Analysis
-
max time kernel
91s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 05:58
Behavioral task
behavioral1
Sample
533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe
Resource
win10v2004-20241007-en
General
-
Target
533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe
-
Size
232KB
-
MD5
b6f413ca78a81c19c0d03b2d94de1890
-
SHA1
b9e8b5f91d59fd52c2b1cbde32422f0919c9216c
-
SHA256
533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27
-
SHA512
d75ee0631908ff8e539ee1647ddfb08ced71f645d294a56dd0c48f62093c2d613b855b319b2fa3b6e6d09a035b29a762b84ebbdb3b1673421e608c20a5f1524b
-
SSDEEP
3072:t5NNfTKy7usluTXp6UF5wzec+tZOnU1/s5HH0AU/yRvS3u121TzlbNRfzPadOF:vNNfTKy6s21L7/s50z/Wa3/PNlPX
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fcoolj32.exeIdemkp32.exeCelpqbon.exeLmckeidj.exeAjociq32.exeKfjfik32.exeFdgefn32.exeEcbfmm32.exeNdiomdde.exeChgimh32.exeMlmjgnaa.exeBeggec32.exeEhaolpke.exeNianjl32.exeKkckblgq.exeMpoppadq.exeGmoppefc.exeHlqfqo32.exeKnpkhhhg.exeDeiipp32.exeLqgjkbop.exeLckpbm32.exeKcngcp32.exeNhpabdqd.exeCfjihdcc.exeGnofng32.exeLcffgnnc.exeLbkchj32.exeMpkjgckc.exeHplbamdf.exeKnddcg32.exeEjadibmh.exeGlcfgk32.exeEblpke32.exeKbeqjl32.exeMcbmmbhb.exeBemmenhb.exeEoomai32.exeHabkeacd.exeLncgollm.exeMbopon32.exeOecnkk32.exeAidpjm32.exeGiejkp32.exeHadhjaaa.exeJkobgm32.exePkojoghl.exeJhfjadim.exeLmhdph32.exeOingii32.exeGpafgp32.exeEjdaoa32.exeEnbapf32.exeMeffjjln.exeFikgda32.exeKccian32.exeCeqjla32.exeBpbabf32.exeDooqceid.exeEbnmpemq.exeMlpngd32.exeCcpqjfnh.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcoolj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idemkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Celpqbon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmckeidj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajociq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfjfik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdgefn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecbfmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndiomdde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chgimh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlmjgnaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beggec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehaolpke.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nianjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkckblgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpoppadq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmoppefc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlqfqo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knpkhhhg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deiipp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lqgjkbop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lckpbm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcngcp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhpabdqd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfjihdcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnofng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcffgnnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbkchj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpkjgckc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hplbamdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knddcg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejadibmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glcfgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eblpke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbeqjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcbmmbhb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bemmenhb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eoomai32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Habkeacd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lncgollm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbopon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oecnkk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aidpjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aidpjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Giejkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hadhjaaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkobgm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkojoghl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhfjadim.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmhdph32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oingii32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpafgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejdaoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hadhjaaa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enbapf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Meffjjln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fikgda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kccian32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceqjla32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpbabf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dooqceid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebnmpemq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlpngd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccpqjfnh.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Pkojoghl.exePmqffonj.exeQcjoci32.exeQcmkhi32.exeQmepanje.exeAilqfooi.exeAcadchoo.exeAmjiln32.exeAnkedf32.exeAalofa32.exeAicfgn32.exeAhhchk32.exeBmelpa32.exeBdodmlcm.exeBdaabk32.exeBinikb32.exeBphaglgo.exeBiqfpb32.exeBlobmm32.exeBeggec32.exeBmnofp32.exeBpmkbl32.exeCeickb32.exeCiepkajj.exeCpohhk32.exeCelpqbon.exeChjmmnnb.exeCcpqjfnh.exeChmibmlo.exeCeqjla32.exeChofhm32.exeCpjklo32.exeChabmm32.exeDnnkec32.exeDpmgao32.exeDlchfp32.exeDdjphm32.exeDgildi32.exeDflmpebj.exeDcpmijqc.exeDjjeedhp.exeDbejjfek.exeDjlbkcfn.exeDoijcjde.exeDbggpfci.exeDfbbpd32.exeEhaolpke.exeEnngdgim.exeEfeoedjo.exeEdhpaa32.exeEgflml32.exeEomdoj32.exeEblpke32.exeEqopfbfn.exeEgihcl32.exeEnbapf32.exeEbnmpemq.exeEkfaij32.exeEnenef32.exeEdofbpja.exeEcbfmm32.exeEfpbih32.exeEngjkeab.exeEmjjfb32.exepid process 3016 Pkojoghl.exe 2900 Pmqffonj.exe 2868 Qcjoci32.exe 2688 Qcmkhi32.exe 2244 Qmepanje.exe 1680 Ailqfooi.exe 552 Acadchoo.exe 2488 Amjiln32.exe 2084 Ankedf32.exe 2092 Aalofa32.exe 2940 Aicfgn32.exe 2292 Ahhchk32.exe 1380 Bmelpa32.exe 1420 Bdodmlcm.exe 2300 Bdaabk32.exe 2136 Binikb32.exe 896 Bphaglgo.exe 1632 Biqfpb32.exe 1640 Blobmm32.exe 2028 Beggec32.exe 1948 Bmnofp32.exe 996 Bpmkbl32.exe 2436 Ceickb32.exe 1596 Ciepkajj.exe 1980 Cpohhk32.exe 2788 Celpqbon.exe 2052 Chjmmnnb.exe 2696 Ccpqjfnh.exe 2776 Chmibmlo.exe 2736 Ceqjla32.exe 2996 Chofhm32.exe 2260 Cpjklo32.exe 2248 Chabmm32.exe 2920 Dnnkec32.exe 2732 Dpmgao32.exe 1004 Dlchfp32.exe 1164 Ddjphm32.exe 588 Dgildi32.exe 532 Dflmpebj.exe 2360 Dcpmijqc.exe 2068 Djjeedhp.exe 316 Dbejjfek.exe 2648 Djlbkcfn.exe 1908 Doijcjde.exe 2824 Dbggpfci.exe 800 Dfbbpd32.exe 1852 Ehaolpke.exe 1348 Enngdgim.exe 2356 Efeoedjo.exe 2828 Edhpaa32.exe 2860 Egflml32.exe 840 Eomdoj32.exe 2284 Eblpke32.exe 2116 Eqopfbfn.exe 2484 Egihcl32.exe 2856 Enbapf32.exe 2724 Ebnmpemq.exe 320 Ekfaij32.exe 2188 Enenef32.exe 1944 Edofbpja.exe 884 Ecbfmm32.exe 1508 Efpbih32.exe 2228 Engjkeab.exe 1896 Emjjfb32.exe -
Loads dropped DLL 64 IoCs
Processes:
533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exePkojoghl.exePmqffonj.exeQcjoci32.exeQcmkhi32.exeQmepanje.exeAilqfooi.exeAcadchoo.exeAmjiln32.exeAnkedf32.exeAalofa32.exeAicfgn32.exeAhhchk32.exeBmelpa32.exeBdodmlcm.exeBdaabk32.exeBinikb32.exeBphaglgo.exeBiqfpb32.exeBlobmm32.exeBeggec32.exeBmnofp32.exeBpmkbl32.exeCeickb32.exeCiepkajj.exeCpohhk32.exeCelpqbon.exeChjmmnnb.exeCcpqjfnh.exeChmibmlo.exeCeqjla32.exeChofhm32.exepid process 2440 533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe 2440 533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe 3016 Pkojoghl.exe 3016 Pkojoghl.exe 2900 Pmqffonj.exe 2900 Pmqffonj.exe 2868 Qcjoci32.exe 2868 Qcjoci32.exe 2688 Qcmkhi32.exe 2688 Qcmkhi32.exe 2244 Qmepanje.exe 2244 Qmepanje.exe 1680 Ailqfooi.exe 1680 Ailqfooi.exe 552 Acadchoo.exe 552 Acadchoo.exe 2488 Amjiln32.exe 2488 Amjiln32.exe 2084 Ankedf32.exe 2084 Ankedf32.exe 2092 Aalofa32.exe 2092 Aalofa32.exe 2940 Aicfgn32.exe 2940 Aicfgn32.exe 2292 Ahhchk32.exe 2292 Ahhchk32.exe 1380 Bmelpa32.exe 1380 Bmelpa32.exe 1420 Bdodmlcm.exe 1420 Bdodmlcm.exe 2300 Bdaabk32.exe 2300 Bdaabk32.exe 2136 Binikb32.exe 2136 Binikb32.exe 896 Bphaglgo.exe 896 Bphaglgo.exe 1632 Biqfpb32.exe 1632 Biqfpb32.exe 1640 Blobmm32.exe 1640 Blobmm32.exe 2028 Beggec32.exe 2028 Beggec32.exe 1948 Bmnofp32.exe 1948 Bmnofp32.exe 996 Bpmkbl32.exe 996 Bpmkbl32.exe 2436 Ceickb32.exe 2436 Ceickb32.exe 1596 Ciepkajj.exe 1596 Ciepkajj.exe 1980 Cpohhk32.exe 1980 Cpohhk32.exe 2788 Celpqbon.exe 2788 Celpqbon.exe 2052 Chjmmnnb.exe 2052 Chjmmnnb.exe 2696 Ccpqjfnh.exe 2696 Ccpqjfnh.exe 2776 Chmibmlo.exe 2776 Chmibmlo.exe 2736 Ceqjla32.exe 2736 Ceqjla32.exe 2996 Chofhm32.exe 2996 Chofhm32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Gmlmpo32.exeGnofng32.exeJpeafo32.exeBdaabk32.exeOdfofhic.exeHbpbck32.exeKjebjjck.exeDooqceid.exeLgmekpmn.exeCglfndaa.exeDkeahf32.exeEdhpaa32.exeGjbqjiem.exeNdgbgefh.exeNmgjee32.exeNmjmekan.exeKfdfdf32.exeNdiomdde.exeDdbolkac.exeJgbmco32.exeLadpagin.exeEnbapf32.exeEbnmpemq.exeOipcnieb.exeChofhm32.exeEgflml32.exeColdmfkf.exeMlbkmdah.exeKbcddlnd.exeMlgdhcmb.exeOhdglfoj.exeNmogpj32.exeCfjihdcc.exeCojghf32.exeKfjfik32.exeJfbinf32.exeLknebaba.exeLbjjekhl.exeEdofbpja.exeFcdbcloi.exeHbekojlp.exeKkckblgq.exeMagfjebk.exeAadakl32.exeBclqme32.exeIlhlan32.exeChjmmnnb.exeMlhmkbhb.exePqbifhjb.exeBhbpahan.exeNhakecld.exeGfgdij32.exeJkgbcofn.exeNldcagaq.exeEngjkeab.exeMhfhaoec.exeJjnlikic.exeFnafdc32.exeHlecmkel.exeOlgpff32.exeFipdqmje.exeMfqiingf.exeCmdaeo32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Glomllkd.exe Gmlmpo32.exe File created C:\Windows\SysWOW64\Afloik32.dll Gnofng32.exe File opened for modification C:\Windows\SysWOW64\Jcdmbk32.exe Jpeafo32.exe File created C:\Windows\SysWOW64\Kpfdhgca.dll Bdaabk32.exe File opened for modification C:\Windows\SysWOW64\Okqgcb32.exe Odfofhic.exe File created C:\Windows\SysWOW64\Blajkq32.dll Hbpbck32.exe File created C:\Windows\SysWOW64\Kmdofebo.exe Kjebjjck.exe File created C:\Windows\SysWOW64\Nedeohin.dll Dooqceid.exe File opened for modification C:\Windows\SysWOW64\Lpcmlnnp.exe Lgmekpmn.exe File created C:\Windows\SysWOW64\Dmbjhfda.dll Cglfndaa.exe File created C:\Windows\SysWOW64\Glgpghnp.dll Dkeahf32.exe File created C:\Windows\SysWOW64\Bbijkm32.dll Edhpaa32.exe File created C:\Windows\SysWOW64\Jkbhmg32.dll Gjbqjiem.exe File created C:\Windows\SysWOW64\Ngencpel.exe Ndgbgefh.exe File opened for modification C:\Windows\SysWOW64\Noifmmec.exe Nmgjee32.exe File opened for modification C:\Windows\SysWOW64\Nddeae32.exe Nmjmekan.exe File opened for modification C:\Windows\SysWOW64\Kdgfpbaf.exe Kfdfdf32.exe File created C:\Windows\SysWOW64\Gcnemg32.dll Ndiomdde.exe File created C:\Windows\SysWOW64\Nlaeee32.dll Ddbolkac.exe File created C:\Windows\SysWOW64\Jjqiok32.exe Jgbmco32.exe File created C:\Windows\SysWOW64\Capgei32.dll Ladpagin.exe File created C:\Windows\SysWOW64\Ebnmpemq.exe Enbapf32.exe File created C:\Windows\SysWOW64\Ifdhgj32.dll Ebnmpemq.exe File opened for modification C:\Windows\SysWOW64\Olopjddf.exe Oipcnieb.exe File opened for modification C:\Windows\SysWOW64\Cpjklo32.exe Chofhm32.exe File created C:\Windows\SysWOW64\Qoemceeo.dll Egflml32.exe File created C:\Windows\SysWOW64\Nalgneml.dll Coldmfkf.exe File created C:\Windows\SysWOW64\Mjaaedaj.dll Mlbkmdah.exe File opened for modification C:\Windows\SysWOW64\Keappgmg.exe Kbcddlnd.exe File created C:\Windows\SysWOW64\Noepdo32.exe Mlgdhcmb.exe File created C:\Windows\SysWOW64\Okcchbnn.exe Ohdglfoj.exe File created C:\Windows\SysWOW64\Jdbmjldj.dll Nmogpj32.exe File opened for modification C:\Windows\SysWOW64\Cmdaeo32.exe Cfjihdcc.exe File created C:\Windows\SysWOW64\Obkdmi32.dll Cojghf32.exe File opened for modification C:\Windows\SysWOW64\Kjebjjck.exe Kfjfik32.exe File created C:\Windows\SysWOW64\Mnpfkfcn.dll Jfbinf32.exe File created C:\Windows\SysWOW64\Jcmodmbk.dll Lknebaba.exe File created C:\Windows\SysWOW64\Dacppppl.dll Lbjjekhl.exe File created C:\Windows\SysWOW64\Ecbfmm32.exe Edofbpja.exe File created C:\Windows\SysWOW64\Ffboohnm.exe Fcdbcloi.exe File opened for modification C:\Windows\SysWOW64\Hechkfkc.exe Hbekojlp.exe File created C:\Windows\SysWOW64\Naheae32.dll Kkckblgq.exe File created C:\Windows\SysWOW64\Aafdca32.dll Magfjebk.exe File created C:\Windows\SysWOW64\Idoqdcmi.dll Aadakl32.exe File created C:\Windows\SysWOW64\Bimolnei.dll Bclqme32.exe File opened for modification C:\Windows\SysWOW64\Ibadnhmb.exe Ilhlan32.exe File opened for modification C:\Windows\SysWOW64\Ccpqjfnh.exe Chjmmnnb.exe File created C:\Windows\SysWOW64\Gmeckg32.dll Mlhmkbhb.exe File created C:\Windows\SysWOW64\Fmehidpd.dll Pqbifhjb.exe File created C:\Windows\SysWOW64\Bjalndpb.exe Bhbpahan.exe File created C:\Windows\SysWOW64\Nphbfplf.exe Nhakecld.exe File created C:\Windows\SysWOW64\Gmgnmlma.dll Gfgdij32.exe File created C:\Windows\SysWOW64\Obdngaom.dll Jkgbcofn.exe File opened for modification C:\Windows\SysWOW64\Ncnlnaim.exe Nldcagaq.exe File created C:\Windows\SysWOW64\Emjjfb32.exe Engjkeab.exe File created C:\Windows\SysWOW64\Mkfpqgco.dll Mhfhaoec.exe File opened for modification C:\Windows\SysWOW64\Jnjhjj32.exe Jjnlikic.exe File created C:\Windows\SysWOW64\Lddcfl32.dll Fnafdc32.exe File opened for modification C:\Windows\SysWOW64\Habkeacd.exe Hlecmkel.exe File created C:\Windows\SysWOW64\Nggkipci.exe Ndiomdde.exe File created C:\Windows\SysWOW64\Ocqhcqgk.exe Olgpff32.exe File created C:\Windows\SysWOW64\Pgjkje32.dll Fipdqmje.exe File opened for modification C:\Windows\SysWOW64\Mioeeifi.exe Mfqiingf.exe File created C:\Windows\SysWOW64\Capmemci.exe Cmdaeo32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6472 6452 WerFault.exe Ockdmn32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Fjaqhe32.exeFdgefn32.exeFacfpddd.exeGpmllpef.exeIciaim32.exeEqnillbb.exeLbkchj32.exeIpabfcdm.exeEjdaoa32.exeFgeabi32.exeOkijhmcm.exeLkfdfo32.exeMmemoe32.exeAalofa32.exeJhkclc32.exeAkgibd32.exeGibmep32.exeQcmkhi32.exeQidckjae.exeBhpclica.exeKqemeb32.exeOpjlkc32.exeMfceom32.exeMfebdm32.exeNcnlnaim.exeEoajgh32.exeKhglkqfj.exeOlopjddf.exeAcadchoo.exeFcdbcloi.exeFkldgi32.exeIencdc32.exeDkeahf32.exeEjadibmh.exeFcoolj32.exeJghcbjll.exeDpmgao32.exeGpafgp32.exeIlkpac32.exeOnmfin32.exeJkobgm32.exeCllkkk32.exeDbggpfci.exeEnenef32.exeQkbpgeai.exeMffkgl32.exeNbdbml32.exeCeqjla32.exeHbpbck32.exeAfhpca32.exeHbknmicj.exeKkilgb32.exeKkaolm32.exeQekdpkgj.exeBimbql32.exeHpoofm32.exeKninog32.exeEfpbih32.exeFblljhbo.exeIphhgb32.exeJhfjadim.exeKnoaeimg.exeAgnjge32.exeKjnanhhc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fjaqhe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdgefn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Facfpddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpmllpef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iciaim32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eqnillbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbkchj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ipabfcdm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ejdaoa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgeabi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Okijhmcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkfdfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmemoe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aalofa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jhkclc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akgibd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gibmep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qcmkhi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qidckjae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhpclica.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqemeb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opjlkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfceom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfebdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncnlnaim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eoajgh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khglkqfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olopjddf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acadchoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcdbcloi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkldgi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iencdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkeahf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ejadibmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcoolj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jghcbjll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpmgao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpafgp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilkpac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onmfin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkobgm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cllkkk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbggpfci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enenef32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qkbpgeai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mffkgl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbdbml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceqjla32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbpbck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afhpca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbknmicj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkilgb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkaolm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qekdpkgj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bimbql32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpoofm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kninog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efpbih32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fblljhbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iphhgb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jhfjadim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knoaeimg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agnjge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjnanhhc.exe -
Modifies registry class 64 IoCs
Processes:
Gbnenk32.exeIhnmfoli.exeJjkiie32.exeKccian32.exeJkdfmoha.exeKjebjjck.exeJcdmbk32.exeJkgbcofn.exeCppakj32.exeChgimh32.exeDibhjokm.exeGnmihgkh.exeAjociq32.exeCimooo32.exeNoplmlok.exeOipcnieb.exeJkioho32.exeNhhqfb32.exeEdofbpja.exeJldbgb32.exeOnocon32.exeGabofn32.exeIencdc32.exeJfjjkhhg.exeGfogneop.exeGphlgk32.exeMlmjgnaa.exeOqmokioh.exeBdgcaj32.exeOkijhmcm.exeFipdqmje.exeMpalfabn.exeAnkedf32.exeGeaofc32.exeKmoekf32.exeMhkhgd32.exeDadcppbp.exeJempcgad.exePmqffonj.exeOafedmlb.exeEjohdbok.exeHabkeacd.exeHpghfn32.exeAmjiln32.exeLmhdph32.exeMlbkmdah.exeOojfnakl.exeLiekddkh.exeGjbqjiem.exeKioiffcn.exeMemlki32.exeGbmoceol.exeIcbkhnan.exeNianjl32.exeNhnemdbf.exeCkchcc32.exeEgflml32.exeOjfcdo32.exeDabfjp32.exeLcffgnnc.exeMmpcdfem.exeKodghqop.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldcpnjhf.dll" Gbnenk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihnmfoli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odnmig32.dll" Jjkiie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kccian32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkdfmoha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjebjjck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcdmbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkgbcofn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdnmmaaf.dll" Cppakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iejkpp32.dll" Chgimh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdlenkfg.dll" Dibhjokm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gnmihgkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhpioaop.dll" Ajociq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cimooo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnhapl32.dll" Noplmlok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbfdeplh.dll" Oipcnieb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkioho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmmjolll.dll" Nhhqfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edofbpja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jldbgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onocon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpjfnk32.dll" Gabofn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjlnkheo.dll" Iencdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcdafj32.dll" Jfjjkhhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfogneop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gphlgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlmjgnaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oqmokioh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdgcaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okijhmcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fipdqmje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpalfabn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ankedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdfdbg32.dll" Geaofc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gadgpb32.dll" Kmoekf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Faqkji32.dll" Mhkhgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgdiff32.dll" Dadcppbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jempcgad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmqffonj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcpabfbj.dll" Oafedmlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onooimfn.dll" Ejohdbok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajodjfdi.dll" Habkeacd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpghfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amjiln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chnjdl32.dll" Lmhdph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlbkmdah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oojfnakl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Liekddkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkbhmg32.dll" Gjbqjiem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciifcjnd.dll" Kioiffcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Memlki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbmoceol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Icbkhnan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nianjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gnmihgkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbmoceol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nhnemdbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckchcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egflml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojfcdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dabfjp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcffgnnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmpcdfem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekkcanhb.dll" Kodghqop.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exePkojoghl.exePmqffonj.exeQcjoci32.exeQcmkhi32.exeQmepanje.exeAilqfooi.exeAcadchoo.exeAmjiln32.exeAnkedf32.exeAalofa32.exeAicfgn32.exeAhhchk32.exeBmelpa32.exeBdodmlcm.exeBdaabk32.exedescription pid process target process PID 2440 wrote to memory of 3016 2440 533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe Pkojoghl.exe PID 2440 wrote to memory of 3016 2440 533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe Pkojoghl.exe PID 2440 wrote to memory of 3016 2440 533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe Pkojoghl.exe PID 2440 wrote to memory of 3016 2440 533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe Pkojoghl.exe PID 3016 wrote to memory of 2900 3016 Pkojoghl.exe Pmqffonj.exe PID 3016 wrote to memory of 2900 3016 Pkojoghl.exe Pmqffonj.exe PID 3016 wrote to memory of 2900 3016 Pkojoghl.exe Pmqffonj.exe PID 3016 wrote to memory of 2900 3016 Pkojoghl.exe Pmqffonj.exe PID 2900 wrote to memory of 2868 2900 Pmqffonj.exe Qcjoci32.exe PID 2900 wrote to memory of 2868 2900 Pmqffonj.exe Qcjoci32.exe PID 2900 wrote to memory of 2868 2900 Pmqffonj.exe Qcjoci32.exe PID 2900 wrote to memory of 2868 2900 Pmqffonj.exe Qcjoci32.exe PID 2868 wrote to memory of 2688 2868 Qcjoci32.exe Qcmkhi32.exe PID 2868 wrote to memory of 2688 2868 Qcjoci32.exe Qcmkhi32.exe PID 2868 wrote to memory of 2688 2868 Qcjoci32.exe Qcmkhi32.exe PID 2868 wrote to memory of 2688 2868 Qcjoci32.exe Qcmkhi32.exe PID 2688 wrote to memory of 2244 2688 Qcmkhi32.exe Qmepanje.exe PID 2688 wrote to memory of 2244 2688 Qcmkhi32.exe Qmepanje.exe PID 2688 wrote to memory of 2244 2688 Qcmkhi32.exe Qmepanje.exe PID 2688 wrote to memory of 2244 2688 Qcmkhi32.exe Qmepanje.exe PID 2244 wrote to memory of 1680 2244 Qmepanje.exe Ailqfooi.exe PID 2244 wrote to memory of 1680 2244 Qmepanje.exe Ailqfooi.exe PID 2244 wrote to memory of 1680 2244 Qmepanje.exe Ailqfooi.exe PID 2244 wrote to memory of 1680 2244 Qmepanje.exe Ailqfooi.exe PID 1680 wrote to memory of 552 1680 Ailqfooi.exe Acadchoo.exe PID 1680 wrote to memory of 552 1680 Ailqfooi.exe Acadchoo.exe PID 1680 wrote to memory of 552 1680 Ailqfooi.exe Acadchoo.exe PID 1680 wrote to memory of 552 1680 Ailqfooi.exe Acadchoo.exe PID 552 wrote to memory of 2488 552 Acadchoo.exe Amjiln32.exe PID 552 wrote to memory of 2488 552 Acadchoo.exe Amjiln32.exe PID 552 wrote to memory of 2488 552 Acadchoo.exe Amjiln32.exe PID 552 wrote to memory of 2488 552 Acadchoo.exe Amjiln32.exe PID 2488 wrote to memory of 2084 2488 Amjiln32.exe Ankedf32.exe PID 2488 wrote to memory of 2084 2488 Amjiln32.exe Ankedf32.exe PID 2488 wrote to memory of 2084 2488 Amjiln32.exe Ankedf32.exe PID 2488 wrote to memory of 2084 2488 Amjiln32.exe Ankedf32.exe PID 2084 wrote to memory of 2092 2084 Ankedf32.exe Aalofa32.exe PID 2084 wrote to memory of 2092 2084 Ankedf32.exe Aalofa32.exe PID 2084 wrote to memory of 2092 2084 Ankedf32.exe Aalofa32.exe PID 2084 wrote to memory of 2092 2084 Ankedf32.exe Aalofa32.exe PID 2092 wrote to memory of 2940 2092 Aalofa32.exe Aicfgn32.exe PID 2092 wrote to memory of 2940 2092 Aalofa32.exe Aicfgn32.exe PID 2092 wrote to memory of 2940 2092 Aalofa32.exe Aicfgn32.exe PID 2092 wrote to memory of 2940 2092 Aalofa32.exe Aicfgn32.exe PID 2940 wrote to memory of 2292 2940 Aicfgn32.exe Ahhchk32.exe PID 2940 wrote to memory of 2292 2940 Aicfgn32.exe Ahhchk32.exe PID 2940 wrote to memory of 2292 2940 Aicfgn32.exe Ahhchk32.exe PID 2940 wrote to memory of 2292 2940 Aicfgn32.exe Ahhchk32.exe PID 2292 wrote to memory of 1380 2292 Ahhchk32.exe Bmelpa32.exe PID 2292 wrote to memory of 1380 2292 Ahhchk32.exe Bmelpa32.exe PID 2292 wrote to memory of 1380 2292 Ahhchk32.exe Bmelpa32.exe PID 2292 wrote to memory of 1380 2292 Ahhchk32.exe Bmelpa32.exe PID 1380 wrote to memory of 1420 1380 Bmelpa32.exe Bdodmlcm.exe PID 1380 wrote to memory of 1420 1380 Bmelpa32.exe Bdodmlcm.exe PID 1380 wrote to memory of 1420 1380 Bmelpa32.exe Bdodmlcm.exe PID 1380 wrote to memory of 1420 1380 Bmelpa32.exe Bdodmlcm.exe PID 1420 wrote to memory of 2300 1420 Bdodmlcm.exe Bdaabk32.exe PID 1420 wrote to memory of 2300 1420 Bdodmlcm.exe Bdaabk32.exe PID 1420 wrote to memory of 2300 1420 Bdodmlcm.exe Bdaabk32.exe PID 1420 wrote to memory of 2300 1420 Bdodmlcm.exe Bdaabk32.exe PID 2300 wrote to memory of 2136 2300 Bdaabk32.exe Binikb32.exe PID 2300 wrote to memory of 2136 2300 Bdaabk32.exe Binikb32.exe PID 2300 wrote to memory of 2136 2300 Bdaabk32.exe Binikb32.exe PID 2300 wrote to memory of 2136 2300 Bdaabk32.exe Binikb32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe"C:\Users\Admin\AppData\Local\Temp\533df45f81a942c8dc2c8fd11b0f8fc37eed0d476faf414e27132a1a0e019a27N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Pkojoghl.exeC:\Windows\system32\Pkojoghl.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\Pmqffonj.exeC:\Windows\system32\Pmqffonj.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Qcjoci32.exeC:\Windows\system32\Qcjoci32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Qcmkhi32.exeC:\Windows\system32\Qcmkhi32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Qmepanje.exeC:\Windows\system32\Qmepanje.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Ailqfooi.exeC:\Windows\system32\Ailqfooi.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\Acadchoo.exeC:\Windows\system32\Acadchoo.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\Amjiln32.exeC:\Windows\system32\Amjiln32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\Ankedf32.exeC:\Windows\system32\Ankedf32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\Aalofa32.exeC:\Windows\system32\Aalofa32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Aicfgn32.exeC:\Windows\system32\Aicfgn32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\Ahhchk32.exeC:\Windows\system32\Ahhchk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\Bmelpa32.exeC:\Windows\system32\Bmelpa32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\Bdodmlcm.exeC:\Windows\system32\Bdodmlcm.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\Bdaabk32.exeC:\Windows\system32\Bdaabk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Binikb32.exeC:\Windows\system32\Binikb32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2136 -
C:\Windows\SysWOW64\Bphaglgo.exeC:\Windows\system32\Bphaglgo.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896 -
C:\Windows\SysWOW64\Biqfpb32.exeC:\Windows\system32\Biqfpb32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Windows\SysWOW64\Blobmm32.exeC:\Windows\system32\Blobmm32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Windows\SysWOW64\Beggec32.exeC:\Windows\system32\Beggec32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Windows\SysWOW64\Bmnofp32.exeC:\Windows\system32\Bmnofp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Windows\SysWOW64\Bpmkbl32.exeC:\Windows\system32\Bpmkbl32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:996 -
C:\Windows\SysWOW64\Ceickb32.exeC:\Windows\system32\Ceickb32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436 -
C:\Windows\SysWOW64\Ciepkajj.exeC:\Windows\system32\Ciepkajj.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1596 -
C:\Windows\SysWOW64\Cpohhk32.exeC:\Windows\system32\Cpohhk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1980 -
C:\Windows\SysWOW64\Celpqbon.exeC:\Windows\system32\Celpqbon.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Windows\SysWOW64\Chjmmnnb.exeC:\Windows\system32\Chjmmnnb.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2052 -
C:\Windows\SysWOW64\Ccpqjfnh.exeC:\Windows\system32\Ccpqjfnh.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2696 -
C:\Windows\SysWOW64\Chmibmlo.exeC:\Windows\system32\Chmibmlo.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776 -
C:\Windows\SysWOW64\Ceqjla32.exeC:\Windows\system32\Ceqjla32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\Chofhm32.exeC:\Windows\system32\Chofhm32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\Cpjklo32.exeC:\Windows\system32\Cpjklo32.exe33⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Chabmm32.exeC:\Windows\system32\Chabmm32.exe34⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\Dnnkec32.exeC:\Windows\system32\Dnnkec32.exe35⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\Dpmgao32.exeC:\Windows\system32\Dpmgao32.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\Dlchfp32.exeC:\Windows\system32\Dlchfp32.exe37⤵
- Executes dropped EXE
PID:1004 -
C:\Windows\SysWOW64\Ddjphm32.exeC:\Windows\system32\Ddjphm32.exe38⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\Dgildi32.exeC:\Windows\system32\Dgildi32.exe39⤵
- Executes dropped EXE
PID:588 -
C:\Windows\SysWOW64\Dflmpebj.exeC:\Windows\system32\Dflmpebj.exe40⤵
- Executes dropped EXE
PID:532 -
C:\Windows\SysWOW64\Dcpmijqc.exeC:\Windows\system32\Dcpmijqc.exe41⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\Djjeedhp.exeC:\Windows\system32\Djjeedhp.exe42⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Dbejjfek.exeC:\Windows\system32\Dbejjfek.exe43⤵
- Executes dropped EXE
PID:316 -
C:\Windows\SysWOW64\Djlbkcfn.exeC:\Windows\system32\Djlbkcfn.exe44⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\Doijcjde.exeC:\Windows\system32\Doijcjde.exe45⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\Dbggpfci.exeC:\Windows\system32\Dbggpfci.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\Dfbbpd32.exeC:\Windows\system32\Dfbbpd32.exe47⤵
- Executes dropped EXE
PID:800 -
C:\Windows\SysWOW64\Ehaolpke.exeC:\Windows\system32\Ehaolpke.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\Enngdgim.exeC:\Windows\system32\Enngdgim.exe49⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\SysWOW64\Efeoedjo.exeC:\Windows\system32\Efeoedjo.exe50⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\Edhpaa32.exeC:\Windows\system32\Edhpaa32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2828 -
C:\Windows\SysWOW64\Egflml32.exeC:\Windows\system32\Egflml32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2860 -
C:\Windows\SysWOW64\Eomdoj32.exeC:\Windows\system32\Eomdoj32.exe53⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\Eblpke32.exeC:\Windows\system32\Eblpke32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Eqopfbfn.exeC:\Windows\system32\Eqopfbfn.exe55⤵
- Executes dropped EXE
PID:2116 -
C:\Windows\SysWOW64\Egihcl32.exeC:\Windows\system32\Egihcl32.exe56⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\Enbapf32.exeC:\Windows\system32\Enbapf32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2856 -
C:\Windows\SysWOW64\Ebnmpemq.exeC:\Windows\system32\Ebnmpemq.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\Ekfaij32.exeC:\Windows\system32\Ekfaij32.exe59⤵
- Executes dropped EXE
PID:320 -
C:\Windows\SysWOW64\Enenef32.exeC:\Windows\system32\Enenef32.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\Edofbpja.exeC:\Windows\system32\Edofbpja.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1944 -
C:\Windows\SysWOW64\Ecbfmm32.exeC:\Windows\system32\Ecbfmm32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Efpbih32.exeC:\Windows\system32\Efpbih32.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\Engjkeab.exeC:\Windows\system32\Engjkeab.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\Emjjfb32.exeC:\Windows\system32\Emjjfb32.exe65⤵
- Executes dropped EXE
PID:1896 -
C:\Windows\SysWOW64\Fcdbcloi.exeC:\Windows\system32\Fcdbcloi.exe66⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Windows\SysWOW64\Ffboohnm.exeC:\Windows\system32\Ffboohnm.exe67⤵PID:1556
-
C:\Windows\SysWOW64\Fiakkcma.exeC:\Windows\system32\Fiakkcma.exe68⤵PID:2152
-
C:\Windows\SysWOW64\Fmlglb32.exeC:\Windows\system32\Fmlglb32.exe69⤵PID:2288
-
C:\Windows\SysWOW64\Fqhclqnc.exeC:\Windows\system32\Fqhclqnc.exe70⤵PID:2708
-
C:\Windows\SysWOW64\Fcfohlmg.exeC:\Windows\system32\Fcfohlmg.exe71⤵PID:1912
-
C:\Windows\SysWOW64\Ffeldglk.exeC:\Windows\system32\Ffeldglk.exe72⤵PID:2600
-
C:\Windows\SysWOW64\Fladmn32.exeC:\Windows\system32\Fladmn32.exe73⤵PID:2348
-
C:\Windows\SysWOW64\Fpmpnmck.exeC:\Windows\system32\Fpmpnmck.exe74⤵PID:2204
-
C:\Windows\SysWOW64\Fblljhbo.exeC:\Windows\system32\Fblljhbo.exe75⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\Fejifdab.exeC:\Windows\system32\Fejifdab.exe76⤵PID:272
-
C:\Windows\SysWOW64\Fiedfb32.exeC:\Windows\system32\Fiedfb32.exe77⤵PID:596
-
C:\Windows\SysWOW64\Fldabn32.exeC:\Windows\system32\Fldabn32.exe78⤵PID:2132
-
C:\Windows\SysWOW64\Fppmcmah.exeC:\Windows\system32\Fppmcmah.exe79⤵PID:2336
-
C:\Windows\SysWOW64\Ffiepg32.exeC:\Windows\system32\Ffiepg32.exe80⤵PID:1504
-
C:\Windows\SysWOW64\Fihalb32.exeC:\Windows\system32\Fihalb32.exe81⤵PID:2376
-
C:\Windows\SysWOW64\Flfnhnfm.exeC:\Windows\system32\Flfnhnfm.exe82⤵PID:3036
-
C:\Windows\SysWOW64\Fnejdiep.exeC:\Windows\system32\Fnejdiep.exe83⤵PID:1076
-
C:\Windows\SysWOW64\Facfpddd.exeC:\Windows\system32\Facfpddd.exe84⤵
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\Ghmnmo32.exeC:\Windows\system32\Ghmnmo32.exe85⤵PID:2716
-
C:\Windows\SysWOW64\Gjljij32.exeC:\Windows\system32\Gjljij32.exe86⤵PID:2224
-
C:\Windows\SysWOW64\Gngfjicn.exeC:\Windows\system32\Gngfjicn.exe87⤵PID:1488
-
C:\Windows\SysWOW64\Gaebfdba.exeC:\Windows\system32\Gaebfdba.exe88⤵PID:2976
-
C:\Windows\SysWOW64\Geaofc32.exeC:\Windows\system32\Geaofc32.exe89⤵
- Modifies registry class
PID:2764 -
C:\Windows\SysWOW64\Ghpkbn32.exeC:\Windows\system32\Ghpkbn32.exe90⤵PID:2408
-
C:\Windows\SysWOW64\Glkgcmbg.exeC:\Windows\system32\Glkgcmbg.exe91⤵PID:2072
-
C:\Windows\SysWOW64\Gnicoh32.exeC:\Windows\system32\Gnicoh32.exe92⤵PID:2412
-
C:\Windows\SysWOW64\Gecklbih.exeC:\Windows\system32\Gecklbih.exe93⤵PID:2608
-
C:\Windows\SysWOW64\Gdflgo32.exeC:\Windows\system32\Gdflgo32.exe94⤵PID:2660
-
C:\Windows\SysWOW64\Gfdhck32.exeC:\Windows\system32\Gfdhck32.exe95⤵PID:1532
-
C:\Windows\SysWOW64\Gmoppefc.exeC:\Windows\system32\Gmoppefc.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1740 -
C:\Windows\SysWOW64\Gpmllpef.exeC:\Windows\system32\Gpmllpef.exe97⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\Gdihmo32.exeC:\Windows\system32\Gdihmo32.exe98⤵PID:2960
-
C:\Windows\SysWOW64\Gfgdij32.exeC:\Windows\system32\Gfgdij32.exe99⤵
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\Gjbqjiem.exeC:\Windows\system32\Gjbqjiem.exe100⤵
- Drops file in System32 directory
- Modifies registry class
PID:1084 -
C:\Windows\SysWOW64\Gmamfddp.exeC:\Windows\system32\Gmamfddp.exe101⤵PID:944
-
C:\Windows\SysWOW64\Gamifcmi.exeC:\Windows\system32\Gamifcmi.exe102⤵PID:1744
-
C:\Windows\SysWOW64\Gpoibp32.exeC:\Windows\system32\Gpoibp32.exe103⤵PID:1588
-
C:\Windows\SysWOW64\Gbnenk32.exeC:\Windows\system32\Gbnenk32.exe104⤵
- Modifies registry class
PID:1060 -
C:\Windows\SysWOW64\Gihnkejd.exeC:\Windows\system32\Gihnkejd.exe105⤵PID:988
-
C:\Windows\SysWOW64\Glfjgaih.exeC:\Windows\system32\Glfjgaih.exe106⤵PID:2460
-
C:\Windows\SysWOW64\Gpafgp32.exeC:\Windows\system32\Gpafgp32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\Hbpbck32.exeC:\Windows\system32\Hbpbck32.exe108⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\Hijjpeha.exeC:\Windows\system32\Hijjpeha.exe109⤵PID:2680
-
C:\Windows\SysWOW64\Hlhfmqge.exeC:\Windows\system32\Hlhfmqge.exe110⤵PID:2268
-
C:\Windows\SysWOW64\Heakefnf.exeC:\Windows\system32\Heakefnf.exe111⤵PID:3004
-
C:\Windows\SysWOW64\Hhogaamj.exeC:\Windows\system32\Hhogaamj.exe112⤵PID:772
-
C:\Windows\SysWOW64\Hlkcbp32.exeC:\Windows\system32\Hlkcbp32.exe113⤵PID:2372
-
C:\Windows\SysWOW64\Hbekojlp.exeC:\Windows\system32\Hbekojlp.exe114⤵
- Drops file in System32 directory
PID:1872 -
C:\Windows\SysWOW64\Hechkfkc.exeC:\Windows\system32\Hechkfkc.exe115⤵PID:1888
-
C:\Windows\SysWOW64\Hhadgakg.exeC:\Windows\system32\Hhadgakg.exe116⤵PID:608
-
C:\Windows\SysWOW64\Holldk32.exeC:\Windows\system32\Holldk32.exe117⤵PID:2432
-
C:\Windows\SysWOW64\Hajhpgag.exeC:\Windows\system32\Hajhpgag.exe118⤵PID:1736
-
C:\Windows\SysWOW64\Hdhdlbpk.exeC:\Windows\system32\Hdhdlbpk.exe119⤵PID:1132
-
C:\Windows\SysWOW64\Hkbmil32.exeC:\Windows\system32\Hkbmil32.exe120⤵PID:1856
-
C:\Windows\SysWOW64\Hmqieh32.exeC:\Windows\system32\Hmqieh32.exe121⤵PID:1064
-
C:\Windows\SysWOW64\Hdkaabnh.exeC:\Windows\system32\Hdkaabnh.exe122⤵PID:3048
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-