Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
0bfa13354b7275c2a59bca21abe6468d44f42c5a9cd576ff567ac4148401de0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0bfa13354b7275c2a59bca21abe6468d44f42c5a9cd576ff567ac4148401de0f.exe
Resource
win10v2004-20220901-en
General
-
Target
0bfa13354b7275c2a59bca21abe6468d44f42c5a9cd576ff567ac4148401de0f.exe
-
Size
98KB
-
MD5
0ad2e80a73b9010ccb0f5bff56f7f170
-
SHA1
c48f459b4145ed98b5a0327e9c6cb031ad186e0a
-
SHA256
0bfa13354b7275c2a59bca21abe6468d44f42c5a9cd576ff567ac4148401de0f
-
SHA512
35afc9ea860139f8f51a32d925fdb0a7fe35d30f2dd02d6f8e4f0e5a35c32c873fd00e2d3709e3f348a236733ea6cfcd2f68fce91bfdb5c712b27490332baf60
-
SSDEEP
1536:WX+gYl+YrNyyjRaseP855hSOStqE1QZ+:dgZuAyjRascOMqE1o+
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmnfnfnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikifog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kojkli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfmdnk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enfcql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnkfbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdodko32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjhekdai.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njdegcgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hecakh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpkqik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhkkqgml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkggmplf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgbpgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idmamm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhdlij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdgeqgnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhfchp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Addanc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcmfih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbamjgpg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncgpei32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdikibgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdbnpaoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iacnlapb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndmpjoah.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oahgdbjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kblkhjbo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opnbfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aigpfe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejbkeibj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Foenggdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejmkpcbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmdgnhpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omkmogji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pojehmdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amdilc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knmdmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joaopq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lidofb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inflpi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdkmnkfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mllnhm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgknca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Belmldgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mldhhnkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Copaqh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgomgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khomde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbgjdiha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enfjkb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gboficpd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alhpbfnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apkbcd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkqddebh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmecikkj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jobnac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Copaqh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcgmme32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnfmgjka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jhdlij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgqhac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmkpoj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phkagk32.exe -
Executes dropped EXE 64 IoCs
pid Process 1324 Iqfcikbd.exe 2716 Ifckab32.exe 2580 Iqhpok32.exe 3740 Ijadgqgb.exe 3868 Jcihpfnc.exe 2088 Jjcqmp32.exe 3184 Jopieg32.exe 4292 Jjembp32.exe 212 Jobfkg32.exe 4444 Jmffdkpn.exe 2408 Jmicjknk.exe 3700 Jmkpoj32.exe 4392 Mhhcdpgd.exe 3768 Mdodia32.exe 1328 Mmghbfci.exe 3964 Mhmmoo32.exe 3564 Mmiegf32.exe 4532 Mhoido32.exe 4228 Magnndhm.exe 988 Mibbbg32.exe 4652 Nkboljlj.exe 2400 Npogdqka.exe 3492 Niglmfab.exe 3060 Ndmpjoah.exe 2788 Ngklfjpl.exe 2584 Nmedcd32.exe 4324 Nilehemm.exe 5012 Ophjjobg.exe 2420 Oahgdbjj.exe 4732 Opmceo32.exe 2188 Oiehndeb.exe 4656 Opopknlo.exe 4072 Oihedd32.exe 4052 Odmiam32.exe 1012 Pnenjbif.exe 1680 Phkagk32.exe 3076 Pnhjpa32.exe 1688 Pdbbllop.exe 2636 Pjokdbmg.exe 4452 Ppicam32.exe 3144 Pkngoedj.exe 1736 Pahpkp32.exe 2056 Phbhhjcd.exe 908 Pkqddebh.exe 4548 Pnoppqak.exe 4964 Pdihmk32.exe 4840 Adponj32.exe 800 Aqgobkhd.exe 424 Ajodkp32.exe 2916 Agcdedno.exe 3896 Abhibmmd.exe 3936 Akamkc32.exe 4768 Anoign32.exe 2452 Adiadh32.exe 4252 Bnafmnaf.exe 1824 Bkeffbpp.exe 4024 Bqboni32.exe 2040 Bjkcgodg.exe 2016 Bqeldi32.exe 876 Bgodqcca.exe 1608 Bbdhnlcg.exe 3108 Bgaqfb32.exe 1548 Bjpmbn32.exe 4256 Ceeapg32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Pikqjf32.exe Pfmdnk32.exe File created C:\Windows\SysWOW64\Ibogmacl.dll Hdodko32.exe File created C:\Windows\SysWOW64\Nahqni32.dll Iqfcikbd.exe File created C:\Windows\SysWOW64\Jchafp32.exe Jloiifbj.exe File opened for modification C:\Windows\SysWOW64\Qlcfgg32.exe Qgfnop32.exe File created C:\Windows\SysWOW64\Pedndg32.exe Pojehmdg.exe File opened for modification C:\Windows\SysWOW64\Clcajlbf.exe Cfjimbkj.exe File created C:\Windows\SysWOW64\Fjhdal32.exe Ffhnen32.exe File opened for modification C:\Windows\SysWOW64\Jkhpeacm.exe Jjgcni32.exe File opened for modification C:\Windows\SysWOW64\Kbgamk32.exe Koieapgq.exe File created C:\Windows\SysWOW64\Oinkco32.exe Nljkjjhe.exe File created C:\Windows\SysWOW64\Kklkkd32.exe Kdbcojqc.exe File created C:\Windows\SysWOW64\Kjeihbak.dll Anoign32.exe File opened for modification C:\Windows\SysWOW64\Dagapf32.exe Dniedk32.exe File created C:\Windows\SysWOW64\Angljiji.dll Dcjpmk32.exe File created C:\Windows\SysWOW64\Goambe32.exe Glbafjkj.exe File created C:\Windows\SysWOW64\Aipclc32.exe Acfkoinn.exe File created C:\Windows\SysWOW64\Jcddpn32.dll Eobgme32.exe File created C:\Windows\SysWOW64\Eheaol32.dll Pnhjpa32.exe File created C:\Windows\SysWOW64\Heiaqm32.exe Hcjedbfg.exe File opened for modification C:\Windows\SysWOW64\Ejenen32.exe Eggbic32.exe File created C:\Windows\SysWOW64\Kdceeaok.dll Cqnojg32.exe File created C:\Windows\SysWOW64\Kheljnfp.exe Kbkdnd32.exe File created C:\Windows\SysWOW64\Enjmlleo.exe Egqeoa32.exe File created C:\Windows\SysWOW64\Milmhdib.dll Jflgmkee.exe File created C:\Windows\SysWOW64\Bbjnjf32.dll Hhnkfj32.exe File created C:\Windows\SysWOW64\Hfmagk32.exe Hdodko32.exe File created C:\Windows\SysWOW64\Fidhqnjd.dll Hnblchqd.exe File opened for modification C:\Windows\SysWOW64\Locghafl.exe Lpbgjj32.exe File opened for modification C:\Windows\SysWOW64\Ppicam32.exe Pjokdbmg.exe File created C:\Windows\SysWOW64\Gkmfpngp.dll Adponj32.exe File created C:\Windows\SysWOW64\Iapfdcbp.dll Jloiifbj.exe File created C:\Windows\SysWOW64\Bgggenfn.exe Bdikibgj.exe File created C:\Windows\SysWOW64\Fmejbnim.exe Fjfnfbji.exe File created C:\Windows\SysWOW64\Jdkdha32.exe Jnallg32.exe File created C:\Windows\SysWOW64\Cenjhc32.dll Kicfoelo.exe File opened for modification C:\Windows\SysWOW64\Kdgcdp32.exe Kbighd32.exe File created C:\Windows\SysWOW64\Omhpig32.exe Obclln32.exe File created C:\Windows\SysWOW64\Oblobm32.exe Opnbfa32.exe File opened for modification C:\Windows\SysWOW64\Amblfc32.exe Aigpfe32.exe File created C:\Windows\SysWOW64\Iapbenko.exe Ioaficlk.exe File created C:\Windows\SysWOW64\Njdegcgl.exe Ndjlji32.exe File created C:\Windows\SysWOW64\Hbombj32.dll Npcjei32.exe File created C:\Windows\SysWOW64\Dnfadekb.exe Dkhehilo.exe File opened for modification C:\Windows\SysWOW64\Egmbnhec.exe Eenfbmfo.exe File opened for modification C:\Windows\SysWOW64\Ifckab32.exe Iqfcikbd.exe File created C:\Windows\SysWOW64\Cjfbbgia.dll Mmiegf32.exe File opened for modification C:\Windows\SysWOW64\Ophjjobg.exe Nilehemm.exe File created C:\Windows\SysWOW64\Lockjj32.dll Hlnihbma.exe File opened for modification C:\Windows\SysWOW64\Niadmjnp.exe Nmjdhi32.exe File created C:\Windows\SysWOW64\Egnhibpd.exe Eqdpmh32.exe File opened for modification C:\Windows\SysWOW64\Bnbemagl.exe Belmldgj.exe File opened for modification C:\Windows\SysWOW64\Niglmfab.exe Npogdqka.exe File opened for modification C:\Windows\SysWOW64\Ajodkp32.exe Aqgobkhd.exe File opened for modification C:\Windows\SysWOW64\Fimojo32.exe Fbcfmejb.exe File opened for modification C:\Windows\SysWOW64\Jloiifbj.exe Ifdall32.exe File created C:\Windows\SysWOW64\Knhblf32.exe Jlgeengd.exe File created C:\Windows\SysWOW64\Klnkem32.exe Kdgcdp32.exe File opened for modification C:\Windows\SysWOW64\Ifdall32.exe Iokipacq.exe File opened for modification C:\Windows\SysWOW64\Blalnobl.exe Bibpacch.exe File created C:\Windows\SysWOW64\Eobgme32.exe Emdjaj32.exe File opened for modification C:\Windows\SysWOW64\Ejmdemoh.exe Egnhibpd.exe File created C:\Windows\SysWOW64\Npcjei32.exe Njfamb32.exe File created C:\Windows\SysWOW64\Ilbcca32.exe Idkkad32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 13400 13360 WerFault.exe 700 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjglgffj.dll" Konnmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Niglmfab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdceeaok.dll" Cqnojg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpqglh32.dll" Mfjlefkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gffkgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfkigpdd.dll" Bbdhnlcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgcohjmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fklnlhjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emkhde32.dll" Lknbgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njidglbi.dll" Mijolk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmkkbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhpaac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kakkio32.dll" Blhbnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbhidloh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckcbgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gehijp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfflad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oedeniig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blalnobl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgefbobf.dll" Femina32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Komolo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnnmealg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jailbo32.dll" Emkqainl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aigpfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jalabpgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oilgafla.dll" Kblkhjbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpaaimgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cobnfgaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmqmae32.dll" Mjmofd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akpfqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgopcmlm.dll" Dkhehilo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcdmcl32.dll" Momqhfam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phioib32.dll" Jobnac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okmeoe32.dll" Jjbjbjad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eilcnp32.dll" Qdknhdcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgjmbkeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgmnpmfq.dll" Echlniga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffoigcpn.dll" Mopmnf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccdgqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlldmhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjgcni32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apkbcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hapfjk32.dll" Kdegopbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aigpfe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acfkoinn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djdodk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Joaopq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjgcni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmppki32.dll" Jkhpeacm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iihcddkg.dll" Gbjlnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dobiehek.dll" Iokipacq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jhlpof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jobfkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcknkphd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plfhpf32.dll" Mllnhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obeianjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihfphlmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flkkfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkfgpeen.dll" Mbamjgpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Joahfj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jhimopqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qcfajhhi.dll" Ikifog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noechl32.dll" Jhdlij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maafkh32.dll" Eggbic32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1324 1300 0bfa13354b7275c2a59bca21abe6468d44f42c5a9cd576ff567ac4148401de0f.exe 84 PID 1300 wrote to memory of 1324 1300 0bfa13354b7275c2a59bca21abe6468d44f42c5a9cd576ff567ac4148401de0f.exe 84 PID 1300 wrote to memory of 1324 1300 0bfa13354b7275c2a59bca21abe6468d44f42c5a9cd576ff567ac4148401de0f.exe 84 PID 1324 wrote to memory of 2716 1324 Iqfcikbd.exe 85 PID 1324 wrote to memory of 2716 1324 Iqfcikbd.exe 85 PID 1324 wrote to memory of 2716 1324 Iqfcikbd.exe 85 PID 2716 wrote to memory of 2580 2716 Ifckab32.exe 86 PID 2716 wrote to memory of 2580 2716 Ifckab32.exe 86 PID 2716 wrote to memory of 2580 2716 Ifckab32.exe 86 PID 2580 wrote to memory of 3740 2580 Iqhpok32.exe 87 PID 2580 wrote to memory of 3740 2580 Iqhpok32.exe 87 PID 2580 wrote to memory of 3740 2580 Iqhpok32.exe 87 PID 3740 wrote to memory of 3868 3740 Ijadgqgb.exe 88 PID 3740 wrote to memory of 3868 3740 Ijadgqgb.exe 88 PID 3740 wrote to memory of 3868 3740 Ijadgqgb.exe 88 PID 3868 wrote to memory of 2088 3868 Jcihpfnc.exe 89 PID 3868 wrote to memory of 2088 3868 Jcihpfnc.exe 89 PID 3868 wrote to memory of 2088 3868 Jcihpfnc.exe 89 PID 2088 wrote to memory of 3184 2088 Jjcqmp32.exe 90 PID 2088 wrote to memory of 3184 2088 Jjcqmp32.exe 90 PID 2088 wrote to memory of 3184 2088 Jjcqmp32.exe 90 PID 3184 wrote to memory of 4292 3184 Jopieg32.exe 91 PID 3184 wrote to memory of 4292 3184 Jopieg32.exe 91 PID 3184 wrote to memory of 4292 3184 Jopieg32.exe 91 PID 4292 wrote to memory of 212 4292 Jjembp32.exe 92 PID 4292 wrote to memory of 212 4292 Jjembp32.exe 92 PID 4292 wrote to memory of 212 4292 Jjembp32.exe 92 PID 212 wrote to memory of 4444 212 Jobfkg32.exe 93 PID 212 wrote to memory of 4444 212 Jobfkg32.exe 93 PID 212 wrote to memory of 4444 212 Jobfkg32.exe 93 PID 4444 wrote to memory of 2408 4444 Jmffdkpn.exe 94 PID 4444 wrote to memory of 2408 4444 Jmffdkpn.exe 94 PID 4444 wrote to memory of 2408 4444 Jmffdkpn.exe 94 PID 2408 wrote to memory of 3700 2408 Jmicjknk.exe 95 PID 2408 wrote to memory of 3700 2408 Jmicjknk.exe 95 PID 2408 wrote to memory of 3700 2408 Jmicjknk.exe 95 PID 3700 wrote to memory of 4392 3700 Jmkpoj32.exe 96 PID 3700 wrote to memory of 4392 3700 Jmkpoj32.exe 96 PID 3700 wrote to memory of 4392 3700 Jmkpoj32.exe 96 PID 4392 wrote to memory of 3768 4392 Mhhcdpgd.exe 97 PID 4392 wrote to memory of 3768 4392 Mhhcdpgd.exe 97 PID 4392 wrote to memory of 3768 4392 Mhhcdpgd.exe 97 PID 3768 wrote to memory of 1328 3768 Mdodia32.exe 98 PID 3768 wrote to memory of 1328 3768 Mdodia32.exe 98 PID 3768 wrote to memory of 1328 3768 Mdodia32.exe 98 PID 1328 wrote to memory of 3964 1328 Mmghbfci.exe 99 PID 1328 wrote to memory of 3964 1328 Mmghbfci.exe 99 PID 1328 wrote to memory of 3964 1328 Mmghbfci.exe 99 PID 3964 wrote to memory of 3564 3964 Mhmmoo32.exe 100 PID 3964 wrote to memory of 3564 3964 Mhmmoo32.exe 100 PID 3964 wrote to memory of 3564 3964 Mhmmoo32.exe 100 PID 3564 wrote to memory of 4532 3564 Mmiegf32.exe 101 PID 3564 wrote to memory of 4532 3564 Mmiegf32.exe 101 PID 3564 wrote to memory of 4532 3564 Mmiegf32.exe 101 PID 4532 wrote to memory of 4228 4532 Mhoido32.exe 102 PID 4532 wrote to memory of 4228 4532 Mhoido32.exe 102 PID 4532 wrote to memory of 4228 4532 Mhoido32.exe 102 PID 4228 wrote to memory of 988 4228 Magnndhm.exe 103 PID 4228 wrote to memory of 988 4228 Magnndhm.exe 103 PID 4228 wrote to memory of 988 4228 Magnndhm.exe 103 PID 988 wrote to memory of 4652 988 Mibbbg32.exe 104 PID 988 wrote to memory of 4652 988 Mibbbg32.exe 104 PID 988 wrote to memory of 4652 988 Mibbbg32.exe 104 PID 4652 wrote to memory of 2400 4652 Nkboljlj.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bfa13354b7275c2a59bca21abe6468d44f42c5a9cd576ff567ac4148401de0f.exe"C:\Users\Admin\AppData\Local\Temp\0bfa13354b7275c2a59bca21abe6468d44f42c5a9cd576ff567ac4148401de0f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\Iqfcikbd.exeC:\Windows\system32\Iqfcikbd.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\Ifckab32.exeC:\Windows\system32\Ifckab32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Iqhpok32.exeC:\Windows\system32\Iqhpok32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Ijadgqgb.exeC:\Windows\system32\Ijadgqgb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\Jcihpfnc.exeC:\Windows\system32\Jcihpfnc.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\Jjcqmp32.exeC:\Windows\system32\Jjcqmp32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Jopieg32.exeC:\Windows\system32\Jopieg32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\Jjembp32.exeC:\Windows\system32\Jjembp32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\Jobfkg32.exeC:\Windows\system32\Jobfkg32.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\Jmffdkpn.exeC:\Windows\system32\Jmffdkpn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\Jmicjknk.exeC:\Windows\system32\Jmicjknk.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\Jmkpoj32.exeC:\Windows\system32\Jmkpoj32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\Mhhcdpgd.exeC:\Windows\system32\Mhhcdpgd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\Mdodia32.exeC:\Windows\system32\Mdodia32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\Mmghbfci.exeC:\Windows\system32\Mmghbfci.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\Mhmmoo32.exeC:\Windows\system32\Mhmmoo32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\Mmiegf32.exeC:\Windows\system32\Mmiegf32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\Mhoido32.exeC:\Windows\system32\Mhoido32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\Magnndhm.exeC:\Windows\system32\Magnndhm.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\Mibbbg32.exeC:\Windows\system32\Mibbbg32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\Nkboljlj.exeC:\Windows\system32\Nkboljlj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\Npogdqka.exeC:\Windows\system32\Npogdqka.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\Niglmfab.exeC:\Windows\system32\Niglmfab.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:3492 -
C:\Windows\SysWOW64\Ndmpjoah.exeC:\Windows\system32\Ndmpjoah.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\Ngklfjpl.exeC:\Windows\system32\Ngklfjpl.exe26⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Nmedcd32.exeC:\Windows\system32\Nmedcd32.exe27⤵
- Executes dropped EXE
PID:2584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Nilehemm.exeC:\Windows\system32\Nilehemm.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4324 -
C:\Windows\SysWOW64\Ophjjobg.exeC:\Windows\system32\Ophjjobg.exe2⤵
- Executes dropped EXE
PID:5012
-
-
C:\Windows\SysWOW64\Oahgdbjj.exeC:\Windows\system32\Oahgdbjj.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\Opmceo32.exeC:\Windows\system32\Opmceo32.exe2⤵
- Executes dropped EXE
PID:4732 -
C:\Windows\SysWOW64\Oiehndeb.exeC:\Windows\system32\Oiehndeb.exe3⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\Opopknlo.exeC:\Windows\system32\Opopknlo.exe4⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\SysWOW64\Oihedd32.exeC:\Windows\system32\Oihedd32.exe5⤵
- Executes dropped EXE
PID:4072 -
C:\Windows\SysWOW64\Odmiam32.exeC:\Windows\system32\Odmiam32.exe6⤵
- Executes dropped EXE
PID:4052 -
C:\Windows\SysWOW64\Pnenjbif.exeC:\Windows\system32\Pnenjbif.exe7⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\Phkagk32.exeC:\Windows\system32\Phkagk32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\Pnhjpa32.exeC:\Windows\system32\Pnhjpa32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3076 -
C:\Windows\SysWOW64\Pdbbllop.exeC:\Windows\system32\Pdbbllop.exe10⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\Pjokdbmg.exeC:\Windows\system32\Pjokdbmg.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\Ppicam32.exeC:\Windows\system32\Ppicam32.exe12⤵
- Executes dropped EXE
PID:4452 -
C:\Windows\SysWOW64\Pkngoedj.exeC:\Windows\system32\Pkngoedj.exe13⤵
- Executes dropped EXE
PID:3144 -
C:\Windows\SysWOW64\Pahpkp32.exeC:\Windows\system32\Pahpkp32.exe14⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\Phbhhjcd.exeC:\Windows\system32\Phbhhjcd.exe15⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Pkqddebh.exeC:\Windows\system32\Pkqddebh.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:908 -
C:\Windows\SysWOW64\Pnoppqak.exeC:\Windows\system32\Pnoppqak.exe17⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\SysWOW64\Pdihmk32.exeC:\Windows\system32\Pdihmk32.exe18⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\Adponj32.exeC:\Windows\system32\Adponj32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4840 -
C:\Windows\SysWOW64\Aqgobkhd.exeC:\Windows\system32\Aqgobkhd.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:800 -
C:\Windows\SysWOW64\Ajodkp32.exeC:\Windows\system32\Ajodkp32.exe21⤵
- Executes dropped EXE
PID:424 -
C:\Windows\SysWOW64\Agcdedno.exeC:\Windows\system32\Agcdedno.exe22⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Abhibmmd.exeC:\Windows\system32\Abhibmmd.exe23⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\Akamkc32.exeC:\Windows\system32\Akamkc32.exe24⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\Anoign32.exeC:\Windows\system32\Anoign32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4768 -
C:\Windows\SysWOW64\Adiadh32.exeC:\Windows\system32\Adiadh32.exe26⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Bnafmnaf.exeC:\Windows\system32\Bnafmnaf.exe27⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\SysWOW64\Bkeffbpp.exeC:\Windows\system32\Bkeffbpp.exe28⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\Bqboni32.exeC:\Windows\system32\Bqboni32.exe29⤵
- Executes dropped EXE
PID:4024 -
C:\Windows\SysWOW64\Bjkcgodg.exeC:\Windows\system32\Bjkcgodg.exe30⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\Bqeldi32.exeC:\Windows\system32\Bqeldi32.exe31⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\Bgodqcca.exeC:\Windows\system32\Bgodqcca.exe32⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\Bbdhnlcg.exeC:\Windows\system32\Bbdhnlcg.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Bgaqfb32.exeC:\Windows\system32\Bgaqfb32.exe34⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\SysWOW64\Bjpmbn32.exeC:\Windows\system32\Bjpmbn32.exe35⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\Ceeapg32.exeC:\Windows\system32\Ceeapg32.exe36⤵
- Executes dropped EXE
PID:4256 -
C:\Windows\SysWOW64\Ckoilage.exeC:\Windows\system32\Ckoilage.exe37⤵PID:2888
-
C:\Windows\SysWOW64\Cnmehlgi.exeC:\Windows\system32\Cnmehlgi.exe38⤵PID:4476
-
C:\Windows\SysWOW64\Cqlbdhfl.exeC:\Windows\system32\Cqlbdhfl.exe39⤵PID:1976
-
C:\Windows\SysWOW64\Cgfjabmi.exeC:\Windows\system32\Cgfjabmi.exe40⤵PID:3296
-
C:\Windows\SysWOW64\Cnpbnl32.exeC:\Windows\system32\Cnpbnl32.exe41⤵PID:1956
-
C:\Windows\SysWOW64\Cqnojg32.exeC:\Windows\system32\Cqnojg32.exe42⤵
- Drops file in System32 directory
- Modifies registry class
PID:4268 -
C:\Windows\SysWOW64\Ckcbgp32.exeC:\Windows\system32\Ckcbgp32.exe43⤵
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\Dgomgq32.exeC:\Windows\system32\Dgomgq32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4960 -
C:\Windows\SysWOW64\Dniedk32.exeC:\Windows\system32\Dniedk32.exe45⤵
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Dagapf32.exeC:\Windows\system32\Dagapf32.exe46⤵PID:532
-
C:\Windows\SysWOW64\Dhfchp32.exeC:\Windows\system32\Dhfchp32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:636 -
C:\Windows\SysWOW64\Djdodk32.exeC:\Windows\system32\Djdodk32.exe48⤵
- Modifies registry class
PID:1484 -
C:\Windows\SysWOW64\Ebndkhmj.exeC:\Windows\system32\Ebndkhmj.exe49⤵PID:1356
-
C:\Windows\SysWOW64\Eihlhb32.exeC:\Windows\system32\Eihlhb32.exe50⤵PID:4004
-
C:\Windows\SysWOW64\Enedpi32.exeC:\Windows\system32\Enedpi32.exe51⤵PID:3576
-
C:\Windows\SysWOW64\Eijimb32.exeC:\Windows\system32\Eijimb32.exe52⤵PID:4216
-
C:\Windows\SysWOW64\Elieim32.exeC:\Windows\system32\Elieim32.exe53⤵PID:1596
-
C:\Windows\SysWOW64\Engaei32.exeC:\Windows\system32\Engaei32.exe54⤵PID:1004
-
C:\Windows\SysWOW64\Eeajbc32.exeC:\Windows\system32\Eeajbc32.exe55⤵PID:2564
-
C:\Windows\SysWOW64\Ebejlg32.exeC:\Windows\system32\Ebejlg32.exe56⤵PID:4600
-
C:\Windows\SysWOW64\Elmodmmb.exeC:\Windows\system32\Elmodmmb.exe57⤵PID:3032
-
C:\Windows\SysWOW64\Ejpopi32.exeC:\Windows\system32\Ejpopi32.exe58⤵PID:2744
-
C:\Windows\SysWOW64\Eajgmckj.exeC:\Windows\system32\Eajgmckj.exe59⤵PID:5140
-
C:\Windows\SysWOW64\Ehdoincf.exeC:\Windows\system32\Ehdoincf.exe60⤵PID:5164
-
C:\Windows\SysWOW64\Ejbkeibj.exeC:\Windows\system32\Ejbkeibj.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5188 -
C:\Windows\SysWOW64\Fbjcgfbl.exeC:\Windows\system32\Fbjcgfbl.exe62⤵PID:5204
-
C:\Windows\SysWOW64\Fehpcbap.exeC:\Windows\system32\Fehpcbap.exe63⤵PID:5228
-
C:\Windows\SysWOW64\Fhflomad.exeC:\Windows\system32\Fhflomad.exe64⤵PID:5248
-
C:\Windows\SysWOW64\Fblplfqj.exeC:\Windows\system32\Fblplfqj.exe65⤵PID:5264
-
C:\Windows\SysWOW64\Fhiidm32.exeC:\Windows\system32\Fhiidm32.exe66⤵PID:5280
-
C:\Windows\SysWOW64\Fkgeqh32.exeC:\Windows\system32\Fkgeqh32.exe67⤵PID:5296
-
C:\Windows\SysWOW64\Femina32.exeC:\Windows\system32\Femina32.exe68⤵
- Modifies registry class
PID:5312 -
C:\Windows\SysWOW64\Fhkejm32.exeC:\Windows\system32\Fhkejm32.exe69⤵PID:5328
-
C:\Windows\SysWOW64\Foenggdk.exeC:\Windows\system32\Foenggdk.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5344 -
C:\Windows\SysWOW64\Facjcbco.exeC:\Windows\system32\Facjcbco.exe71⤵PID:5360
-
C:\Windows\SysWOW64\Fklnlhjp.exeC:\Windows\system32\Fklnlhjp.exe72⤵
- Modifies registry class
PID:5376 -
C:\Windows\SysWOW64\Fbcfmejb.exeC:\Windows\system32\Fbcfmejb.exe73⤵
- Drops file in System32 directory
PID:5392 -
C:\Windows\SysWOW64\Fimojo32.exeC:\Windows\system32\Fimojo32.exe74⤵PID:5408
-
C:\Windows\SysWOW64\Flkkfk32.exeC:\Windows\system32\Flkkfk32.exe75⤵
- Modifies registry class
PID:5424 -
C:\Windows\SysWOW64\Gojgbf32.exeC:\Windows\system32\Gojgbf32.exe76⤵PID:5440
-
C:\Windows\SysWOW64\Gahcna32.exeC:\Windows\system32\Gahcna32.exe77⤵PID:5456
-
C:\Windows\SysWOW64\Glngkjop.exeC:\Windows\system32\Glngkjop.exe78⤵PID:5472
-
C:\Windows\SysWOW64\Goldgfnc.exeC:\Windows\system32\Goldgfnc.exe79⤵PID:5488
-
C:\Windows\SysWOW64\Gakpcamg.exeC:\Windows\system32\Gakpcamg.exe80⤵PID:5512
-
C:\Windows\SysWOW64\Ghdhpk32.exeC:\Windows\system32\Ghdhpk32.exe81⤵PID:5540
-
C:\Windows\SysWOW64\Glpdajmm.exeC:\Windows\system32\Glpdajmm.exe82⤵PID:5568
-
C:\Windows\SysWOW64\Gbjlnd32.exeC:\Windows\system32\Gbjlnd32.exe83⤵
- Modifies registry class
PID:5588 -
C:\Windows\SysWOW64\Gehijp32.exeC:\Windows\system32\Gehijp32.exe84⤵
- Modifies registry class
PID:5604 -
C:\Windows\SysWOW64\Glbafjkj.exeC:\Windows\system32\Glbafjkj.exe85⤵
- Drops file in System32 directory
PID:5620 -
C:\Windows\SysWOW64\Goambe32.exeC:\Windows\system32\Goambe32.exe86⤵PID:5636
-
C:\Windows\SysWOW64\Gaoioq32.exeC:\Windows\system32\Gaoioq32.exe87⤵PID:5652
-
C:\Windows\SysWOW64\Ghiakkqo.exeC:\Windows\system32\Ghiakkqo.exe88⤵PID:5668
-
C:\Windows\SysWOW64\Gkhngfpb.exeC:\Windows\system32\Gkhngfpb.exe89⤵PID:5684
-
C:\Windows\SysWOW64\Gboficpd.exeC:\Windows\system32\Gboficpd.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5712 -
C:\Windows\SysWOW64\Ghlnajol.exeC:\Windows\system32\Ghlnajol.exe91⤵PID:5740
-
C:\Windows\SysWOW64\Hkjkmfnp.exeC:\Windows\system32\Hkjkmfnp.exe92⤵PID:5760
-
C:\Windows\SysWOW64\Hcabnc32.exeC:\Windows\system32\Hcabnc32.exe93⤵PID:5780
-
C:\Windows\SysWOW64\Hepojo32.exeC:\Windows\system32\Hepojo32.exe94⤵PID:5800
-
C:\Windows\SysWOW64\Hhnkfj32.exeC:\Windows\system32\Hhnkfj32.exe95⤵
- Drops file in System32 directory
PID:5832 -
C:\Windows\SysWOW64\Hohccddf.exeC:\Windows\system32\Hohccddf.exe96⤵PID:5852
-
C:\Windows\SysWOW64\Hccodc32.exeC:\Windows\system32\Hccodc32.exe97⤵PID:5876
-
C:\Windows\SysWOW64\Hebkpn32.exeC:\Windows\system32\Hebkpn32.exe98⤵PID:5904
-
C:\Windows\SysWOW64\Hhphlj32.exeC:\Windows\system32\Hhphlj32.exe99⤵PID:5924
-
C:\Windows\SysWOW64\Hlldmhcp.exeC:\Windows\system32\Hlldmhcp.exe100⤵
- Modifies registry class
PID:5944 -
C:\Windows\SysWOW64\Hojpidbc.exeC:\Windows\system32\Hojpidbc.exe101⤵PID:5968
-
C:\Windows\SysWOW64\Haileo32.exeC:\Windows\system32\Haileo32.exe102⤵PID:6000
-
C:\Windows\SysWOW64\Hipdfm32.exeC:\Windows\system32\Hipdfm32.exe103⤵PID:6024
-
C:\Windows\SysWOW64\Hkaqnegg.exeC:\Windows\system32\Hkaqnegg.exe104⤵PID:6048
-
C:\Windows\SysWOW64\Hommnc32.exeC:\Windows\system32\Hommnc32.exe105⤵PID:6068
-
C:\Windows\SysWOW64\Hlqmhh32.exeC:\Windows\system32\Hlqmhh32.exe106⤵PID:6084
-
C:\Windows\SysWOW64\Hcjedbfg.exeC:\Windows\system32\Hcjedbfg.exe107⤵
- Drops file in System32 directory
PID:6100 -
C:\Windows\SysWOW64\Heiaqm32.exeC:\Windows\system32\Heiaqm32.exe108⤵PID:6116
-
C:\Windows\SysWOW64\Ioaficlk.exeC:\Windows\system32\Ioaficlk.exe109⤵
- Drops file in System32 directory
PID:6132 -
C:\Windows\SysWOW64\Iapbenko.exeC:\Windows\system32\Iapbenko.exe110⤵PID:5124
-
C:\Windows\SysWOW64\Ijgjglla.exeC:\Windows\system32\Ijgjglla.exe111⤵PID:5160
-
C:\Windows\SysWOW64\Ikhgnd32.exeC:\Windows\system32\Ikhgnd32.exe112⤵PID:5220
-
C:\Windows\SysWOW64\Icoopa32.exeC:\Windows\system32\Icoopa32.exe113⤵PID:5708
-
C:\Windows\SysWOW64\Ihlghhpi.exeC:\Windows\system32\Ihlghhpi.exe114⤵PID:5748
-
C:\Windows\SysWOW64\Iofpdb32.exeC:\Windows\system32\Iofpdb32.exe115⤵PID:5812
-
C:\Windows\SysWOW64\Ijkdbk32.exeC:\Windows\system32\Ijkdbk32.exe116⤵PID:5844
-
C:\Windows\SysWOW64\Iljpnf32.exeC:\Windows\system32\Iljpnf32.exe117⤵PID:5888
-
C:\Windows\SysWOW64\Iohljb32.exeC:\Windows\system32\Iohljb32.exe118⤵PID:5956
-
C:\Windows\SysWOW64\Iaghfm32.exeC:\Windows\system32\Iaghfm32.exe119⤵PID:5996
-
C:\Windows\SysWOW64\Ijnqgk32.exeC:\Windows\system32\Ijnqgk32.exe120⤵PID:6036
-
C:\Windows\SysWOW64\Iokipacq.exeC:\Windows\system32\Iokipacq.exe121⤵
- Drops file in System32 directory
- Modifies registry class
PID:6152 -
C:\Windows\SysWOW64\Ifdall32.exeC:\Windows\system32\Ifdall32.exe122⤵
- Drops file in System32 directory
PID:6168
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-