Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe
Resource
win10v2004-20241007-en
General
-
Target
c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe
-
Size
80KB
-
MD5
562a616bc9546b40a516f28278fa7888
-
SHA1
c1b8ef923338424b12755d4bfc2c17b84c914d59
-
SHA256
c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc
-
SHA512
10f593a40dba0c36790bcef3528a3aabb899608ff4f7c2b130a99aa283ca4f985146854018ca689c622daff9390163085a20e7b6ed3c80101e42e409a0aabe84
-
SSDEEP
1536:Fir/heqpqjAJ2M9O2LwS5DUHRbPa9b6i+sIk:FidsAL5wS5DSCopsIk
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kmdofebo.exeEhdnkh32.exeObonfj32.exeQkeofnfk.exeDcjmcd32.exePgopak32.exeJkgelh32.exeJhfepfme.exeKlbfbg32.exeHibebeqb.exeOcclcg32.exeFeobac32.exeAkbelbpi.exeCiebdj32.exeCneiki32.exeFkdlaplh.exeKdlbckee.exeMiiofn32.exePncljmko.exeQmpplh32.exeCdqfgh32.exeFgjkmijh.exeMfhabe32.exeCjqglf32.exeNegeln32.exeNgjoif32.exeQkelme32.exeCkchcc32.exeHjhlnahk.exeHlpmmpam.exeNpkfff32.exeHmgodc32.exeEcgeba32.exeGielchpp.exeJmkmlk32.exeMhdcbjal.exeDpmgao32.exeGhenamai.exeHpoofm32.exeHmdldmja.exeLhegcg32.exeCiknhb32.exeLgjcdc32.exeNpiiafpa.exeGggclfkj.exeHbjgbbpn.exeEmncci32.exePejcab32.exeMchjjc32.exeNgcbie32.exeFichqckn.exeJbijcgbc.exeHecjco32.exeCjhdgk32.exeNbljfdoh.exePfando32.exeGjkfglom.exeFejifdab.exeCcolja32.exeCipnng32.exeMfoqephq.exeKknklg32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmdofebo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehdnkh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obonfj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkeofnfk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcjmcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgopak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkgelh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhfepfme.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klbfbg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hibebeqb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Occlcg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feobac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akbelbpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ciebdj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cneiki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkdlaplh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdlbckee.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miiofn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pncljmko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmpplh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdqfgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgjkmijh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfhabe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjqglf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Negeln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngjoif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qkelme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckchcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjhlnahk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cneiki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlpmmpam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npkfff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmgodc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecgeba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gielchpp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjhlnahk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmkmlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhdcbjal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpmgao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghenamai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpoofm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmdldmja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhegcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ciknhb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgjcdc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npiiafpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gggclfkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbjgbbpn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emncci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pejcab32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mchjjc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngcbie32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fichqckn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbijcgbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hecjco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjhdgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbljfdoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfando32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjkfglom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fejifdab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccolja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cipnng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfoqephq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kknklg32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Maiqfl32.exeMhcicf32.exeMmbnam32.exeMiiofn32.exeNepokogo.exeNphpng32.exeNegeln32.exeNnbjpqoa.exeNgjoif32.exeOcclcg32.exeOfdeeb32.exeOfgbkacb.exeOoofcg32.exePkfghh32.exePkhdnh32.exePgodcich.exePkmmigjo.exePeeabm32.exePalbgn32.exeQjdgpcmd.exeQpaohjkk.exeAilqfooi.exeAphehidc.exeAiqjao32.exeAhhchk32.exeBaqhapdj.exeBmjekahk.exeBknfeege.exeBdfjnkne.exeBeggec32.exeCiepkajj.exeCabaec32.exeCofaog32.exeChofhm32.exeChabmm32.exeDpmgao32.exeDlchfp32.exeDcpmijqc.exeDpcnbn32.exeDhobgp32.exeEkpkhkji.exeEkbhnkhf.exeEqamla32.exeEgkehllh.exeEnenef32.exeEjlnjg32.exeFphgbn32.exeFjnkpf32.exeFmlglb32.exeFichqckn.exeFpmpnmck.exeFejifdab.exeFmaqgaae.exeFbniohpl.exeFelekcop.exeFpbihl32.exeFeobac32.exeGjljij32.exeGaebfdba.exeGhpkbn32.exeGahpkd32.exeGjpddigo.exeGpmllpef.exeGfgdij32.exepid process 2080 Maiqfl32.exe 2924 Mhcicf32.exe 2792 Mmbnam32.exe 2700 Miiofn32.exe 2680 Nepokogo.exe 2228 Nphpng32.exe 2656 Negeln32.exe 2624 Nnbjpqoa.exe 3008 Ngjoif32.exe 2776 Occlcg32.exe 2416 Ofdeeb32.exe 332 Ofgbkacb.exe 2376 Ooofcg32.exe 2464 Pkfghh32.exe 1576 Pkhdnh32.exe 1236 Pgodcich.exe 940 Pkmmigjo.exe 824 Peeabm32.exe 1712 Palbgn32.exe 1948 Qjdgpcmd.exe 1308 Qpaohjkk.exe 1048 Ailqfooi.exe 2004 Aphehidc.exe 2272 Aiqjao32.exe 1440 Ahhchk32.exe 2352 Baqhapdj.exe 2784 Bmjekahk.exe 2808 Bknfeege.exe 1528 Bdfjnkne.exe 2764 Beggec32.exe 2692 Ciepkajj.exe 2588 Cabaec32.exe 1128 Cofaog32.exe 3012 Chofhm32.exe 2984 Chabmm32.exe 2208 Dpmgao32.exe 2364 Dlchfp32.exe 2216 Dcpmijqc.exe 320 Dpcnbn32.exe 2432 Dhobgp32.exe 1956 Ekpkhkji.exe 2340 Ekbhnkhf.exe 1920 Eqamla32.exe 1224 Egkehllh.exe 1292 Enenef32.exe 1952 Ejlnjg32.exe 2028 Fphgbn32.exe 2260 Fjnkpf32.exe 2468 Fmlglb32.exe 1580 Fichqckn.exe 2540 Fpmpnmck.exe 2828 Fejifdab.exe 2876 Fmaqgaae.exe 2892 Fbniohpl.exe 2812 Felekcop.exe 2508 Fpbihl32.exe 3024 Feobac32.exe 2952 Gjljij32.exe 3060 Gaebfdba.exe 1688 Ghpkbn32.exe 2368 Gahpkd32.exe 2452 Gjpddigo.exe 2244 Gpmllpef.exe 584 Gfgdij32.exe -
Loads dropped DLL 64 IoCs
Processes:
c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exeMaiqfl32.exeMhcicf32.exeMmbnam32.exeMiiofn32.exeNepokogo.exeNphpng32.exeNegeln32.exeNnbjpqoa.exeNgjoif32.exeOcclcg32.exeOfdeeb32.exeOfgbkacb.exeOoofcg32.exePkfghh32.exePkhdnh32.exePgodcich.exePkmmigjo.exePeeabm32.exePalbgn32.exeQjdgpcmd.exeQpaohjkk.exeAilqfooi.exeAphehidc.exeAiqjao32.exeAhhchk32.exeBaqhapdj.exeBmjekahk.exeBknfeege.exeBdfjnkne.exeBeggec32.exeCiepkajj.exepid process 1644 c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe 1644 c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe 2080 Maiqfl32.exe 2080 Maiqfl32.exe 2924 Mhcicf32.exe 2924 Mhcicf32.exe 2792 Mmbnam32.exe 2792 Mmbnam32.exe 2700 Miiofn32.exe 2700 Miiofn32.exe 2680 Nepokogo.exe 2680 Nepokogo.exe 2228 Nphpng32.exe 2228 Nphpng32.exe 2656 Negeln32.exe 2656 Negeln32.exe 2624 Nnbjpqoa.exe 2624 Nnbjpqoa.exe 3008 Ngjoif32.exe 3008 Ngjoif32.exe 2776 Occlcg32.exe 2776 Occlcg32.exe 2416 Ofdeeb32.exe 2416 Ofdeeb32.exe 332 Ofgbkacb.exe 332 Ofgbkacb.exe 2376 Ooofcg32.exe 2376 Ooofcg32.exe 2464 Pkfghh32.exe 2464 Pkfghh32.exe 1576 Pkhdnh32.exe 1576 Pkhdnh32.exe 1236 Pgodcich.exe 1236 Pgodcich.exe 940 Pkmmigjo.exe 940 Pkmmigjo.exe 824 Peeabm32.exe 824 Peeabm32.exe 1712 Palbgn32.exe 1712 Palbgn32.exe 1948 Qjdgpcmd.exe 1948 Qjdgpcmd.exe 1308 Qpaohjkk.exe 1308 Qpaohjkk.exe 1048 Ailqfooi.exe 1048 Ailqfooi.exe 2004 Aphehidc.exe 2004 Aphehidc.exe 2272 Aiqjao32.exe 2272 Aiqjao32.exe 1440 Ahhchk32.exe 1440 Ahhchk32.exe 2352 Baqhapdj.exe 2352 Baqhapdj.exe 2784 Bmjekahk.exe 2784 Bmjekahk.exe 2808 Bknfeege.exe 2808 Bknfeege.exe 1528 Bdfjnkne.exe 1528 Bdfjnkne.exe 2764 Beggec32.exe 2764 Beggec32.exe 2692 Ciepkajj.exe 2692 Ciepkajj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Klgpmgod.exeNqdaal32.exeIlkpac32.exeNpiiafpa.exeLnopmegg.exeLpbhmiji.exeMpeebhhf.exeCbfeam32.exeFqqdigko.exeQnoklc32.exeNpnclf32.exeNilndfgl.exeEjjdmp32.exeFpfkhbon.exeNphpng32.exeEgkehllh.exeFeobac32.exeHlmphp32.exeEkpkhkji.exeFbniohpl.exeKodghqop.exeFialggcl.exeKgjgepqm.exeFnkblm32.exeMhdcbjal.exeGjemoi32.exeCikbjpqd.exeGlomllkd.exeLkffohon.exeNjobpa32.exeOcdnloph.exeDmgmbj32.exeGjiibm32.exeFjomhonj.exeDoocln32.exeIfiilp32.exeLodoefed.exeLehfafgp.exeCeacoqfi.exeFghngimj.exeKgmilmkb.exeBigohejb.exeJmejmm32.exeJngkdj32.exeJnlepioj.exeEmkfmioh.exeBkgqpjch.exeHhhblgim.exeKlonqpbi.exeOaqeogll.exeAcemeo32.exeMaiqfl32.exeEkbhnkhf.exeGindjqnc.exeNjopgh32.exeNjcibgcf.exeOpbopn32.exeDbmlal32.exeOmlahqeo.exeIljifm32.exeKbcfme32.exeLfonlg32.exedescription ioc process File created C:\Windows\SysWOW64\Nekofg32.dll Klgpmgod.exe File created C:\Windows\SysWOW64\Nmkbfmpf.exe Nqdaal32.exe File created C:\Windows\SysWOW64\Icdhnn32.exe Ilkpac32.exe File created C:\Windows\SysWOW64\Nhpabdqd.exe Npiiafpa.exe File created C:\Windows\SysWOW64\Lhddjngm.exe Lnopmegg.exe File opened for modification C:\Windows\SysWOW64\Mfoqephq.exe Lpbhmiji.exe File created C:\Windows\SysWOW64\Dpmmdfgc.dll Mpeebhhf.exe File created C:\Windows\SysWOW64\Cipnng32.exe Cbfeam32.exe File opened for modification C:\Windows\SysWOW64\Gjiibm32.exe Fqqdigko.exe File created C:\Windows\SysWOW64\Iepfml32.dll Qnoklc32.exe File created C:\Windows\SysWOW64\Noplll32.dll Npnclf32.exe File created C:\Windows\SysWOW64\Madikm32.dll Nilndfgl.exe File opened for modification C:\Windows\SysWOW64\Ecbhfeip.exe Ejjdmp32.exe File created C:\Windows\SysWOW64\Fgqcel32.exe Fpfkhbon.exe File created C:\Windows\SysWOW64\Hgeckn32.dll Nphpng32.exe File opened for modification C:\Windows\SysWOW64\Enenef32.exe Egkehllh.exe File created C:\Windows\SysWOW64\Gjljij32.exe Feobac32.exe File created C:\Windows\SysWOW64\Opfeoj32.dll Hlmphp32.exe File opened for modification C:\Windows\SysWOW64\Ekbhnkhf.exe Ekpkhkji.exe File created C:\Windows\SysWOW64\Amfabj32.dll Fbniohpl.exe File opened for modification C:\Windows\SysWOW64\Kimlqfeq.exe Kodghqop.exe File opened for modification C:\Windows\SysWOW64\Fcjqpm32.exe Fialggcl.exe File opened for modification C:\Windows\SysWOW64\Klgpmgod.exe Kgjgepqm.exe File opened for modification C:\Windows\SysWOW64\Fokofpif.exe Fnkblm32.exe File opened for modification C:\Windows\SysWOW64\Mfhcknpf.exe Mhdcbjal.exe File created C:\Windows\SysWOW64\Glfjgaih.exe Gjemoi32.exe File created C:\Windows\SysWOW64\Cdqfgh32.exe Cikbjpqd.exe File opened for modification C:\Windows\SysWOW64\Ghenamai.exe Glomllkd.exe File created C:\Windows\SysWOW64\Lflklaoc.exe Lkffohon.exe File created C:\Windows\SysWOW64\Ngcbie32.exe Njobpa32.exe File opened for modification C:\Windows\SysWOW64\Odckfb32.exe Ocdnloph.exe File opened for modification C:\Windows\SysWOW64\Dhlapc32.exe Dmgmbj32.exe File opened for modification C:\Windows\SysWOW64\Gjkfglom.exe Gjiibm32.exe File created C:\Windows\SysWOW64\Qaaghk32.dll Fjomhonj.exe File created C:\Windows\SysWOW64\Okefloqc.dll Cbfeam32.exe File opened for modification C:\Windows\SysWOW64\Deikhhhe.exe Doocln32.exe File created C:\Windows\SysWOW64\Megohpba.dll Ifiilp32.exe File created C:\Windows\SysWOW64\Lclijeeg.dll Lodoefed.exe File created C:\Windows\SysWOW64\Llbnnq32.exe Lehfafgp.exe File opened for modification C:\Windows\SysWOW64\Cipleo32.exe Ceacoqfi.exe File opened for modification C:\Windows\SysWOW64\Fgjkmijh.exe Fghngimj.exe File opened for modification C:\Windows\SysWOW64\Kninog32.exe Kgmilmkb.exe File created C:\Windows\SysWOW64\Bfkobj32.exe Bigohejb.exe File created C:\Windows\SysWOW64\Jdobjgqg.exe Jmejmm32.exe File opened for modification C:\Windows\SysWOW64\Gjljij32.exe Feobac32.exe File created C:\Windows\SysWOW64\Jgppmpjp.exe Jngkdj32.exe File opened for modification C:\Windows\SysWOW64\Kfgjdlme.exe Jnlepioj.exe File created C:\Windows\SysWOW64\Echoepmo.exe Emkfmioh.exe File created C:\Windows\SysWOW64\Mpdqih32.dll Bkgqpjch.exe File created C:\Windows\SysWOW64\Hcjbpaea.dll Hhhblgim.exe File opened for modification C:\Windows\SysWOW64\Kbkgig32.exe Klonqpbi.exe File created C:\Windows\SysWOW64\Ocdnloph.exe Oaqeogll.exe File created C:\Windows\SysWOW64\Amnanefa.exe Acemeo32.exe File created C:\Windows\SysWOW64\Mhcicf32.exe Maiqfl32.exe File created C:\Windows\SysWOW64\Eqamla32.exe Ekbhnkhf.exe File created C:\Windows\SysWOW64\Bbgmbfej.dll Gindjqnc.exe File created C:\Windows\SysWOW64\Nplhooec.exe Njopgh32.exe File opened for modification C:\Windows\SysWOW64\Obonfj32.exe Njcibgcf.exe File created C:\Windows\SysWOW64\Efmnppdb.dll Opbopn32.exe File opened for modification C:\Windows\SysWOW64\Dmgmbj32.exe Dbmlal32.exe File opened for modification C:\Windows\SysWOW64\Obijpgcf.exe Omlahqeo.exe File created C:\Windows\SysWOW64\Igcjgk32.exe Iljifm32.exe File opened for modification C:\Windows\SysWOW64\Klijjnen.exe Kbcfme32.exe File opened for modification C:\Windows\SysWOW64\Mnffnd32.exe Lfonlg32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1972 1508 WerFault.exe Ohnemidj.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Amplklmj.exeFgjkmijh.exeJneoojeb.exeQmahog32.exeJehbfjia.exeFjnkpf32.exeMldgbcoe.exeGpeoakhc.exeCaccnllf.exeIpcjje32.exeLpddgd32.exeKknklg32.exeLdkeoo32.exeCgeopqfp.exeKlgpmgod.exeNkhhie32.exeIcbkhnan.exePgopak32.exeDndndbnl.exeBfkobj32.exeNcbdjhnf.exeAcbieing.exeBokcom32.exeKggfnoch.exeNjopgh32.exeEijffhjd.exeHajkip32.exeMmpmjpba.exeJaffca32.exePgodcich.exeKqqdjceh.exeGgeiooea.exePjjmonac.exeOdaqikaa.exeIcbldbgi.exeHpjeknfi.exeDbneekan.exeLkffohon.exeElnonp32.exeFaonqiod.exeLhegcg32.exeGaebfdba.exeIcdhnn32.exeLefikg32.exeIjhkembk.exeEkpkhkji.exeDeikhhhe.exeMoflkfca.exeGacgli32.exeFjomhonj.exeHmdldmja.exeHnlnmd32.exeGccjpb32.exeAlfdcp32.exeConpdm32.exeNmpkal32.exeOhpnag32.exeChofhm32.exeGjpddigo.exeHbpbck32.exeJngkdj32.exeDdhekfeb.exeQnoklc32.exeAlmjcobe.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amplklmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgjkmijh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jneoojeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qmahog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jehbfjia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fjnkpf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mldgbcoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpeoakhc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caccnllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ipcjje32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpddgd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kknklg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldkeoo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgeopqfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klgpmgod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkhhie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icbkhnan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgopak32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dndndbnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfkobj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncbdjhnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acbieing.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bokcom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kggfnoch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njopgh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eijffhjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hajkip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmpmjpba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jaffca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgodcich.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqqdjceh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggeiooea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjjmonac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odaqikaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icbldbgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpjeknfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbneekan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkffohon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Elnonp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Faonqiod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhegcg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gaebfdba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icdhnn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lefikg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijhkembk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekpkhkji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deikhhhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moflkfca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gacgli32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fjomhonj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmdldmja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnlnmd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gccjpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alfdcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Conpdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmpkal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohpnag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chofhm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjpddigo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbpbck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jngkdj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddhekfeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnoklc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Almjcobe.exe -
Modifies registry class 64 IoCs
Processes:
Bmohjooe.exeKqqdjceh.exeKifgllbc.exeJopbnn32.exePncljmko.exeAqanke32.exeDdhekfeb.exeDhlapc32.exeFmlglb32.exeCjfgalcq.exeMdcdcmai.exeCfjdfg32.exeJjhgdqef.exeQcmnaaji.exeKknklg32.exeKcnilhap.exeAmnanefa.exeGjpddigo.exeLflklaoc.exeJdpidm32.exeMfhabe32.exeNjcibgcf.exeKodghqop.exeNokcbm32.exeIfniaeqk.exeEjjdmp32.exeDdnaonia.exeKadhen32.exeLjeabf32.exeAoijjjcl.exeGcikfhed.exeIhaldgak.exeJmejmm32.exeMkelcenm.exeGaebfdba.exeJllakpdk.exeCobjmq32.exeHajkip32.exeFaonqiod.exeHlqfqo32.exeJbijcgbc.exeEhpgha32.exePeeabm32.exeHhogaamj.exeIaipmm32.exeMbgela32.exeCikbjpqd.exeKgmilmkb.exeOcdnloph.exeJplinckj.exeAmplklmj.exeCdqfgh32.exeIfceemdj.exeNmpiicdm.exeMhckloge.exeNadoiccn.exeBmgddcnf.exeKhjkiikl.exePkfghh32.exeFejifdab.exeBkgqpjch.exeCgeopqfp.exeHkndiabh.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmohjooe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kqqdjceh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcinbihe.dll" Kifgllbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjpief32.dll" Jopbnn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pncljmko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aqanke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddhekfeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhlapc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmlglb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjfgalcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdcdcmai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfjdfg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjhgdqef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qcmnaaji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kknklg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcnilhap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfhibn32.dll" Amnanefa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gjpddigo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lflklaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpfnod32.dll" Jdpidm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfhabe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnimkebm.dll" Njcibgcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijcbdhqk.dll" Kodghqop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nokcbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agjlmh32.dll" Ifniaeqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejjdmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddnaonia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnoaan32.dll" Kadhen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Manbna32.dll" Ljeabf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aoijjjcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gcikfhed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihaldgak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jmejmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkelcenm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gaebfdba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejikmqhk.dll" Jllakpdk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cobjmq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpbcnigl.dll" Hajkip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekoemjgn.dll" Faonqiod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlqfqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbijcgbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfmeqg32.dll" Ehpgha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Peeabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhogaamj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iaipmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbgela32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cikbjpqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgmilmkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcipdg32.dll" Ocdnloph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahjldnpp.dll" Jplinckj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amplklmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijilkf32.dll" Cdqfgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhkjod32.dll" Ifceemdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahpfkg32.dll" Kgmilmkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkimli32.dll" Nmpiicdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhckloge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nadoiccn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmgddcnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldamppgp.dll" Khjkiikl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkfghh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fejifdab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkgqpjch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgeopqfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbjkiamp.dll" Hkndiabh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exeMaiqfl32.exeMhcicf32.exeMmbnam32.exeMiiofn32.exeNepokogo.exeNphpng32.exeNegeln32.exeNnbjpqoa.exeNgjoif32.exeOcclcg32.exeOfdeeb32.exeOfgbkacb.exeOoofcg32.exePkfghh32.exePkhdnh32.exedescription pid process target process PID 1644 wrote to memory of 2080 1644 c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe Maiqfl32.exe PID 1644 wrote to memory of 2080 1644 c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe Maiqfl32.exe PID 1644 wrote to memory of 2080 1644 c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe Maiqfl32.exe PID 1644 wrote to memory of 2080 1644 c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe Maiqfl32.exe PID 2080 wrote to memory of 2924 2080 Maiqfl32.exe Mhcicf32.exe PID 2080 wrote to memory of 2924 2080 Maiqfl32.exe Mhcicf32.exe PID 2080 wrote to memory of 2924 2080 Maiqfl32.exe Mhcicf32.exe PID 2080 wrote to memory of 2924 2080 Maiqfl32.exe Mhcicf32.exe PID 2924 wrote to memory of 2792 2924 Mhcicf32.exe Mmbnam32.exe PID 2924 wrote to memory of 2792 2924 Mhcicf32.exe Mmbnam32.exe PID 2924 wrote to memory of 2792 2924 Mhcicf32.exe Mmbnam32.exe PID 2924 wrote to memory of 2792 2924 Mhcicf32.exe Mmbnam32.exe PID 2792 wrote to memory of 2700 2792 Mmbnam32.exe Miiofn32.exe PID 2792 wrote to memory of 2700 2792 Mmbnam32.exe Miiofn32.exe PID 2792 wrote to memory of 2700 2792 Mmbnam32.exe Miiofn32.exe PID 2792 wrote to memory of 2700 2792 Mmbnam32.exe Miiofn32.exe PID 2700 wrote to memory of 2680 2700 Miiofn32.exe Nepokogo.exe PID 2700 wrote to memory of 2680 2700 Miiofn32.exe Nepokogo.exe PID 2700 wrote to memory of 2680 2700 Miiofn32.exe Nepokogo.exe PID 2700 wrote to memory of 2680 2700 Miiofn32.exe Nepokogo.exe PID 2680 wrote to memory of 2228 2680 Nepokogo.exe Nphpng32.exe PID 2680 wrote to memory of 2228 2680 Nepokogo.exe Nphpng32.exe PID 2680 wrote to memory of 2228 2680 Nepokogo.exe Nphpng32.exe PID 2680 wrote to memory of 2228 2680 Nepokogo.exe Nphpng32.exe PID 2228 wrote to memory of 2656 2228 Nphpng32.exe Negeln32.exe PID 2228 wrote to memory of 2656 2228 Nphpng32.exe Negeln32.exe PID 2228 wrote to memory of 2656 2228 Nphpng32.exe Negeln32.exe PID 2228 wrote to memory of 2656 2228 Nphpng32.exe Negeln32.exe PID 2656 wrote to memory of 2624 2656 Negeln32.exe Nnbjpqoa.exe PID 2656 wrote to memory of 2624 2656 Negeln32.exe Nnbjpqoa.exe PID 2656 wrote to memory of 2624 2656 Negeln32.exe Nnbjpqoa.exe PID 2656 wrote to memory of 2624 2656 Negeln32.exe Nnbjpqoa.exe PID 2624 wrote to memory of 3008 2624 Nnbjpqoa.exe Ngjoif32.exe PID 2624 wrote to memory of 3008 2624 Nnbjpqoa.exe Ngjoif32.exe PID 2624 wrote to memory of 3008 2624 Nnbjpqoa.exe Ngjoif32.exe PID 2624 wrote to memory of 3008 2624 Nnbjpqoa.exe Ngjoif32.exe PID 3008 wrote to memory of 2776 3008 Ngjoif32.exe Occlcg32.exe PID 3008 wrote to memory of 2776 3008 Ngjoif32.exe Occlcg32.exe PID 3008 wrote to memory of 2776 3008 Ngjoif32.exe Occlcg32.exe PID 3008 wrote to memory of 2776 3008 Ngjoif32.exe Occlcg32.exe PID 2776 wrote to memory of 2416 2776 Occlcg32.exe Ofdeeb32.exe PID 2776 wrote to memory of 2416 2776 Occlcg32.exe Ofdeeb32.exe PID 2776 wrote to memory of 2416 2776 Occlcg32.exe Ofdeeb32.exe PID 2776 wrote to memory of 2416 2776 Occlcg32.exe Ofdeeb32.exe PID 2416 wrote to memory of 332 2416 Ofdeeb32.exe Ofgbkacb.exe PID 2416 wrote to memory of 332 2416 Ofdeeb32.exe Ofgbkacb.exe PID 2416 wrote to memory of 332 2416 Ofdeeb32.exe Ofgbkacb.exe PID 2416 wrote to memory of 332 2416 Ofdeeb32.exe Ofgbkacb.exe PID 332 wrote to memory of 2376 332 Ofgbkacb.exe Ooofcg32.exe PID 332 wrote to memory of 2376 332 Ofgbkacb.exe Ooofcg32.exe PID 332 wrote to memory of 2376 332 Ofgbkacb.exe Ooofcg32.exe PID 332 wrote to memory of 2376 332 Ofgbkacb.exe Ooofcg32.exe PID 2376 wrote to memory of 2464 2376 Ooofcg32.exe Pkfghh32.exe PID 2376 wrote to memory of 2464 2376 Ooofcg32.exe Pkfghh32.exe PID 2376 wrote to memory of 2464 2376 Ooofcg32.exe Pkfghh32.exe PID 2376 wrote to memory of 2464 2376 Ooofcg32.exe Pkfghh32.exe PID 2464 wrote to memory of 1576 2464 Pkfghh32.exe Pkhdnh32.exe PID 2464 wrote to memory of 1576 2464 Pkfghh32.exe Pkhdnh32.exe PID 2464 wrote to memory of 1576 2464 Pkfghh32.exe Pkhdnh32.exe PID 2464 wrote to memory of 1576 2464 Pkfghh32.exe Pkhdnh32.exe PID 1576 wrote to memory of 1236 1576 Pkhdnh32.exe Pgodcich.exe PID 1576 wrote to memory of 1236 1576 Pkhdnh32.exe Pgodcich.exe PID 1576 wrote to memory of 1236 1576 Pkhdnh32.exe Pgodcich.exe PID 1576 wrote to memory of 1236 1576 Pkhdnh32.exe Pgodcich.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe"C:\Users\Admin\AppData\Local\Temp\c393d79980a40b42db93fd7cb79118bf853b139f12569f4662b75288f2ecffcc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\Maiqfl32.exeC:\Windows\system32\Maiqfl32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Mhcicf32.exeC:\Windows\system32\Mhcicf32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\Mmbnam32.exeC:\Windows\system32\Mmbnam32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\Miiofn32.exeC:\Windows\system32\Miiofn32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\Nepokogo.exeC:\Windows\system32\Nepokogo.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\Nphpng32.exeC:\Windows\system32\Nphpng32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\Negeln32.exeC:\Windows\system32\Negeln32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Nnbjpqoa.exeC:\Windows\system32\Nnbjpqoa.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Ngjoif32.exeC:\Windows\system32\Ngjoif32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Occlcg32.exeC:\Windows\system32\Occlcg32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\Ofdeeb32.exeC:\Windows\system32\Ofdeeb32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\Ofgbkacb.exeC:\Windows\system32\Ofgbkacb.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\Ooofcg32.exeC:\Windows\system32\Ooofcg32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Pkfghh32.exeC:\Windows\system32\Pkfghh32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\Pkhdnh32.exeC:\Windows\system32\Pkhdnh32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\Pgodcich.exeC:\Windows\system32\Pgodcich.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Windows\SysWOW64\Pkmmigjo.exeC:\Windows\system32\Pkmmigjo.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Windows\SysWOW64\Peeabm32.exeC:\Windows\system32\Peeabm32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:824 -
C:\Windows\SysWOW64\Palbgn32.exeC:\Windows\system32\Palbgn32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Windows\SysWOW64\Qjdgpcmd.exeC:\Windows\system32\Qjdgpcmd.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Windows\SysWOW64\Qpaohjkk.exeC:\Windows\system32\Qpaohjkk.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Windows\SysWOW64\Ailqfooi.exeC:\Windows\system32\Ailqfooi.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1048 -
C:\Windows\SysWOW64\Aphehidc.exeC:\Windows\system32\Aphehidc.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Windows\SysWOW64\Aiqjao32.exeC:\Windows\system32\Aiqjao32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Windows\SysWOW64\Ahhchk32.exeC:\Windows\system32\Ahhchk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1440 -
C:\Windows\SysWOW64\Baqhapdj.exeC:\Windows\system32\Baqhapdj.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2352 -
C:\Windows\SysWOW64\Bmjekahk.exeC:\Windows\system32\Bmjekahk.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2784 -
C:\Windows\SysWOW64\Bknfeege.exeC:\Windows\system32\Bknfeege.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2808 -
C:\Windows\SysWOW64\Bdfjnkne.exeC:\Windows\system32\Bdfjnkne.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528 -
C:\Windows\SysWOW64\Beggec32.exeC:\Windows\system32\Beggec32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764 -
C:\Windows\SysWOW64\Ciepkajj.exeC:\Windows\system32\Ciepkajj.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Windows\SysWOW64\Cabaec32.exeC:\Windows\system32\Cabaec32.exe33⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Cofaog32.exeC:\Windows\system32\Cofaog32.exe34⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\SysWOW64\Chofhm32.exeC:\Windows\system32\Chofhm32.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\Chabmm32.exeC:\Windows\system32\Chabmm32.exe36⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\Dpmgao32.exeC:\Windows\system32\Dpmgao32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\Dlchfp32.exeC:\Windows\system32\Dlchfp32.exe38⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\Dcpmijqc.exeC:\Windows\system32\Dcpmijqc.exe39⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\Dpcnbn32.exeC:\Windows\system32\Dpcnbn32.exe40⤵
- Executes dropped EXE
PID:320 -
C:\Windows\SysWOW64\Dhobgp32.exeC:\Windows\system32\Dhobgp32.exe41⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\Ekpkhkji.exeC:\Windows\system32\Ekpkhkji.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\Ekbhnkhf.exeC:\Windows\system32\Ekbhnkhf.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2340 -
C:\Windows\SysWOW64\Eqamla32.exeC:\Windows\system32\Eqamla32.exe44⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\Egkehllh.exeC:\Windows\system32\Egkehllh.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1224 -
C:\Windows\SysWOW64\Enenef32.exeC:\Windows\system32\Enenef32.exe46⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\SysWOW64\Ejlnjg32.exeC:\Windows\system32\Ejlnjg32.exe47⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Fphgbn32.exeC:\Windows\system32\Fphgbn32.exe48⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Fjnkpf32.exeC:\Windows\system32\Fjnkpf32.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\Fmlglb32.exeC:\Windows\system32\Fmlglb32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\Fichqckn.exeC:\Windows\system32\Fichqckn.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\Fpmpnmck.exeC:\Windows\system32\Fpmpnmck.exe52⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\Fejifdab.exeC:\Windows\system32\Fejifdab.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2828 -
C:\Windows\SysWOW64\Fmaqgaae.exeC:\Windows\system32\Fmaqgaae.exe54⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\SysWOW64\Fbniohpl.exeC:\Windows\system32\Fbniohpl.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\Felekcop.exeC:\Windows\system32\Felekcop.exe56⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\Fpbihl32.exeC:\Windows\system32\Fpbihl32.exe57⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\Feobac32.exeC:\Windows\system32\Feobac32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3024 -
C:\Windows\SysWOW64\Gjljij32.exeC:\Windows\system32\Gjljij32.exe59⤵
- Executes dropped EXE
PID:2952 -
C:\Windows\SysWOW64\Gaebfdba.exeC:\Windows\system32\Gaebfdba.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3060 -
C:\Windows\SysWOW64\Ghpkbn32.exeC:\Windows\system32\Ghpkbn32.exe61⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\Gahpkd32.exeC:\Windows\system32\Gahpkd32.exe62⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Gjpddigo.exeC:\Windows\system32\Gjpddigo.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2452 -
C:\Windows\SysWOW64\Gpmllpef.exeC:\Windows\system32\Gpmllpef.exe64⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Gfgdij32.exeC:\Windows\system32\Gfgdij32.exe65⤵
- Executes dropped EXE
PID:584 -
C:\Windows\SysWOW64\Gpoibp32.exeC:\Windows\system32\Gpoibp32.exe66⤵PID:2024
-
C:\Windows\SysWOW64\Gjemoi32.exeC:\Windows\system32\Gjemoi32.exe67⤵
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\Glfjgaih.exeC:\Windows\system32\Glfjgaih.exe68⤵PID:2772
-
C:\Windows\SysWOW64\Hbpbck32.exeC:\Windows\system32\Hbpbck32.exe69⤵
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\Hijjpeha.exeC:\Windows\system32\Hijjpeha.exe70⤵PID:1436
-
C:\Windows\SysWOW64\Hbboiknb.exeC:\Windows\system32\Hbboiknb.exe71⤵PID:2868
-
C:\Windows\SysWOW64\Hhogaamj.exeC:\Windows\system32\Hhogaamj.exe72⤵
- Modifies registry class
PID:2328 -
C:\Windows\SysWOW64\Hbekojlp.exeC:\Windows\system32\Hbekojlp.exe73⤵PID:1508
-
C:\Windows\SysWOW64\Hlmphp32.exeC:\Windows\system32\Hlmphp32.exe74⤵
- Drops file in System32 directory
PID:1016 -
C:\Windows\SysWOW64\Hajhpgag.exeC:\Windows\system32\Hajhpgag.exe75⤵PID:1120
-
C:\Windows\SysWOW64\Hlpmmpam.exeC:\Windows\system32\Hlpmmpam.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1652 -
C:\Windows\SysWOW64\Haleefoe.exeC:\Windows\system32\Haleefoe.exe77⤵PID:2968
-
C:\Windows\SysWOW64\Hhfmbq32.exeC:\Windows\system32\Hhfmbq32.exe78⤵PID:3068
-
C:\Windows\SysWOW64\Imcfjg32.exeC:\Windows\system32\Imcfjg32.exe79⤵PID:2372
-
C:\Windows\SysWOW64\Ipabfcdm.exeC:\Windows\system32\Ipabfcdm.exe80⤵PID:580
-
C:\Windows\SysWOW64\Iijfoh32.exeC:\Windows\system32\Iijfoh32.exe81⤵PID:2440
-
C:\Windows\SysWOW64\Icbkhnan.exeC:\Windows\system32\Icbkhnan.exe82⤵
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\Ilkpac32.exeC:\Windows\system32\Ilkpac32.exe83⤵
- Drops file in System32 directory
PID:1800 -
C:\Windows\SysWOW64\Icdhnn32.exeC:\Windows\system32\Icdhnn32.exe84⤵
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\Iphhgb32.exeC:\Windows\system32\Iphhgb32.exe85⤵PID:2092
-
C:\Windows\SysWOW64\Igbqdlea.exeC:\Windows\system32\Igbqdlea.exe86⤵PID:2284
-
C:\Windows\SysWOW64\Ionehnbm.exeC:\Windows\system32\Ionehnbm.exe87⤵PID:896
-
C:\Windows\SysWOW64\Jjcieg32.exeC:\Windows\system32\Jjcieg32.exe88⤵PID:1396
-
C:\Windows\SysWOW64\Jopbnn32.exeC:\Windows\system32\Jopbnn32.exe89⤵
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Jdmjfe32.exeC:\Windows\system32\Jdmjfe32.exe90⤵PID:2936
-
C:\Windows\SysWOW64\Jneoojeb.exeC:\Windows\system32\Jneoojeb.exe91⤵
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\Jflgph32.exeC:\Windows\system32\Jflgph32.exe92⤵PID:2424
-
C:\Windows\SysWOW64\Jngkdj32.exeC:\Windows\system32\Jngkdj32.exe93⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\Jgppmpjp.exeC:\Windows\system32\Jgppmpjp.exe94⤵PID:2068
-
C:\Windows\SysWOW64\Jddqgdii.exeC:\Windows\system32\Jddqgdii.exe95⤵PID:524
-
C:\Windows\SysWOW64\Jnlepioj.exeC:\Windows\system32\Jnlepioj.exe96⤵
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\Kfgjdlme.exeC:\Windows\system32\Kfgjdlme.exe97⤵PID:1624
-
C:\Windows\SysWOW64\Kqmnadlk.exeC:\Windows\system32\Kqmnadlk.exe98⤵PID:772
-
C:\Windows\SysWOW64\Kggfnoch.exeC:\Windows\system32\Kggfnoch.exe99⤵
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\Kmdofebo.exeC:\Windows\system32\Kmdofebo.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2564 -
C:\Windows\SysWOW64\Kjhopjqi.exeC:\Windows\system32\Kjhopjqi.exe101⤵PID:2304
-
C:\Windows\SysWOW64\Kodghqop.exeC:\Windows\system32\Kodghqop.exe102⤵
- Drops file in System32 directory
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Kimlqfeq.exeC:\Windows\system32\Kimlqfeq.exe103⤵PID:1536
-
C:\Windows\SysWOW64\Kpgdnp32.exeC:\Windows\system32\Kpgdnp32.exe104⤵PID:2132
-
C:\Windows\SysWOW64\Lgbibb32.exeC:\Windows\system32\Lgbibb32.exe105⤵PID:2908
-
C:\Windows\SysWOW64\Lnlaomae.exeC:\Windows\system32\Lnlaomae.exe106⤵PID:3020
-
C:\Windows\SysWOW64\Lefikg32.exeC:\Windows\system32\Lefikg32.exe107⤵
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\Ljcbcngi.exeC:\Windows\system32\Ljcbcngi.exe108⤵PID:1916
-
C:\Windows\SysWOW64\Lehfafgp.exeC:\Windows\system32\Lehfafgp.exe109⤵
- Drops file in System32 directory
PID:964 -
C:\Windows\SysWOW64\Llbnnq32.exeC:\Windows\system32\Llbnnq32.exe110⤵PID:1700
-
C:\Windows\SysWOW64\Lcncbc32.exeC:\Windows\system32\Lcncbc32.exe111⤵PID:1924
-
C:\Windows\SysWOW64\Ljgkom32.exeC:\Windows\system32\Ljgkom32.exe112⤵PID:1692
-
C:\Windows\SysWOW64\Lpddgd32.exeC:\Windows\system32\Lpddgd32.exe113⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\Lhklha32.exeC:\Windows\system32\Lhklha32.exe114⤵PID:1076
-
C:\Windows\SysWOW64\Mfceom32.exeC:\Windows\system32\Mfceom32.exe115⤵PID:2704
-
C:\Windows\SysWOW64\Mfebdm32.exeC:\Windows\system32\Mfebdm32.exe116⤵PID:1240
-
C:\Windows\SysWOW64\Maocekoo.exeC:\Windows\system32\Maocekoo.exe117⤵PID:2180
-
C:\Windows\SysWOW64\Mifkfhpa.exeC:\Windows\system32\Mifkfhpa.exe118⤵PID:2212
-
C:\Windows\SysWOW64\Mldgbcoe.exeC:\Windows\system32\Mldgbcoe.exe119⤵
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\Maapjjml.exeC:\Windows\system32\Maapjjml.exe120⤵PID:2404
-
C:\Windows\SysWOW64\Mhkhgd32.exeC:\Windows\system32\Mhkhgd32.exe121⤵PID:1444
-
C:\Windows\SysWOW64\Noepdo32.exeC:\Windows\system32\Noepdo32.exe122⤵PID:1864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-