Analysis
-
max time kernel
40s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe
Resource
win10v2004-20241007-en
General
-
Target
7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe
-
Size
96KB
-
MD5
394373068f69838b78b82f800655556c
-
SHA1
2c30bc8208e57c7f50303a5b6e8eb327f631c20d
-
SHA256
7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5
-
SHA512
312090fcbaade823ae8dcbd06564ded6e544fc172bdddad9b453067606ab16e0f944567a545eecf5820c7a863a29ed8edb565f86bd23ed72ce7465e22ff8156d
-
SSDEEP
1536:UIKVKXmsmbH4l9OjAbY6lMNx/1nKIpFVOKbOeE+2L5J7RZObZUUWaegPYAG:bKKkH4l9OjAbY6l+/kbeED5JClUUWaed
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fcdele32.exeQamjmh32.exeCcolja32.exeDomffn32.exeFefpfi32.exeIamjghnm.exePacqlcdi.exeIjbjpg32.exePeiaij32.exeAmnanefa.exeAdeiobgc.exeDdcadd32.exeAjgfnk32.exeDlqgob32.exePhoeomjc.exeIpijpkei.exeCgeopqfp.exeGfpjgn32.exePchdfb32.exeLdihjo32.exeCjljpjjk.exeMgjpcf32.exeAgchdfmk.exeEeceim32.exeNmmlccfp.exeQjbehfbo.exeHcajjf32.exeCkndmaad.exeEonfgbhc.exeAlcqcjgd.exeMcendc32.exeLkhcdhmk.exeHfdbji32.exeMbobgfnf.exeNmkpnd32.exeNdiaem32.exeAfffgjma.exeLoofjg32.exePceqfl32.exeGeeekf32.exeIilocklc.exeKneflplf.exeKhkdmh32.exeMoloidjl.exeCmbiap32.exeOdgqoa32.exeKabobo32.exeNijcgp32.exeOmjeba32.exeNjobpa32.exeHefibg32.exeOnhnjclg.exeLfckhc32.exeGoodpb32.exeJalmcl32.exeJlmddi32.exeLfgaaa32.exeAmhopfof.exeDmiihjak.exeHmdnme32.exePapank32.exeGqknjlfp.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcdele32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qamjmh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccolja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Domffn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fefpfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iamjghnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pacqlcdi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijbjpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peiaij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amnanefa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adeiobgc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddcadd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajgfnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlqgob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phoeomjc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipijpkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgeopqfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfpjgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pchdfb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldihjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjljpjjk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgjpcf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agchdfmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eeceim32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmmlccfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjbehfbo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Domffn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcajjf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckndmaad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eonfgbhc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alcqcjgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcendc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkhcdhmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfdbji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbobgfnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmkpnd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndiaem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afffgjma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loofjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pceqfl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Geeekf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amnanefa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iilocklc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kneflplf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khkdmh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moloidjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmbiap32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odgqoa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kabobo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nijcgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omjeba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njobpa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hefibg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onhnjclg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfckhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Goodpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jalmcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jlmddi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfgaaa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amhopfof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmiihjak.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmdnme32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Papank32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gqknjlfp.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 3 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Jjbdfbnl.exe family_bruteratel C:\Windows\SysWOW64\Dpdbdo32.exe family_bruteratel C:\Windows\SysWOW64\Mliibj32.exe family_bruteratel -
Executes dropped EXE 64 IoCs
Processes:
Omgfdhbq.exeOcdnloph.exeOcihgo32.exePeiaij32.exePapank32.exePodbgo32.exePdcgeejf.exePchdfb32.exeAjgfnk32.exeAmhopfof.exeAkmlacdn.exeAkphfbbl.exeAjdego32.exeBnbnnm32.exeBgkbfcck.exeBmjhdi32.exeBlodefdg.exeCnpnga32.exeCppjadhk.exeClfkfeno.exeCeoooj32.exeCkkhga32.exeCkndmaad.exeCmlqimph.exeDggbgadf.exeDgiomabc.exeDdmofeam.exeDijgnm32.exeDlkqpg32.exeEeceim32.exeEdhbjjhn.exeEonfgbhc.exeEdmkei32.exeEaalom32.exeFnhlcn32.exeFcdele32.exeFmacpj32.exeFdmgdl32.exeGdodjlda.exeGqfeom32.exeGgpmkgab.exeGbeaip32.exeGknfaehi.exeGqknjlfp.exeGgdfff32.exeGmaoomld.exeGjephakn.exeHmdldmja.exeHbqdldhi.exeHjhlnahk.exeHcpqfgol.exeHpgakh32.exeHiofdmkq.exeHpinagbm.exeHhdcejph.exeHnnkbd32.exeIhgpkinf.exeImchcplm.exeIflmlfcn.exeImfeip32.exeIfniaeqk.exeImhanp32.exeIfqfge32.exeIpijpkei.exepid process 2028 Omgfdhbq.exe 1632 Ocdnloph.exe 2760 Ocihgo32.exe 2736 Peiaij32.exe 2748 Papank32.exe 2628 Podbgo32.exe 2232 Pdcgeejf.exe 1712 Pchdfb32.exe 2960 Ajgfnk32.exe 1268 Amhopfof.exe 1384 Akmlacdn.exe 520 Akphfbbl.exe 2808 Ajdego32.exe 872 Bnbnnm32.exe 2172 Bgkbfcck.exe 2340 Bmjhdi32.exe 3044 Blodefdg.exe 1092 Cnpnga32.exe 1700 Cppjadhk.exe 2440 Clfkfeno.exe 2168 Ceoooj32.exe 3060 Ckkhga32.exe 1052 Ckndmaad.exe 1364 Cmlqimph.exe 1212 Dggbgadf.exe 556 Dgiomabc.exe 1608 Ddmofeam.exe 2924 Dijgnm32.exe 2468 Dlkqpg32.exe 2888 Eeceim32.exe 2460 Edhbjjhn.exe 2744 Eonfgbhc.exe 2692 Edmkei32.exe 2336 Eaalom32.exe 2944 Fnhlcn32.exe 2996 Fcdele32.exe 1016 Fmacpj32.exe 1280 Fdmgdl32.exe 1020 Gdodjlda.exe 1444 Gqfeom32.exe 2728 Ggpmkgab.exe 2344 Gbeaip32.exe 2896 Gknfaehi.exe 2132 Gqknjlfp.exe 2400 Ggdfff32.exe 2364 Gmaoomld.exe 2488 Gjephakn.exe 1340 Hmdldmja.exe 2272 Hbqdldhi.exe 2392 Hjhlnahk.exe 1824 Hcpqfgol.exe 932 Hpgakh32.exe 1740 Hiofdmkq.exe 2900 Hpinagbm.exe 2860 Hhdcejph.exe 2804 Hnnkbd32.exe 2648 Ihgpkinf.exe 648 Imchcplm.exe 1696 Iflmlfcn.exe 2012 Imfeip32.exe 2436 Ifniaeqk.exe 2620 Imhanp32.exe 2332 Ifqfge32.exe 1804 Ipijpkei.exe -
Loads dropped DLL 64 IoCs
Processes:
7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exeOmgfdhbq.exeOcdnloph.exeOcihgo32.exePeiaij32.exePapank32.exePodbgo32.exePdcgeejf.exePchdfb32.exeAjgfnk32.exeAmhopfof.exeAkmlacdn.exeAkphfbbl.exeAjdego32.exeBnbnnm32.exeBgkbfcck.exeBmjhdi32.exeBlodefdg.exeCnpnga32.exeCppjadhk.exeClfkfeno.exeCeoooj32.exeCkkhga32.exeCkndmaad.exeCmlqimph.exeDggbgadf.exeDgiomabc.exeDdmofeam.exeDijgnm32.exeDlkqpg32.exeEeceim32.exeEdhbjjhn.exepid process 1048 7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe 1048 7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe 2028 Omgfdhbq.exe 2028 Omgfdhbq.exe 1632 Ocdnloph.exe 1632 Ocdnloph.exe 2760 Ocihgo32.exe 2760 Ocihgo32.exe 2736 Peiaij32.exe 2736 Peiaij32.exe 2748 Papank32.exe 2748 Papank32.exe 2628 Podbgo32.exe 2628 Podbgo32.exe 2232 Pdcgeejf.exe 2232 Pdcgeejf.exe 1712 Pchdfb32.exe 1712 Pchdfb32.exe 2960 Ajgfnk32.exe 2960 Ajgfnk32.exe 1268 Amhopfof.exe 1268 Amhopfof.exe 1384 Akmlacdn.exe 1384 Akmlacdn.exe 520 Akphfbbl.exe 520 Akphfbbl.exe 2808 Ajdego32.exe 2808 Ajdego32.exe 872 Bnbnnm32.exe 872 Bnbnnm32.exe 2172 Bgkbfcck.exe 2172 Bgkbfcck.exe 2340 Bmjhdi32.exe 2340 Bmjhdi32.exe 3044 Blodefdg.exe 3044 Blodefdg.exe 1092 Cnpnga32.exe 1092 Cnpnga32.exe 1700 Cppjadhk.exe 1700 Cppjadhk.exe 2440 Clfkfeno.exe 2440 Clfkfeno.exe 2168 Ceoooj32.exe 2168 Ceoooj32.exe 3060 Ckkhga32.exe 3060 Ckkhga32.exe 1052 Ckndmaad.exe 1052 Ckndmaad.exe 1364 Cmlqimph.exe 1364 Cmlqimph.exe 1212 Dggbgadf.exe 1212 Dggbgadf.exe 556 Dgiomabc.exe 556 Dgiomabc.exe 1608 Ddmofeam.exe 1608 Ddmofeam.exe 2924 Dijgnm32.exe 2924 Dijgnm32.exe 2468 Dlkqpg32.exe 2468 Dlkqpg32.exe 2888 Eeceim32.exe 2888 Eeceim32.exe 2460 Edhbjjhn.exe 2460 Edhbjjhn.exe -
Drops file in System32 directory 64 IoCs
Processes:
Lfgaaa32.exeJmmmbg32.exeNjobpa32.exeAnfjpa32.exeBnbnnm32.exeIfqfge32.exeEkofgnna.exeDghjmlnm.exeGohqhl32.exeDomffn32.exeIaipmm32.exeMoloidjl.exeLkqdajhc.exeHmdnme32.exeEpdncb32.exeEbpgoh32.exeFdmgdl32.exeMfchgflg.exePolakmbi.exeApllml32.exeJaamhb32.exeKcipqi32.exeEpjbienl.exeEpnldd32.exeKnbjgq32.exeDbmnjenb.exeDnfkefad.exeEdmkei32.exeHbqdldhi.exePjpicfdb.exeAhlnmjkf.exeDidgig32.exeGdgcnj32.exePkkeeikj.exeEajhgg32.exeOdfjdk32.exeOegflcbj.exeQlcgmpkp.exeKhnqbhdi.exeMmpobi32.exeDdmofeam.exeLlkgpmck.exeCbcikn32.exeBikhce32.exeFplknh32.exePobgjhgh.exeJnafop32.exeDijgnm32.exeIhgpkinf.exeKhkadoog.exeLjjjmeie.exeEkppjmia.exeFcgdjmlo.exeLndlamke.exeHjhlnahk.exeImfeip32.exeDedkbb32.exeJalmcl32.exeMnneabff.exePopkeh32.exeQkbkfh32.exePojgnf32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Loofjg32.exe Lfgaaa32.exe File created C:\Windows\SysWOW64\Jbjejojn.exe Jmmmbg32.exe File created C:\Windows\SysWOW64\Ncggifep.exe Njobpa32.exe File created C:\Windows\SysWOW64\Ahlnmjkf.exe Anfjpa32.exe File opened for modification C:\Windows\SysWOW64\Bgkbfcck.exe Bnbnnm32.exe File created C:\Windows\SysWOW64\Ipijpkei.exe Ifqfge32.exe File created C:\Windows\SysWOW64\Elqcnfdp.exe Ekofgnna.exe File created C:\Windows\SysWOW64\Fanhpabf.dll Dghjmlnm.exe File opened for modification C:\Windows\SysWOW64\Ggphji32.exe Gohqhl32.exe File created C:\Windows\SysWOW64\Ehjnebll.dll Domffn32.exe File created C:\Windows\SysWOW64\Jjbdfbnl.exe Iaipmm32.exe File opened for modification C:\Windows\SysWOW64\Mmpobi32.exe Moloidjl.exe File created C:\Windows\SysWOW64\Lqmliqfj.exe Lkqdajhc.exe File created C:\Windows\SysWOW64\Hbafel32.exe Hmdnme32.exe File created C:\Windows\SysWOW64\Dlodea32.dll Epdncb32.exe File opened for modification C:\Windows\SysWOW64\Flhkhnel.exe Ebpgoh32.exe File opened for modification C:\Windows\SysWOW64\Gdodjlda.exe Fdmgdl32.exe File created C:\Windows\SysWOW64\Qeophqkd.dll Mfchgflg.exe File created C:\Windows\SysWOW64\Qakmghbm.exe Polakmbi.exe File opened for modification C:\Windows\SysWOW64\Bfieec32.exe Apllml32.exe File created C:\Windows\SysWOW64\Dmolagqb.dll Jaamhb32.exe File created C:\Windows\SysWOW64\Kjchmclb.exe Kcipqi32.exe File created C:\Windows\SysWOW64\Hilakcna.dll Epjbienl.exe File opened for modification C:\Windows\SysWOW64\Eigpmjqg.exe Epnldd32.exe File created C:\Windows\SysWOW64\Khhndi32.exe Knbjgq32.exe File opened for modification C:\Windows\SysWOW64\Dlfbck32.exe Dbmnjenb.exe File opened for modification C:\Windows\SysWOW64\Ejmljg32.exe Dnfkefad.exe File opened for modification C:\Windows\SysWOW64\Eaalom32.exe Edmkei32.exe File opened for modification C:\Windows\SysWOW64\Hjhlnahk.exe Hbqdldhi.exe File created C:\Windows\SysWOW64\Polakmbi.exe Pjpicfdb.exe File created C:\Windows\SysWOW64\Apgcbmha.exe Ahlnmjkf.exe File opened for modification C:\Windows\SysWOW64\Dkfcqo32.exe Didgig32.exe File opened for modification C:\Windows\SysWOW64\Gkaljdaf.exe Gdgcnj32.exe File opened for modification C:\Windows\SysWOW64\Phoeomjc.exe Pkkeeikj.exe File opened for modification C:\Windows\SysWOW64\Eamdlf32.exe Eajhgg32.exe File opened for modification C:\Windows\SysWOW64\Oegflcbj.exe Odfjdk32.exe File created C:\Windows\SysWOW64\Popkeh32.exe Oegflcbj.exe File created C:\Windows\SysWOW64\Qdkpomkb.exe Qlcgmpkp.exe File opened for modification C:\Windows\SysWOW64\Lafekm32.exe Khnqbhdi.exe File created C:\Windows\SysWOW64\Dgcdjk32.dll Mmpobi32.exe File opened for modification C:\Windows\SysWOW64\Dijgnm32.exe Ddmofeam.exe File opened for modification C:\Windows\SysWOW64\Lfckhc32.exe Llkgpmck.exe File opened for modification C:\Windows\SysWOW64\Cinahhff.exe Cbcikn32.exe File opened for modification C:\Windows\SysWOW64\Bfphmi32.exe Bikhce32.exe File created C:\Windows\SysWOW64\Fkapkq32.exe Fplknh32.exe File created C:\Windows\SysWOW64\Phklcn32.exe Pobgjhgh.exe File created C:\Windows\SysWOW64\Jekoljgo.exe Jnafop32.exe File created C:\Windows\SysWOW64\Dlkqpg32.exe Dijgnm32.exe File opened for modification C:\Windows\SysWOW64\Imchcplm.exe Ihgpkinf.exe File created C:\Windows\SysWOW64\Kbcfme32.exe Khkadoog.exe File created C:\Windows\SysWOW64\Mgnkfjho.exe Ljjjmeie.exe File created C:\Windows\SysWOW64\Eajhgg32.exe Ekppjmia.exe File opened for modification C:\Windows\SysWOW64\Fefpfi32.exe Fcgdjmlo.exe File opened for modification C:\Windows\SysWOW64\Mliibj32.exe Lndlamke.exe File opened for modification C:\Windows\SysWOW64\Hcpqfgol.exe Hjhlnahk.exe File created C:\Windows\SysWOW64\Ifniaeqk.exe Imfeip32.exe File opened for modification C:\Windows\SysWOW64\Lqmliqfj.exe Lkqdajhc.exe File created C:\Windows\SysWOW64\Mcoinndc.dll Dedkbb32.exe File created C:\Windows\SysWOW64\Limhol32.dll Moloidjl.exe File created C:\Windows\SysWOW64\Cggcja32.dll Jalmcl32.exe File opened for modification C:\Windows\SysWOW64\Mjeffc32.exe Mnneabff.exe File created C:\Windows\SysWOW64\Pieobaiq.exe Popkeh32.exe File created C:\Windows\SysWOW64\Qlcgmpkp.exe Qkbkfh32.exe File opened for modification C:\Windows\SysWOW64\Pedokpcm.exe Pojgnf32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3024 3800 WerFault.exe Iqmcmaja.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Ceoooj32.exeAmnanefa.exeIniglajj.exeJbjejojn.exeNnfeep32.exeJgpbfh32.exeMliibj32.exePnfkheap.exeCjqglf32.exeHiphmf32.exeAmhopfof.exeBmjhdi32.exeNcbkenba.exeGkfkoi32.exeHpinagbm.exeBjfkbhae.exeDoocln32.exeOmhhma32.exeFhfihd32.exeHiofdmkq.exeNhbqqlfe.exeQakmghbm.exeQjbehfbo.exeJinghn32.exeHjnaehgj.exeMbobgfnf.exeCfghagio.exeCbnhfhoc.exeEkeiel32.exeEkgfkl32.exeHbqdldhi.exeLdihjo32.exeOinbglkm.exeOakcan32.exeCakfcfoc.exeDaplmimi.exeLjpqlqmd.exeFcgdjmlo.exeMnakjaoc.exeFljhmmci.exeGgmldj32.exeClfkfeno.exeHhdcejph.exeMjmgbe32.exeCabldeik.exeOdfjdk32.exeCeoagcld.exeEbkndibq.exeJaamhb32.exeJacjna32.exeOnbkle32.exeKcahjqfa.exeMcghajkq.exePkcfak32.exeCjljpjjk.exeKhkdmh32.exeKhnqbhdi.exeFkbadifn.exeJifhdphd.exeKhkadoog.exeLjjjmeie.exeBikhce32.exeObgmjh32.exeMoloidjl.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceoooj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amnanefa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iniglajj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbjejojn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nnfeep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgpbfh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mliibj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnfkheap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjqglf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hiphmf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amhopfof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmjhdi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncbkenba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkfkoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpinagbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjfkbhae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doocln32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omhhma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fhfihd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hiofdmkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhbqqlfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qakmghbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qjbehfbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jinghn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjnaehgj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbobgfnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfghagio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbnhfhoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekeiel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekgfkl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbqdldhi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldihjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oinbglkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oakcan32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cakfcfoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daplmimi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljpqlqmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcgdjmlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnakjaoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fljhmmci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggmldj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clfkfeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhdcejph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjmgbe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cabldeik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odfjdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceoagcld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ebkndibq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jaamhb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jacjna32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onbkle32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcahjqfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mcghajkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkcfak32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjljpjjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khkdmh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khnqbhdi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkbadifn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jifhdphd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khkadoog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljjjmeie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bikhce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obgmjh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moloidjl.exe -
Modifies registry class 64 IoCs
Processes:
Edmkei32.exeMgnkfjho.exeNifjnd32.exePceqfl32.exeEpnldd32.exeDmopge32.exeFldbnb32.exeFnbhmlkk.exeGjnbmlmj.exeInfjfblm.exeHancef32.exeLbfcbdce.exeOppbjn32.exeCcolja32.exeJepoao32.exeMpaoojjb.exeDedkbb32.exeIjhkembk.exeDidgig32.exeCbnhfhoc.exeDifplf32.exeJhgnbehe.exeAapikqel.exeAmhopfof.exeAkphfbbl.exeGdgcnj32.exeJinghn32.exePopkeh32.exeBfqaph32.exeEmnelbdi.exeEpdncb32.exeMnakjaoc.exeApllml32.exeLkqdajhc.exeOfjjghik.exeBikhce32.exeClkfjman.exeOmgfdhbq.exePolakmbi.exeJjbdfbnl.exeIamjghnm.exeCdgdlnop.exeMkkpjg32.exeLahaqm32.exePedokpcm.exeAkmlacdn.exeJgpbfh32.exeBfphmi32.exeGmjbchnq.exeNehjmppo.exeFlphccbp.exeJekoljgo.exeKhnqbhdi.exeOjdlkp32.exeDlqgob32.exeEigpmjqg.exeJdobjgqg.exeOdoddlcd.exeGeeekf32.exeGdjpcj32.exeBqambacb.exeEkeiel32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaoeap32.dll" Edmkei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgnkfjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nifjnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pceqfl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Epnldd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmopge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fldbnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnbhmlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjnbmlmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Infjfblm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hancef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbfcbdce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oppbjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Difcao32.dll" Ccolja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpcqnh32.dll" Jepoao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpaoojjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dedkbb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijhkembk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldfmlkmf.dll" Didgig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbnhfhoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Difplf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jhgnbehe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aapikqel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amhopfof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akphfbbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdgcnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qbdjnieg.dll" Jinghn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Popkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfqaph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emnelbdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlodea32.dll" Epdncb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnakjaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mnakjaoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apllml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkqdajhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofjjghik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bikhce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clkfjman.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omgfdhbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Moljfnpo.dll" Polakmbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjbdfbnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcjlicgq.dll" Iamjghnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmhfaj32.dll" Cdgdlnop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkkpjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lahaqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fobccb32.dll" Pedokpcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akmlacdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhnmpigi.dll" Jgpbfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfphmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpohfljj.dll" Gmjbchnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nehjmppo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hokemgkj.dll" Flphccbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jekoljgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khnqbhdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojdlkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlqgob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckjfchcp.dll" Eigpmjqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdobjgqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ododdlcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Geeekf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Laeqgcbl.dll" Gdjpcj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bqambacb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ekeiel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lahaqm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exeOmgfdhbq.exeOcdnloph.exeOcihgo32.exePeiaij32.exePapank32.exePodbgo32.exePdcgeejf.exePchdfb32.exeAjgfnk32.exeAmhopfof.exeAkmlacdn.exeAkphfbbl.exeAjdego32.exeBnbnnm32.exeBgkbfcck.exedescription pid process target process PID 1048 wrote to memory of 2028 1048 7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe Omgfdhbq.exe PID 1048 wrote to memory of 2028 1048 7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe Omgfdhbq.exe PID 1048 wrote to memory of 2028 1048 7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe Omgfdhbq.exe PID 1048 wrote to memory of 2028 1048 7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe Omgfdhbq.exe PID 2028 wrote to memory of 1632 2028 Omgfdhbq.exe Ocdnloph.exe PID 2028 wrote to memory of 1632 2028 Omgfdhbq.exe Ocdnloph.exe PID 2028 wrote to memory of 1632 2028 Omgfdhbq.exe Ocdnloph.exe PID 2028 wrote to memory of 1632 2028 Omgfdhbq.exe Ocdnloph.exe PID 1632 wrote to memory of 2760 1632 Ocdnloph.exe Ocihgo32.exe PID 1632 wrote to memory of 2760 1632 Ocdnloph.exe Ocihgo32.exe PID 1632 wrote to memory of 2760 1632 Ocdnloph.exe Ocihgo32.exe PID 1632 wrote to memory of 2760 1632 Ocdnloph.exe Ocihgo32.exe PID 2760 wrote to memory of 2736 2760 Ocihgo32.exe Peiaij32.exe PID 2760 wrote to memory of 2736 2760 Ocihgo32.exe Peiaij32.exe PID 2760 wrote to memory of 2736 2760 Ocihgo32.exe Peiaij32.exe PID 2760 wrote to memory of 2736 2760 Ocihgo32.exe Peiaij32.exe PID 2736 wrote to memory of 2748 2736 Peiaij32.exe Papank32.exe PID 2736 wrote to memory of 2748 2736 Peiaij32.exe Papank32.exe PID 2736 wrote to memory of 2748 2736 Peiaij32.exe Papank32.exe PID 2736 wrote to memory of 2748 2736 Peiaij32.exe Papank32.exe PID 2748 wrote to memory of 2628 2748 Papank32.exe Podbgo32.exe PID 2748 wrote to memory of 2628 2748 Papank32.exe Podbgo32.exe PID 2748 wrote to memory of 2628 2748 Papank32.exe Podbgo32.exe PID 2748 wrote to memory of 2628 2748 Papank32.exe Podbgo32.exe PID 2628 wrote to memory of 2232 2628 Podbgo32.exe Pdcgeejf.exe PID 2628 wrote to memory of 2232 2628 Podbgo32.exe Pdcgeejf.exe PID 2628 wrote to memory of 2232 2628 Podbgo32.exe Pdcgeejf.exe PID 2628 wrote to memory of 2232 2628 Podbgo32.exe Pdcgeejf.exe PID 2232 wrote to memory of 1712 2232 Pdcgeejf.exe Pchdfb32.exe PID 2232 wrote to memory of 1712 2232 Pdcgeejf.exe Pchdfb32.exe PID 2232 wrote to memory of 1712 2232 Pdcgeejf.exe Pchdfb32.exe PID 2232 wrote to memory of 1712 2232 Pdcgeejf.exe Pchdfb32.exe PID 1712 wrote to memory of 2960 1712 Pchdfb32.exe Ajgfnk32.exe PID 1712 wrote to memory of 2960 1712 Pchdfb32.exe Ajgfnk32.exe PID 1712 wrote to memory of 2960 1712 Pchdfb32.exe Ajgfnk32.exe PID 1712 wrote to memory of 2960 1712 Pchdfb32.exe Ajgfnk32.exe PID 2960 wrote to memory of 1268 2960 Ajgfnk32.exe Amhopfof.exe PID 2960 wrote to memory of 1268 2960 Ajgfnk32.exe Amhopfof.exe PID 2960 wrote to memory of 1268 2960 Ajgfnk32.exe Amhopfof.exe PID 2960 wrote to memory of 1268 2960 Ajgfnk32.exe Amhopfof.exe PID 1268 wrote to memory of 1384 1268 Amhopfof.exe Akmlacdn.exe PID 1268 wrote to memory of 1384 1268 Amhopfof.exe Akmlacdn.exe PID 1268 wrote to memory of 1384 1268 Amhopfof.exe Akmlacdn.exe PID 1268 wrote to memory of 1384 1268 Amhopfof.exe Akmlacdn.exe PID 1384 wrote to memory of 520 1384 Akmlacdn.exe Akphfbbl.exe PID 1384 wrote to memory of 520 1384 Akmlacdn.exe Akphfbbl.exe PID 1384 wrote to memory of 520 1384 Akmlacdn.exe Akphfbbl.exe PID 1384 wrote to memory of 520 1384 Akmlacdn.exe Akphfbbl.exe PID 520 wrote to memory of 2808 520 Akphfbbl.exe Ajdego32.exe PID 520 wrote to memory of 2808 520 Akphfbbl.exe Ajdego32.exe PID 520 wrote to memory of 2808 520 Akphfbbl.exe Ajdego32.exe PID 520 wrote to memory of 2808 520 Akphfbbl.exe Ajdego32.exe PID 2808 wrote to memory of 872 2808 Ajdego32.exe Bnbnnm32.exe PID 2808 wrote to memory of 872 2808 Ajdego32.exe Bnbnnm32.exe PID 2808 wrote to memory of 872 2808 Ajdego32.exe Bnbnnm32.exe PID 2808 wrote to memory of 872 2808 Ajdego32.exe Bnbnnm32.exe PID 872 wrote to memory of 2172 872 Bnbnnm32.exe Bgkbfcck.exe PID 872 wrote to memory of 2172 872 Bnbnnm32.exe Bgkbfcck.exe PID 872 wrote to memory of 2172 872 Bnbnnm32.exe Bgkbfcck.exe PID 872 wrote to memory of 2172 872 Bnbnnm32.exe Bgkbfcck.exe PID 2172 wrote to memory of 2340 2172 Bgkbfcck.exe Bmjhdi32.exe PID 2172 wrote to memory of 2340 2172 Bgkbfcck.exe Bmjhdi32.exe PID 2172 wrote to memory of 2340 2172 Bgkbfcck.exe Bmjhdi32.exe PID 2172 wrote to memory of 2340 2172 Bgkbfcck.exe Bmjhdi32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe"C:\Users\Admin\AppData\Local\Temp\7167d92bf11634cedbbe6882cccc151ca29a61a1f9b73ce576f3caacb82493c5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\Omgfdhbq.exeC:\Windows\system32\Omgfdhbq.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Ocdnloph.exeC:\Windows\system32\Ocdnloph.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\Ocihgo32.exeC:\Windows\system32\Ocihgo32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Peiaij32.exeC:\Windows\system32\Peiaij32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\Papank32.exeC:\Windows\system32\Papank32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\Podbgo32.exeC:\Windows\system32\Podbgo32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\Pdcgeejf.exeC:\Windows\system32\Pdcgeejf.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Pchdfb32.exeC:\Windows\system32\Pchdfb32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\Ajgfnk32.exeC:\Windows\system32\Ajgfnk32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Amhopfof.exeC:\Windows\system32\Amhopfof.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Akmlacdn.exeC:\Windows\system32\Akmlacdn.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Akphfbbl.exeC:\Windows\system32\Akphfbbl.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\Ajdego32.exeC:\Windows\system32\Ajdego32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Bnbnnm32.exeC:\Windows\system32\Bnbnnm32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\Bgkbfcck.exeC:\Windows\system32\Bgkbfcck.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\Bmjhdi32.exeC:\Windows\system32\Bmjhdi32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\Blodefdg.exeC:\Windows\system32\Blodefdg.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3044 -
C:\Windows\SysWOW64\Cnpnga32.exeC:\Windows\system32\Cnpnga32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Windows\SysWOW64\Cppjadhk.exeC:\Windows\system32\Cppjadhk.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Windows\SysWOW64\Clfkfeno.exeC:\Windows\system32\Clfkfeno.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\Ceoooj32.exeC:\Windows\system32\Ceoooj32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\Ckkhga32.exeC:\Windows\system32\Ckkhga32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3060 -
C:\Windows\SysWOW64\Ckndmaad.exeC:\Windows\system32\Ckndmaad.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1052 -
C:\Windows\SysWOW64\Cmlqimph.exeC:\Windows\system32\Cmlqimph.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1364 -
C:\Windows\SysWOW64\Dggbgadf.exeC:\Windows\system32\Dggbgadf.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212 -
C:\Windows\SysWOW64\Dgiomabc.exeC:\Windows\system32\Dgiomabc.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:556 -
C:\Windows\SysWOW64\Ddmofeam.exeC:\Windows\system32\Ddmofeam.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1608 -
C:\Windows\SysWOW64\Dijgnm32.exeC:\Windows\system32\Dijgnm32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\Dlkqpg32.exeC:\Windows\system32\Dlkqpg32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468 -
C:\Windows\SysWOW64\Eeceim32.exeC:\Windows\system32\Eeceim32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Windows\SysWOW64\Edhbjjhn.exeC:\Windows\system32\Edhbjjhn.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2460 -
C:\Windows\SysWOW64\Eonfgbhc.exeC:\Windows\system32\Eonfgbhc.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\Edmkei32.exeC:\Windows\system32\Edmkei32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2692 -
C:\Windows\SysWOW64\Eaalom32.exeC:\Windows\system32\Eaalom32.exe35⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Fnhlcn32.exeC:\Windows\system32\Fnhlcn32.exe36⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\Fcdele32.exeC:\Windows\system32\Fcdele32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\Fmacpj32.exeC:\Windows\system32\Fmacpj32.exe38⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\Fdmgdl32.exeC:\Windows\system32\Fdmgdl32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1280 -
C:\Windows\SysWOW64\Gdodjlda.exeC:\Windows\system32\Gdodjlda.exe40⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\Gqfeom32.exeC:\Windows\system32\Gqfeom32.exe41⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\Ggpmkgab.exeC:\Windows\system32\Ggpmkgab.exe42⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\Gbeaip32.exeC:\Windows\system32\Gbeaip32.exe43⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\Gknfaehi.exeC:\Windows\system32\Gknfaehi.exe44⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\Gqknjlfp.exeC:\Windows\system32\Gqknjlfp.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\Ggdfff32.exeC:\Windows\system32\Ggdfff32.exe46⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Gmaoomld.exeC:\Windows\system32\Gmaoomld.exe47⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\Gjephakn.exeC:\Windows\system32\Gjephakn.exe48⤵
- Executes dropped EXE
PID:2488 -
C:\Windows\SysWOW64\Hmdldmja.exeC:\Windows\system32\Hmdldmja.exe49⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\Hbqdldhi.exeC:\Windows\system32\Hbqdldhi.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\Hjhlnahk.exeC:\Windows\system32\Hjhlnahk.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2392 -
C:\Windows\SysWOW64\Hcpqfgol.exeC:\Windows\system32\Hcpqfgol.exe52⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\Hpgakh32.exeC:\Windows\system32\Hpgakh32.exe53⤵
- Executes dropped EXE
PID:932 -
C:\Windows\SysWOW64\Hiofdmkq.exeC:\Windows\system32\Hiofdmkq.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\Hpinagbm.exeC:\Windows\system32\Hpinagbm.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\Hhdcejph.exeC:\Windows\system32\Hhdcejph.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\Hnnkbd32.exeC:\Windows\system32\Hnnkbd32.exe57⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\Ihgpkinf.exeC:\Windows\system32\Ihgpkinf.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2648 -
C:\Windows\SysWOW64\Imchcplm.exeC:\Windows\system32\Imchcplm.exe59⤵
- Executes dropped EXE
PID:648 -
C:\Windows\SysWOW64\Iflmlfcn.exeC:\Windows\system32\Iflmlfcn.exe60⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\Imfeip32.exeC:\Windows\system32\Imfeip32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\Ifniaeqk.exeC:\Windows\system32\Ifniaeqk.exe62⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\Imhanp32.exeC:\Windows\system32\Imhanp32.exe63⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\Ifqfge32.exeC:\Windows\system32\Ifqfge32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2332 -
C:\Windows\SysWOW64\Ipijpkei.exeC:\Windows\system32\Ipijpkei.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Iefchacp.exeC:\Windows\system32\Iefchacp.exe66⤵PID:3048
-
C:\Windows\SysWOW64\Jiclnpjg.exeC:\Windows\system32\Jiclnpjg.exe67⤵PID:384
-
C:\Windows\SysWOW64\Joqdfghn.exeC:\Windows\system32\Joqdfghn.exe68⤵PID:2104
-
C:\Windows\SysWOW64\Jifhdphd.exeC:\Windows\system32\Jifhdphd.exe69⤵
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\Jaamhb32.exeC:\Windows\system32\Jaamhb32.exe70⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Windows\SysWOW64\Jdpidm32.exeC:\Windows\system32\Jdpidm32.exe71⤵PID:876
-
C:\Windows\SysWOW64\Jacjna32.exeC:\Windows\system32\Jacjna32.exe72⤵
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\Jgpbfh32.exeC:\Windows\system32\Jgpbfh32.exe73⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2264 -
C:\Windows\SysWOW64\Jaffca32.exeC:\Windows\system32\Jaffca32.exe74⤵PID:2356
-
C:\Windows\SysWOW64\Kjakhcne.exeC:\Windows\system32\Kjakhcne.exe75⤵PID:2876
-
C:\Windows\SysWOW64\Kcipqi32.exeC:\Windows\system32\Kcipqi32.exe76⤵
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\Kjchmclb.exeC:\Windows\system32\Kjchmclb.exe77⤵PID:2676
-
C:\Windows\SysWOW64\Kdilkllh.exeC:\Windows\system32\Kdilkllh.exe78⤵PID:988
-
C:\Windows\SysWOW64\Kjfdcc32.exeC:\Windows\system32\Kjfdcc32.exe79⤵PID:2824
-
C:\Windows\SysWOW64\Kfmehdpc.exeC:\Windows\system32\Kfmehdpc.exe80⤵PID:1924
-
C:\Windows\SysWOW64\Khkadoog.exeC:\Windows\system32\Khkadoog.exe81⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\Kbcfme32.exeC:\Windows\system32\Kbcfme32.exe82⤵PID:2732
-
C:\Windows\SysWOW64\Khmnio32.exeC:\Windows\system32\Khmnio32.exe83⤵PID:1120
-
C:\Windows\SysWOW64\Lbfcbdce.exeC:\Windows\system32\Lbfcbdce.exe84⤵
- Modifies registry class
PID:2376 -
C:\Windows\SysWOW64\Llkgpmck.exeC:\Windows\system32\Llkgpmck.exe85⤵
- Drops file in System32 directory
PID:3056 -
C:\Windows\SysWOW64\Lfckhc32.exeC:\Windows\system32\Lfckhc32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:608 -
C:\Windows\SysWOW64\Lkqdajhc.exeC:\Windows\system32\Lkqdajhc.exe87⤵
- Drops file in System32 directory
- Modifies registry class
PID:624 -
C:\Windows\SysWOW64\Lqmliqfj.exeC:\Windows\system32\Lqmliqfj.exe88⤵PID:1840
-
C:\Windows\SysWOW64\Ldihjo32.exeC:\Windows\system32\Ldihjo32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:784 -
C:\Windows\SysWOW64\Lbmicc32.exeC:\Windows\system32\Lbmicc32.exe90⤵PID:2556
-
C:\Windows\SysWOW64\Lgiakjld.exeC:\Windows\system32\Lgiakjld.exe91⤵PID:1484
-
C:\Windows\SysWOW64\Lqbfdp32.exeC:\Windows\system32\Lqbfdp32.exe92⤵PID:2100
-
C:\Windows\SysWOW64\Ljjjmeie.exeC:\Windows\system32\Ljjjmeie.exe93⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\SysWOW64\Mgnkfjho.exeC:\Windows\system32\Mgnkfjho.exe94⤵
- Modifies registry class
PID:1044 -
C:\Windows\SysWOW64\Mjmgbe32.exeC:\Windows\system32\Mjmgbe32.exe95⤵
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\Mpipkl32.exeC:\Windows\system32\Mpipkl32.exe96⤵PID:2980
-
C:\Windows\SysWOW64\Mfchgflg.exeC:\Windows\system32\Mfchgflg.exe97⤵
- Drops file in System32 directory
PID:2020 -
C:\Windows\SysWOW64\Mcghajkq.exeC:\Windows\system32\Mcghajkq.exe98⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\Mmpmjpba.exeC:\Windows\system32\Mmpmjpba.exe99⤵PID:1932
-
C:\Windows\SysWOW64\Mbmebgpi.exeC:\Windows\system32\Mbmebgpi.exe100⤵PID:2452
-
C:\Windows\SysWOW64\Mifmoa32.exeC:\Windows\system32\Mifmoa32.exe101⤵PID:764
-
C:\Windows\SysWOW64\Mbobgfnf.exeC:\Windows\system32\Mbobgfnf.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\Niijdq32.exeC:\Windows\system32\Niijdq32.exe103⤵PID:2348
-
C:\Windows\SysWOW64\Nbaomf32.exeC:\Windows\system32\Nbaomf32.exe104⤵PID:2444
-
C:\Windows\SysWOW64\Ncbkenba.exeC:\Windows\system32\Ncbkenba.exe105⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\Nmkpnd32.exeC:\Windows\system32\Nmkpnd32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2568 -
C:\Windows\SysWOW64\Ndehjnpo.exeC:\Windows\system32\Ndehjnpo.exe107⤵PID:3036
-
C:\Windows\SysWOW64\Nmmlccfp.exeC:\Windows\system32\Nmmlccfp.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2740 -
C:\Windows\SysWOW64\Nhbqqlfe.exeC:\Windows\system32\Nhbqqlfe.exe109⤵
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\Ndiaem32.exeC:\Windows\system32\Ndiaem32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1800 -
C:\Windows\SysWOW64\Nifjnd32.exeC:\Windows\system32\Nifjnd32.exe111⤵
- Modifies registry class
PID:1748 -
C:\Windows\SysWOW64\Oppbjn32.exeC:\Windows\system32\Oppbjn32.exe112⤵
- Modifies registry class
PID:1556 -
C:\Windows\SysWOW64\Ofjjghik.exeC:\Windows\system32\Ofjjghik.exe113⤵
- Modifies registry class
PID:2684 -
C:\Windows\SysWOW64\Oiifcdhn.exeC:\Windows\system32\Oiifcdhn.exe114⤵PID:2380
-
C:\Windows\SysWOW64\Odgqoa32.exeC:\Windows\system32\Odgqoa32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2596 -
C:\Windows\SysWOW64\Okailkhd.exeC:\Windows\system32\Okailkhd.exe116⤵PID:2292
-
C:\Windows\SysWOW64\Pkcfak32.exeC:\Windows\system32\Pkcfak32.exe117⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\Pnfkheap.exeC:\Windows\system32\Pnfkheap.exe118⤵
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\Pdpcep32.exeC:\Windows\system32\Pdpcep32.exe119⤵PID:2816
-
C:\Windows\SysWOW64\Pimlmf32.exeC:\Windows\system32\Pimlmf32.exe120⤵PID:3028
-
C:\Windows\SysWOW64\Ppgdjqna.exeC:\Windows\system32\Ppgdjqna.exe121⤵PID:2768
-
C:\Windows\SysWOW64\Pceqfl32.exeC:\Windows\system32\Pceqfl32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-