Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe
Resource
win10v2004-20241007-en
General
-
Target
a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe
-
Size
96KB
-
MD5
a68546a8e849530775f69f0dc8762540
-
SHA1
6eb94c1e435d72754689f7d1ed88e20cba58f1ad
-
SHA256
a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11
-
SHA512
aad503b31ee849b18b6d1d86c316a46403778da8cb1c7f2df6328c7fa8d0c72eaa5e149d7570f7985923d54253a3b0253b0bdce4eb804b04f81ec09976782482
-
SSDEEP
1536:xt7Idmqtrf51q7C55KpBIgd8CfPEXK2SL2Lh17RZObZUUWaegPYA:xtomq1f/fF9X0o7ClUUWae
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Baiqpo32.exeBfhfne32.exeKcqgnfbe.exeMafmfqij.exePaoebbol.exeAapnip32.exeBjohcdab.exeLppgciga.exeNocpfc32.exePmmcad32.exePjqckikd.exeQfqgfh32.exeAidlmcdl.exeAakdnqdo.exeCdclgh32.exeDkanob32.exeJalaid32.exeNjkail32.exeKlkhml32.exeNbdiho32.exeOilmfg32.exeMpjijhof.exeNbkohn32.exeObnlnm32.exeQbekejqe.exeQcdgom32.exeDidnkogg.exeKcepif32.exeCiioopad.exeCdqpbi32.exea9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exeKhifln32.exeLplmhj32.exeOcdnhofj.exeMjggnmab.exeNqjbqe32.exeAiaphc32.exeBkaehdoo.exeLefika32.exeMbhilp32.exeMcjbkc32.exeNcdeaa32.exeAahhia32.exeBbhqbg32.exeCpcglj32.exeDigkqn32.exePifple32.exeMcmoab32.exeNbfemnkg.exeOflddl32.exeOfbjdken.exePpmlcpil.exePpbeno32.exePjgikh32.exeDpofhiod.exeLekbfpgk.exeNfnhbngf.exeOjecok32.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baiqpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfhfne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcqgnfbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mafmfqij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Paoebbol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aapnip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjohcdab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lppgciga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nocpfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmmcad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjqckikd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfqgfh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aidlmcdl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aakdnqdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdclgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkanob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jalaid32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njkail32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klkhml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbdiho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oilmfg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mafmfqij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpjijhof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbkohn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obnlnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbekejqe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcdgom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Didnkogg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcepif32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciioopad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ciioopad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdqpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khifln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lplmhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbdiho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocdnhofj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjggnmab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqjbqe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aiaphc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkaehdoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lefika32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbhilp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcjbkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncdeaa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aahhia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aidlmcdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbhqbg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpcglj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Digkqn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pifple32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcqgnfbe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpjijhof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcmoab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbfemnkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oflddl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofbjdken.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppmlcpil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppbeno32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjgikh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpofhiod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lekbfpgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfnhbngf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojecok32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Jalaid32.exeJicija32.exeJopabhna.exeKhifln32.exeKldblmmk.exeKemfeb32.exeKlgoalkh.exeKcqgnfbe.exeKikokq32.exeKpdghkao.exeKeappapf.exeKlkhml32.exeKcepif32.exeKedlea32.exeKlndbkep.exeKpiqcj32.exeLchmoe32.exeLefika32.exeLplmhj32.exeLcjide32.exeLhgbmlia.exeLekbfpgk.exeLhioblgo.exeLppgciga.exeLhkkhk32.exeLcaped32.exeLhnhnk32.exeMafmfqij.exeMpgmdhai.exeMbhilp32.exeMhbaijod.exeMpjijhof.exeMbkfap32.exeMffbbomn.exeMplfog32.exeMcjbkc32.exeMjdkhmcd.exeMqnceg32.exeMcmoab32.exeMjggnmab.exeMlecjhae.exeNocpfc32.exeNfnhbngf.exeNhldoifj.exeNqclpfgl.exeNbdiho32.exeNjkail32.exeNmjmeg32.exeNcdeaa32.exeNbfemnkg.exeNiqnjh32.exeNokfgbja.exeNfdncm32.exeNqjbqe32.exeNbkohn32.exeNjbgik32.exeOoopbb32.exeObnlnm32.exeOjecok32.exeOqolldmo.exeObphcm32.exeOflddl32.exeOodimaaf.exeOfnajk32.exepid Process 1884 Jalaid32.exe 2672 Jicija32.exe 4768 Jopabhna.exe 2576 Khifln32.exe 3492 Kldblmmk.exe 1176 Kemfeb32.exe 1960 Klgoalkh.exe 2840 Kcqgnfbe.exe 1392 Kikokq32.exe 3996 Kpdghkao.exe 4900 Keappapf.exe 980 Klkhml32.exe 2084 Kcepif32.exe 2880 Kedlea32.exe 3240 Klndbkep.exe 3156 Kpiqcj32.exe 1028 Lchmoe32.exe 628 Lefika32.exe 2412 Lplmhj32.exe 2812 Lcjide32.exe 1432 Lhgbmlia.exe 2956 Lekbfpgk.exe 3760 Lhioblgo.exe 1016 Lppgciga.exe 1616 Lhkkhk32.exe 1312 Lcaped32.exe 5016 Lhnhnk32.exe 5100 Mafmfqij.exe 2024 Mpgmdhai.exe 2976 Mbhilp32.exe 4600 Mhbaijod.exe 2392 Mpjijhof.exe 3140 Mbkfap32.exe 3964 Mffbbomn.exe 2680 Mplfog32.exe 4624 Mcjbkc32.exe 5040 Mjdkhmcd.exe 4992 Mqnceg32.exe 2400 Mcmoab32.exe 2224 Mjggnmab.exe 3364 Mlecjhae.exe 4344 Nocpfc32.exe 3596 Nfnhbngf.exe 180 Nhldoifj.exe 2728 Nqclpfgl.exe 536 Nbdiho32.exe 4564 Njkail32.exe 912 Nmjmeg32.exe 2552 Ncdeaa32.exe 3612 Nbfemnkg.exe 2108 Niqnjh32.exe 2288 Nokfgbja.exe 736 Nfdncm32.exe 1240 Nqjbqe32.exe 2900 Nbkohn32.exe 844 Njbgik32.exe 4728 Ooopbb32.exe 4440 Obnlnm32.exe 1244 Ojecok32.exe 4524 Oqolldmo.exe 4864 Obphcm32.exe 4760 Oflddl32.exe 1364 Oodimaaf.exe 3508 Ofnajk32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Lplmhj32.exeOpfebqpd.exeCmggeohk.exeCchiie32.exeDigkqn32.exeBmbnjo32.exeCkkhocgd.exeBdbcqklh.exeDghodc32.exeNfdncm32.exePfegjjck.exeMqnceg32.exeCipepo32.exeCaijfljl.exeDancal32.exeMlecjhae.exeCiioopad.exeQbekejqe.exeAdnjek32.exeBjjohe32.exeOqolldmo.exePaaahbmi.exeBpidfl32.exeCapgpnbf.exeCbachf32.exeMhbaijod.exeAificcbj.exeObphcm32.exePpkonp32.exeAiaphc32.exeKcqgnfbe.exeMafmfqij.exeKlgoalkh.exeDkfgjamg.exeCagmamlo.exeLhgbmlia.exeOcbacp32.exeKedlea32.exeMpjijhof.exePfjqei32.exeKcepif32.exeLekbfpgk.exePpmlcpil.exePaoebbol.exeAdpgkk32.exeBaiqpo32.exeBdjjaj32.exeNhldoifj.exeNbfemnkg.exeLefika32.exeAamadpbl.exeCbofbf32.exeDcopidle.exeOcdnhofj.exeQmhbmc32.exeOflddl32.exeBffihe32.exeBpqjfk32.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\Lcjide32.exe Lplmhj32.exe File opened for modification C:\Windows\SysWOW64\Ocbacp32.exe Opfebqpd.exe File opened for modification C:\Windows\SysWOW64\Cdqpbi32.exe Cmggeohk.exe File created C:\Windows\SysWOW64\Ofmlog32.dll Cchiie32.exe File opened for modification C:\Windows\SysWOW64\Dancal32.exe Digkqn32.exe File opened for modification C:\Windows\SysWOW64\Bpqjfk32.exe Bmbnjo32.exe File opened for modification C:\Windows\SysWOW64\Cmidknfh.exe Ckkhocgd.exe File opened for modification C:\Windows\SysWOW64\Bfapmfkk.exe Bdbcqklh.exe File created C:\Windows\SysWOW64\Afchdfgd.dll Dghodc32.exe File opened for modification C:\Windows\SysWOW64\Nqjbqe32.exe Nfdncm32.exe File created C:\Windows\SysWOW64\Dbdoodpc.dll Pfegjjck.exe File created C:\Windows\SysWOW64\Mcmoab32.exe Mqnceg32.exe File opened for modification C:\Windows\SysWOW64\Mcmoab32.exe Mqnceg32.exe File created C:\Windows\SysWOW64\Oblanggg.dll Cipepo32.exe File opened for modification C:\Windows\SysWOW64\Ddhfbhip.exe Caijfljl.exe File created C:\Windows\SysWOW64\Dcopidle.exe Dancal32.exe File opened for modification C:\Windows\SysWOW64\Nocpfc32.exe Mlecjhae.exe File created C:\Windows\SysWOW64\Bnlono32.dll Ciioopad.exe File opened for modification C:\Windows\SysWOW64\Qfqgfh32.exe Qbekejqe.exe File created C:\Windows\SysWOW64\Aflfag32.exe Adnjek32.exe File opened for modification C:\Windows\SysWOW64\Bimocbla.exe Bjjohe32.exe File opened for modification C:\Windows\SysWOW64\Dcopidle.exe Dancal32.exe File created C:\Windows\SysWOW64\Cfplpc32.dll Oqolldmo.exe File created C:\Windows\SysWOW64\Pfnjqikq.exe Paaahbmi.exe File opened for modification C:\Windows\SysWOW64\Bbhqbg32.exe Bpidfl32.exe File opened for modification C:\Windows\SysWOW64\Cpcglj32.exe Capgpnbf.exe File opened for modification C:\Windows\SysWOW64\Cmggeohk.exe Cbachf32.exe File opened for modification C:\Windows\SysWOW64\Mpjijhof.exe Mhbaijod.exe File created C:\Windows\SysWOW64\Foljjfdj.dll Aificcbj.exe File created C:\Windows\SysWOW64\Oflddl32.exe Obphcm32.exe File created C:\Windows\SysWOW64\Pfegjjck.exe Ppkonp32.exe File created C:\Windows\SysWOW64\Aahhia32.exe Aiaphc32.exe File created C:\Windows\SysWOW64\Cgeedfgk.dll Kcqgnfbe.exe File opened for modification C:\Windows\SysWOW64\Mpgmdhai.exe Mafmfqij.exe File opened for modification C:\Windows\SysWOW64\Kcqgnfbe.exe Klgoalkh.exe File created C:\Windows\SysWOW64\Dnedfmlk.exe Dkfgjamg.exe File created C:\Windows\SysWOW64\Cchiie32.exe Cagmamlo.exe File created C:\Windows\SysWOW64\Nibimbeo.dll Lhgbmlia.exe File created C:\Windows\SysWOW64\Beekdcmo.dll Ocbacp32.exe File created C:\Windows\SysWOW64\Jehnpp32.dll Kedlea32.exe File created C:\Windows\SysWOW64\Afbmdp32.dll Mafmfqij.exe File opened for modification C:\Windows\SysWOW64\Mbkfap32.exe Mpjijhof.exe File opened for modification C:\Windows\SysWOW64\Paoebbol.exe Pfjqei32.exe File opened for modification C:\Windows\SysWOW64\Kedlea32.exe Kcepif32.exe File created C:\Windows\SysWOW64\Qoodla32.dll Lekbfpgk.exe File created C:\Windows\SysWOW64\Pipmdblk.dll Ppmlcpil.exe File created C:\Windows\SysWOW64\Ppbeno32.exe Paoebbol.exe File created C:\Windows\SysWOW64\Bjjohe32.exe Adpgkk32.exe File opened for modification C:\Windows\SysWOW64\Bdgmlj32.exe Baiqpo32.exe File created C:\Windows\SysWOW64\Bfhfne32.exe Bdjjaj32.exe File opened for modification C:\Windows\SysWOW64\Nqclpfgl.exe Nhldoifj.exe File opened for modification C:\Windows\SysWOW64\Niqnjh32.exe Nbfemnkg.exe File created C:\Windows\SysWOW64\Cpcglj32.exe Capgpnbf.exe File created C:\Windows\SysWOW64\Lplmhj32.exe Lefika32.exe File created C:\Windows\SysWOW64\Opjlhike.dll Aamadpbl.exe File created C:\Windows\SysWOW64\Ciioopad.exe Cbofbf32.exe File created C:\Windows\SysWOW64\Hkmlejlc.dll Dcopidle.exe File created C:\Windows\SysWOW64\Ofbjdken.exe Ocdnhofj.exe File opened for modification C:\Windows\SysWOW64\Qbekejqe.exe Qmhbmc32.exe File created C:\Windows\SysWOW64\Iljnongi.dll Oflddl32.exe File created C:\Windows\SysWOW64\Dkbcln32.dll Bffihe32.exe File opened for modification C:\Windows\SysWOW64\Cbofbf32.exe Bpqjfk32.exe File created C:\Windows\SysWOW64\Omaffope.dll Bpqjfk32.exe File created C:\Windows\SysWOW64\Acdlmq32.dll Cagmamlo.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5488 5292 WerFault.exe 231 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Ddolcgch.exeNfdncm32.exeQmhbmc32.exeCipepo32.exeQmkobbpk.exeDancal32.exeNhldoifj.exeNokfgbja.exeOfpnok32.exeAidlmcdl.exeAamadpbl.exeBfhfne32.exeBpqjfk32.exeMcjbkc32.exeOfnajk32.exePaaahbmi.exeLcaped32.exeAapnip32.exeBpidfl32.exeCmidknfh.exeCkoajb32.exeMffbbomn.exeNmjmeg32.exeOflddl32.exeAdnjek32.exeCdclgh32.exeKikokq32.exeMjggnmab.exeAahhia32.exePfegjjck.exeKemfeb32.exeMjdkhmcd.exeOqolldmo.exeDcopidle.exeNbdiho32.exeNjbgik32.exeCkmedbeb.exeDpofhiod.exeMbhilp32.exeMqnceg32.exeBffihe32.exeMhbaijod.exeOjecok32.exeBaiqpo32.exea9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exeKldblmmk.exeKlkhml32.exeLchmoe32.exeNiqnjh32.exePifple32.exeAmfooafm.exeBjjohe32.exeBimocbla.exeNqclpfgl.exeQcdgom32.exeAblafi32.exeLppgciga.exeAbnnlhhj.exeCbachf32.exeKeappapf.exeNbfemnkg.exePfjqei32.exeAdiqjlcb.exeLhnhnk32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddolcgch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfdncm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qmhbmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cipepo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qmkobbpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dancal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhldoifj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nokfgbja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofpnok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aidlmcdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aamadpbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfhfne32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpqjfk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mcjbkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofnajk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Paaahbmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcaped32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aapnip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpidfl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmidknfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckoajb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mffbbomn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmjmeg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oflddl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adnjek32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdclgh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kikokq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjggnmab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aahhia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfegjjck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kemfeb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjdkhmcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oqolldmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcopidle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbdiho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njbgik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckmedbeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpofhiod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbhilp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mqnceg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bffihe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhbaijod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojecok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baiqpo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kldblmmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klkhml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lchmoe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Niqnjh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pifple32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amfooafm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjjohe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bimocbla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqclpfgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qcdgom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ablafi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lppgciga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abnnlhhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbachf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keappapf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbfemnkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfjqei32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adiqjlcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhnhnk32.exe -
Modifies registry class 64 IoCs
Processes:
Klgoalkh.exeKpdghkao.exePjgikh32.exeObnlnm32.exePpkonp32.exeDancal32.exea9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exePmmcad32.exeNcdeaa32.exeOjecok32.exePifple32.exeAdnjek32.exeMplfog32.exeOfbjdken.exeAificcbj.exeKikokq32.exeMbkfap32.exeMcjbkc32.exeQmkobbpk.exeAdpgkk32.exeBjohcdab.exeLhgbmlia.exeNbfemnkg.exeBdgmlj32.exeBdbcqklh.exeBkaehdoo.exeKcepif32.exeMpjijhof.exeNmjmeg32.exeKemfeb32.exeMhbaijod.exeOfnajk32.exeBpidfl32.exeCdqpbi32.exePamhmb32.exeQcdgom32.exeCmggeohk.exeCagmamlo.exeCkkhocgd.exeKedlea32.exeLhnhnk32.exePfegjjck.exeBjjohe32.exeBffihe32.exeAflfag32.exeNfnhbngf.exeAiaphc32.exeAjeemfil.exeKhifln32.exeLhioblgo.exeMjdkhmcd.exeMlecjhae.exeQfqgfh32.exeMffbbomn.exePjqckikd.exePfjqei32.exePblhokip.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Klgoalkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnjdme32.dll" Kpdghkao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeinggog.dll" Pjgikh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obnlnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Giijoi32.dll" Ppkonp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dancal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmmcad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncdeaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojecok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pifple32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adnjek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mplfog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofbjdken.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aificcbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kikokq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbkfap32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcjbkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qmkobbpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iochne32.dll" Mplfog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adpgkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdebhm32.dll" Bjohcdab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhgbmlia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbfemnkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdgmlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bncpqm32.dll" Bdbcqklh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfickphb.dll" Bkaehdoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcepif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpjijhof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmjmeg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kemfeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhbaijod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofnajk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qebpgnkb.dll" Bpidfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qkjbpk32.dll" Cdqpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klngce32.dll" Pamhmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdbcqklh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qcdgom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmggeohk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cagmamlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iokalh32.dll" Ckkhocgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jehnpp32.dll" Kedlea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhnhnk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfegjjck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhdlea32.dll" Bjjohe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bffihe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mifceapa.dll" Aflfag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Neelfb32.dll" Nfnhbngf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aiaphc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbgnlcdn.dll" Bdgmlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apibhl32.dll" Ajeemfil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khifln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eginhm32.dll" Lhioblgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjdkhmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlecjhae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qfqgfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kikokq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mffbbomn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmmcad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dapbnf32.dll" Pjqckikd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfjqei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofnajk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjqckikd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccliam32.dll" Pblhokip.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exeJalaid32.exeJicija32.exeJopabhna.exeKhifln32.exeKldblmmk.exeKemfeb32.exeKlgoalkh.exeKcqgnfbe.exeKikokq32.exeKpdghkao.exeKeappapf.exeKlkhml32.exeKcepif32.exeKedlea32.exeKlndbkep.exeKpiqcj32.exeLchmoe32.exeLefika32.exeLplmhj32.exeLcjide32.exeLhgbmlia.exedescription pid Process procid_target PID 2124 wrote to memory of 1884 2124 a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe 82 PID 2124 wrote to memory of 1884 2124 a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe 82 PID 2124 wrote to memory of 1884 2124 a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe 82 PID 1884 wrote to memory of 2672 1884 Jalaid32.exe 83 PID 1884 wrote to memory of 2672 1884 Jalaid32.exe 83 PID 1884 wrote to memory of 2672 1884 Jalaid32.exe 83 PID 2672 wrote to memory of 4768 2672 Jicija32.exe 84 PID 2672 wrote to memory of 4768 2672 Jicija32.exe 84 PID 2672 wrote to memory of 4768 2672 Jicija32.exe 84 PID 4768 wrote to memory of 2576 4768 Jopabhna.exe 85 PID 4768 wrote to memory of 2576 4768 Jopabhna.exe 85 PID 4768 wrote to memory of 2576 4768 Jopabhna.exe 85 PID 2576 wrote to memory of 3492 2576 Khifln32.exe 86 PID 2576 wrote to memory of 3492 2576 Khifln32.exe 86 PID 2576 wrote to memory of 3492 2576 Khifln32.exe 86 PID 3492 wrote to memory of 1176 3492 Kldblmmk.exe 87 PID 3492 wrote to memory of 1176 3492 Kldblmmk.exe 87 PID 3492 wrote to memory of 1176 3492 Kldblmmk.exe 87 PID 1176 wrote to memory of 1960 1176 Kemfeb32.exe 88 PID 1176 wrote to memory of 1960 1176 Kemfeb32.exe 88 PID 1176 wrote to memory of 1960 1176 Kemfeb32.exe 88 PID 1960 wrote to memory of 2840 1960 Klgoalkh.exe 89 PID 1960 wrote to memory of 2840 1960 Klgoalkh.exe 89 PID 1960 wrote to memory of 2840 1960 Klgoalkh.exe 89 PID 2840 wrote to memory of 1392 2840 Kcqgnfbe.exe 90 PID 2840 wrote to memory of 1392 2840 Kcqgnfbe.exe 90 PID 2840 wrote to memory of 1392 2840 Kcqgnfbe.exe 90 PID 1392 wrote to memory of 3996 1392 Kikokq32.exe 91 PID 1392 wrote to memory of 3996 1392 Kikokq32.exe 91 PID 1392 wrote to memory of 3996 1392 Kikokq32.exe 91 PID 3996 wrote to memory of 4900 3996 Kpdghkao.exe 92 PID 3996 wrote to memory of 4900 3996 Kpdghkao.exe 92 PID 3996 wrote to memory of 4900 3996 Kpdghkao.exe 92 PID 4900 wrote to memory of 980 4900 Keappapf.exe 93 PID 4900 wrote to memory of 980 4900 Keappapf.exe 93 PID 4900 wrote to memory of 980 4900 Keappapf.exe 93 PID 980 wrote to memory of 2084 980 Klkhml32.exe 94 PID 980 wrote to memory of 2084 980 Klkhml32.exe 94 PID 980 wrote to memory of 2084 980 Klkhml32.exe 94 PID 2084 wrote to memory of 2880 2084 Kcepif32.exe 95 PID 2084 wrote to memory of 2880 2084 Kcepif32.exe 95 PID 2084 wrote to memory of 2880 2084 Kcepif32.exe 95 PID 2880 wrote to memory of 3240 2880 Kedlea32.exe 96 PID 2880 wrote to memory of 3240 2880 Kedlea32.exe 96 PID 2880 wrote to memory of 3240 2880 Kedlea32.exe 96 PID 3240 wrote to memory of 3156 3240 Klndbkep.exe 97 PID 3240 wrote to memory of 3156 3240 Klndbkep.exe 97 PID 3240 wrote to memory of 3156 3240 Klndbkep.exe 97 PID 3156 wrote to memory of 1028 3156 Kpiqcj32.exe 98 PID 3156 wrote to memory of 1028 3156 Kpiqcj32.exe 98 PID 3156 wrote to memory of 1028 3156 Kpiqcj32.exe 98 PID 1028 wrote to memory of 628 1028 Lchmoe32.exe 99 PID 1028 wrote to memory of 628 1028 Lchmoe32.exe 99 PID 1028 wrote to memory of 628 1028 Lchmoe32.exe 99 PID 628 wrote to memory of 2412 628 Lefika32.exe 100 PID 628 wrote to memory of 2412 628 Lefika32.exe 100 PID 628 wrote to memory of 2412 628 Lefika32.exe 100 PID 2412 wrote to memory of 2812 2412 Lplmhj32.exe 101 PID 2412 wrote to memory of 2812 2412 Lplmhj32.exe 101 PID 2412 wrote to memory of 2812 2412 Lplmhj32.exe 101 PID 2812 wrote to memory of 1432 2812 Lcjide32.exe 102 PID 2812 wrote to memory of 1432 2812 Lcjide32.exe 102 PID 2812 wrote to memory of 1432 2812 Lcjide32.exe 102 PID 1432 wrote to memory of 2956 1432 Lhgbmlia.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe"C:\Users\Admin\AppData\Local\Temp\a9ae2cfb6e0eca331ba9ad87efd2c820126cd6bba4c7e51c6ad2f71677c7cb11N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Jalaid32.exeC:\Windows\system32\Jalaid32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\Jicija32.exeC:\Windows\system32\Jicija32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Jopabhna.exeC:\Windows\system32\Jopabhna.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\Khifln32.exeC:\Windows\system32\Khifln32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Kldblmmk.exeC:\Windows\system32\Kldblmmk.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\Kemfeb32.exeC:\Windows\system32\Kemfeb32.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\Klgoalkh.exeC:\Windows\system32\Klgoalkh.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\Kcqgnfbe.exeC:\Windows\system32\Kcqgnfbe.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Kikokq32.exeC:\Windows\system32\Kikokq32.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\Kpdghkao.exeC:\Windows\system32\Kpdghkao.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\Keappapf.exeC:\Windows\system32\Keappapf.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\Klkhml32.exeC:\Windows\system32\Klkhml32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\Kcepif32.exeC:\Windows\system32\Kcepif32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\Kedlea32.exeC:\Windows\system32\Kedlea32.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Klndbkep.exeC:\Windows\system32\Klndbkep.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\Kpiqcj32.exeC:\Windows\system32\Kpiqcj32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\Lchmoe32.exeC:\Windows\system32\Lchmoe32.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\Lefika32.exeC:\Windows\system32\Lefika32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\Lplmhj32.exeC:\Windows\system32\Lplmhj32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\Lcjide32.exeC:\Windows\system32\Lcjide32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\Lhgbmlia.exeC:\Windows\system32\Lhgbmlia.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\Lekbfpgk.exeC:\Windows\system32\Lekbfpgk.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2956 -
C:\Windows\SysWOW64\Lhioblgo.exeC:\Windows\system32\Lhioblgo.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:3760 -
C:\Windows\SysWOW64\Lppgciga.exeC:\Windows\system32\Lppgciga.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\Lhkkhk32.exeC:\Windows\system32\Lhkkhk32.exe26⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Lcaped32.exeC:\Windows\system32\Lcaped32.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1312 -
C:\Windows\SysWOW64\Lhnhnk32.exeC:\Windows\system32\Lhnhnk32.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5016 -
C:\Windows\SysWOW64\Mafmfqij.exeC:\Windows\system32\Mafmfqij.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5100 -
C:\Windows\SysWOW64\Mpgmdhai.exeC:\Windows\system32\Mpgmdhai.exe30⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Mbhilp32.exeC:\Windows\system32\Mbhilp32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\Mhbaijod.exeC:\Windows\system32\Mhbaijod.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4600 -
C:\Windows\SysWOW64\Mpjijhof.exeC:\Windows\system32\Mpjijhof.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\Mbkfap32.exeC:\Windows\system32\Mbkfap32.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:3140 -
C:\Windows\SysWOW64\Mffbbomn.exeC:\Windows\system32\Mffbbomn.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3964 -
C:\Windows\SysWOW64\Mplfog32.exeC:\Windows\system32\Mplfog32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Mcjbkc32.exeC:\Windows\system32\Mcjbkc32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4624 -
C:\Windows\SysWOW64\Mjdkhmcd.exeC:\Windows\system32\Mjdkhmcd.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5040 -
C:\Windows\SysWOW64\Mqnceg32.exeC:\Windows\system32\Mqnceg32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4992 -
C:\Windows\SysWOW64\Mcmoab32.exeC:\Windows\system32\Mcmoab32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Mjggnmab.exeC:\Windows\system32\Mjggnmab.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\Mlecjhae.exeC:\Windows\system32\Mlecjhae.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3364 -
C:\Windows\SysWOW64\Nocpfc32.exeC:\Windows\system32\Nocpfc32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\Nfnhbngf.exeC:\Windows\system32\Nfnhbngf.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3596 -
C:\Windows\SysWOW64\Nhldoifj.exeC:\Windows\system32\Nhldoifj.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:180 -
C:\Windows\SysWOW64\Nqclpfgl.exeC:\Windows\system32\Nqclpfgl.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\Nbdiho32.exeC:\Windows\system32\Nbdiho32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\Njkail32.exeC:\Windows\system32\Njkail32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4564 -
C:\Windows\SysWOW64\Nmjmeg32.exeC:\Windows\system32\Nmjmeg32.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:912 -
C:\Windows\SysWOW64\Ncdeaa32.exeC:\Windows\system32\Ncdeaa32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2552 -
C:\Windows\SysWOW64\Nbfemnkg.exeC:\Windows\system32\Nbfemnkg.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\Niqnjh32.exeC:\Windows\system32\Niqnjh32.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\Nokfgbja.exeC:\Windows\system32\Nokfgbja.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\Nfdncm32.exeC:\Windows\system32\Nfdncm32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:736 -
C:\Windows\SysWOW64\Nqjbqe32.exeC:\Windows\system32\Nqjbqe32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1240 -
C:\Windows\SysWOW64\Nbkohn32.exeC:\Windows\system32\Nbkohn32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\Njbgik32.exeC:\Windows\system32\Njbgik32.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\Ooopbb32.exeC:\Windows\system32\Ooopbb32.exe58⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\Obnlnm32.exeC:\Windows\system32\Obnlnm32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4440 -
C:\Windows\SysWOW64\Ojecok32.exeC:\Windows\system32\Ojecok32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1244 -
C:\Windows\SysWOW64\Oqolldmo.exeC:\Windows\system32\Oqolldmo.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Windows\SysWOW64\Obphcm32.exeC:\Windows\system32\Obphcm32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4864 -
C:\Windows\SysWOW64\Oflddl32.exeC:\Windows\system32\Oflddl32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Windows\SysWOW64\Oodimaaf.exeC:\Windows\system32\Oodimaaf.exe64⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\Ofnajk32.exeC:\Windows\system32\Ofnajk32.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3508 -
C:\Windows\SysWOW64\Oilmfg32.exeC:\Windows\system32\Oilmfg32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1744 -
C:\Windows\SysWOW64\Opfebqpd.exeC:\Windows\system32\Opfebqpd.exe67⤵
- Drops file in System32 directory
PID:3712 -
C:\Windows\SysWOW64\Ocbacp32.exeC:\Windows\system32\Ocbacp32.exe68⤵
- Drops file in System32 directory
PID:5092 -
C:\Windows\SysWOW64\Ofpnok32.exeC:\Windows\system32\Ofpnok32.exe69⤵
- System Location Discovery: System Language Discovery
PID:432 -
C:\Windows\SysWOW64\Ocdnhofj.exeC:\Windows\system32\Ocdnhofj.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\Ofbjdken.exeC:\Windows\system32\Ofbjdken.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4752 -
C:\Windows\SysWOW64\Pmmcad32.exeC:\Windows\system32\Pmmcad32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5112 -
C:\Windows\SysWOW64\Ppkonp32.exeC:\Windows\system32\Ppkonp32.exe73⤵
- Drops file in System32 directory
- Modifies registry class
PID:5104 -
C:\Windows\SysWOW64\Pfegjjck.exeC:\Windows\system32\Pfegjjck.exe74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3404 -
C:\Windows\SysWOW64\Pjqckikd.exeC:\Windows\system32\Pjqckikd.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Ppmlcpil.exeC:\Windows\system32\Ppmlcpil.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4452 -
C:\Windows\SysWOW64\Pblhokip.exeC:\Windows\system32\Pblhokip.exe77⤵
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Pifple32.exeC:\Windows\system32\Pifple32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Pamhmb32.exeC:\Windows\system32\Pamhmb32.exe79⤵
- Modifies registry class
PID:3216 -
C:\Windows\SysWOW64\Pfjqei32.exeC:\Windows\system32\Pfjqei32.exe80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1372 -
C:\Windows\SysWOW64\Paoebbol.exeC:\Windows\system32\Paoebbol.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4100 -
C:\Windows\SysWOW64\Ppbeno32.exeC:\Windows\system32\Ppbeno32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:740 -
C:\Windows\SysWOW64\Pjgikh32.exeC:\Windows\system32\Pjgikh32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2176 -
C:\Windows\SysWOW64\Paaahbmi.exeC:\Windows\system32\Paaahbmi.exe84⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:388 -
C:\Windows\SysWOW64\Pfnjqikq.exeC:\Windows\system32\Pfnjqikq.exe85⤵PID:8
-
C:\Windows\SysWOW64\Qmhbmc32.exeC:\Windows\system32\Qmhbmc32.exe86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\Qbekejqe.exeC:\Windows\system32\Qbekejqe.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\Qfqgfh32.exeC:\Windows\system32\Qfqgfh32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1568 -
C:\Windows\SysWOW64\Qmkobbpk.exeC:\Windows\system32\Qmkobbpk.exe89⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4296 -
C:\Windows\SysWOW64\Qcdgom32.exeC:\Windows\system32\Qcdgom32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4360 -
C:\Windows\SysWOW64\Aiaphc32.exeC:\Windows\system32\Aiaphc32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4164 -
C:\Windows\SysWOW64\Aahhia32.exeC:\Windows\system32\Aahhia32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\Abjdqi32.exeC:\Windows\system32\Abjdqi32.exe93⤵PID:4644
-
C:\Windows\SysWOW64\Aidlmcdl.exeC:\Windows\system32\Aidlmcdl.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Windows\SysWOW64\Aakdnqdo.exeC:\Windows\system32\Aakdnqdo.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2676 -
C:\Windows\SysWOW64\Adiqjlcb.exeC:\Windows\system32\Adiqjlcb.exe96⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\Ablafi32.exeC:\Windows\system32\Ablafi32.exe97⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\Aificcbj.exeC:\Windows\system32\Aificcbj.exe98⤵
- Drops file in System32 directory
- Modifies registry class
PID:64 -
C:\Windows\SysWOW64\Aamadpbl.exeC:\Windows\system32\Aamadpbl.exe99⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\Abnnlhhj.exeC:\Windows\system32\Abnnlhhj.exe100⤵
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\Ajeemfil.exeC:\Windows\system32\Ajeemfil.exe101⤵
- Modifies registry class
PID:4436 -
C:\Windows\SysWOW64\Aapnip32.exeC:\Windows\system32\Aapnip32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3916 -
C:\Windows\SysWOW64\Adnjek32.exeC:\Windows\system32\Adnjek32.exe103⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:336 -
C:\Windows\SysWOW64\Aflfag32.exeC:\Windows\system32\Aflfag32.exe104⤵
- Modifies registry class
PID:1956 -
C:\Windows\SysWOW64\Amfooafm.exeC:\Windows\system32\Amfooafm.exe105⤵
- System Location Discovery: System Language Discovery
PID:4876 -
C:\Windows\SysWOW64\Adpgkk32.exeC:\Windows\system32\Adpgkk32.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:2220 -
C:\Windows\SysWOW64\Bjjohe32.exeC:\Windows\system32\Bjjohe32.exe107⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4412 -
C:\Windows\SysWOW64\Bimocbla.exeC:\Windows\system32\Bimocbla.exe108⤵
- System Location Discovery: System Language Discovery
PID:456 -
C:\Windows\SysWOW64\Bdbcqklh.exeC:\Windows\system32\Bdbcqklh.exe109⤵
- Drops file in System32 directory
- Modifies registry class
PID:440 -
C:\Windows\SysWOW64\Bfapmfkk.exeC:\Windows\system32\Bfapmfkk.exe110⤵PID:3528
-
C:\Windows\SysWOW64\Bipliajo.exeC:\Windows\system32\Bipliajo.exe111⤵PID:4620
-
C:\Windows\SysWOW64\Bpidfl32.exeC:\Windows\system32\Bpidfl32.exe112⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4104 -
C:\Windows\SysWOW64\Bbhqbg32.exeC:\Windows\system32\Bbhqbg32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3852 -
C:\Windows\SysWOW64\Bjohcdab.exeC:\Windows\system32\Bjohcdab.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1780 -
C:\Windows\SysWOW64\Baiqpo32.exeC:\Windows\system32\Baiqpo32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\Bdgmlj32.exeC:\Windows\system32\Bdgmlj32.exe116⤵
- Modifies registry class
PID:3812 -
C:\Windows\SysWOW64\Bffihe32.exeC:\Windows\system32\Bffihe32.exe117⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4184 -
C:\Windows\SysWOW64\Bkaehdoo.exeC:\Windows\system32\Bkaehdoo.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1532 -
C:\Windows\SysWOW64\Bdjjaj32.exeC:\Windows\system32\Bdjjaj32.exe119⤵
- Drops file in System32 directory
PID:4824 -
C:\Windows\SysWOW64\Bfhfne32.exeC:\Windows\system32\Bfhfne32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\Bmbnjo32.exeC:\Windows\system32\Bmbnjo32.exe121⤵
- Drops file in System32 directory
PID:4348 -
C:\Windows\SysWOW64\Bpqjfk32.exeC:\Windows\system32\Bpqjfk32.exe122⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-