq.exe File created C:\Windows\SysWOW64\Eckomcec.dll Fclbgj32.exe File created C:\Windows\SysWOW64\Fnjkajpb.dll 1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe File opened for modification C:\Windows\SysWOW64\Odqlhjbi.exe Ongckp32.exe File opened for modification C:\Windows\SysWOW64\Ohengmcf.exe Ogdaod32.exe File opened for modification C:\Windows\SysWOW64\Ahhchk32.exe Ajdcofop.exe File created C:\Windows\SysWOW64\Ockdmn32.exe Olalpdbc.exe File created C:\Windows\SysWOW64\Cnhhge32.exe Boleejag.exe File opened for modification C:\Windows\SysWOW64\Bafkookd.exe Blibghmm.exe File created C:\Windows\SysWOW64\Jdlacfca.exe Jghqia32.exe File created C:\Windows\SysWOW64\Hqnpad32.dll Nkqjdo32.exe File created C:\Windows\SysWOW64\Hingbldn.dll Ebabicfn.exe File created C:\Windows\SysWOW64\Kihjmonk.dll Jofdll32.exe File opened for modification C:\Windows\SysWOW64\Mjmnmk32.exe Laeidfdn.exe File opened for modification C:\Windows\SysWOW64\Kcajceke.exe Kndbko32.exe File created C:\Windows\SysWOW64\Jlmock32.dll Mdgmbhgh.exe File created C:\Windows\SysWOW64\Kpijio32.dll Bbfnchfb.exe File created C:\Windows\SysWOW64\Jjqiok32.exe Jhmpbc32.exe File created C:\Windows\SysWOW64\Kggfnoch.exe Knoaeimg.exe File created C:\Windows\SysWOW64\Mpbodi32.dll Nokcbm32.exe File created C:\Windows\SysWOW64\Pfmpgd32.dll Negeln32.exe File created C:\Windows\SysWOW64\Dgildi32.exe Dnqhkcdo.exe File created C:\Windows\SysWOW64\Agngpn32.dll Chgimh32.exe File created C:\Windows\SysWOW64\Nokqidll.exe Nhqhmj32.exe File opened for modification C:\Windows\SysWOW64\Jjkiie32.exe Jofdll32.exe File opened for modification C:\Windows\SysWOW64\Meeopdhb.exe Mcfbfaao.exe File created C:\Windows\SysWOW64\Glgkjp32.dll Dklepmal.exe File opened for modification C:\Windows\SysWOW64\Ihbdhepp.exe Inmpklpj.exe File created C:\Windows\SysWOW64\Poajppaa.dll Jdlacfca.exe File created C:\Windows\SysWOW64\Qcoljb32.dll Mkfojakp.exe File created C:\Windows\SysWOW64\Coldmfkf.exe Cgaoic32.exe File created C:\Windows\SysWOW64\Bdggbp32.dll Iokahhac.exe File created C:\Windows\SysWOW64\Jjkiie32.exe Jofdll32.exe File created C:\Windows\SysWOW64\Bpkphm32.dll Lqjfpbmm.exe File created C:\Windows\SysWOW64\Anlbkeee.dll Kndbko32.exe File created C:\Windows\SysWOW64\Bakdjn32.exe Bhbpahan.exe File opened for modification C:\Windows\SysWOW64\Cdqfgh32.exe Cdnjaibm.exe File opened for modification C:\Windows\SysWOW64\Eoajgh32.exe Egeecf32.exe File created C:\Windows\SysWOW64\Ddhcbnnn.exe Chabmm32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2196 2932 WerFault.exe Ockdmn32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Gpjilj32.exeHjmmcgha.exeMaocekoo.exeEkjgbi32.exeMaldfbjn.exeNegeln32.exeNhnemdbf.exeIokahhac.exeHdbbnd32.exeMdgmbhgh.exeOgdaod32.exeAlmihjlj.exeCkmbdh32.exeJdlclo32.exeNanhihno.exeIdekbgji.exeNhcebj32.exeAmkbpm32.exeNnodgbed.exeNhpabdqd.exeKnoaeimg.exeNdiomdde.exeNmacej32.exeAgqfme32.exeOphoecoa.exeOiokholk.exeOgaeieoj.exeHpdbmooo.exeLehfafgp.exeAjjinaco.exeBlibghmm.exeBakdjn32.exeCdnjaibm.exeKcajceke.exeGhmnmo32.exeFgqhgjbb.exeNinjjf32.exeNlocka32.exeBlipno32.exeDgalhgpg.exeHajhpgag.exeDkhnmfle.exeMkfojakp.exeDnqhkcdo.exeJfagemej.exeBbfnchfb.exePipjpj32.exeAiflpm32.exeDammoahg.exeGdcfoq32.exeHgoadp32.exeMoccnoni.exeHadhjaaa.exeChabmm32.exeEdhpaa32.exeNhqhmj32.exeDodahk32.exeMfebdm32.exeCnhhge32.exeKaekljjo.exeNmgjee32.exeNiqgof32.exeLaackgka.exeIaddid32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpjilj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjmmcgha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maocekoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekjgbi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maldfbjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Negeln32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhnemdbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iokahhac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdbbnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdgmbhgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogdaod32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Almihjlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckmbdh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdlclo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nanhihno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idekbgji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhcebj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amkbpm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nnodgbed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhpabdqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knoaeimg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndiomdde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmacej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agqfme32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ophoecoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oiokholk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogaeieoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpdbmooo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lehfafgp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajjinaco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blibghmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bakdjn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdnjaibm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcajceke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghmnmo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgqhgjbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ninjjf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlocka32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blipno32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgalhgpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hajhpgag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkhnmfle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkfojakp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnqhkcdo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfagemej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbfnchfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pipjpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aiflpm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dammoahg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gdcfoq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgoadp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moccnoni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hadhjaaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chabmm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edhpaa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhqhmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodahk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfebdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnhhge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kaekljjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmgjee32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Niqgof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Laackgka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iaddid32.exe -
Modifies registry class 64 IoCs
Processes:
Hbhagiem.exeIdokma32.exeIjampgde.exeKbeqjl32.exeMmkafhnb.exeFihalb32.exeEbabicfn.exeNanhihno.exeQonlhd32.exeMjddnjdf.exeLdhgnk32.exeAmoibc32.exeIhlnhffh.exeNafiej32.exeGbcien32.exeGedbfimc.exeJibpghbk.exeKigibh32.exeMeeopdhb.exeBmnofp32.exeHhfmbq32.exeAgccbenc.exeGfdaid32.exeBimphc32.exeLiboodmk.exe1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exeDklepmal.exeOngckp32.exeChabmm32.exeHgckoofa.exeAjdcofop.exeHadhjaaa.exeOeegnj32.exeIbkhak32.exeGnicoh32.exeLjcbcngi.exeOkkddd32.exeHpdbmooo.exeHkbmil32.exeHjmmcgha.exeEdhpaa32.exeCiepkajj.exeAmmoel32.exeOomlfpdi.exeLqjfpbmm.exeCnhhge32.exeHgoadp32.exePbdipa32.exeCdnjaibm.exeQaofgc32.exeDnqhkcdo.exeEfoifiep.exeDibhjokm.exeFbfjkj32.exeLpgqlc32.exeAiflpm32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hbhagiem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akfbdoha.dll" Idokma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijampgde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbeqjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmkafhnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fihalb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hingbldn.dll" Ebabicfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nanhihno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qonlhd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebabicfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgaabajd.dll" Mjddnjdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibmkap32.dll" Ldhgnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npabemib.dll" Amoibc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmogjn32.dll" Ihlnhffh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nafiej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbcien32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gedbfimc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejcfme32.dll" Jibpghbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kigibh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Meeopdhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbiphidl.dll" Bmnofp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkpnjeha.dll" Hhfmbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agccbenc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gfdaid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bimphc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Moeodd32.dll" Liboodmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dklepmal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eiefbk32.dll" Ongckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glipgk32.dll" Chabmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aopnanlf.dll" Hgckoofa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajdcofop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hadhjaaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfdfng32.dll" Oeegnj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibkhak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pchjmjfn.dll" Gnicoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ljcbcngi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Agccbenc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okkddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpdbmooo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkbmil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjmmcgha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qoemceeo.dll" Edhpaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijampgde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhnlnf32.dll" Kbeqjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ciepkajj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifjbd32.dll" Ammoel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkdjamga.dll" Oomlfpdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lqjfpbmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oomlfpdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hclmphpn.dll" Cnhhge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgoadp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbdipa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kopnjkfp.dll" Qonlhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlmfcoia.dll" Cdnjaibm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qaofgc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnqhkcdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efoifiep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihlnhffh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dibhjokm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbfjkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lpgqlc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aiflpm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exeKlmbjh32.exeLdhgnk32.exeLglmefcg.exeLaaabo32.exeMokkegmm.exeMaldfbjn.exeMkibjgli.exeNddcimag.exeNgbpehpj.exeNnodgbed.exeObcffefa.exeOnjgkf32.exeOiokholk.exePpdfimji.exePbepkh32.exedescription pid process target process PID 2448 wrote to memory of 2832 2448 1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe Klmbjh32.exe PID 2448 wrote to memory of 2832 2448 1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe Klmbjh32.exe PID 2448 wrote to memory of 2832 2448 1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe Klmbjh32.exe PID 2448 wrote to memory of 2832 2448 1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe Klmbjh32.exe PID 2832 wrote to memory of 2884 2832 Klmbjh32.exe Ldhgnk32.exe PID 2832 wrote to memory of 2884 2832 Klmbjh32.exe Ldhgnk32.exe PID 2832 wrote to memory of 2884 2832 Klmbjh32.exe Ldhgnk32.exe PID 2832 wrote to memory of 2884 2832 Klmbjh32.exe Ldhgnk32.exe PID 2884 wrote to memory of 2932 2884 Ldhgnk32.exe Lglmefcg.exe PID 2884 wrote to memory of 2932 2884 Ldhgnk32.exe Lglmefcg.exe PID 2884 wrote to memory of 2932 2884 Ldhgnk32.exe Lglmefcg.exe PID 2884 wrote to memory of 2932 2884 Ldhgnk32.exe Lglmefcg.exe PID 2932 wrote to memory of 2676 2932 Lglmefcg.exe Laaabo32.exe PID 2932 wrote to memory of 2676 2932 Lglmefcg.exe Laaabo32.exe PID 2932 wrote to memory of 2676 2932 Lglmefcg.exe Laaabo32.exe PID 2932 wrote to memory of 2676 2932 Lglmefcg.exe Laaabo32.exe PID 2676 wrote to memory of 2080 2676 Laaabo32.exe Mokkegmm.exe PID 2676 wrote to memory of 2080 2676 Laaabo32.exe Mokkegmm.exe PID 2676 wrote to memory of 2080 2676 Laaabo32.exe Mokkegmm.exe PID 2676 wrote to memory of 2080 2676 Laaabo32.exe Mokkegmm.exe PID 2080 wrote to memory of 1916 2080 Mokkegmm.exe Maldfbjn.exe PID 2080 wrote to memory of 1916 2080 Mokkegmm.exe Maldfbjn.exe PID 2080 wrote to memory of 1916 2080 Mokkegmm.exe Maldfbjn.exe PID 2080 wrote to memory of 1916 2080 Mokkegmm.exe Maldfbjn.exe PID 1916 wrote to memory of 2204 1916 Maldfbjn.exe Mkibjgli.exe PID 1916 wrote to memory of 2204 1916 Maldfbjn.exe Mkibjgli.exe PID 1916 wrote to memory of 2204 1916 Maldfbjn.exe Mkibjgli.exe PID 1916 wrote to memory of 2204 1916 Maldfbjn.exe Mkibjgli.exe PID 2204 wrote to memory of 2424 2204 Mkibjgli.exe Nddcimag.exe PID 2204 wrote to memory of 2424 2204 Mkibjgli.exe Nddcimag.exe PID 2204 wrote to memory of 2424 2204 Mkibjgli.exe Nddcimag.exe PID 2204 wrote to memory of 2424 2204 Mkibjgli.exe Nddcimag.exe PID 2424 wrote to memory of 2956 2424 Nddcimag.exe Ngbpehpj.exe PID 2424 wrote to memory of 2956 2424 Nddcimag.exe Ngbpehpj.exe PID 2424 wrote to memory of 2956 2424 Nddcimag.exe Ngbpehpj.exe PID 2424 wrote to memory of 2956 2424 Nddcimag.exe Ngbpehpj.exe PID 2956 wrote to memory of 1816 2956 Ngbpehpj.exe Nnodgbed.exe PID 2956 wrote to memory of 1816 2956 Ngbpehpj.exe Nnodgbed.exe PID 2956 wrote to memory of 1816 2956 Ngbpehpj.exe Nnodgbed.exe PID 2956 wrote to memory of 1816 2956 Ngbpehpj.exe Nnodgbed.exe PID 1816 wrote to memory of 564 1816 Nnodgbed.exe Obcffefa.exe PID 1816 wrote to memory of 564 1816 Nnodgbed.exe Obcffefa.exe PID 1816 wrote to memory of 564 1816 Nnodgbed.exe Obcffefa.exe PID 1816 wrote to memory of 564 1816 Nnodgbed.exe Obcffefa.exe PID 564 wrote to memory of 2024 564 Obcffefa.exe Onjgkf32.exe PID 564 wrote to memory of 2024 564 Obcffefa.exe Onjgkf32.exe PID 564 wrote to memory of 2024 564 Obcffefa.exe Onjgkf32.exe PID 564 wrote to memory of 2024 564 Obcffefa.exe Onjgkf32.exe PID 2024 wrote to memory of 2368 2024 Onjgkf32.exe Oiokholk.exe PID 2024 wrote to memory of 2368 2024 Onjgkf32.exe Oiokholk.exe PID 2024 wrote to memory of 2368 2024 Onjgkf32.exe Oiokholk.exe PID 2024 wrote to memory of 2368 2024 Onjgkf32.exe Oiokholk.exe PID 2368 wrote to memory of 2128 2368 Oiokholk.exe Ppdfimji.exe PID 2368 wrote to memory of 2128 2368 Oiokholk.exe Ppdfimji.exe PID 2368 wrote to memory of 2128 2368 Oiokholk.exe Ppdfimji.exe PID 2368 wrote to memory of 2128 2368 Oiokholk.exe Ppdfimji.exe PID 2128 wrote to memory of 2396 2128 Ppdfimji.exe Pbepkh32.exe PID 2128 wrote to memory of 2396 2128 Ppdfimji.exe Pbepkh32.exe PID 2128 wrote to memory of 2396 2128 Ppdfimji.exe Pbepkh32.exe PID 2128 wrote to memory of 2396 2128 Ppdfimji.exe Pbepkh32.exe PID 2396 wrote to memory of 1676 2396 Pbepkh32.exe Pefhlcdk.exe PID 2396 wrote to memory of 1676 2396 Pbepkh32.exe Pefhlcdk.exe PID 2396 wrote to memory of 1676 2396 Pbepkh32.exe Pefhlcdk.exe PID 2396 wrote to memory of 1676 2396 Pbepkh32.exe Pefhlcdk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe"C:\Users\Admin\AppData\Local\Temp\1c55f981b1181307735b9691ed202c0fc132c50296db3f4d46a27fbc6ceb852f.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Klmbjh32.exeC:\Windows\system32\Klmbjh32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\Ldhgnk32.exeC:\Windows\system32\Ldhgnk32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Lglmefcg.exeC:\Windows\system32\Lglmefcg.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Laaabo32.exeC:\Windows\system32\Laaabo32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\Mokkegmm.exeC:\Windows\system32\Mokkegmm.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Maldfbjn.exeC:\Windows\system32\Maldfbjn.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\Mkibjgli.exeC:\Windows\system32\Mkibjgli.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\Nddcimag.exeC:\Windows\system32\Nddcimag.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\Ngbpehpj.exeC:\Windows\system32\Ngbpehpj.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\Nnodgbed.exeC:\Windows\system32\Nnodgbed.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\Obcffefa.exeC:\Windows\system32\Obcffefa.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\Onjgkf32.exeC:\Windows\system32\Onjgkf32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\Oiokholk.exeC:\Windows\system32\Oiokholk.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\Ppdfimji.exeC:\Windows\system32\Ppdfimji.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\Pbepkh32.exeC:\Windows\system32\Pbepkh32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\Pefhlcdk.exeC:\Windows\system32\Pefhlcdk.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Windows\SysWOW64\Qaofgc32.exeC:\Windows\system32\Qaofgc32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Ajjgei32.exeC:\Windows\system32\Ajjgei32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1468 -
C:\Windows\SysWOW64\Apkihofl.exeC:\Windows\system32\Apkihofl.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Windows\SysWOW64\Amoibc32.exeC:\Windows\system32\Amoibc32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2596 -
C:\Windows\SysWOW64\Baclaf32.exeC:\Windows\system32\Baclaf32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220 -
C:\Windows\SysWOW64\Blipno32.exeC:\Windows\system32\Blipno32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\Bimphc32.exeC:\Windows\system32\Bimphc32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2360 -
C:\Windows\SysWOW64\Bedamd32.exeC:\Windows\system32\Bedamd32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1040 -
C:\Windows\SysWOW64\Boleejag.exeC:\Windows\system32\Boleejag.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2728 -
C:\Windows\SysWOW64\Cnhhge32.exeC:\Windows\system32\Cnhhge32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\Cpiaipmh.exeC:\Windows\system32\Cpiaipmh.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436 -
C:\Windows\SysWOW64\Ddkgbc32.exeC:\Windows\system32\Ddkgbc32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552 -
C:\Windows\SysWOW64\Dbadagln.exeC:\Windows\system32\Dbadagln.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2792 -
C:\Windows\SysWOW64\Dkjhjm32.exeC:\Windows\system32\Dkjhjm32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1936 -
C:\Windows\SysWOW64\Dklepmal.exeC:\Windows\system32\Dklepmal.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Enmnahnm.exeC:\Windows\system32\Enmnahnm.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\Epcddopf.exeC:\Windows\system32\Epcddopf.exe34⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\Eikimeff.exeC:\Windows\system32\Eikimeff.exe35⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\Efoifiep.exeC:\Windows\system32\Efoifiep.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\Fbfjkj32.exeC:\Windows\system32\Fbfjkj32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:864 -
C:\Windows\SysWOW64\Fjaoplho.exeC:\Windows\system32\Fjaoplho.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:760 -
C:\Windows\SysWOW64\Fakglf32.exeC:\Windows\system32\Fakglf32.exe39⤵
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\Gbcien32.exeC:\Windows\system32\Gbcien32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Gdcfoq32.exeC:\Windows\system32\Gdcfoq32.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\Gedbfimc.exeC:\Windows\system32\Gedbfimc.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\Ghekhd32.exeC:\Windows\system32\Ghekhd32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\Gbjpem32.exeC:\Windows\system32\Gbjpem32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\Gkedjo32.exeC:\Windows\system32\Gkedjo32.exe45⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\Gekhgh32.exeC:\Windows\system32\Gekhgh32.exe46⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\SysWOW64\Hmfmkjdf.exeC:\Windows\system32\Hmfmkjdf.exe47⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\Hgoadp32.exeC:\Windows\system32\Hgoadp32.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1276 -
C:\Windows\SysWOW64\Hdbbnd32.exeC:\Windows\system32\Hdbbnd32.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\Hafbghhj.exeC:\Windows\system32\Hafbghhj.exe50⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\Hgckoofa.exeC:\Windows\system32\Hgckoofa.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Hlpchfdi.exeC:\Windows\system32\Hlpchfdi.exe52⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\Hgfheodo.exeC:\Windows\system32\Hgfheodo.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\Hlbpme32.exeC:\Windows\system32\Hlbpme32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\Ijfqfj32.exeC:\Windows\system32\Ijfqfj32.exe55⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\Iocioq32.exeC:\Windows\system32\Iocioq32.exe56⤵
- Executes dropped EXE
PID:604 -
C:\Windows\SysWOW64\Ihlnhffh.exeC:\Windows\system32\Ihlnhffh.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\Icabeo32.exeC:\Windows\system32\Icabeo32.exe58⤵
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\Ilifndlo.exeC:\Windows\system32\Ilifndlo.exe59⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\Idekbgji.exeC:\Windows\system32\Idekbgji.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\Inmpklpj.exeC:\Windows\system32\Inmpklpj.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1632 -
C:\Windows\SysWOW64\Ihbdhepp.exeC:\Windows\system32\Ihbdhepp.exe62⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\Ibkhak32.exeC:\Windows\system32\Ibkhak32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\Jghqia32.exeC:\Windows\system32\Jghqia32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1616 -
C:\Windows\SysWOW64\Jdlacfca.exeC:\Windows\system32\Jdlacfca.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\Jjijkmbi.exeC:\Windows\system32\Jjijkmbi.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1464 -
C:\Windows\SysWOW64\Jcandb32.exeC:\Windows\system32\Jcandb32.exe67⤵PID:2212
-
C:\Windows\SysWOW64\Jqeomfgc.exeC:\Windows\system32\Jqeomfgc.exe68⤵PID:1372
-
C:\Windows\SysWOW64\Jfagemej.exeC:\Windows\system32\Jfagemej.exe69⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\Jojloc32.exeC:\Windows\system32\Jojloc32.exe70⤵PID:3008
-
C:\Windows\SysWOW64\Jibpghbk.exeC:\Windows\system32\Jibpghbk.exe71⤵
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Kffqqm32.exeC:\Windows\system32\Kffqqm32.exe72⤵PID:1824
-
C:\Windows\SysWOW64\Kpoejbhe.exeC:\Windows\system32\Kpoejbhe.exe73⤵PID:2648
-
C:\Windows\SysWOW64\Kigibh32.exeC:\Windows\system32\Kigibh32.exe74⤵
- Modifies registry class
PID:932 -
C:\Windows\SysWOW64\Kndbko32.exeC:\Windows\system32\Kndbko32.exe75⤵
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\Kcajceke.exeC:\Windows\system32\Kcajceke.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\Kaekljjo.exeC:\Windows\system32\Kaekljjo.exe77⤵
- System Location Discovery: System Language Discovery
PID:520 -
C:\Windows\SysWOW64\Kgocid32.exeC:\Windows\system32\Kgocid32.exe78⤵PID:580
-
C:\Windows\SysWOW64\Kmklak32.exeC:\Windows\system32\Kmklak32.exe79⤵PID:1272
-
C:\Windows\SysWOW64\Lhapocoi.exeC:\Windows\system32\Lhapocoi.exe80⤵PID:2192
-
C:\Windows\SysWOW64\Lmnhgjmp.exeC:\Windows\system32\Lmnhgjmp.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2356 -
C:\Windows\SysWOW64\Mebpakbq.exeC:\Windows\system32\Mebpakbq.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1364 -
C:\Windows\SysWOW64\Mokdja32.exeC:\Windows\system32\Mokdja32.exe83⤵PID:2012
-
C:\Windows\SysWOW64\Mdgmbhgh.exeC:\Windows\system32\Mdgmbhgh.exe84⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\Mpqjmh32.exeC:\Windows\system32\Mpqjmh32.exe85⤵PID:1736
-
C:\Windows\SysWOW64\Mkfojakp.exeC:\Windows\system32\Mkfojakp.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\Mdoccg32.exeC:\Windows\system32\Mdoccg32.exe87⤵PID:1108
-
C:\Windows\SysWOW64\Nepokogo.exeC:\Windows\system32\Nepokogo.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2844 -
C:\Windows\SysWOW64\Npechhgd.exeC:\Windows\system32\Npechhgd.exe89⤵PID:2864
-
C:\Windows\SysWOW64\Ngoleb32.exeC:\Windows\system32\Ngoleb32.exe90⤵PID:1548
-
C:\Windows\SysWOW64\Nhqhmj32.exeC:\Windows\system32\Nhqhmj32.exe91⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\Nokqidll.exeC:\Windows\system32\Nokqidll.exe92⤵PID:3032
-
C:\Windows\SysWOW64\Nhcebj32.exeC:\Windows\system32\Nhcebj32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Windows\SysWOW64\Negeln32.exeC:\Windows\system32\Negeln32.exe94⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\Nlanhh32.exeC:\Windows\system32\Nlanhh32.exe95⤵PID:2160
-
C:\Windows\SysWOW64\Nanfqo32.exeC:\Windows\system32\Nanfqo32.exe96⤵PID:2284
-
C:\Windows\SysWOW64\Nkfkidmk.exeC:\Windows\system32\Nkfkidmk.exe97⤵PID:2136
-
C:\Windows\SysWOW64\Odnobj32.exeC:\Windows\system32\Odnobj32.exe98⤵PID:1492
-
C:\Windows\SysWOW64\Ongckp32.exeC:\Windows\system32\Ongckp32.exe99⤵
- Drops file in System32 directory
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Odqlhjbi.exeC:\Windows\system32\Odqlhjbi.exe100⤵PID:1028
-
C:\Windows\SysWOW64\Okkddd32.exeC:\Windows\system32\Okkddd32.exe101⤵
- Modifies registry class
PID:2860 -
C:\Windows\SysWOW64\Ogaeieoj.exeC:\Windows\system32\Ogaeieoj.exe102⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\Ogdaod32.exeC:\Windows\system32\Ogdaod32.exe103⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\Ohengmcf.exeC:\Windows\system32\Ohengmcf.exe104⤵
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\Ockbdebl.exeC:\Windows\system32\Ockbdebl.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2796 -
C:\Windows\SysWOW64\Pbpoebgc.exeC:\Windows\system32\Pbpoebgc.exe106⤵PID:752
-
C:\Windows\SysWOW64\Pkhdnh32.exeC:\Windows\system32\Pkhdnh32.exe107⤵PID:2296
-
C:\Windows\SysWOW64\Pbdipa32.exeC:\Windows\system32\Pbdipa32.exe108⤵
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\Pchbmigj.exeC:\Windows\system32\Pchbmigj.exe109⤵PID:2556
-
C:\Windows\SysWOW64\Pmqffonj.exeC:\Windows\system32\Pmqffonj.exe110⤵PID:1576
-
C:\Windows\SysWOW64\Qcmkhi32.exeC:\Windows\system32\Qcmkhi32.exe111⤵PID:1056
-
C:\Windows\SysWOW64\Abbhje32.exeC:\Windows\system32\Abbhje32.exe112⤵PID:3056
-
C:\Windows\SysWOW64\Apfici32.exeC:\Windows\system32\Apfici32.exe113⤵PID:1044
-
C:\Windows\SysWOW64\Almihjlj.exeC:\Windows\system32\Almihjlj.exe114⤵
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\Abgaeddg.exeC:\Windows\system32\Abgaeddg.exe115⤵PID:2656
-
C:\Windows\SysWOW64\Anmbje32.exeC:\Windows\system32\Anmbje32.exe116⤵PID:2740
-
C:\Windows\SysWOW64\Ajdcofop.exeC:\Windows\system32\Ajdcofop.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\Ahhchk32.exeC:\Windows\system32\Ahhchk32.exe118⤵PID:2304
-
C:\Windows\SysWOW64\Bobleeef.exeC:\Windows\system32\Bobleeef.exe119⤵PID:2680
-
C:\Windows\SysWOW64\Bodhjdcc.exeC:\Windows\system32\Bodhjdcc.exe120⤵PID:2936
-
C:\Windows\SysWOW64\Bfpmog32.exeC:\Windows\system32\Bfpmog32.exe121⤵
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\Bbfnchfb.exeC:\Windows\system32\Bbfnchfb.exe122⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1308
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-