Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe
Resource
win10v2004-20241007-en
General
-
Target
c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe
-
Size
91KB
-
MD5
027804d6459231bf7741fce86ce51fca
-
SHA1
67153396fd2bbab384b558073dd04f3a35d8aa4f
-
SHA256
c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339
-
SHA512
573051354da1f863d87d2550d20773ff3dac718fd3bdd8c8ae3ce88a067e0f90ad86b1bf2339cc01336727b0a82d72d0bb1425d94362f92e1bc4d28a8bfdfc4a
-
SSDEEP
1536:9n1lAyDyJeg0qufEMGMxfnAtlLBsLnVLdGUHyNwtN4/nLLVaBlEaaaaaadhXd45s:91GyOJLHuf9fatlLBsLnVUUHyNwtN4/l
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Laogfg32.exeLaackgka.exePmiikipg.exeCapmemci.exeEcjibgdh.exeIekgod32.exeKqokgd32.exeQidckjae.exeCppakj32.exeDnfjiali.exeEbdoocdk.exec88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exeIdcqep32.exeIebmpcjc.exeOphoecoa.exeBhbpahan.exeNpnclf32.exeEjdaoa32.exeGplebjbk.exeNdmeecmb.exeMoqgiopk.exeCgobcd32.exeDefljp32.exeHjkpng32.exeLjjhdm32.exeOcceip32.exeCgaoic32.exeDhibakmb.exeEoecbheg.exeHplbamdf.exeKjhopjqi.exeOpcejd32.exeIoaobjin.exeMhkhgd32.exeNcnlnaim.exeEpipql32.exeIplnpq32.exeLmlnjcgg.exeLbbiii32.exeMdmhfpkg.exeJdogldmo.exeOomlfpdi.exeOingii32.exeMiaaki32.exeHdqhambg.exeIiipeb32.exeIgcjgk32.exeKqkalenn.exeGcchgini.exeHipmoc32.exeMejoei32.exeOnapdmma.exeEcobmg32.exeNbbegl32.exeNkdpmn32.exeNknnnoph.exeBhelghol.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laogfg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laackgka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmiikipg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Capmemci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecjibgdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iekgod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kqokgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qidckjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cppakj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnfjiali.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebdoocdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idcqep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iebmpcjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ophoecoa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhbpahan.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npnclf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejdaoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gplebjbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndmeecmb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moqgiopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgobcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Defljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjkpng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cppakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljjhdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Occeip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgaoic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhibakmb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eoecbheg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hplbamdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hplbamdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjhopjqi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opcejd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioaobjin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhkhgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncnlnaim.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epipql32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iplnpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmlnjcgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbbiii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdmhfpkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdogldmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oomlfpdi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oingii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Miaaki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdqhambg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiipeb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igcjgk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndmeecmb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ophoecoa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kqkalenn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebdoocdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcchgini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hipmoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mejoei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onapdmma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecobmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iplnpq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbbegl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkdpmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oingii32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nknnnoph.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhelghol.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Jldbgb32.exeJdogldmo.exeJdadadkl.exeKqkalenn.exeKopnma32.exeKqokgd32.exeKjhopjqi.exeKpgdnp32.exeKbeqjl32.exeLefikg32.exeLbjjekhl.exeLaogfg32.exeLaackgka.exeLjjhdm32.exeMbemho32.exeMiaaki32.exeMbjfcnkg.exeMoqgiopk.exeMejoei32.exeMoccnoni.exeMhkhgd32.exeNmhqokcq.exeNmjmekan.exeNhpabdqd.exeNknnnoph.exeNkqjdo32.exeNpnclf32.exeNcnlnaim.exeOihdjk32.exeOcceip32.exeOddbqhkf.exeOolbcaij.exeOnapdmma.exePcqebd32.exePmiikipg.exePjmjdnop.exePfcjiodd.exePolobd32.exeQidckjae.exeQkbpgeai.exeQnciiq32.exeBppdlgjk.exeBbcjca32.exeBhbpahan.exeBakdjn32.exeBhelghol.exeCmaeoo32.exeCppakj32.exeCfjihdcc.exeCapmemci.exeCkhbnb32.exeCmfnjnin.exeCpejfjha.exeCgobcd32.exeCllkkk32.exeCpgglifo.exeCgaoic32.exeChblqlcj.exeDchpnd32.exeDefljp32.exeDooqceid.exeDeiipp32.exeDoamhe32.exeDhibakmb.exepid process 1888 Jldbgb32.exe 3024 Jdogldmo.exe 3044 Jdadadkl.exe 2936 Kqkalenn.exe 2788 Kopnma32.exe 1892 Kqokgd32.exe 2040 Kjhopjqi.exe 892 Kpgdnp32.exe 2232 Kbeqjl32.exe 2396 Lefikg32.exe 3008 Lbjjekhl.exe 1264 Laogfg32.exe 2312 Laackgka.exe 2372 Ljjhdm32.exe 2080 Mbemho32.exe 676 Miaaki32.exe 2668 Mbjfcnkg.exe 1960 Moqgiopk.exe 1580 Mejoei32.exe 2264 Moccnoni.exe 2448 Mhkhgd32.exe 1112 Nmhqokcq.exe 2544 Nmjmekan.exe 2528 Nhpabdqd.exe 1504 Nknnnoph.exe 2144 Nkqjdo32.exe 1716 Npnclf32.exe 3056 Ncnlnaim.exe 2556 Oihdjk32.exe 2296 Occeip32.exe 2780 Oddbqhkf.exe 2368 Oolbcaij.exe 2516 Onapdmma.exe 264 Pcqebd32.exe 2600 Pmiikipg.exe 2344 Pjmjdnop.exe 884 Pfcjiodd.exe 1336 Polobd32.exe 1192 Qidckjae.exe 2336 Qkbpgeai.exe 2204 Qnciiq32.exe 2588 Bppdlgjk.exe 968 Bbcjca32.exe 2440 Bhbpahan.exe 1512 Bakdjn32.exe 2332 Bhelghol.exe 1304 Cmaeoo32.exe 2272 Cppakj32.exe 588 Cfjihdcc.exe 1260 Capmemci.exe 2892 Ckhbnb32.exe 2536 Cmfnjnin.exe 2016 Cpejfjha.exe 2792 Cgobcd32.exe 2884 Cllkkk32.exe 2092 Cpgglifo.exe 2500 Cgaoic32.exe 1124 Chblqlcj.exe 2392 Dchpnd32.exe 2864 Defljp32.exe 2604 Dooqceid.exe 2028 Deiipp32.exe 1840 Doamhe32.exe 584 Dhibakmb.exe -
Loads dropped DLL 64 IoCs
Processes:
c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exeJldbgb32.exeJdogldmo.exeJdadadkl.exeKqkalenn.exeKopnma32.exeKqokgd32.exeKjhopjqi.exeKpgdnp32.exeKbeqjl32.exeLefikg32.exeLbjjekhl.exeLaogfg32.exeLaackgka.exeLjjhdm32.exeMbemho32.exeMiaaki32.exeMbjfcnkg.exeMoqgiopk.exeMejoei32.exeMoccnoni.exeMhkhgd32.exeNmhqokcq.exeNmjmekan.exeNhpabdqd.exeNknnnoph.exeNkqjdo32.exeNpnclf32.exeNcnlnaim.exeOihdjk32.exeOcceip32.exeOddbqhkf.exepid process 2004 c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe 2004 c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe 1888 Jldbgb32.exe 1888 Jldbgb32.exe 3024 Jdogldmo.exe 3024 Jdogldmo.exe 3044 Jdadadkl.exe 3044 Jdadadkl.exe 2936 Kqkalenn.exe 2936 Kqkalenn.exe 2788 Kopnma32.exe 2788 Kopnma32.exe 1892 Kqokgd32.exe 1892 Kqokgd32.exe 2040 Kjhopjqi.exe 2040 Kjhopjqi.exe 892 Kpgdnp32.exe 892 Kpgdnp32.exe 2232 Kbeqjl32.exe 2232 Kbeqjl32.exe 2396 Lefikg32.exe 2396 Lefikg32.exe 3008 Lbjjekhl.exe 3008 Lbjjekhl.exe 1264 Laogfg32.exe 1264 Laogfg32.exe 2312 Laackgka.exe 2312 Laackgka.exe 2372 Ljjhdm32.exe 2372 Ljjhdm32.exe 2080 Mbemho32.exe 2080 Mbemho32.exe 676 Miaaki32.exe 676 Miaaki32.exe 2668 Mbjfcnkg.exe 2668 Mbjfcnkg.exe 1960 Moqgiopk.exe 1960 Moqgiopk.exe 1580 Mejoei32.exe 1580 Mejoei32.exe 2264 Moccnoni.exe 2264 Moccnoni.exe 2448 Mhkhgd32.exe 2448 Mhkhgd32.exe 1112 Nmhqokcq.exe 1112 Nmhqokcq.exe 2544 Nmjmekan.exe 2544 Nmjmekan.exe 2528 Nhpabdqd.exe 2528 Nhpabdqd.exe 1504 Nknnnoph.exe 1504 Nknnnoph.exe 2144 Nkqjdo32.exe 2144 Nkqjdo32.exe 1716 Npnclf32.exe 1716 Npnclf32.exe 3056 Ncnlnaim.exe 3056 Ncnlnaim.exe 2556 Oihdjk32.exe 2556 Oihdjk32.exe 2296 Occeip32.exe 2296 Occeip32.exe 2780 Oddbqhkf.exe 2780 Oddbqhkf.exe -
Drops file in System32 directory 64 IoCs
Processes:
Cgaoic32.exeDoamhe32.exeJdogldmo.exeMejoei32.exeQkbpgeai.exeEqnillbb.exeIebmpcjc.exeLqjfpbmm.exeOnapdmma.exeCfjihdcc.exeDefljp32.exeHeijidbn.exeIekgod32.exeHpjeknfi.exeHjoiiffo.exeFkambhgf.exeNebnigmp.exeNkbcgnie.exeKpgdnp32.exeNmjmekan.exeCmaeoo32.exeGbmoceol.exeMgoaap32.exeNaionh32.exeMiaaki32.exeNhpabdqd.exeGeinjapb.exeJnpoie32.exeCmfnjnin.exeEhinpnpm.exeGdnkkmej.exeHdqhambg.exeLefikg32.exeQidckjae.exeFmgcepio.exeJlghpa32.exeKfbemi32.exeKqokgd32.exeNmhqokcq.exeFeiaknmg.exeDooqceid.exeGindjqnc.exeHjkpng32.exeIplnpq32.exeKjhopjqi.exePcqebd32.exePmiikipg.exeMhkhgd32.exeIkmibjkm.exeMeeopdhb.exeNlmffa32.exeNkdpmn32.exeLoocanbe.exeMmcpjfcj.exeNdmeecmb.exeOkfmbm32.exeOomlfpdi.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Chblqlcj.exe Cgaoic32.exe File opened for modification C:\Windows\SysWOW64\Dhibakmb.exe Doamhe32.exe File created C:\Windows\SysWOW64\Jdadadkl.exe Jdogldmo.exe File created C:\Windows\SysWOW64\Moccnoni.exe Mejoei32.exe File created C:\Windows\SysWOW64\Qnciiq32.exe Qkbpgeai.exe File created C:\Windows\SysWOW64\Ehinpnpm.exe Eqnillbb.exe File created C:\Windows\SysWOW64\Ondomh32.dll Iebmpcjc.exe File created C:\Windows\SysWOW64\Loocanbe.exe Lqjfpbmm.exe File created C:\Windows\SysWOW64\Idkbii32.dll Onapdmma.exe File opened for modification C:\Windows\SysWOW64\Capmemci.exe Cfjihdcc.exe File created C:\Windows\SysWOW64\Ngmcpn32.dll Defljp32.exe File created C:\Windows\SysWOW64\Qkgjae32.dll Heijidbn.exe File opened for modification C:\Windows\SysWOW64\Iabhdefo.exe Iekgod32.exe File created C:\Windows\SysWOW64\Capmemci.exe Cfjihdcc.exe File created C:\Windows\SysWOW64\Hjoiiffo.exe Hpjeknfi.exe File created C:\Windows\SysWOW64\Hplbamdf.exe Hjoiiffo.exe File created C:\Windows\SysWOW64\Feiaknmg.exe Fkambhgf.exe File created C:\Windows\SysWOW64\Nlmffa32.exe Nebnigmp.exe File created C:\Windows\SysWOW64\Dmlibo32.dll Nkbcgnie.exe File created C:\Windows\SysWOW64\Kbeqjl32.exe Kpgdnp32.exe File opened for modification C:\Windows\SysWOW64\Nhpabdqd.exe Nmjmekan.exe File created C:\Windows\SysWOW64\Mbiamkii.dll Cmaeoo32.exe File opened for modification C:\Windows\SysWOW64\Gdnkkmej.exe Gbmoceol.exe File created C:\Windows\SysWOW64\Mcfbfaao.exe Mgoaap32.exe File created C:\Windows\SysWOW64\Gnfmhdpb.dll Mgoaap32.exe File created C:\Windows\SysWOW64\Nkbcgnie.exe Naionh32.exe File created C:\Windows\SysWOW64\Naflocji.dll Miaaki32.exe File created C:\Windows\SysWOW64\Nknnnoph.exe Nhpabdqd.exe File opened for modification C:\Windows\SysWOW64\Ghgjflof.exe Geinjapb.exe File opened for modification C:\Windows\SysWOW64\Jghcbjll.exe Jnpoie32.exe File created C:\Windows\SysWOW64\Aempha32.dll Cmfnjnin.exe File created C:\Windows\SysWOW64\Ecobmg32.exe Ehinpnpm.exe File created C:\Windows\SysWOW64\Igcjgk32.exe Iebmpcjc.exe File created C:\Windows\SysWOW64\Hndoifdp.exe Gdnkkmej.exe File opened for modification C:\Windows\SysWOW64\Hjkpng32.exe Hdqhambg.exe File created C:\Windows\SysWOW64\Lbjjekhl.exe Lefikg32.exe File opened for modification C:\Windows\SysWOW64\Lbjjekhl.exe Lefikg32.exe File created C:\Windows\SysWOW64\Qkbpgeai.exe Qidckjae.exe File created C:\Windows\SysWOW64\Gfogneop.exe Fmgcepio.exe File created C:\Windows\SysWOW64\Jofdll32.exe Jlghpa32.exe File created C:\Windows\SysWOW64\Cblmfa32.dll Kfbemi32.exe File created C:\Windows\SysWOW64\Depfiffk.dll Kqokgd32.exe File created C:\Windows\SysWOW64\Nmjmekan.exe Nmhqokcq.exe File created C:\Windows\SysWOW64\Ffkncf32.exe Feiaknmg.exe File created C:\Windows\SysWOW64\Deiipp32.exe Dooqceid.exe File created C:\Windows\SysWOW64\Phkfglid.dll Gindjqnc.exe File created C:\Windows\SysWOW64\Pbcdpd32.dll Hjkpng32.exe File created C:\Windows\SysWOW64\Jnpoie32.exe Iplnpq32.exe File created C:\Windows\SysWOW64\Mdpnaccc.dll Kjhopjqi.exe File created C:\Windows\SysWOW64\Pmiikipg.exe Pcqebd32.exe File created C:\Windows\SysWOW64\Ammgib32.dll Pmiikipg.exe File opened for modification C:\Windows\SysWOW64\Jdadadkl.exe Jdogldmo.exe File created C:\Windows\SysWOW64\Nmhqokcq.exe Mhkhgd32.exe File created C:\Windows\SysWOW64\Jhdpfo32.dll Ikmibjkm.exe File created C:\Windows\SysWOW64\Ajbnaedb.dll Meeopdhb.exe File opened for modification C:\Windows\SysWOW64\Naionh32.exe Nlmffa32.exe File opened for modification C:\Windows\SysWOW64\Nanhihno.exe Nkdpmn32.exe File opened for modification C:\Windows\SysWOW64\Kpgdnp32.exe Kjhopjqi.exe File opened for modification C:\Windows\SysWOW64\Nmjmekan.exe Nmhqokcq.exe File created C:\Windows\SysWOW64\Lkfdfo32.exe Loocanbe.exe File created C:\Windows\SysWOW64\Gaejddnk.dll Mmcpjfcj.exe File opened for modification C:\Windows\SysWOW64\Okfmbm32.exe Ndmeecmb.exe File created C:\Windows\SysWOW64\Oobiclmh.exe Okfmbm32.exe File created C:\Windows\SysWOW64\Oheppe32.exe Oomlfpdi.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2808 1932 WerFault.exe Ockdmn32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Polobd32.exeMmcpjfcj.exeGbmoceol.exeMdmhfpkg.exeNkbcgnie.exeKqokgd32.exeNkqjdo32.exeOddbqhkf.exeCpgglifo.exeDnfjiali.exeFkambhgf.exeLoocanbe.exeNkdpmn32.exeNknnnoph.exeBbcjca32.exeCfjihdcc.exeCgobcd32.exeCpejfjha.exeDdpbfl32.exeHjoiiffo.exeLqjfpbmm.exeKdjceb32.exeLmlnjcgg.exeLkfdfo32.exeMmpcdfem.exeGdnkkmej.exeJlghpa32.exeNepach32.exeKbeqjl32.exeNmjmekan.exeEgchmfnd.exeGnmihgkh.exeFfkncf32.exeFqpbpo32.exeKngaig32.exeLbjjekhl.exeNmhqokcq.exeCmaeoo32.exeCppakj32.exeOhjmlaci.exeOphoecoa.exeBhelghol.exeCapmemci.exeLbbiii32.exeNdmeecmb.exeOobiclmh.exeLjjhdm32.exeBhbpahan.exeGfogneop.exeGipqpplq.exeNpnclf32.exeNcnlnaim.exePfcjiodd.exeLenioenj.exeMfkebkjk.exeKpgdnp32.exeHdcdfmqe.exeHipmoc32.exeIdcqep32.exeDeiipp32.exeJghcbjll.exeNebnigmp.exeNlmffa32.exeMejoei32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Polobd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmcpjfcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbmoceol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdmhfpkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkbcgnie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqokgd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkqjdo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oddbqhkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpgglifo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnfjiali.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkambhgf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loocanbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkdpmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nknnnoph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbcjca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfjihdcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgobcd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpejfjha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddpbfl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjoiiffo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lqjfpbmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdjceb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmlnjcgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkfdfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmpcdfem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gdnkkmej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlghpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nepach32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbeqjl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmjmekan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Egchmfnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnmihgkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffkncf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fqpbpo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kngaig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjjekhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmhqokcq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmaeoo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cppakj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohjmlaci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ophoecoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhelghol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Capmemci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbbiii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndmeecmb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oobiclmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljjhdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhbpahan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfogneop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gipqpplq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npnclf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncnlnaim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfcjiodd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lenioenj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfkebkjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpgdnp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdcdfmqe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hipmoc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idcqep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deiipp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jghcbjll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nebnigmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlmffa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mejoei32.exe -
Modifies registry class 64 IoCs
Processes:
Jgmlmj32.exeNepach32.exeNanhihno.exeQnciiq32.exeGegaeabe.exeMlmjgnaa.exeOphoecoa.exeNpnclf32.exeQidckjae.exeOkfmbm32.exeNknnnoph.exePfcjiodd.exeDhibakmb.exeEoecbheg.exeFqpbpo32.exeCllkkk32.exePmiikipg.exeBbcjca32.exeChblqlcj.exeNaionh32.exeNkbcgnie.exeOdanqb32.exeJldbgb32.exeMbjfcnkg.exeNkqjdo32.exeEjdaoa32.exeKqkalenn.exeHjoiiffo.exeNpffaq32.exeKpgdnp32.exeCpejfjha.exeHdcdfmqe.exeNlmffa32.exeJdogldmo.exeNbbegl32.exeHjkpng32.exeJghcbjll.exeLkfdfo32.exeCgobcd32.exeHndoifdp.exeIebmpcjc.exeJofdll32.exeKfbemi32.exeKopnma32.exeEcjibgdh.exeIgcjgk32.exeMoccnoni.exeOihdjk32.exePolobd32.exeIdcqep32.exeMcfbfaao.exeMoqgiopk.exeCmfnjnin.exeDkmghe32.exeEcobmg32.exeGnmihgkh.exeIplnpq32.exeIabhdefo.exeLgabgl32.exeNhfdqb32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgmlmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nepach32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fchpmeni.dll" Nanhihno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qnciiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjjheeoc.dll" Gegaeabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eqlhflgh.dll" Mlmjgnaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmefoa32.dll" Ophoecoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npnclf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qidckjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okfmbm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nknnnoph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkofpm32.dll" Pfcjiodd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igchjiao.dll" Dhibakmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eoecbheg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fqpbpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jomadboo.dll" Cllkkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ammgib32.dll" Pmiikipg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpinbk32.dll" Bbcjca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chblqlcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Naionh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmlibo32.dll" Nkbcgnie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Odanqb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jldbgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgbjkg32.dll" Mbjfcnkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkqjdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbfajl32.dll" Ejdaoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcihik32.dll" Odanqb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kqkalenn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjoiiffo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npffaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpgdnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpejfjha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gegaeabe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdcdfmqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlmffa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Neccdc32.dll" Jdogldmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbbegl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjkpng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jghcbjll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cllkkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icipkhcj.dll" Lkfdfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kiohpojo.dll" Cgobcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajodjfdi.dll" Hndoifdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iebmpcjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jofdll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfbemi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Picadgfk.dll" Kopnma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecjibgdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Igcjgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Moccnoni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oihdjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Polobd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihhpdnkl.dll" Idcqep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkplgm32.dll" Mcfbfaao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Moqgiopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmfnjnin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkmghe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecobmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gnmihgkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iplnpq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iabhdefo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgabgl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlmjgnaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhfdqb32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exeJldbgb32.exeJdogldmo.exeJdadadkl.exeKqkalenn.exeKopnma32.exeKqokgd32.exeKjhopjqi.exeKpgdnp32.exeKbeqjl32.exeLefikg32.exeLbjjekhl.exeLaogfg32.exeLaackgka.exeLjjhdm32.exeMbemho32.exedescription pid process target process PID 2004 wrote to memory of 1888 2004 c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe Jldbgb32.exe PID 2004 wrote to memory of 1888 2004 c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe Jldbgb32.exe PID 2004 wrote to memory of 1888 2004 c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe Jldbgb32.exe PID 2004 wrote to memory of 1888 2004 c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe Jldbgb32.exe PID 1888 wrote to memory of 3024 1888 Jldbgb32.exe Jdogldmo.exe PID 1888 wrote to memory of 3024 1888 Jldbgb32.exe Jdogldmo.exe PID 1888 wrote to memory of 3024 1888 Jldbgb32.exe Jdogldmo.exe PID 1888 wrote to memory of 3024 1888 Jldbgb32.exe Jdogldmo.exe PID 3024 wrote to memory of 3044 3024 Jdogldmo.exe Jdadadkl.exe PID 3024 wrote to memory of 3044 3024 Jdogldmo.exe Jdadadkl.exe PID 3024 wrote to memory of 3044 3024 Jdogldmo.exe Jdadadkl.exe PID 3024 wrote to memory of 3044 3024 Jdogldmo.exe Jdadadkl.exe PID 3044 wrote to memory of 2936 3044 Jdadadkl.exe Kqkalenn.exe PID 3044 wrote to memory of 2936 3044 Jdadadkl.exe Kqkalenn.exe PID 3044 wrote to memory of 2936 3044 Jdadadkl.exe Kqkalenn.exe PID 3044 wrote to memory of 2936 3044 Jdadadkl.exe Kqkalenn.exe PID 2936 wrote to memory of 2788 2936 Kqkalenn.exe Kopnma32.exe PID 2936 wrote to memory of 2788 2936 Kqkalenn.exe Kopnma32.exe PID 2936 wrote to memory of 2788 2936 Kqkalenn.exe Kopnma32.exe PID 2936 wrote to memory of 2788 2936 Kqkalenn.exe Kopnma32.exe PID 2788 wrote to memory of 1892 2788 Kopnma32.exe Kqokgd32.exe PID 2788 wrote to memory of 1892 2788 Kopnma32.exe Kqokgd32.exe PID 2788 wrote to memory of 1892 2788 Kopnma32.exe Kqokgd32.exe PID 2788 wrote to memory of 1892 2788 Kopnma32.exe Kqokgd32.exe PID 1892 wrote to memory of 2040 1892 Kqokgd32.exe Kjhopjqi.exe PID 1892 wrote to memory of 2040 1892 Kqokgd32.exe Kjhopjqi.exe PID 1892 wrote to memory of 2040 1892 Kqokgd32.exe Kjhopjqi.exe PID 1892 wrote to memory of 2040 1892 Kqokgd32.exe Kjhopjqi.exe PID 2040 wrote to memory of 892 2040 Kjhopjqi.exe Kpgdnp32.exe PID 2040 wrote to memory of 892 2040 Kjhopjqi.exe Kpgdnp32.exe PID 2040 wrote to memory of 892 2040 Kjhopjqi.exe Kpgdnp32.exe PID 2040 wrote to memory of 892 2040 Kjhopjqi.exe Kpgdnp32.exe PID 892 wrote to memory of 2232 892 Kpgdnp32.exe Kbeqjl32.exe PID 892 wrote to memory of 2232 892 Kpgdnp32.exe Kbeqjl32.exe PID 892 wrote to memory of 2232 892 Kpgdnp32.exe Kbeqjl32.exe PID 892 wrote to memory of 2232 892 Kpgdnp32.exe Kbeqjl32.exe PID 2232 wrote to memory of 2396 2232 Kbeqjl32.exe Lefikg32.exe PID 2232 wrote to memory of 2396 2232 Kbeqjl32.exe Lefikg32.exe PID 2232 wrote to memory of 2396 2232 Kbeqjl32.exe Lefikg32.exe PID 2232 wrote to memory of 2396 2232 Kbeqjl32.exe Lefikg32.exe PID 2396 wrote to memory of 3008 2396 Lefikg32.exe Lbjjekhl.exe PID 2396 wrote to memory of 3008 2396 Lefikg32.exe Lbjjekhl.exe PID 2396 wrote to memory of 3008 2396 Lefikg32.exe Lbjjekhl.exe PID 2396 wrote to memory of 3008 2396 Lefikg32.exe Lbjjekhl.exe PID 3008 wrote to memory of 1264 3008 Lbjjekhl.exe Laogfg32.exe PID 3008 wrote to memory of 1264 3008 Lbjjekhl.exe Laogfg32.exe PID 3008 wrote to memory of 1264 3008 Lbjjekhl.exe Laogfg32.exe PID 3008 wrote to memory of 1264 3008 Lbjjekhl.exe Laogfg32.exe PID 1264 wrote to memory of 2312 1264 Laogfg32.exe Laackgka.exe PID 1264 wrote to memory of 2312 1264 Laogfg32.exe Laackgka.exe PID 1264 wrote to memory of 2312 1264 Laogfg32.exe Laackgka.exe PID 1264 wrote to memory of 2312 1264 Laogfg32.exe Laackgka.exe PID 2312 wrote to memory of 2372 2312 Laackgka.exe Ljjhdm32.exe PID 2312 wrote to memory of 2372 2312 Laackgka.exe Ljjhdm32.exe PID 2312 wrote to memory of 2372 2312 Laackgka.exe Ljjhdm32.exe PID 2312 wrote to memory of 2372 2312 Laackgka.exe Ljjhdm32.exe PID 2372 wrote to memory of 2080 2372 Ljjhdm32.exe Mbemho32.exe PID 2372 wrote to memory of 2080 2372 Ljjhdm32.exe Mbemho32.exe PID 2372 wrote to memory of 2080 2372 Ljjhdm32.exe Mbemho32.exe PID 2372 wrote to memory of 2080 2372 Ljjhdm32.exe Mbemho32.exe PID 2080 wrote to memory of 676 2080 Mbemho32.exe Miaaki32.exe PID 2080 wrote to memory of 676 2080 Mbemho32.exe Miaaki32.exe PID 2080 wrote to memory of 676 2080 Mbemho32.exe Miaaki32.exe PID 2080 wrote to memory of 676 2080 Mbemho32.exe Miaaki32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe"C:\Users\Admin\AppData\Local\Temp\c88c01689dca5cb8c8e0b5e2142733f0a7addeeaf725be44a33c3feb687e3339.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\Jldbgb32.exeC:\Windows\system32\Jldbgb32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Jdogldmo.exeC:\Windows\system32\Jdogldmo.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Jdadadkl.exeC:\Windows\system32\Jdadadkl.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Kqkalenn.exeC:\Windows\system32\Kqkalenn.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Kopnma32.exeC:\Windows\system32\Kopnma32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Kqokgd32.exeC:\Windows\system32\Kqokgd32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\Kjhopjqi.exeC:\Windows\system32\Kjhopjqi.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\Kpgdnp32.exeC:\Windows\system32\Kpgdnp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\Kbeqjl32.exeC:\Windows\system32\Kbeqjl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Lefikg32.exeC:\Windows\system32\Lefikg32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\Lbjjekhl.exeC:\Windows\system32\Lbjjekhl.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Laogfg32.exeC:\Windows\system32\Laogfg32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\Laackgka.exeC:\Windows\system32\Laackgka.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\Ljjhdm32.exeC:\Windows\system32\Ljjhdm32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\Mbemho32.exeC:\Windows\system32\Mbemho32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Miaaki32.exeC:\Windows\system32\Miaaki32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:676 -
C:\Windows\SysWOW64\Mbjfcnkg.exeC:\Windows\system32\Mbjfcnkg.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2668 -
C:\Windows\SysWOW64\Moqgiopk.exeC:\Windows\system32\Moqgiopk.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\Mejoei32.exeC:\Windows\system32\Mejoei32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\Moccnoni.exeC:\Windows\system32\Moccnoni.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2264 -
C:\Windows\SysWOW64\Mhkhgd32.exeC:\Windows\system32\Mhkhgd32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\Nmhqokcq.exeC:\Windows\system32\Nmhqokcq.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1112 -
C:\Windows\SysWOW64\Nmjmekan.exeC:\Windows\system32\Nmjmekan.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\Nhpabdqd.exeC:\Windows\system32\Nhpabdqd.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\Nknnnoph.exeC:\Windows\system32\Nknnnoph.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1504 -
C:\Windows\SysWOW64\Nkqjdo32.exeC:\Windows\system32\Nkqjdo32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\Npnclf32.exeC:\Windows\system32\Npnclf32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1716 -
C:\Windows\SysWOW64\Ncnlnaim.exeC:\Windows\system32\Ncnlnaim.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\Oihdjk32.exeC:\Windows\system32\Oihdjk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2556 -
C:\Windows\SysWOW64\Occeip32.exeC:\Windows\system32\Occeip32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2296 -
C:\Windows\SysWOW64\Oddbqhkf.exeC:\Windows\system32\Oddbqhkf.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\Oolbcaij.exeC:\Windows\system32\Oolbcaij.exe33⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Onapdmma.exeC:\Windows\system32\Onapdmma.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\Pcqebd32.exeC:\Windows\system32\Pcqebd32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:264 -
C:\Windows\SysWOW64\Pmiikipg.exeC:\Windows\system32\Pmiikipg.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2600 -
C:\Windows\SysWOW64\Pjmjdnop.exeC:\Windows\system32\Pjmjdnop.exe37⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\Pfcjiodd.exeC:\Windows\system32\Pfcjiodd.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:884 -
C:\Windows\SysWOW64\Polobd32.exeC:\Windows\system32\Polobd32.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1336 -
C:\Windows\SysWOW64\Qidckjae.exeC:\Windows\system32\Qidckjae.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1192 -
C:\Windows\SysWOW64\Qkbpgeai.exeC:\Windows\system32\Qkbpgeai.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\Qnciiq32.exeC:\Windows\system32\Qnciiq32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:2204 -
C:\Windows\SysWOW64\Bppdlgjk.exeC:\Windows\system32\Bppdlgjk.exe43⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Bbcjca32.exeC:\Windows\system32\Bbcjca32.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:968 -
C:\Windows\SysWOW64\Bhbpahan.exeC:\Windows\system32\Bhbpahan.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\Bakdjn32.exeC:\Windows\system32\Bakdjn32.exe46⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\Bhelghol.exeC:\Windows\system32\Bhelghol.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\Cmaeoo32.exeC:\Windows\system32\Cmaeoo32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1304 -
C:\Windows\SysWOW64\Cppakj32.exeC:\Windows\system32\Cppakj32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\Cfjihdcc.exeC:\Windows\system32\Cfjihdcc.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:588 -
C:\Windows\SysWOW64\Capmemci.exeC:\Windows\system32\Capmemci.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1260 -
C:\Windows\SysWOW64\Ckhbnb32.exeC:\Windows\system32\Ckhbnb32.exe52⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\Cmfnjnin.exeC:\Windows\system32\Cmfnjnin.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Cpejfjha.exeC:\Windows\system32\Cpejfjha.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Cgobcd32.exeC:\Windows\system32\Cgobcd32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\Cllkkk32.exeC:\Windows\system32\Cllkkk32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Cpgglifo.exeC:\Windows\system32\Cpgglifo.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\Cgaoic32.exeC:\Windows\system32\Cgaoic32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2500 -
C:\Windows\SysWOW64\Chblqlcj.exeC:\Windows\system32\Chblqlcj.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:1124 -
C:\Windows\SysWOW64\Dchpnd32.exeC:\Windows\system32\Dchpnd32.exe60⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\Defljp32.exeC:\Windows\system32\Defljp32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\Dooqceid.exeC:\Windows\system32\Dooqceid.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\Deiipp32.exeC:\Windows\system32\Deiipp32.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\Doamhe32.exeC:\Windows\system32\Doamhe32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1840 -
C:\Windows\SysWOW64\Dhibakmb.exeC:\Windows\system32\Dhibakmb.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:584 -
C:\Windows\SysWOW64\Dnfjiali.exeC:\Windows\system32\Dnfjiali.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\Ddpbfl32.exeC:\Windows\system32\Ddpbfl32.exe67⤵
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\Djmknb32.exeC:\Windows\system32\Djmknb32.exe68⤵PID:1676
-
C:\Windows\SysWOW64\Dkmghe32.exeC:\Windows\system32\Dkmghe32.exe69⤵
- Modifies registry class
PID:1760 -
C:\Windows\SysWOW64\Epipql32.exeC:\Windows\system32\Epipql32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:768 -
C:\Windows\SysWOW64\Egchmfnd.exeC:\Windows\system32\Egchmfnd.exe71⤵
- System Location Discovery: System Language Discovery
PID:1228 -
C:\Windows\SysWOW64\Elpqemll.exeC:\Windows\system32\Elpqemll.exe72⤵PID:2140
-
C:\Windows\SysWOW64\Ecjibgdh.exeC:\Windows\system32\Ecjibgdh.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Ejdaoa32.exeC:\Windows\system32\Ejdaoa32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2784 -
C:\Windows\SysWOW64\Eqnillbb.exeC:\Windows\system32\Eqnillbb.exe75⤵
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Ehinpnpm.exeC:\Windows\system32\Ehinpnpm.exe76⤵
- Drops file in System32 directory
PID:2984 -
C:\Windows\SysWOW64\Ecobmg32.exeC:\Windows\system32\Ecobmg32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1904 -
C:\Windows\SysWOW64\Eoecbheg.exeC:\Windows\system32\Eoecbheg.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\Ebdoocdk.exeC:\Windows\system32\Ebdoocdk.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:952 -
C:\Windows\SysWOW64\Fkldgi32.exeC:\Windows\system32\Fkldgi32.exe80⤵PID:1012
-
C:\Windows\SysWOW64\Fipdqmje.exeC:\Windows\system32\Fipdqmje.exe81⤵PID:2340
-
C:\Windows\SysWOW64\Fbiijb32.exeC:\Windows\system32\Fbiijb32.exe82⤵PID:2108
-
C:\Windows\SysWOW64\Fkambhgf.exeC:\Windows\system32\Fkambhgf.exe83⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\Feiaknmg.exeC:\Windows\system32\Feiaknmg.exe84⤵
- Drops file in System32 directory
PID:1560 -
C:\Windows\SysWOW64\Ffkncf32.exeC:\Windows\system32\Ffkncf32.exe85⤵
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\Fqpbpo32.exeC:\Windows\system32\Fqpbpo32.exe86⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Fmgcepio.exeC:\Windows\system32\Fmgcepio.exe87⤵
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\Gfogneop.exeC:\Windows\system32\Gfogneop.exe88⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\Gindjqnc.exeC:\Windows\system32\Gindjqnc.exe89⤵
- Drops file in System32 directory
PID:2136 -
C:\Windows\SysWOW64\Gcchgini.exeC:\Windows\system32\Gcchgini.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2816 -
C:\Windows\SysWOW64\Gipqpplq.exeC:\Windows\system32\Gipqpplq.exe91⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\Gnmihgkh.exeC:\Windows\system32\Gnmihgkh.exe92⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2268 -
C:\Windows\SysWOW64\Gegaeabe.exeC:\Windows\system32\Gegaeabe.exe93⤵
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Gplebjbk.exeC:\Windows\system32\Gplebjbk.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:940 -
C:\Windows\SysWOW64\Geinjapb.exeC:\Windows\system32\Geinjapb.exe95⤵
- Drops file in System32 directory
PID:1312 -
C:\Windows\SysWOW64\Ghgjflof.exeC:\Windows\system32\Ghgjflof.exe96⤵PID:524
-
C:\Windows\SysWOW64\Gbmoceol.exeC:\Windows\system32\Gbmoceol.exe97⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\Gdnkkmej.exeC:\Windows\system32\Gdnkkmej.exe98⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\Hndoifdp.exeC:\Windows\system32\Hndoifdp.exe99⤵
- Modifies registry class
PID:2100 -
C:\Windows\SysWOW64\Hdqhambg.exeC:\Windows\system32\Hdqhambg.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1220 -
C:\Windows\SysWOW64\Hjkpng32.exeC:\Windows\system32\Hjkpng32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1640 -
C:\Windows\SysWOW64\Hdcdfmqe.exeC:\Windows\system32\Hdcdfmqe.exe102⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Hipmoc32.exeC:\Windows\system32\Hipmoc32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\Hpjeknfi.exeC:\Windows\system32\Hpjeknfi.exe104⤵
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Hjoiiffo.exeC:\Windows\system32\Hjoiiffo.exe105⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2228 -
C:\Windows\SysWOW64\Hplbamdf.exeC:\Windows\system32\Hplbamdf.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1664 -
C:\Windows\SysWOW64\Heijidbn.exeC:\Windows\system32\Heijidbn.exe107⤵
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\Ioaobjin.exeC:\Windows\system32\Ioaobjin.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:836 -
C:\Windows\SysWOW64\Iekgod32.exeC:\Windows\system32\Iekgod32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:472 -
C:\Windows\SysWOW64\Iabhdefo.exeC:\Windows\system32\Iabhdefo.exe110⤵
- Modifies registry class
PID:1712 -
C:\Windows\SysWOW64\Iiipeb32.exeC:\Windows\system32\Iiipeb32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1020 -
C:\Windows\SysWOW64\Idcqep32.exeC:\Windows\system32\Idcqep32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1564 -
C:\Windows\SysWOW64\Ikmibjkm.exeC:\Windows\system32\Ikmibjkm.exe113⤵
- Drops file in System32 directory
PID:2720 -
C:\Windows\SysWOW64\Iebmpcjc.exeC:\Windows\system32\Iebmpcjc.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\Igcjgk32.exeC:\Windows\system32\Igcjgk32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1600 -
C:\Windows\SysWOW64\Iplnpq32.exeC:\Windows\system32\Iplnpq32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\Jnpoie32.exeC:\Windows\system32\Jnpoie32.exe117⤵
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\Jghcbjll.exeC:\Windows\system32\Jghcbjll.exe118⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2552 -
C:\Windows\SysWOW64\Jlekja32.exeC:\Windows\system32\Jlekja32.exe119⤵PID:972
-
C:\Windows\SysWOW64\Jlghpa32.exeC:\Windows\system32\Jlghpa32.exe120⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\Jofdll32.exeC:\Windows\system32\Jofdll32.exe121⤵
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Jgmlmj32.exeC:\Windows\system32\Jgmlmj32.exe122⤵
- Modifies registry class
PID:1576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-