Analysis
-
max time kernel
40s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 23:08
Behavioral task
behavioral1
Sample
42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe
Resource
win7-20241010-en
General
-
Target
42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe
-
Size
163KB
-
MD5
c5c295fec7224c8a6cb645c39af3b372
-
SHA1
8beb4b48e9a40d8274d930b25f0ad27c5ebf62eb
-
SHA256
42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e
-
SHA512
c34e1f7e308be596a81dd367f9f7b2095147964ca1c55338d17d360adb87ee064a6b958d1e3a323fddbdb5c4db7be90751fe01ee9e2048825a5fb87b77cd8689
-
SSDEEP
1536:PNWDnPoOJZJkR5uxDTK5ijdKASfvoCoEN09xlProNVU4qNVUrk/9QbfBr+7GwKrj:k7PoOjJDTcvodvltOrWKDBr+yJb
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Hgknffcp.exeJgaikb32.exePphilb32.exeFlmglfhk.exeGphokhco.exeAjelmiag.exeGgcnbh32.exeEogckqkk.exeBholco32.exeGpledf32.exeIiiogoac.exeJdpmij32.exeCgibpj32.exeCoknmp32.exeGpfbfh32.exePofnok32.exeKjalch32.exeBbcjfn32.exeLebemmbk.exeHnnoempk.exeMcjihk32.exeMacpcccp.exeNeaehelb.exeMphfji32.exeAjnlqgfo.exeCajmbd32.exeFmnmih32.exeHbcdfq32.exeNhhdiknb.exeFflehp32.exeJkpilg32.exeOfcnmh32.exeAngafl32.exeAeachphg.exeBjbelf32.exeGgfgoo32.exeBbhgbj32.exeKdefdjnl.exeGiafmfad.exeLblflgqk.exeAjkokgia.exeDljdcqek.exeGijplg32.exeAkahokho.exeJgjman32.exeLbfdnijp.exeHegdinpd.exeHepdml32.exeIniebmfg.exeAlcclb32.exeIghfecdb.exeLnkjfcik.exeAndlmnki.exeIdagdm32.exeLehfcc32.exeEjcaanfg.exeEkcmkamj.exeGepeep32.exeLiaenblm.exeFdcahdib.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgknffcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgaikb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pphilb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flmglfhk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gphokhco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajelmiag.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggcnbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eogckqkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bholco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpledf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiiogoac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdpmij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgibpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coknmp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpfbfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pofnok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjalch32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbcjfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lebemmbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hnnoempk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcjihk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Macpcccp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neaehelb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mphfji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajnlqgfo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cajmbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmnmih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbcdfq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhhdiknb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fflehp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gphokhco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkpilg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofcnmh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Angafl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeachphg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjbelf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggfgoo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbhgbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdefdjnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Giafmfad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lblflgqk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbcdfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajkokgia.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dljdcqek.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gijplg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akahokho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgjman32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbfdnijp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hegdinpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hepdml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iniebmfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggcnbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Alcclb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ighfecdb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnkjfcik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Andlmnki.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idagdm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lehfcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejcaanfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekcmkamj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gepeep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pphilb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liaenblm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdcahdib.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Nhlkkabh.exe family_bruteratel -
Executes dropped EXE 64 IoCs
Processes:
Cbokoa32.exeDnjeoa32.exeDmaoem32.exeDihojnqo.exeDflpdb32.exeDcppmg32.exeEamgeo32.exeEnagnc32.exeEfllcf32.exeFioajqmb.exeFfeoid32.exeFeklja32.exeGepeep32.exeGohjnf32.exeGgcnbh32.exeGidgdcli.exeHohfmi32.exeHdgkkppm.exeIkcpmieg.exeIcnealbb.exeIccnmk32.exeJchhhjjg.exeJgjman32.exeJboanfmm.exeJadnoc32.exeKjalch32.exeKigidd32.exeKofnbk32.exeLbfdnijp.exeLlnhgn32.exeLanmde32.exeMkhocj32.exeMinldf32.exeMiphjf32.exeMcjihk32.exeMhgbpb32.exeNekbjf32.exeNhlkkabh.exeNpgppdpc.exeNchiao32.exeOhgnoeii.exeObpbhk32.exeOilgje32.exeOfphdi32.exePjbnmm32.exePcjbfbmm.exePmbfoh32.exePcokaa32.exePpelfbol.exePphilb32.exeQeeadi32.exeQnmfmoaa.exeQhejed32.exeAanonj32.exeAlcclb32.exeAapkdi32.exeAndlmnki.exeAfoqbpid.exeApheke32.exeAjmihn32.exeAdenqd32.exeBlabef32.exeBffgbo32.exeBlcokf32.exepid process 2396 Cbokoa32.exe 2528 Dnjeoa32.exe 2948 Dmaoem32.exe 2980 Dihojnqo.exe 2864 Dflpdb32.exe 2756 Dcppmg32.exe 2660 Eamgeo32.exe 2348 Enagnc32.exe 2448 Efllcf32.exe 1728 Fioajqmb.exe 1140 Ffeoid32.exe 2016 Feklja32.exe 1652 Gepeep32.exe 1064 Gohjnf32.exe 2632 Ggcnbh32.exe 2260 Gidgdcli.exe 2460 Hohfmi32.exe 2424 Hdgkkppm.exe 1016 Ikcpmieg.exe 1252 Icnealbb.exe 1328 Iccnmk32.exe 3024 Jchhhjjg.exe 1624 Jgjman32.exe 2008 Jboanfmm.exe 1648 Jadnoc32.exe 2344 Kjalch32.exe 1500 Kigidd32.exe 2484 Kofnbk32.exe 2888 Lbfdnijp.exe 2808 Llnhgn32.exe 2744 Lanmde32.exe 2900 Mkhocj32.exe 2208 Minldf32.exe 2452 Miphjf32.exe 2436 Mcjihk32.exe 2748 Mhgbpb32.exe 956 Nekbjf32.exe 2476 Nhlkkabh.exe 2388 Npgppdpc.exe 1380 Nchiao32.exe 1352 Ohgnoeii.exe 3048 Obpbhk32.exe 2216 Oilgje32.exe 1596 Ofphdi32.exe 2268 Pjbnmm32.exe 2408 Pcjbfbmm.exe 2468 Pmbfoh32.exe 1956 Pcokaa32.exe 924 Ppelfbol.exe 1752 Pphilb32.exe 2308 Qeeadi32.exe 2760 Qnmfmoaa.exe 1472 Qhejed32.exe 2884 Aanonj32.exe 2840 Alcclb32.exe 2816 Aapkdi32.exe 2712 Andlmnki.exe 2004 Afoqbpid.exe 2976 Apheke32.exe 2248 Ajmihn32.exe 2968 Adenqd32.exe 2128 Blabef32.exe 976 Bffgbo32.exe 2536 Blcokf32.exe -
Loads dropped DLL 64 IoCs
Processes:
42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exeCbokoa32.exeDnjeoa32.exeDmaoem32.exeDihojnqo.exeDflpdb32.exeDcppmg32.exeEamgeo32.exeEnagnc32.exeEfllcf32.exeFioajqmb.exeFfeoid32.exeFeklja32.exeGepeep32.exeGohjnf32.exeGgcnbh32.exeGidgdcli.exeHohfmi32.exeHdgkkppm.exeIkcpmieg.exeIcnealbb.exeIccnmk32.exeJchhhjjg.exeJgjman32.exeJboanfmm.exeJadnoc32.exeKjalch32.exeKigidd32.exeKofnbk32.exeLbfdnijp.exeLlnhgn32.exeLanmde32.exepid process 1268 42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe 1268 42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe 2396 Cbokoa32.exe 2396 Cbokoa32.exe 2528 Dnjeoa32.exe 2528 Dnjeoa32.exe 2948 Dmaoem32.exe 2948 Dmaoem32.exe 2980 Dihojnqo.exe 2980 Dihojnqo.exe 2864 Dflpdb32.exe 2864 Dflpdb32.exe 2756 Dcppmg32.exe 2756 Dcppmg32.exe 2660 Eamgeo32.exe 2660 Eamgeo32.exe 2348 Enagnc32.exe 2348 Enagnc32.exe 2448 Efllcf32.exe 2448 Efllcf32.exe 1728 Fioajqmb.exe 1728 Fioajqmb.exe 1140 Ffeoid32.exe 1140 Ffeoid32.exe 2016 Feklja32.exe 2016 Feklja32.exe 1652 Gepeep32.exe 1652 Gepeep32.exe 1064 Gohjnf32.exe 1064 Gohjnf32.exe 2632 Ggcnbh32.exe 2632 Ggcnbh32.exe 2260 Gidgdcli.exe 2260 Gidgdcli.exe 2460 Hohfmi32.exe 2460 Hohfmi32.exe 2424 Hdgkkppm.exe 2424 Hdgkkppm.exe 1016 Ikcpmieg.exe 1016 Ikcpmieg.exe 1252 Icnealbb.exe 1252 Icnealbb.exe 1328 Iccnmk32.exe 1328 Iccnmk32.exe 3024 Jchhhjjg.exe 3024 Jchhhjjg.exe 1624 Jgjman32.exe 1624 Jgjman32.exe 2008 Jboanfmm.exe 2008 Jboanfmm.exe 1648 Jadnoc32.exe 1648 Jadnoc32.exe 2344 Kjalch32.exe 2344 Kjalch32.exe 1500 Kigidd32.exe 1500 Kigidd32.exe 2484 Kofnbk32.exe 2484 Kofnbk32.exe 2888 Lbfdnijp.exe 2888 Lbfdnijp.exe 2808 Llnhgn32.exe 2808 Llnhgn32.exe 2744 Lanmde32.exe 2744 Lanmde32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kgkokjjd.exePcgnfl32.exeAjnlqgfo.exeOfphdi32.exeJficbn32.exeAjkokgia.exeAngafl32.exeIejnna32.exePiipibff.exeIpedihgm.exePmeemp32.exeDdlloi32.exePjiffd32.exeLcllii32.exeFmqpinlf.exeHohfmi32.exeLehfcc32.exeMjknab32.exeKigidd32.exeOdhhdk32.exeDblcnngi.exeFlmglfhk.exeDljdcqek.exeNekbjf32.exeQohkdkdn.exeHiichkog.exeDocjpa32.exeEjcaanfg.exeFflehp32.exeMacpcccp.exeMbiokdam.exeBijobb32.exeAanonj32.exeGdchifik.exeIghfecdb.exeMhjdpgic.exeEamgeo32.exeNmlcbafa.exeBfjmkn32.exeCkboba32.exeGeckno32.exeMogqlgbi.exeGjomlp32.exeOabafcek.exeCpccnp32.exeGepeep32.exeLlnhgn32.exeBlcokf32.exeCbpbek32.exeKjalch32.exeOkgpfjbo.exeObpbhk32.exeOhgnoeii.exePphilb32.exeQcigjolm.exeBbcjfn32.exeJadnoc32.exeMipjbokm.exeJkpilg32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Lmhhcaik.exe Kgkokjjd.exe File created C:\Windows\SysWOW64\Pblkgh32.exe Pcgnfl32.exe File created C:\Windows\SysWOW64\Bgaljk32.exe Ajnlqgfo.exe File created C:\Windows\SysWOW64\Pjbnmm32.exe Ofphdi32.exe File opened for modification C:\Windows\SysWOW64\Jkhhpeka.exe Jficbn32.exe File created C:\Windows\SysWOW64\Lglfbk32.dll Ajkokgia.exe File created C:\Windows\SysWOW64\Apgnpo32.exe Angafl32.exe File opened for modification C:\Windows\SysWOW64\Ilcfjkgj.exe Iejnna32.exe File created C:\Windows\SysWOW64\Pqodpj32.dll Piipibff.exe File created C:\Windows\SysWOW64\Jehmda32.dll Ipedihgm.exe File created C:\Windows\SysWOW64\Gmplenhh.dll Pmeemp32.exe File opened for modification C:\Windows\SysWOW64\Efbbba32.exe Ddlloi32.exe File created C:\Windows\SysWOW64\Pdlahl32.dll Pjiffd32.exe File created C:\Windows\SysWOW64\Maplcm32.exe Lcllii32.exe File created C:\Windows\SysWOW64\Fhfdffll.exe Fmqpinlf.exe File opened for modification C:\Windows\SysWOW64\Pjiffd32.exe Pmeemp32.exe File created C:\Windows\SysWOW64\Hlhleh32.dll Hohfmi32.exe File opened for modification C:\Windows\SysWOW64\Lblflgqk.exe Lehfcc32.exe File opened for modification C:\Windows\SysWOW64\Mphfji32.exe Mjknab32.exe File created C:\Windows\SysWOW64\Gpejff32.dll Kigidd32.exe File created C:\Windows\SysWOW64\Ogiqffhl.exe Odhhdk32.exe File opened for modification C:\Windows\SysWOW64\Ddlloi32.exe Dblcnngi.exe File created C:\Windows\SysWOW64\Mnnimkif.dll Flmglfhk.exe File created C:\Windows\SysWOW64\Aeachphg.exe Ajkokgia.exe File created C:\Windows\SysWOW64\Dechlfkl.exe Dljdcqek.exe File opened for modification C:\Windows\SysWOW64\Nhlkkabh.exe Nekbjf32.exe File opened for modification C:\Windows\SysWOW64\Qiqpmp32.exe Qohkdkdn.exe File created C:\Windows\SysWOW64\Hepdml32.exe Hiichkog.exe File opened for modification C:\Windows\SysWOW64\Dlgjie32.exe Docjpa32.exe File created C:\Windows\SysWOW64\Ekcmkamj.exe Ejcaanfg.exe File created C:\Windows\SysWOW64\Fbbfmqdm.exe Fflehp32.exe File opened for modification C:\Windows\SysWOW64\Mogqlgbi.exe Macpcccp.exe File opened for modification C:\Windows\SysWOW64\Mpmpeiqg.exe Mbiokdam.exe File opened for modification C:\Windows\SysWOW64\Baecgdbj.exe Bijobb32.exe File opened for modification C:\Windows\SysWOW64\Alcclb32.exe Aanonj32.exe File opened for modification C:\Windows\SysWOW64\Gjomlp32.exe Gdchifik.exe File created C:\Windows\SysWOW64\Iankbldh.exe Ighfecdb.exe File opened for modification C:\Windows\SysWOW64\Mdaedhoh.exe Mhjdpgic.exe File created C:\Windows\SysWOW64\Bigmoadp.dll Eamgeo32.exe File created C:\Windows\SysWOW64\Abklpl32.dll Nmlcbafa.exe File created C:\Windows\SysWOW64\Bdnmda32.exe Bfjmkn32.exe File created C:\Windows\SysWOW64\Cdjckfda.exe Ckboba32.exe File created C:\Windows\SysWOW64\Fccffm32.dll Geckno32.exe File created C:\Windows\SysWOW64\Fhdbgqke.dll Mogqlgbi.exe File created C:\Windows\SysWOW64\Gjoiokgo.dll Gjomlp32.exe File created C:\Windows\SysWOW64\Jnjbig32.dll Ighfecdb.exe File opened for modification C:\Windows\SysWOW64\Okkfoikl.exe Oabafcek.exe File created C:\Windows\SysWOW64\Dljdcqek.exe Cpccnp32.exe File opened for modification C:\Windows\SysWOW64\Gohjnf32.exe Gepeep32.exe File created C:\Windows\SysWOW64\Pmnede32.dll Llnhgn32.exe File created C:\Windows\SysWOW64\Cfbpel32.dll Blcokf32.exe File opened for modification C:\Windows\SysWOW64\Cpccnp32.exe Cbpbek32.exe File opened for modification C:\Windows\SysWOW64\Kigidd32.exe Kjalch32.exe File created C:\Windows\SysWOW64\Ognakk32.exe Okgpfjbo.exe File created C:\Windows\SysWOW64\Dhmibjdp.dll Qohkdkdn.exe File created C:\Windows\SysWOW64\Ohcnekjc.dll Obpbhk32.exe File created C:\Windows\SysWOW64\Obpbhk32.exe Ohgnoeii.exe File created C:\Windows\SysWOW64\Qeeadi32.exe Pphilb32.exe File opened for modification C:\Windows\SysWOW64\Amalcd32.exe Qcigjolm.exe File created C:\Windows\SysWOW64\Blkoocfl.exe Bbcjfn32.exe File opened for modification C:\Windows\SysWOW64\Kjalch32.exe Jadnoc32.exe File created C:\Windows\SysWOW64\Mbiokdam.exe Mipjbokm.exe File opened for modification C:\Windows\SysWOW64\Enagnc32.exe Eamgeo32.exe File created C:\Windows\SysWOW64\Jqmadn32.exe Jkpilg32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2144 2604 WerFault.exe Hblgkkfa.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Gdchifik.exeAkdedkfl.exeGpbkca32.exeJchhhjjg.exeFflehp32.exeKbljmd32.exeCemfnh32.exeDpkpie32.exeNhlkkabh.exeIodolf32.exeIdcdjmao.exeEopbooqb.exeEkkppkpf.exeHkifld32.exeJqmadn32.exeDddodd32.exeDclikp32.exeIniebmfg.exeDechlfkl.exeAanonj32.exeMhjdpgic.exeMipjbokm.exeBholco32.exeCbokoa32.exePpelfbol.exeHmefcp32.exeEbccal32.exeMjknab32.exePmeemp32.exeNchiao32.exeCplkehnk.exeJflfbdqe.exeKpkali32.exeHiichkog.exeEbnlba32.exeBbhgbj32.exeGekncjfe.exeEdahca32.exeGmcmomjc.exeKbdmboqk.exeMpmpeiqg.exeQiqpmp32.exeAeachphg.exeBpomdmqa.exeDmaoem32.exeMinldf32.exeJkpilg32.exeIpedihgm.exeAkfbjkdj.exeOgiqffhl.exeAjnlqgfo.exeFeklja32.exeLanmde32.exeEmlkoknp.exeHopibdfd.exeNaebmppm.exeAdenqd32.exeBoohgk32.exeKbppfb32.exeQfdpgd32.exeKjalch32.exeAlcclb32.exeGjjcqpbj.exeJgaikb32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gdchifik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akdedkfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpbkca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jchhhjjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fflehp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbljmd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cemfnh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpkpie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhlkkabh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iodolf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idcdjmao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eopbooqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekkppkpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkifld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jqmadn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddodd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dclikp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iniebmfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dechlfkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aanonj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhjdpgic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mipjbokm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bholco32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbokoa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppelfbol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmefcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ebccal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjknab32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmeemp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nchiao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cplkehnk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jflfbdqe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpkali32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hiichkog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ebnlba32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbhgbj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gekncjfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edahca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmcmomjc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbdmboqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpmpeiqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qiqpmp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeachphg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpomdmqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmaoem32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Minldf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkpilg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ipedihgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akfbjkdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogiqffhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajnlqgfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Feklja32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lanmde32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emlkoknp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hopibdfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Naebmppm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adenqd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boohgk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbppfb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qfdpgd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjalch32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alcclb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjjcqpbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgaikb32.exe -
Modifies registry class 64 IoCs
Processes:
Gpfbfh32.exeMinldf32.exeMogqlgbi.exeBbcjfn32.exeGjjcqpbj.exeNkhmkf32.exeAndlmnki.exeMphfji32.exeNdoenlcf.exeNaebmppm.exeNmlcbafa.exeFidmniqa.exeEgbaelej.exeQeeadi32.exeFgpqnpjh.exeEgchocif.exeDechlfkl.exeHhfcnb32.exeAdenqd32.exeBlabef32.exeHegdinpd.exeDlgjie32.exeEbnlba32.exeGeckno32.exeIhfmdm32.exeCffejk32.exeMkhocj32.exePjbnmm32.exeGhcdpjqj.exeHmefcp32.exeIankbldh.exeEamgeo32.exeMjknab32.exeMipjbokm.exeBpomdmqa.exeCdkfco32.exeDcppmg32.exeHcdkagga.exePcgnfl32.exeFlmglfhk.exeKgkokjjd.exeGjomlp32.exeKjpafanf.exeJadnoc32.exeCbokoa32.exeFilnjk32.exeKamncagl.exeOilgje32.exeAeommfnf.exeKnldaf32.exeCaofmc32.exeDnbfkh32.exeGiafmfad.exeHopibdfd.exeJnlhbb32.exeOgnakk32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpfbfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdmnphna.dll" Minldf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mogqlgbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofhmfe32.dll" Bbcjfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gjjcqpbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfmial32.dll" Nkhmkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Andlmnki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mphfji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hiiqij32.dll" Ndoenlcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Naebmppm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abklpl32.dll" Nmlcbafa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epoljelg.dll" Fidmniqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pghcbd32.dll" Egbaelej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qeeadi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odhomb32.dll" Fgpqnpjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egchocif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpkmbn32.dll" Dechlfkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhfcnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adenqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlaghmbg.dll" Blabef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ioocfn32.dll" Hegdinpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlgjie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgpqnpjh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebnlba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebnlba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Geckno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihfmdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cffejk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahdocnod.dll" Mkhocj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efknddjn.dll" Pjbnmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghcdpjqj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmefcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbankjel.dll" Iankbldh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbhpld32.dll" Naebmppm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmlcbafa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bigmoadp.dll" Eamgeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjknab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjknab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mipjbokm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndkpji32.dll" Bpomdmqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdkfco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mainpc32.dll" Dcppmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcdkagga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elacjp32.dll" Pcgnfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnnimkif.dll" Flmglfhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akekgimh.dll" Kgkokjjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gjomlp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihnfpjjj.dll" Kjpafanf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jadnoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blabef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anijicnf.dll" Cbokoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpkjfq32.dll" Filnjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kamncagl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oilgje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aeommfnf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbokoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgnnjcee.dll" Hmefcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knldaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onhokqml.dll" Caofmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnbfkh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Giafmfad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hopibdfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkeooo32.dll" Jnlhbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ognakk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exeCbokoa32.exeDnjeoa32.exeDmaoem32.exeDihojnqo.exeDflpdb32.exeDcppmg32.exeEamgeo32.exeEnagnc32.exeEfllcf32.exeFioajqmb.exeFfeoid32.exeFeklja32.exeGepeep32.exeGohjnf32.exeGgcnbh32.exedescription pid process target process PID 1268 wrote to memory of 2396 1268 42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe Cbokoa32.exe PID 1268 wrote to memory of 2396 1268 42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe Cbokoa32.exe PID 1268 wrote to memory of 2396 1268 42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe Cbokoa32.exe PID 1268 wrote to memory of 2396 1268 42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe Cbokoa32.exe PID 2396 wrote to memory of 2528 2396 Cbokoa32.exe Dnjeoa32.exe PID 2396 wrote to memory of 2528 2396 Cbokoa32.exe Dnjeoa32.exe PID 2396 wrote to memory of 2528 2396 Cbokoa32.exe Dnjeoa32.exe PID 2396 wrote to memory of 2528 2396 Cbokoa32.exe Dnjeoa32.exe PID 2528 wrote to memory of 2948 2528 Dnjeoa32.exe Dmaoem32.exe PID 2528 wrote to memory of 2948 2528 Dnjeoa32.exe Dmaoem32.exe PID 2528 wrote to memory of 2948 2528 Dnjeoa32.exe Dmaoem32.exe PID 2528 wrote to memory of 2948 2528 Dnjeoa32.exe Dmaoem32.exe PID 2948 wrote to memory of 2980 2948 Dmaoem32.exe Dihojnqo.exe PID 2948 wrote to memory of 2980 2948 Dmaoem32.exe Dihojnqo.exe PID 2948 wrote to memory of 2980 2948 Dmaoem32.exe Dihojnqo.exe PID 2948 wrote to memory of 2980 2948 Dmaoem32.exe Dihojnqo.exe PID 2980 wrote to memory of 2864 2980 Dihojnqo.exe Dflpdb32.exe PID 2980 wrote to memory of 2864 2980 Dihojnqo.exe Dflpdb32.exe PID 2980 wrote to memory of 2864 2980 Dihojnqo.exe Dflpdb32.exe PID 2980 wrote to memory of 2864 2980 Dihojnqo.exe Dflpdb32.exe PID 2864 wrote to memory of 2756 2864 Dflpdb32.exe Dcppmg32.exe PID 2864 wrote to memory of 2756 2864 Dflpdb32.exe Dcppmg32.exe PID 2864 wrote to memory of 2756 2864 Dflpdb32.exe Dcppmg32.exe PID 2864 wrote to memory of 2756 2864 Dflpdb32.exe Dcppmg32.exe PID 2756 wrote to memory of 2660 2756 Dcppmg32.exe Eamgeo32.exe PID 2756 wrote to memory of 2660 2756 Dcppmg32.exe Eamgeo32.exe PID 2756 wrote to memory of 2660 2756 Dcppmg32.exe Eamgeo32.exe PID 2756 wrote to memory of 2660 2756 Dcppmg32.exe Eamgeo32.exe PID 2660 wrote to memory of 2348 2660 Eamgeo32.exe Enagnc32.exe PID 2660 wrote to memory of 2348 2660 Eamgeo32.exe Enagnc32.exe PID 2660 wrote to memory of 2348 2660 Eamgeo32.exe Enagnc32.exe PID 2660 wrote to memory of 2348 2660 Eamgeo32.exe Enagnc32.exe PID 2348 wrote to memory of 2448 2348 Enagnc32.exe Efllcf32.exe PID 2348 wrote to memory of 2448 2348 Enagnc32.exe Efllcf32.exe PID 2348 wrote to memory of 2448 2348 Enagnc32.exe Efllcf32.exe PID 2348 wrote to memory of 2448 2348 Enagnc32.exe Efllcf32.exe PID 2448 wrote to memory of 1728 2448 Efllcf32.exe Fioajqmb.exe PID 2448 wrote to memory of 1728 2448 Efllcf32.exe Fioajqmb.exe PID 2448 wrote to memory of 1728 2448 Efllcf32.exe Fioajqmb.exe PID 2448 wrote to memory of 1728 2448 Efllcf32.exe Fioajqmb.exe PID 1728 wrote to memory of 1140 1728 Fioajqmb.exe Ffeoid32.exe PID 1728 wrote to memory of 1140 1728 Fioajqmb.exe Ffeoid32.exe PID 1728 wrote to memory of 1140 1728 Fioajqmb.exe Ffeoid32.exe PID 1728 wrote to memory of 1140 1728 Fioajqmb.exe Ffeoid32.exe PID 1140 wrote to memory of 2016 1140 Ffeoid32.exe Feklja32.exe PID 1140 wrote to memory of 2016 1140 Ffeoid32.exe Feklja32.exe PID 1140 wrote to memory of 2016 1140 Ffeoid32.exe Feklja32.exe PID 1140 wrote to memory of 2016 1140 Ffeoid32.exe Feklja32.exe PID 2016 wrote to memory of 1652 2016 Feklja32.exe Gepeep32.exe PID 2016 wrote to memory of 1652 2016 Feklja32.exe Gepeep32.exe PID 2016 wrote to memory of 1652 2016 Feklja32.exe Gepeep32.exe PID 2016 wrote to memory of 1652 2016 Feklja32.exe Gepeep32.exe PID 1652 wrote to memory of 1064 1652 Gepeep32.exe Gohjnf32.exe PID 1652 wrote to memory of 1064 1652 Gepeep32.exe Gohjnf32.exe PID 1652 wrote to memory of 1064 1652 Gepeep32.exe Gohjnf32.exe PID 1652 wrote to memory of 1064 1652 Gepeep32.exe Gohjnf32.exe PID 1064 wrote to memory of 2632 1064 Gohjnf32.exe Ggcnbh32.exe PID 1064 wrote to memory of 2632 1064 Gohjnf32.exe Ggcnbh32.exe PID 1064 wrote to memory of 2632 1064 Gohjnf32.exe Ggcnbh32.exe PID 1064 wrote to memory of 2632 1064 Gohjnf32.exe Ggcnbh32.exe PID 2632 wrote to memory of 2260 2632 Ggcnbh32.exe Gidgdcli.exe PID 2632 wrote to memory of 2260 2632 Ggcnbh32.exe Gidgdcli.exe PID 2632 wrote to memory of 2260 2632 Ggcnbh32.exe Gidgdcli.exe PID 2632 wrote to memory of 2260 2632 Ggcnbh32.exe Gidgdcli.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe"C:\Users\Admin\AppData\Local\Temp\42d9118ceb8ea30646ab017e17e457d6569dd4ca18feaa1b42ff883f5d3a2c8e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Cbokoa32.exeC:\Windows\system32\Cbokoa32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\Dnjeoa32.exeC:\Windows\system32\Dnjeoa32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\Dmaoem32.exeC:\Windows\system32\Dmaoem32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\Dihojnqo.exeC:\Windows\system32\Dihojnqo.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Dflpdb32.exeC:\Windows\system32\Dflpdb32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Dcppmg32.exeC:\Windows\system32\Dcppmg32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Eamgeo32.exeC:\Windows\system32\Eamgeo32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Enagnc32.exeC:\Windows\system32\Enagnc32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\Efllcf32.exeC:\Windows\system32\Efllcf32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Fioajqmb.exeC:\Windows\system32\Fioajqmb.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\Ffeoid32.exeC:\Windows\system32\Ffeoid32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\Feklja32.exeC:\Windows\system32\Feklja32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\Gepeep32.exeC:\Windows\system32\Gepeep32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\Gohjnf32.exeC:\Windows\system32\Gohjnf32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\Ggcnbh32.exeC:\Windows\system32\Ggcnbh32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\Gidgdcli.exeC:\Windows\system32\Gidgdcli.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260 -
C:\Windows\SysWOW64\Hohfmi32.exeC:\Windows\system32\Hohfmi32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\Hdgkkppm.exeC:\Windows\system32\Hdgkkppm.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Windows\SysWOW64\Ikcpmieg.exeC:\Windows\system32\Ikcpmieg.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016 -
C:\Windows\SysWOW64\Icnealbb.exeC:\Windows\system32\Icnealbb.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1252 -
C:\Windows\SysWOW64\Iccnmk32.exeC:\Windows\system32\Iccnmk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1328 -
C:\Windows\SysWOW64\Jchhhjjg.exeC:\Windows\system32\Jchhhjjg.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\Jgjman32.exeC:\Windows\system32\Jgjman32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Windows\SysWOW64\Jboanfmm.exeC:\Windows\system32\Jboanfmm.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008 -
C:\Windows\SysWOW64\Jadnoc32.exeC:\Windows\system32\Jadnoc32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1648 -
C:\Windows\SysWOW64\Kjalch32.exeC:\Windows\system32\Kjalch32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\Kigidd32.exeC:\Windows\system32\Kigidd32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\Kofnbk32.exeC:\Windows\system32\Kofnbk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2484 -
C:\Windows\SysWOW64\Lbfdnijp.exeC:\Windows\system32\Lbfdnijp.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Windows\SysWOW64\Llnhgn32.exeC:\Windows\system32\Llnhgn32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\Lanmde32.exeC:\Windows\system32\Lanmde32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\Mkhocj32.exeC:\Windows\system32\Mkhocj32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2900 -
C:\Windows\SysWOW64\Minldf32.exeC:\Windows\system32\Minldf32.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2208 -
C:\Windows\SysWOW64\Miphjf32.exeC:\Windows\system32\Miphjf32.exe35⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Mcjihk32.exeC:\Windows\system32\Mcjihk32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\Mhgbpb32.exeC:\Windows\system32\Mhgbpb32.exe37⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\Nekbjf32.exeC:\Windows\system32\Nekbjf32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:956 -
C:\Windows\SysWOW64\Nhlkkabh.exeC:\Windows\system32\Nhlkkabh.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\Npgppdpc.exeC:\Windows\system32\Npgppdpc.exe40⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\Nchiao32.exeC:\Windows\system32\Nchiao32.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\Ohgnoeii.exeC:\Windows\system32\Ohgnoeii.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1352 -
C:\Windows\SysWOW64\Obpbhk32.exeC:\Windows\system32\Obpbhk32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\Oilgje32.exeC:\Windows\system32\Oilgje32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:2216 -
C:\Windows\SysWOW64\Ofphdi32.exeC:\Windows\system32\Ofphdi32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1596 -
C:\Windows\SysWOW64\Pjbnmm32.exeC:\Windows\system32\Pjbnmm32.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:2268 -
C:\Windows\SysWOW64\Pcjbfbmm.exeC:\Windows\system32\Pcjbfbmm.exe47⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\Pmbfoh32.exeC:\Windows\system32\Pmbfoh32.exe48⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\Pcokaa32.exeC:\Windows\system32\Pcokaa32.exe49⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Ppelfbol.exeC:\Windows\system32\Ppelfbol.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:924 -
C:\Windows\SysWOW64\Pphilb32.exeC:\Windows\system32\Pphilb32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\Qeeadi32.exeC:\Windows\system32\Qeeadi32.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\Qnmfmoaa.exeC:\Windows\system32\Qnmfmoaa.exe53⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\SysWOW64\Qhejed32.exeC:\Windows\system32\Qhejed32.exe54⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\Aanonj32.exeC:\Windows\system32\Aanonj32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\Alcclb32.exeC:\Windows\system32\Alcclb32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\Aapkdi32.exeC:\Windows\system32\Aapkdi32.exe57⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\Andlmnki.exeC:\Windows\system32\Andlmnki.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Afoqbpid.exeC:\Windows\system32\Afoqbpid.exe59⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\Apheke32.exeC:\Windows\system32\Apheke32.exe60⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\Ajmihn32.exeC:\Windows\system32\Ajmihn32.exe61⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\Adenqd32.exeC:\Windows\system32\Adenqd32.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\Blabef32.exeC:\Windows\system32\Blabef32.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Bffgbo32.exeC:\Windows\system32\Bffgbo32.exe64⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\Blcokf32.exeC:\Windows\system32\Blcokf32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\Belcck32.exeC:\Windows\system32\Belcck32.exe66⤵PID:2384
-
C:\Windows\SysWOW64\Bpahad32.exeC:\Windows\system32\Bpahad32.exe67⤵PID:2196
-
C:\Windows\SysWOW64\Biiljjnk.exeC:\Windows\system32\Biiljjnk.exe68⤵PID:2376
-
C:\Windows\SysWOW64\Bepmokco.exeC:\Windows\system32\Bepmokco.exe69⤵PID:2124
-
C:\Windows\SysWOW64\Bkmegaaf.exeC:\Windows\system32\Bkmegaaf.exe70⤵PID:2628
-
C:\Windows\SysWOW64\Cdejpg32.exeC:\Windows\system32\Cdejpg32.exe71⤵PID:1076
-
C:\Windows\SysWOW64\Coknmp32.exeC:\Windows\system32\Coknmp32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2640 -
C:\Windows\SysWOW64\Cplkehnk.exeC:\Windows\system32\Cplkehnk.exe73⤵
- System Location Discovery: System Language Discovery
PID:668 -
C:\Windows\SysWOW64\Ckboba32.exeC:\Windows\system32\Ckboba32.exe74⤵
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\Cdjckfda.exeC:\Windows\system32\Cdjckfda.exe75⤵PID:2824
-
C:\Windows\SysWOW64\Ddgcdjip.exeC:\Windows\system32\Ddgcdjip.exe76⤵PID:2908
-
C:\Windows\SysWOW64\Dblcnngi.exeC:\Windows\system32\Dblcnngi.exe77⤵
- Drops file in System32 directory
PID:2212 -
C:\Windows\SysWOW64\Ddlloi32.exeC:\Windows\system32\Ddlloi32.exe78⤵
- Drops file in System32 directory
PID:2668 -
C:\Windows\SysWOW64\Efbbba32.exeC:\Windows\system32\Efbbba32.exe79⤵PID:1512
-
C:\Windows\SysWOW64\Emlkoknp.exeC:\Windows\system32\Emlkoknp.exe80⤵
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\Ejpkho32.exeC:\Windows\system32\Ejpkho32.exe81⤵PID:1436
-
C:\Windows\SysWOW64\Emogdk32.exeC:\Windows\system32\Emogdk32.exe82⤵PID:3040
-
C:\Windows\SysWOW64\Echpaecj.exeC:\Windows\system32\Echpaecj.exe83⤵PID:2492
-
C:\Windows\SysWOW64\Eiehilaa.exeC:\Windows\system32\Eiehilaa.exe84⤵PID:2520
-
C:\Windows\SysWOW64\Ebnlba32.exeC:\Windows\system32\Ebnlba32.exe85⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Emcqpjhh.exeC:\Windows\system32\Emcqpjhh.exe86⤵PID:776
-
C:\Windows\SysWOW64\Fflehp32.exeC:\Windows\system32\Fflehp32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\Fbbfmqdm.exeC:\Windows\system32\Fbbfmqdm.exe88⤵PID:1308
-
C:\Windows\SysWOW64\Filnjk32.exeC:\Windows\system32\Filnjk32.exe89⤵
- Modifies registry class
PID:1048 -
C:\Windows\SysWOW64\Fbebcp32.exeC:\Windows\system32\Fbebcp32.exe90⤵PID:2068
-
C:\Windows\SysWOW64\Flmglfhk.exeC:\Windows\system32\Flmglfhk.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Fhdhqg32.exeC:\Windows\system32\Fhdhqg32.exe92⤵PID:1920
-
C:\Windows\SysWOW64\Fmqpinlf.exeC:\Windows\system32\Fmqpinlf.exe93⤵
- Drops file in System32 directory
PID:1184 -
C:\Windows\SysWOW64\Fhfdffll.exeC:\Windows\system32\Fhfdffll.exe94⤵PID:308
-
C:\Windows\SysWOW64\Gmcmomjc.exeC:\Windows\system32\Gmcmomjc.exe95⤵
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\Gfkagc32.exeC:\Windows\system32\Gfkagc32.exe96⤵PID:948
-
C:\Windows\SysWOW64\Glhjpjok.exeC:\Windows\system32\Glhjpjok.exe97⤵PID:1588
-
C:\Windows\SysWOW64\Gfnnmboa.exeC:\Windows\system32\Gfnnmboa.exe98⤵PID:276
-
C:\Windows\SysWOW64\Gpfbfh32.exeC:\Windows\system32\Gpfbfh32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\Geckno32.exeC:\Windows\system32\Geckno32.exe100⤵
- Drops file in System32 directory
- Modifies registry class
PID:288 -
C:\Windows\SysWOW64\Gphokhco.exeC:\Windows\system32\Gphokhco.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1408 -
C:\Windows\SysWOW64\Ghcdpjqj.exeC:\Windows\system32\Ghcdpjqj.exe102⤵
- Modifies registry class
PID:1976 -
C:\Windows\SysWOW64\Hegdinpd.exeC:\Windows\system32\Hegdinpd.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\Hopibdfd.exeC:\Windows\system32\Hopibdfd.exe104⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Hgknffcp.exeC:\Windows\system32\Hgknffcp.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2896 -
C:\Windows\SysWOW64\Hmefcp32.exeC:\Windows\system32\Hmefcp32.exe106⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Hkifld32.exeC:\Windows\system32\Hkifld32.exe107⤵
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\Hcdkagga.exeC:\Windows\system32\Hcdkagga.exe108⤵
- Modifies registry class
PID:672 -
C:\Windows\SysWOW64\Hlmpjl32.exeC:\Windows\system32\Hlmpjl32.exe109⤵PID:1708
-
C:\Windows\SysWOW64\Ilolol32.exeC:\Windows\system32\Ilolol32.exe110⤵PID:2372
-
C:\Windows\SysWOW64\Ihfmdm32.exeC:\Windows\system32\Ihfmdm32.exe111⤵
- Modifies registry class
PID:764 -
C:\Windows\SysWOW64\Iejnna32.exeC:\Windows\system32\Iejnna32.exe112⤵
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\Ilcfjkgj.exeC:\Windows\system32\Ilcfjkgj.exe113⤵PID:2364
-
C:\Windows\SysWOW64\Iodolf32.exeC:\Windows\system32\Iodolf32.exe114⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\Idagdm32.exeC:\Windows\system32\Idagdm32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2624 -
C:\Windows\SysWOW64\Idcdjmao.exeC:\Windows\system32\Idcdjmao.exe116⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\Jnlhbb32.exeC:\Windows\system32\Jnlhbb32.exe117⤵
- Modifies registry class
PID:556 -
C:\Windows\SysWOW64\Jkpilg32.exeC:\Windows\system32\Jkpilg32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\Jqmadn32.exeC:\Windows\system32\Jqmadn32.exe119⤵
- System Location Discovery: System Language Discovery
PID:944 -
C:\Windows\SysWOW64\Jqonjmbn.exeC:\Windows\system32\Jqonjmbn.exe120⤵PID:3020
-
C:\Windows\SysWOW64\Jflfbdqe.exeC:\Windows\system32\Jflfbdqe.exe121⤵
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\Jbbgge32.exeC:\Windows\system32\Jbbgge32.exe122⤵PID:2780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-