Analysis
-
max time kernel
74s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 05:50
Behavioral task
behavioral1
Sample
7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe
Resource
win10v2004-20241007-en
General
-
Target
7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe
-
Size
96KB
-
MD5
7e2eaffbf151e0373ab68cc266042610
-
SHA1
7db9397ef6f030068de22312360d34ef496f6131
-
SHA256
7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82
-
SHA512
18a8cf4a0e4b68513f3902410705e3db0f9fbbc5292eb72941a0bb2707592511b0b6a84af42d07858af0a217ed34b199c0bf33a1b32d2627d0bd9f63989e4468
-
SSDEEP
1536:QfDff0Bq8PMrXJJB9wCYMhdm2L5X7RZObZUUWaegPYA:ETyqYMlJz5LpClUUWae
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Igcjgk32.exeBgihjl32.exeAjmfca32.exeFqkieogp.exeCodgbqmc.exeHkpaoape.exePanehkaj.exeGjccbb32.exeHmgodc32.exeOmeini32.exePqhkdg32.exeIfniaeqk.exePaemac32.exeHliieioi.exeDomffn32.exeDmgmbj32.exeKegebn32.exeAmjkefmd.exeIpecndab.exe7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exeNmpiicdm.exeAjmhljip.exeJbbbed32.exeHlecmkel.exeJghcbjll.exeKjnanhhc.exeIjenpn32.exeKpeonkig.exePmmcfi32.exeHamgno32.exeIlmool32.exeLdfldpqf.exeNiqgof32.exePniohk32.exeQfimhmlo.exeJacjna32.exeGipqpplq.exeDmffhd32.exeIigcobid.exeMbhlgg32.exeIaipmm32.exeFkjbpkag.exeAmebjgai.exeAnfggicl.exeNiombolm.exeFlbehbqm.exeOacbdg32.exeEgeecf32.exeMlmjgnaa.exeKjchmclb.exePoinkg32.exeIfoljn32.exeKmbclj32.exeAbaaoodq.exeFhngkm32.exeJkgelh32.exeJhpopk32.exeLnopmegg.exeMlejkl32.exeAcnpjj32.exeGmipko32.exeDdkbqfcp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Igcjgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgihjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajmfca32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqkieogp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Codgbqmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkpaoape.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Panehkaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjccbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmgodc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omeini32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqhkdg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifniaeqk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paemac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hliieioi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Domffn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgmbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kegebn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amjkefmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipecndab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmpiicdm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajmhljip.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbbbed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlecmkel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jghcbjll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjnanhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijenpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajmhljip.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpeonkig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmmcfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqhkdg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hamgno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilmool32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldfldpqf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niqgof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pniohk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfimhmlo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jacjna32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gipqpplq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmffhd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iigcobid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbhlgg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iaipmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkjbpkag.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amebjgai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anfggicl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Niombolm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flbehbqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oacbdg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egeecf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlmjgnaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjchmclb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Poinkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifoljn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmbclj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abaaoodq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhngkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkgelh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhpopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnopmegg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlejkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acnpjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmipko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddkbqfcp.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 2 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Oojhfj32.exe family_bruteratel C:\Windows\SysWOW64\Mliibj32.exe family_bruteratel -
Executes dropped EXE 64 IoCs
Processes:
Miaaki32.exeMoqgiopk.exeMbopon32.exeNklaipbj.exeNhpabdqd.exeNmmjjk32.exeNpnclf32.exeOemhjlha.exeOeaael32.exeOdfofhic.exeOqmokioh.exePdkhag32.exePcqebd32.exePogegeoj.exePcenmcea.exePmmcfi32.exeQonlhd32.exeQekdpkgj.exeAiimfi32.exeAbaaoodq.exeAjmfca32.exeAfcghbgp.exeAplkah32.exeAjcldpkd.exeBclqme32.exeBneancnc.exeBaigen32.exeBmohjooe.exeCmaeoo32.exeCkfeic32.exeCpbnaj32.exeCojghf32.exeDakpiajj.exeDkcebg32.exeDglbmg32.exeDdpbfl32.exeEffhic32.exeEgeecf32.exeEbofcd32.exeEocfmh32.exeEoecbheg.exeFhngkm32.exeFipdqmje.exeFqkieogp.exeFjdnne32.exeFeiaknmg.exeFmdfppkb.exeFcoolj32.exeFmgcepio.exeGcakbjpl.exeGmipko32.exeGbfhcf32.exeGipqpplq.exeGnmihgkh.exeGlaiak32.exeGeinjapb.exeGbmoceol.exeHlecmkel.exeHmgodc32.exeHengep32.exeHadhjaaa.exeHfaqbh32.exeHpjeknfi.exeHjoiiffo.exepid process 2224 Miaaki32.exe 2220 Moqgiopk.exe 2168 Mbopon32.exe 2496 Nklaipbj.exe 2836 Nhpabdqd.exe 2820 Nmmjjk32.exe 2988 Npnclf32.exe 916 Oemhjlha.exe 2136 Oeaael32.exe 432 Odfofhic.exe 2120 Oqmokioh.exe 1548 Pdkhag32.exe 1760 Pcqebd32.exe 2232 Pogegeoj.exe 2404 Pcenmcea.exe 2064 Pmmcfi32.exe 756 Qonlhd32.exe 1420 Qekdpkgj.exe 1972 Aiimfi32.exe 2576 Abaaoodq.exe 2440 Ajmfca32.exe 1232 Afcghbgp.exe 1512 Aplkah32.exe 1524 Ajcldpkd.exe 2608 Bclqme32.exe 2432 Bneancnc.exe 584 Baigen32.exe 2128 Bmohjooe.exe 2952 Cmaeoo32.exe 2480 Ckfeic32.exe 2832 Cpbnaj32.exe 2516 Cojghf32.exe 1872 Dakpiajj.exe 1652 Dkcebg32.exe 2276 Dglbmg32.exe 1836 Ddpbfl32.exe 2028 Effhic32.exe 1400 Egeecf32.exe 2216 Ebofcd32.exe 2244 Eocfmh32.exe 2328 Eoecbheg.exe 900 Fhngkm32.exe 2776 Fipdqmje.exe 1356 Fqkieogp.exe 2544 Fjdnne32.exe 1088 Feiaknmg.exe 2628 Fmdfppkb.exe 2752 Fcoolj32.exe 888 Fmgcepio.exe 3000 Gcakbjpl.exe 1704 Gmipko32.exe 2960 Gbfhcf32.exe 3060 Gipqpplq.exe 2972 Gnmihgkh.exe 2548 Glaiak32.exe 2868 Geinjapb.exe 1832 Gbmoceol.exe 2088 Hlecmkel.exe 1632 Hmgodc32.exe 2308 Hengep32.exe 2176 Hadhjaaa.exe 1992 Hfaqbh32.exe 1164 Hpjeknfi.exe 1812 Hjoiiffo.exe -
Loads dropped DLL 64 IoCs
Processes:
7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exeMiaaki32.exeMoqgiopk.exeMbopon32.exeNklaipbj.exeNhpabdqd.exeNmmjjk32.exeNpnclf32.exeOemhjlha.exeOeaael32.exeOdfofhic.exeOqmokioh.exePdkhag32.exePcqebd32.exePogegeoj.exePcenmcea.exePmmcfi32.exeQonlhd32.exeQekdpkgj.exeAiimfi32.exeAbaaoodq.exeAjmfca32.exeAfcghbgp.exeAplkah32.exeAjcldpkd.exeBclqme32.exeBhpclica.exeBaigen32.exeBmohjooe.exeCmaeoo32.exeCkfeic32.exeCpbnaj32.exepid process 1688 7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe 1688 7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe 2224 Miaaki32.exe 2224 Miaaki32.exe 2220 Moqgiopk.exe 2220 Moqgiopk.exe 2168 Mbopon32.exe 2168 Mbopon32.exe 2496 Nklaipbj.exe 2496 Nklaipbj.exe 2836 Nhpabdqd.exe 2836 Nhpabdqd.exe 2820 Nmmjjk32.exe 2820 Nmmjjk32.exe 2988 Npnclf32.exe 2988 Npnclf32.exe 916 Oemhjlha.exe 916 Oemhjlha.exe 2136 Oeaael32.exe 2136 Oeaael32.exe 432 Odfofhic.exe 432 Odfofhic.exe 2120 Oqmokioh.exe 2120 Oqmokioh.exe 1548 Pdkhag32.exe 1548 Pdkhag32.exe 1760 Pcqebd32.exe 1760 Pcqebd32.exe 2232 Pogegeoj.exe 2232 Pogegeoj.exe 2404 Pcenmcea.exe 2404 Pcenmcea.exe 2064 Pmmcfi32.exe 2064 Pmmcfi32.exe 756 Qonlhd32.exe 756 Qonlhd32.exe 1420 Qekdpkgj.exe 1420 Qekdpkgj.exe 1972 Aiimfi32.exe 1972 Aiimfi32.exe 2576 Abaaoodq.exe 2576 Abaaoodq.exe 2440 Ajmfca32.exe 2440 Ajmfca32.exe 1232 Afcghbgp.exe 1232 Afcghbgp.exe 1512 Aplkah32.exe 1512 Aplkah32.exe 1524 Ajcldpkd.exe 1524 Ajcldpkd.exe 2608 Bclqme32.exe 2608 Bclqme32.exe 2156 Bhpclica.exe 2156 Bhpclica.exe 584 Baigen32.exe 584 Baigen32.exe 2128 Bmohjooe.exe 2128 Bmohjooe.exe 2952 Cmaeoo32.exe 2952 Cmaeoo32.exe 2480 Ckfeic32.exe 2480 Ckfeic32.exe 2832 Cpbnaj32.exe 2832 Cpbnaj32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Pmmcfi32.exeJghcbjll.exeAjaagi32.exeCgeopqfp.exeDgbgon32.exeJemkai32.exeOpjlkc32.exeGeaaolbo.exeDhlapc32.exeGgmjkapi.exeAfeold32.exePdkhag32.exeJkobgm32.exePqhkdg32.exeBcbedm32.exeFkjbpkag.exeFldbnb32.exeLolbjahp.exeDmffhd32.exeEhpgha32.exeEolljk32.exeGipqpplq.exeCiebdj32.exeLkffohon.exeGqidme32.exeGbfhcf32.exeIfniaeqk.exeNhljpmlm.exeGjccbb32.exeHlkekilg.exeBmbkid32.exeBiakbc32.exeFlbehbqm.exeLhegcg32.exePapank32.exeBfppgohb.exeOojhfj32.exePpiapp32.exeOhmljj32.exeCmapna32.exeIpecndab.exeNhpabdqd.exeHengep32.exeHeijidbn.exeDhekodik.exeFdggofgn.exeHajdniep.exeBncpffdn.exeCgmndokg.exeGoekpm32.exeLohiob32.exeOnfadc32.exeKkckblgq.exeKegebn32.exeKcahjqfa.exeFmgcepio.exeGlaiak32.exeKngaig32.exeAmjkefmd.exeCodgbqmc.exeMjpmkdpp.exeOphanl32.exeGklkdn32.exedescription ioc process File created C:\Windows\SysWOW64\Qonlhd32.exe Pmmcfi32.exe File created C:\Windows\SysWOW64\Fdgbbalc.dll Jghcbjll.exe File created C:\Windows\SysWOW64\Momdeobl.dll Ajaagi32.exe File opened for modification C:\Windows\SysWOW64\Ceioieei.exe Cgeopqfp.exe File created C:\Windows\SysWOW64\Bfmkge32.dll Dgbgon32.exe File opened for modification C:\Windows\SysWOW64\Joepjokm.exe Jemkai32.exe File opened for modification C:\Windows\SysWOW64\Ogddhmdl.exe Opjlkc32.exe File created C:\Windows\SysWOW64\Ekbejn32.dll Geaaolbo.exe File created C:\Windows\SysWOW64\Bcipdfmd.dll Dhlapc32.exe File created C:\Windows\SysWOW64\Mckahlgg.dll Ggmjkapi.exe File created C:\Windows\SysWOW64\Akbgdkgm.exe Afeold32.exe File created C:\Windows\SysWOW64\Pcqebd32.exe Pdkhag32.exe File created C:\Windows\SysWOW64\Jbijcgbc.exe Jkobgm32.exe File created C:\Windows\SysWOW64\Klhejn32.dll Pqhkdg32.exe File opened for modification C:\Windows\SysWOW64\Bqffna32.exe Bcbedm32.exe File created C:\Windows\SysWOW64\Fcegdnna.exe Fkjbpkag.exe File created C:\Windows\SysWOW64\Gdpfbd32.exe Fldbnb32.exe File created C:\Windows\SysWOW64\Eipnnj32.dll Lolbjahp.exe File created C:\Windows\SysWOW64\Ehpgha32.exe Dmffhd32.exe File created C:\Windows\SysWOW64\Ococgpfb.dll Ehpgha32.exe File created C:\Windows\SysWOW64\Noieei32.dll Eolljk32.exe File created C:\Windows\SysWOW64\Gnmihgkh.exe Gipqpplq.exe File opened for modification C:\Windows\SysWOW64\Cobjmq32.exe Ciebdj32.exe File created C:\Windows\SysWOW64\Lhjghlng.exe Lkffohon.exe File opened for modification C:\Windows\SysWOW64\Glpdbfek.exe Gqidme32.exe File created C:\Windows\SysWOW64\Gipqpplq.exe Gbfhcf32.exe File opened for modification C:\Windows\SysWOW64\Ibejfffo.exe Ifniaeqk.exe File created C:\Windows\SysWOW64\Aikbjbjh.dll Nhljpmlm.exe File opened for modification C:\Windows\SysWOW64\Hmdldmja.exe Gjccbb32.exe File created C:\Windows\SysWOW64\Docappbm.dll Hlkekilg.exe File opened for modification C:\Windows\SysWOW64\Bfkobj32.exe Bmbkid32.exe File opened for modification C:\Windows\SysWOW64\Bqhbcqmj.exe Biakbc32.exe File created C:\Windows\SysWOW64\Mgogqmha.dll Flbehbqm.exe File created C:\Windows\SysWOW64\Lppkgi32.exe Lhegcg32.exe File created C:\Windows\SysWOW64\Jfgdqipf.dll Papank32.exe File created C:\Windows\SysWOW64\Kmaimj32.dll Bfppgohb.exe File created C:\Windows\SysWOW64\Eceiinfd.dll Oojhfj32.exe File created C:\Windows\SysWOW64\Lmgggn32.dll Ppiapp32.exe File opened for modification C:\Windows\SysWOW64\Ophanl32.exe Ohmljj32.exe File created C:\Windows\SysWOW64\Kcadedfd.dll Cmapna32.exe File created C:\Windows\SysWOW64\Oamkpm32.dll Ipecndab.exe File created C:\Windows\SysWOW64\Nmmjjk32.exe Nhpabdqd.exe File opened for modification C:\Windows\SysWOW64\Hadhjaaa.exe Hengep32.exe File created C:\Windows\SysWOW64\Qkgjae32.dll Heijidbn.exe File created C:\Windows\SysWOW64\Doocln32.exe Dhekodik.exe File created C:\Windows\SysWOW64\Gndebkii.exe Fdggofgn.exe File created C:\Windows\SysWOW64\Hfflfp32.exe Hajdniep.exe File created C:\Windows\SysWOW64\Mklgei32.dll Bncpffdn.exe File created C:\Windows\SysWOW64\Heljgd32.dll Cgmndokg.exe File opened for modification C:\Windows\SysWOW64\Gdbchd32.exe Goekpm32.exe File created C:\Windows\SysWOW64\Pdbabndd.dll Lohiob32.exe File created C:\Windows\SysWOW64\Ohnemidj.exe Onfadc32.exe File created C:\Windows\SysWOW64\Njbnon32.dll Kkckblgq.exe File created C:\Windows\SysWOW64\Gqgcjbmi.dll Kegebn32.exe File opened for modification C:\Windows\SysWOW64\Kikpgk32.exe Kcahjqfa.exe File created C:\Windows\SysWOW64\Gcakbjpl.exe Fmgcepio.exe File created C:\Windows\SysWOW64\Geinjapb.exe Glaiak32.exe File opened for modification C:\Windows\SysWOW64\Kjnanhhc.exe Kngaig32.exe File created C:\Windows\SysWOW64\Jgcfpd32.dll Amjkefmd.exe File opened for modification C:\Windows\SysWOW64\Cdapjglj.exe Codgbqmc.exe File opened for modification C:\Windows\SysWOW64\Odgqoa32.exe Oojhfj32.exe File opened for modification C:\Windows\SysWOW64\Mkpieggc.exe Mjpmkdpp.exe File opened for modification C:\Windows\SysWOW64\Obgmjh32.exe Ophanl32.exe File created C:\Windows\SysWOW64\Gqidme32.exe Gklkdn32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2480 4924 WerFault.exe Ohnemidj.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Emkfmioh.exeEgfglocf.exeMnakjaoc.exeFmdpejgf.exeEekdmk32.exeObgmjh32.exeOnfadc32.exeBemfjgdg.exeGbeaip32.exeBmbkid32.exeEbofcd32.exeAmebjgai.exeLhddjngm.exeFpihnbmk.exeKfcadq32.exeKcllfi32.exeOpekenmh.exeDadehh32.exeGeinjapb.exeDhaefepn.exeGqidme32.exeNcjcnfcn.exeMoqgiopk.exeLomidgkl.exeNicfnn32.exeBcbedm32.exeCbllph32.exeFdpjcaij.exeKplfmfmf.exeOdoakckp.exeJehbfjia.exeMojaceln.exeNdmeecmb.exeDmgmbj32.exeAlmjcobe.exeFldbnb32.exeOhnemidj.exeOqmokioh.exePcenmcea.exeAplkah32.exeAqimoc32.exeGklkdn32.exeDdpbfl32.exeHamgno32.exeKhmnio32.exePcagkmaj.exeNklaipbj.exeLighjd32.exeChohqebq.exeIfloeo32.exeOacbdg32.exePjblcl32.exeOppbjn32.exeBcopkn32.exeCpemob32.exeAlknnodh.exeQonlhd32.exeJkobgm32.exeAkbelbpi.exeMlejkl32.exeAogmdk32.exeHbhmfk32.exeIadphghe.exeDhekodik.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emkfmioh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Egfglocf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnakjaoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmdpejgf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eekdmk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obgmjh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onfadc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bemfjgdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbeaip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmbkid32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ebofcd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amebjgai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhddjngm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fpihnbmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfcadq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcllfi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opekenmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dadehh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Geinjapb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhaefepn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gqidme32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncjcnfcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moqgiopk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lomidgkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nicfnn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bcbedm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbllph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdpjcaij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kplfmfmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odoakckp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jehbfjia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mojaceln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndmeecmb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgmbj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Almjcobe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fldbnb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohnemidj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oqmokioh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcenmcea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aplkah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqimoc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gklkdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddpbfl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hamgno32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khmnio32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcagkmaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nklaipbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lighjd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chohqebq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifloeo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oacbdg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjblcl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oppbjn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bcopkn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpemob32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alknnodh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qonlhd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkobgm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akbelbpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlejkl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aogmdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbhmfk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iadphghe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhekodik.exe -
Modifies registry class 64 IoCs
Processes:
Ccolja32.exeInfjfblm.exeJbbbed32.exeLlgllj32.exeAialjgbh.exeLmnkpc32.exeBfeibo32.exeCkndmaad.exeFjlqcppm.exeDdnhidmm.exeAfeold32.exeAbaaoodq.exePpgdjqna.exeDmgmbj32.exeFohbqpki.exeJmbnhm32.exeGfhikl32.exeBneancnc.exeIdcqep32.exeKjnanhhc.exeHfajhblm.exeOakaheoa.exeIhooog32.exeOlobcm32.exeBqffna32.exeDdpbfl32.exeOmjbihpn.exeHamgno32.exeQggoeilh.exeFldbnb32.exeCkfeic32.exeJhpopk32.exeJkfnaa32.exeAlknnodh.exeKfcadq32.exeOdfofhic.exePodbgo32.exeMfakbf32.exeDkfcqo32.exeEaoaafli.exeJifkmh32.exeMliibj32.exeOpjlkc32.exeEgeecf32.exeKgjelg32.exeFkocfa32.exeLlainlje.exeOdmgnl32.exeObgmjh32.exeFlbehbqm.exeQonlhd32.exeJemkai32.exeGnmihgkh.exeAmebjgai.exeCeanmc32.exeCmaeoo32.exeIlhlan32.exeBkdbab32.exeBemfjgdg.exePaemac32.exeFcoolj32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfhjpckd.dll" Ccolja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Infjfblm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbbbed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llgllj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aialjgbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmnkpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfeibo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gobdgmhm.dll" Ckndmaad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjlqcppm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddnhidmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbpilaid.dll" Afeold32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abaaoodq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppgdjqna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akihojfo.dll" Dmgmbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fohbqpki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jmbnhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcjbpaea.dll" Gfhikl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acblnk32.dll" Bneancnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihhpdnkl.dll" Idcqep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjnanhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gohqfe32.dll" Hfajhblm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgimkf32.dll" Oakaheoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihooog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olobcm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bqffna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmnechcf.dll" Ddpbfl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omjbihpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hamgno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qggoeilh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fldbnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckfeic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bionpjaj.dll" Jhpopk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkfnaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Alknnodh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oonopkmp.dll" Kfcadq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Odfofhic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eecpggap.dll" Podbgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkegkb32.dll" Mfakbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkfcqo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eaoaafli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jifkmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkeecd32.dll" Mliibj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Opjlkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egeecf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpchof32.dll" Kgjelg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbffjdpp.dll" Fkocfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elcmem32.dll" Llainlje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdqgkodn.dll" Odmgnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obgmjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgogqmha.dll" Flbehbqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qonlhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jemkai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gnmihgkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amebjgai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caoflo32.dll" Infjfblm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgjbdlma.dll" Ceanmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ooocab32.dll" Cmaeoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idcqep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcdfbkkf.dll" Obgmjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilhlan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkdbab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aclcmbmo.dll" Bemfjgdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Paemac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcoolj32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exeMiaaki32.exeMoqgiopk.exeMbopon32.exeNklaipbj.exeNhpabdqd.exeNmmjjk32.exeNpnclf32.exeOemhjlha.exeOeaael32.exeOdfofhic.exeOqmokioh.exePdkhag32.exePcqebd32.exePogegeoj.exePcenmcea.exedescription pid process target process PID 1688 wrote to memory of 2224 1688 7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe Miaaki32.exe PID 1688 wrote to memory of 2224 1688 7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe Miaaki32.exe PID 1688 wrote to memory of 2224 1688 7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe Miaaki32.exe PID 1688 wrote to memory of 2224 1688 7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe Miaaki32.exe PID 2224 wrote to memory of 2220 2224 Miaaki32.exe Moqgiopk.exe PID 2224 wrote to memory of 2220 2224 Miaaki32.exe Moqgiopk.exe PID 2224 wrote to memory of 2220 2224 Miaaki32.exe Moqgiopk.exe PID 2224 wrote to memory of 2220 2224 Miaaki32.exe Moqgiopk.exe PID 2220 wrote to memory of 2168 2220 Moqgiopk.exe Mbopon32.exe PID 2220 wrote to memory of 2168 2220 Moqgiopk.exe Mbopon32.exe PID 2220 wrote to memory of 2168 2220 Moqgiopk.exe Mbopon32.exe PID 2220 wrote to memory of 2168 2220 Moqgiopk.exe Mbopon32.exe PID 2168 wrote to memory of 2496 2168 Mbopon32.exe Nklaipbj.exe PID 2168 wrote to memory of 2496 2168 Mbopon32.exe Nklaipbj.exe PID 2168 wrote to memory of 2496 2168 Mbopon32.exe Nklaipbj.exe PID 2168 wrote to memory of 2496 2168 Mbopon32.exe Nklaipbj.exe PID 2496 wrote to memory of 2836 2496 Nklaipbj.exe Nhpabdqd.exe PID 2496 wrote to memory of 2836 2496 Nklaipbj.exe Nhpabdqd.exe PID 2496 wrote to memory of 2836 2496 Nklaipbj.exe Nhpabdqd.exe PID 2496 wrote to memory of 2836 2496 Nklaipbj.exe Nhpabdqd.exe PID 2836 wrote to memory of 2820 2836 Nhpabdqd.exe Nmmjjk32.exe PID 2836 wrote to memory of 2820 2836 Nhpabdqd.exe Nmmjjk32.exe PID 2836 wrote to memory of 2820 2836 Nhpabdqd.exe Nmmjjk32.exe PID 2836 wrote to memory of 2820 2836 Nhpabdqd.exe Nmmjjk32.exe PID 2820 wrote to memory of 2988 2820 Nmmjjk32.exe Npnclf32.exe PID 2820 wrote to memory of 2988 2820 Nmmjjk32.exe Npnclf32.exe PID 2820 wrote to memory of 2988 2820 Nmmjjk32.exe Npnclf32.exe PID 2820 wrote to memory of 2988 2820 Nmmjjk32.exe Npnclf32.exe PID 2988 wrote to memory of 916 2988 Npnclf32.exe Oemhjlha.exe PID 2988 wrote to memory of 916 2988 Npnclf32.exe Oemhjlha.exe PID 2988 wrote to memory of 916 2988 Npnclf32.exe Oemhjlha.exe PID 2988 wrote to memory of 916 2988 Npnclf32.exe Oemhjlha.exe PID 916 wrote to memory of 2136 916 Oemhjlha.exe Oeaael32.exe PID 916 wrote to memory of 2136 916 Oemhjlha.exe Oeaael32.exe PID 916 wrote to memory of 2136 916 Oemhjlha.exe Oeaael32.exe PID 916 wrote to memory of 2136 916 Oemhjlha.exe Oeaael32.exe PID 2136 wrote to memory of 432 2136 Oeaael32.exe Odfofhic.exe PID 2136 wrote to memory of 432 2136 Oeaael32.exe Odfofhic.exe PID 2136 wrote to memory of 432 2136 Oeaael32.exe Odfofhic.exe PID 2136 wrote to memory of 432 2136 Oeaael32.exe Odfofhic.exe PID 432 wrote to memory of 2120 432 Odfofhic.exe Oqmokioh.exe PID 432 wrote to memory of 2120 432 Odfofhic.exe Oqmokioh.exe PID 432 wrote to memory of 2120 432 Odfofhic.exe Oqmokioh.exe PID 432 wrote to memory of 2120 432 Odfofhic.exe Oqmokioh.exe PID 2120 wrote to memory of 1548 2120 Oqmokioh.exe Pdkhag32.exe PID 2120 wrote to memory of 1548 2120 Oqmokioh.exe Pdkhag32.exe PID 2120 wrote to memory of 1548 2120 Oqmokioh.exe Pdkhag32.exe PID 2120 wrote to memory of 1548 2120 Oqmokioh.exe Pdkhag32.exe PID 1548 wrote to memory of 1760 1548 Pdkhag32.exe Pcqebd32.exe PID 1548 wrote to memory of 1760 1548 Pdkhag32.exe Pcqebd32.exe PID 1548 wrote to memory of 1760 1548 Pdkhag32.exe Pcqebd32.exe PID 1548 wrote to memory of 1760 1548 Pdkhag32.exe Pcqebd32.exe PID 1760 wrote to memory of 2232 1760 Pcqebd32.exe Pogegeoj.exe PID 1760 wrote to memory of 2232 1760 Pcqebd32.exe Pogegeoj.exe PID 1760 wrote to memory of 2232 1760 Pcqebd32.exe Pogegeoj.exe PID 1760 wrote to memory of 2232 1760 Pcqebd32.exe Pogegeoj.exe PID 2232 wrote to memory of 2404 2232 Pogegeoj.exe Pcenmcea.exe PID 2232 wrote to memory of 2404 2232 Pogegeoj.exe Pcenmcea.exe PID 2232 wrote to memory of 2404 2232 Pogegeoj.exe Pcenmcea.exe PID 2232 wrote to memory of 2404 2232 Pogegeoj.exe Pcenmcea.exe PID 2404 wrote to memory of 2064 2404 Pcenmcea.exe Pmmcfi32.exe PID 2404 wrote to memory of 2064 2404 Pcenmcea.exe Pmmcfi32.exe PID 2404 wrote to memory of 2064 2404 Pcenmcea.exe Pmmcfi32.exe PID 2404 wrote to memory of 2064 2404 Pcenmcea.exe Pmmcfi32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe"C:\Users\Admin\AppData\Local\Temp\7268bce83b46ddf66101e1b1a3460dbddfe670e28e079dc817987acb7eab7e82N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\Miaaki32.exeC:\Windows\system32\Miaaki32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\Moqgiopk.exeC:\Windows\system32\Moqgiopk.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Mbopon32.exeC:\Windows\system32\Mbopon32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\Nklaipbj.exeC:\Windows\system32\Nklaipbj.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\Nhpabdqd.exeC:\Windows\system32\Nhpabdqd.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\Nmmjjk32.exeC:\Windows\system32\Nmmjjk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Npnclf32.exeC:\Windows\system32\Npnclf32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\Oemhjlha.exeC:\Windows\system32\Oemhjlha.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\Oeaael32.exeC:\Windows\system32\Oeaael32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\Odfofhic.exeC:\Windows\system32\Odfofhic.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\Oqmokioh.exeC:\Windows\system32\Oqmokioh.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Pdkhag32.exeC:\Windows\system32\Pdkhag32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\Pcqebd32.exeC:\Windows\system32\Pcqebd32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\Pogegeoj.exeC:\Windows\system32\Pogegeoj.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Pcenmcea.exeC:\Windows\system32\Pcenmcea.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Pmmcfi32.exeC:\Windows\system32\Pmmcfi32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\Qonlhd32.exeC:\Windows\system32\Qonlhd32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:756 -
C:\Windows\SysWOW64\Qekdpkgj.exeC:\Windows\system32\Qekdpkgj.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1420 -
C:\Windows\SysWOW64\Aiimfi32.exeC:\Windows\system32\Aiimfi32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Windows\SysWOW64\Abaaoodq.exeC:\Windows\system32\Abaaoodq.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Ajmfca32.exeC:\Windows\system32\Ajmfca32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2440 -
C:\Windows\SysWOW64\Afcghbgp.exeC:\Windows\system32\Afcghbgp.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1232 -
C:\Windows\SysWOW64\Aplkah32.exeC:\Windows\system32\Aplkah32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\Ajcldpkd.exeC:\Windows\system32\Ajcldpkd.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Windows\SysWOW64\Bclqme32.exeC:\Windows\system32\Bclqme32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2608 -
C:\Windows\SysWOW64\Bneancnc.exeC:\Windows\system32\Bneancnc.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:2432 -
C:\Windows\SysWOW64\Bhpclica.exeC:\Windows\system32\Bhpclica.exe28⤵
- Loads dropped DLL
PID:2156 -
C:\Windows\SysWOW64\Baigen32.exeC:\Windows\system32\Baigen32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:584 -
C:\Windows\SysWOW64\Bmohjooe.exeC:\Windows\system32\Bmohjooe.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128 -
C:\Windows\SysWOW64\Cmaeoo32.exeC:\Windows\system32\Cmaeoo32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2952 -
C:\Windows\SysWOW64\Ckfeic32.exeC:\Windows\system32\Ckfeic32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Cpbnaj32.exeC:\Windows\system32\Cpbnaj32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Windows\SysWOW64\Cojghf32.exeC:\Windows\system32\Cojghf32.exe34⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\Dakpiajj.exeC:\Windows\system32\Dakpiajj.exe35⤵
- Executes dropped EXE
PID:1872 -
C:\Windows\SysWOW64\Dkcebg32.exeC:\Windows\system32\Dkcebg32.exe36⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\Dglbmg32.exeC:\Windows\system32\Dglbmg32.exe37⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\Ddpbfl32.exeC:\Windows\system32\Ddpbfl32.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1836 -
C:\Windows\SysWOW64\Effhic32.exeC:\Windows\system32\Effhic32.exe39⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Egeecf32.exeC:\Windows\system32\Egeecf32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1400 -
C:\Windows\SysWOW64\Ebofcd32.exeC:\Windows\system32\Ebofcd32.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\Eocfmh32.exeC:\Windows\system32\Eocfmh32.exe42⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Eoecbheg.exeC:\Windows\system32\Eoecbheg.exe43⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\Fhngkm32.exeC:\Windows\system32\Fhngkm32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:900 -
C:\Windows\SysWOW64\Fipdqmje.exeC:\Windows\system32\Fipdqmje.exe45⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Fqkieogp.exeC:\Windows\system32\Fqkieogp.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\Fjdnne32.exeC:\Windows\system32\Fjdnne32.exe47⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\Feiaknmg.exeC:\Windows\system32\Feiaknmg.exe48⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\Fmdfppkb.exeC:\Windows\system32\Fmdfppkb.exe49⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\Fcoolj32.exeC:\Windows\system32\Fcoolj32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Fmgcepio.exeC:\Windows\system32\Fmgcepio.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:888 -
C:\Windows\SysWOW64\Gcakbjpl.exeC:\Windows\system32\Gcakbjpl.exe52⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\Gmipko32.exeC:\Windows\system32\Gmipko32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1704 -
C:\Windows\SysWOW64\Gbfhcf32.exeC:\Windows\system32\Gbfhcf32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\Gipqpplq.exeC:\Windows\system32\Gipqpplq.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3060 -
C:\Windows\SysWOW64\Gnmihgkh.exeC:\Windows\system32\Gnmihgkh.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\Glaiak32.exeC:\Windows\system32\Glaiak32.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\Geinjapb.exeC:\Windows\system32\Geinjapb.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\Gbmoceol.exeC:\Windows\system32\Gbmoceol.exe59⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\Hlecmkel.exeC:\Windows\system32\Hlecmkel.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\Hmgodc32.exeC:\Windows\system32\Hmgodc32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\Hengep32.exeC:\Windows\system32\Hengep32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\Hadhjaaa.exeC:\Windows\system32\Hadhjaaa.exe63⤵
- Executes dropped EXE
PID:2176 -
C:\Windows\SysWOW64\Hfaqbh32.exeC:\Windows\system32\Hfaqbh32.exe64⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\Hpjeknfi.exeC:\Windows\system32\Hpjeknfi.exe65⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\Hjoiiffo.exeC:\Windows\system32\Hjoiiffo.exe66⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\Hplbamdf.exeC:\Windows\system32\Hplbamdf.exe67⤵PID:2764
-
C:\Windows\SysWOW64\Heijidbn.exeC:\Windows\system32\Heijidbn.exe68⤵
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Ioaobjin.exeC:\Windows\system32\Ioaobjin.exe69⤵PID:1020
-
C:\Windows\SysWOW64\Iigcobid.exeC:\Windows\system32\Iigcobid.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1816 -
C:\Windows\SysWOW64\Iboghh32.exeC:\Windows\system32\Iboghh32.exe71⤵PID:2368
-
C:\Windows\SysWOW64\Ilhlan32.exeC:\Windows\system32\Ilhlan32.exe72⤵
- Modifies registry class
PID:1616 -
C:\Windows\SysWOW64\Idcqep32.exeC:\Windows\system32\Idcqep32.exe73⤵
- Modifies registry class
PID:3064 -
C:\Windows\SysWOW64\Ikmibjkm.exeC:\Windows\system32\Ikmibjkm.exe74⤵PID:1964
-
C:\Windows\SysWOW64\Igcjgk32.exeC:\Windows\system32\Igcjgk32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2840 -
C:\Windows\SysWOW64\Ihcfan32.exeC:\Windows\system32\Ihcfan32.exe76⤵PID:1444
-
C:\Windows\SysWOW64\Jakjjcnd.exeC:\Windows\system32\Jakjjcnd.exe77⤵PID:2856
-
C:\Windows\SysWOW64\Jghcbjll.exeC:\Windows\system32\Jghcbjll.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\Jpqgkpcl.exeC:\Windows\system32\Jpqgkpcl.exe79⤵PID:1496
-
C:\Windows\SysWOW64\Jjilde32.exeC:\Windows\system32\Jjilde32.exe80⤵PID:2352
-
C:\Windows\SysWOW64\Jfpmifoa.exeC:\Windows\system32\Jfpmifoa.exe81⤵PID:864
-
C:\Windows\SysWOW64\Johaalea.exeC:\Windows\system32\Johaalea.exe82⤵PID:2336
-
C:\Windows\SysWOW64\Jkobgm32.exeC:\Windows\system32\Jkobgm32.exe83⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\Jbijcgbc.exeC:\Windows\system32\Jbijcgbc.exe84⤵PID:1796
-
C:\Windows\SysWOW64\Kkaolm32.exeC:\Windows\system32\Kkaolm32.exe85⤵PID:1744
-
C:\Windows\SysWOW64\Kkckblgq.exeC:\Windows\system32\Kkckblgq.exe86⤵
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\Khglkqfj.exeC:\Windows\system32\Khglkqfj.exe87⤵PID:760
-
C:\Windows\SysWOW64\Kcamln32.exeC:\Windows\system32\Kcamln32.exe88⤵PID:1588
-
C:\Windows\SysWOW64\Kngaig32.exeC:\Windows\system32\Kngaig32.exe89⤵
- Drops file in System32 directory
PID:2256 -
C:\Windows\SysWOW64\Kjnanhhc.exeC:\Windows\system32\Kjnanhhc.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2848 -
C:\Windows\SysWOW64\Lgabgl32.exeC:\Windows\system32\Lgabgl32.exe91⤵PID:984
-
C:\Windows\SysWOW64\Lmnkpc32.exeC:\Windows\system32\Lmnkpc32.exe92⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Ljbkig32.exeC:\Windows\system32\Ljbkig32.exe93⤵PID:608
-
C:\Windows\SysWOW64\Lkcgapjl.exeC:\Windows\system32\Lkcgapjl.exe94⤵PID:1148
-
C:\Windows\SysWOW64\Lighjd32.exeC:\Windows\system32\Lighjd32.exe95⤵
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\Lndqbk32.exeC:\Windows\system32\Lndqbk32.exe96⤵PID:2472
-
C:\Windows\SysWOW64\Lgmekpmn.exeC:\Windows\system32\Lgmekpmn.exe97⤵PID:1680
-
C:\Windows\SysWOW64\Lbbiii32.exeC:\Windows\system32\Lbbiii32.exe98⤵PID:2264
-
C:\Windows\SysWOW64\Mljnaocd.exeC:\Windows\system32\Mljnaocd.exe99⤵PID:544
-
C:\Windows\SysWOW64\Mnijnjbh.exeC:\Windows\system32\Mnijnjbh.exe100⤵PID:1528
-
C:\Windows\SysWOW64\Mecbjd32.exeC:\Windows\system32\Mecbjd32.exe101⤵PID:2864
-
C:\Windows\SysWOW64\Mlmjgnaa.exeC:\Windows\system32\Mlmjgnaa.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2036 -
C:\Windows\SysWOW64\Mhckloge.exeC:\Windows\system32\Mhckloge.exe103⤵PID:2976
-
C:\Windows\SysWOW64\Mmpcdfem.exeC:\Windows\system32\Mmpcdfem.exe104⤵PID:2876
-
C:\Windows\SysWOW64\Npcika32.exeC:\Windows\system32\Npcika32.exe105⤵PID:1316
-
C:\Windows\SysWOW64\Nmgjee32.exeC:\Windows\system32\Nmgjee32.exe106⤵PID:1056
-
C:\Windows\SysWOW64\Nhakecld.exeC:\Windows\system32\Nhakecld.exe107⤵PID:980
-
C:\Windows\SysWOW64\Niqgof32.exeC:\Windows\system32\Niqgof32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2292 -
C:\Windows\SysWOW64\Nalldh32.exeC:\Windows\system32\Nalldh32.exe109⤵PID:2284
-
C:\Windows\SysWOW64\Nhfdqb32.exeC:\Windows\system32\Nhfdqb32.exe110⤵PID:1080
-
C:\Windows\SysWOW64\Ndmeecmb.exeC:\Windows\system32\Ndmeecmb.exe111⤵
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\Omeini32.exeC:\Windows\system32\Omeini32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2140 -
C:\Windows\SysWOW64\Odoakckp.exeC:\Windows\system32\Odoakckp.exe113⤵
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\Oacbdg32.exeC:\Windows\system32\Oacbdg32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\Omjbihpn.exeC:\Windows\system32\Omjbihpn.exe115⤵
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Ocfkaone.exeC:\Windows\system32\Ocfkaone.exe116⤵PID:940
-
C:\Windows\SysWOW64\Opjlkc32.exeC:\Windows\system32\Opjlkc32.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:1784 -
C:\Windows\SysWOW64\Ogddhmdl.exeC:\Windows\system32\Ogddhmdl.exe118⤵PID:2348
-
C:\Windows\SysWOW64\Oheppe32.exeC:\Windows\system32\Oheppe32.exe119⤵PID:1260
-
C:\Windows\SysWOW64\Panehkaj.exeC:\Windows\system32\Panehkaj.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:912 -
C:\Windows\SysWOW64\Plcied32.exeC:\Windows\system32\Plcied32.exe121⤵PID:2532
-
C:\Windows\SysWOW64\Papank32.exeC:\Windows\system32\Papank32.exe122⤵
- Drops file in System32 directory
PID:536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-