Analysis
-
max time kernel
4s -
max time network
49s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13/05/2021, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe
-
Size
425KB
-
MD5
b867e9a0a1f0125b4968d066d9073893
-
SHA1
209397872f904f5728390d53c493b4047bc9c420
-
SHA256
b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab
-
SHA512
66a99ef3541ed7a5e07c18bede0bcce2ffa2711d48d5f52068f51bc01c4f707bdea10a9edcb7d6b019695630af3103ba567f9919c03d97ef820a14fc2aa992d3
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 1780 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe 1720 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe 1280 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe 616 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe 1852 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe 768 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe 748 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe 1016 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe 1136 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe 1988 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe 2012 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe 1112 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe 964 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe 1564 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe 1812 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe 552 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exe 684 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exe 1032 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exe 1320 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exe 1820 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exe 1804 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exe 888 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exe 948 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exe 952 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exe 664 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exe 1780 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202y.exe -
resource yara_rule behavioral1/files/0x00040000000130c3-59.dat upx behavioral1/files/0x00040000000130c3-60.dat upx behavioral1/files/0x00040000000130c3-62.dat upx behavioral1/files/0x00040000000130c3-63.dat upx behavioral1/files/0x00040000000130c4-64.dat upx behavioral1/files/0x00040000000130c4-67.dat upx behavioral1/files/0x00040000000130c4-65.dat upx behavioral1/files/0x00040000000130c4-68.dat upx behavioral1/files/0x00050000000130c7-69.dat upx behavioral1/files/0x00050000000130c7-72.dat upx behavioral1/files/0x00050000000130c7-70.dat upx behavioral1/files/0x00050000000130c7-73.dat upx behavioral1/files/0x00030000000130c8-74.dat upx behavioral1/files/0x00030000000130c8-75.dat upx behavioral1/files/0x00030000000130c8-77.dat upx behavioral1/files/0x00030000000130c8-78.dat upx behavioral1/files/0x00030000000130c9-79.dat upx behavioral1/files/0x00030000000130c9-80.dat upx behavioral1/files/0x00030000000130c9-82.dat upx behavioral1/files/0x00030000000130c9-83.dat upx behavioral1/files/0x00030000000130ca-84.dat upx behavioral1/files/0x00030000000130ca-85.dat upx behavioral1/files/0x00030000000130ca-87.dat upx behavioral1/files/0x00030000000130ca-88.dat upx behavioral1/files/0x00030000000130cb-90.dat upx behavioral1/files/0x00030000000130cb-92.dat upx behavioral1/files/0x00030000000130cb-89.dat upx behavioral1/files/0x00030000000130cb-93.dat upx behavioral1/files/0x00030000000130cc-97.dat upx behavioral1/files/0x00030000000130cc-95.dat upx behavioral1/files/0x00030000000130cc-94.dat upx behavioral1/files/0x00030000000130cc-98.dat upx behavioral1/files/0x00030000000130cd-99.dat upx behavioral1/files/0x00030000000130cd-100.dat upx behavioral1/files/0x00030000000130cd-102.dat upx behavioral1/files/0x00030000000130ce-104.dat upx behavioral1/files/0x00030000000130ce-105.dat upx behavioral1/files/0x00030000000130cd-103.dat upx behavioral1/files/0x00030000000130ce-107.dat upx behavioral1/files/0x00030000000130ce-108.dat upx behavioral1/files/0x00030000000130d0-109.dat upx behavioral1/files/0x00030000000130d0-110.dat upx behavioral1/files/0x00030000000130d0-112.dat upx behavioral1/files/0x00030000000130d0-113.dat upx behavioral1/files/0x00030000000130d1-114.dat upx behavioral1/files/0x00030000000130d1-115.dat upx behavioral1/files/0x00030000000130d1-117.dat upx behavioral1/files/0x00030000000130d1-118.dat upx behavioral1/files/0x00030000000130d2-119.dat upx behavioral1/files/0x00030000000130d2-120.dat upx behavioral1/files/0x00030000000130d2-123.dat upx behavioral1/files/0x00030000000130d2-122.dat upx behavioral1/files/0x00030000000130d3-124.dat upx behavioral1/files/0x00030000000130d3-125.dat upx behavioral1/files/0x00030000000130d3-127.dat upx behavioral1/files/0x00030000000130d3-128.dat upx behavioral1/files/0x00030000000130d4-129.dat upx behavioral1/files/0x00030000000130d4-130.dat upx behavioral1/files/0x00030000000130d4-132.dat upx behavioral1/files/0x00030000000130d4-133.dat upx behavioral1/files/0x00030000000130d5-135.dat upx behavioral1/files/0x00030000000130d5-134.dat upx behavioral1/files/0x00030000000130d5-137.dat upx behavioral1/files/0x00030000000130d5-138.dat upx -
Loads dropped DLL 52 IoCs
pid Process 664 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe 664 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe 1780 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe 1780 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe 1720 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe 1720 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe 1280 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe 1280 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe 616 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe 616 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe 1852 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe 1852 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe 768 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe 768 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe 748 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe 748 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe 1016 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe 1016 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe 1136 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe 1136 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe 1988 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe 1988 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe 2012 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe 2012 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe 1112 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe 1112 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe 964 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe 964 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe 1564 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe 1564 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe 1812 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe 1812 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe 552 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exe 552 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exe 684 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exe 684 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exe 1032 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exe 1032 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exe 1320 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exe 1320 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exe 1820 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exe 1820 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exe 1804 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exe 1804 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exe 888 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exe 888 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exe 948 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exe 948 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exe 952 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exe 952 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exe 664 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exe 664 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202y.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exe\"" b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exe -
Modifies registry class 54 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 9391842b0fe86885 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 664 wrote to memory of 1780 664 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe 28 PID 664 wrote to memory of 1780 664 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe 28 PID 664 wrote to memory of 1780 664 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe 28 PID 664 wrote to memory of 1780 664 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe 28 PID 1780 wrote to memory of 1720 1780 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe 29 PID 1780 wrote to memory of 1720 1780 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe 29 PID 1780 wrote to memory of 1720 1780 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe 29 PID 1780 wrote to memory of 1720 1780 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe 29 PID 1720 wrote to memory of 1280 1720 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe 31 PID 1720 wrote to memory of 1280 1720 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe 31 PID 1720 wrote to memory of 1280 1720 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe 31 PID 1720 wrote to memory of 1280 1720 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe 31 PID 1280 wrote to memory of 616 1280 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe 32 PID 1280 wrote to memory of 616 1280 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe 32 PID 1280 wrote to memory of 616 1280 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe 32 PID 1280 wrote to memory of 616 1280 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe 32 PID 616 wrote to memory of 1852 616 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe 33 PID 616 wrote to memory of 1852 616 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe 33 PID 616 wrote to memory of 1852 616 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe 33 PID 616 wrote to memory of 1852 616 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe 33 PID 1852 wrote to memory of 768 1852 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe 34 PID 1852 wrote to memory of 768 1852 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe 34 PID 1852 wrote to memory of 768 1852 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe 34 PID 1852 wrote to memory of 768 1852 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe 34 PID 768 wrote to memory of 748 768 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe 35 PID 768 wrote to memory of 748 768 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe 35 PID 768 wrote to memory of 748 768 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe 35 PID 768 wrote to memory of 748 768 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe 35 PID 748 wrote to memory of 1016 748 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe 36 PID 748 wrote to memory of 1016 748 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe 36 PID 748 wrote to memory of 1016 748 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe 36 PID 748 wrote to memory of 1016 748 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe 36 PID 1016 wrote to memory of 1136 1016 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe 37 PID 1016 wrote to memory of 1136 1016 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe 37 PID 1016 wrote to memory of 1136 1016 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe 37 PID 1016 wrote to memory of 1136 1016 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe 37 PID 1136 wrote to memory of 1988 1136 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe 38 PID 1136 wrote to memory of 1988 1136 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe 38 PID 1136 wrote to memory of 1988 1136 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe 38 PID 1136 wrote to memory of 1988 1136 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe 38 PID 1988 wrote to memory of 2012 1988 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe 39 PID 1988 wrote to memory of 2012 1988 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe 39 PID 1988 wrote to memory of 2012 1988 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe 39 PID 1988 wrote to memory of 2012 1988 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe 39 PID 2012 wrote to memory of 1112 2012 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe 40 PID 2012 wrote to memory of 1112 2012 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe 40 PID 2012 wrote to memory of 1112 2012 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe 40 PID 2012 wrote to memory of 1112 2012 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe 40 PID 1112 wrote to memory of 964 1112 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe 41 PID 1112 wrote to memory of 964 1112 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe 41 PID 1112 wrote to memory of 964 1112 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe 41 PID 1112 wrote to memory of 964 1112 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe 41 PID 964 wrote to memory of 1564 964 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe 42 PID 964 wrote to memory of 1564 964 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe 42 PID 964 wrote to memory of 1564 964 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe 42 PID 964 wrote to memory of 1564 964 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe 42 PID 1564 wrote to memory of 1812 1564 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe 43 PID 1564 wrote to memory of 1812 1564 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe 43 PID 1564 wrote to memory of 1812 1564 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe 43 PID 1564 wrote to memory of 1812 1564 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe 43 PID 1812 wrote to memory of 552 1812 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe 44 PID 1812 wrote to memory of 552 1812 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe 44 PID 1812 wrote to memory of 552 1812 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe 44 PID 1812 wrote to memory of 552 1812 b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe"C:\Users\Admin\AppData\Local\Temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:664 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202a.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202b.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1280 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202c.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:616 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202d.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1852 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202e.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:768 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202f.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202g.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1016 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202h.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202i.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202j.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202k.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1112 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202l.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:964 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202m.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202n.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202o.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:552 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202p.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:684 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202q.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1032 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202r.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1320 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202s.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1820 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202t.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1804 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202u.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:888 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202v.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:948 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202w.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:952 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202x.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:664 -
\??\c:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202y.exec:\users\admin\appdata\local\temp\b3792344349e0098677dada628c8ded11b2bbde2fbb24dd123e3ac94239252ab_3202y.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-