Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 03:39
Static task
static1
Behavioral task
behavioral1
Sample
e232f3e3c55dd22f8d9587f0e35c2564ae2533ed594c75c4145d659fafb68d9c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e232f3e3c55dd22f8d9587f0e35c2564ae2533ed594c75c4145d659fafb68d9c.exe
Resource
win10v2004-20220812-en
General
-
Target
e232f3e3c55dd22f8d9587f0e35c2564ae2533ed594c75c4145d659fafb68d9c.exe
-
Size
51KB
-
MD5
118a562faaf0261261775ae6350b74f0
-
SHA1
5993f7534d4a9e273d06b7ae3d73af2366d47d40
-
SHA256
e232f3e3c55dd22f8d9587f0e35c2564ae2533ed594c75c4145d659fafb68d9c
-
SHA512
036a66cfeaedc827c085af34bdc4dff9ea12a4626d502575482280e93ad8151291daca834d12e94c8646374319248a3b621fe6cc42f81a2dc3c1e7d57fac85b7
-
SSDEEP
768:Vlb7DEfXt+beDmPF574V+VxwwDqHXnkzzJzzDiQP0TlcTzz/1H5m:Vlb/E/t+bbPD4V+xDyk3lNP0mTzBY
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikaggmii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohoblmci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnkbjj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmmdpkjl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmaeaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cakjmm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlgdkeje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehfjah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikdcmpnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdmgfedl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbmcbime.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gchfbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkiho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogfcjnaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aocace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Digkijmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dagiil32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhdfbfdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohgoaehe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojnfihmo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nilehemm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbiaik32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjdfmmlm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgajmpcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plnfaaba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aoeniefo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plcdiabk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imiehfao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aklcpchj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnfphm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnkaalkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlegnjbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iliinc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifomll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgjclaid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfcjojbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohnebd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlfpdh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlglidlo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hoeieolb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abcgoc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqmhqapg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kggjmbeg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpjebcmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdaqoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omlkdcaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpjebcmj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgjclaid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dljqpd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdbfodfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oiihahme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pimmpfep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqqlbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clckpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlolpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjidgkog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gchfbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hladbnbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opmceo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agcdedno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mofmdofg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipoopgnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iohejo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqjbddpl.exe -
Executes dropped EXE 64 IoCs
pid Process 3084 Febicgma.exe 1800 Fcfjmk32.exe 4580 Gipbjech.exe 4104 Gchfbk32.exe 1252 Ggfohi32.exe 1780 Goadmk32.exe 3536 Hcfcdinh.exe 4908 Hladbnbf.exe 4824 Ijgaabom.exe 4864 Icpfjgfn.exe 4772 Ihmnbnde.exe 384 Ignnpf32.exe 3412 Icdoeg32.exe 4776 Iqhpok32.exe 3204 Imopclff.exe 4656 Jqmijjlm.exe 1848 Kjamnnip.exe 4136 Kggjmbeg.exe 2680 Lpelgd32.exe 344 Lpjebcmj.exe 1996 Lhcjiq32.exe 3440 Lhefop32.exe 1240 Mjfopkfh.exe 3768 Mfmpel32.exe 3508 Mdaqoq32.exe 4400 Nijhbfop.exe 3180 Ngniljni.exe 3456 Nilehemm.exe 3328 Nkkabhdp.exe 2188 Ohoblmci.exe 1348 Omlkdcaq.exe 4672 Ogdomiha.exe 940 Omogic32.exe 4124 Opmceo32.exe 2920 Ogglbifo.exe 2588 Oiehndeb.exe 2460 Odkllm32.exe 1076 Oihedd32.exe 4796 Oglemh32.exe 3800 Pijaic32.exe 4132 Pdpfglqc.exe 1940 Pjokdbmg.exe 4208 Ppkpgmba.exe 2520 Ppmmllpo.exe 1156 Qnamfq32.exe 1340 Qjhnkaem.exe 4048 Anhcfoiq.exe 2688 Adbkci32.exe 2836 Aklcpchj.exe 2308 Abflmnog.exe 1028 Agcdedno.exe 1620 Aqkinj32.exe 2004 Ageajdkl.exe 2544 Anoign32.exe 2952 Bnafmnaf.exe 1700 Bkeffbpp.exe 1824 Bhigpf32.exe 4780 Bnfphm32.exe 1296 Bqeldi32.exe 3460 Bkjpaa32.exe 976 Bnilmm32.exe 3148 Bgaqfb32.exe 4112 Ceeapg32.exe 2624 Ckoilage.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Lnkqnmia.exe Lnhdinkd.exe File created C:\Windows\SysWOW64\Kojeoiop.dll Dljqpd32.exe File created C:\Windows\SysWOW64\Dgajmpcl.exe Decmaedh.exe File opened for modification C:\Windows\SysWOW64\Nbkoai32.exe Niqnbdjd.exe File created C:\Windows\SysWOW64\Hcpojd32.exe Hdmoohbo.exe File opened for modification C:\Windows\SysWOW64\Nmaciefp.exe Nfgklkoc.exe File opened for modification C:\Windows\SysWOW64\Pfhmjf32.exe Pciqnk32.exe File created C:\Windows\SysWOW64\Ghniielm.exe Gempgj32.exe File created C:\Windows\SysWOW64\Ikncgkdf.dll Ogmijllo.exe File created C:\Windows\SysWOW64\Iikmbh32.exe Ifmqfm32.exe File created C:\Windows\SysWOW64\Ebdoljdi.dll Mpclce32.exe File created C:\Windows\SysWOW64\Abcgoc32.exe Aikbfnfd.exe File created C:\Windows\SysWOW64\Cmnech32.dll Jkaqnk32.exe File created C:\Windows\SysWOW64\Jjdejk32.dll Bjlpjm32.exe File created C:\Windows\SysWOW64\Nfenigce.dll Mjlalkmd.exe File created C:\Windows\SysWOW64\Agolng32.dll Ofgdcipq.exe File created C:\Windows\SysWOW64\Bhigpf32.exe Bkeffbpp.exe File opened for modification C:\Windows\SysWOW64\Fpelib32.exe Fgjgepeg.exe File created C:\Windows\SysWOW64\Mejmbkpj.dll Iaekaq32.exe File created C:\Windows\SysWOW64\Kefdbo32.exe Kbekqdjh.exe File created C:\Windows\SysWOW64\Idhnkf32.exe Innfnl32.exe File opened for modification C:\Windows\SysWOW64\Dldlnnem.exe Deejfdbe.exe File created C:\Windows\SysWOW64\Mbijeq32.dll Egionb32.exe File created C:\Windows\SysWOW64\Gecpobhn.dll Lncjnn32.exe File created C:\Windows\SysWOW64\Kkkbdj32.dll Mkanma32.exe File opened for modification C:\Windows\SysWOW64\Lhkgoiqe.exe Lfjjga32.exe File opened for modification C:\Windows\SysWOW64\Fgjgepeg.exe Fapohf32.exe File created C:\Windows\SysWOW64\Bpcgdfaa.exe Bhlocipo.exe File created C:\Windows\SysWOW64\Jjdcihik.dll Jblijebc.exe File created C:\Windows\SysWOW64\Mjlalkmd.exe Mpclce32.exe File opened for modification C:\Windows\SysWOW64\Fgcada32.exe Fqiihgdb.exe File opened for modification C:\Windows\SysWOW64\Fgjccb32.exe Fhdfbfdh.exe File created C:\Windows\SysWOW64\Efcknj32.dll Jfehed32.exe File opened for modification C:\Windows\SysWOW64\Mablfnne.exe Mhjhmhhd.exe File opened for modification C:\Windows\SysWOW64\Pififb32.exe Pfhmjf32.exe File created C:\Windows\SysWOW64\Anoign32.exe Ageajdkl.exe File opened for modification C:\Windows\SysWOW64\Dagiil32.exe Dohmlp32.exe File opened for modification C:\Windows\SysWOW64\Cfbkeh32.exe Cmgjgcgo.exe File created C:\Windows\SysWOW64\Qljjjqlc.exe Qfpbmfdf.exe File created C:\Windows\SysWOW64\Higjaoci.exe Bjlpjm32.exe File opened for modification C:\Windows\SysWOW64\Fpnfic32.exe Fgcada32.exe File created C:\Windows\SysWOW64\Nigpemda.dll Clnadfbp.exe File opened for modification C:\Windows\SysWOW64\Fkllnbjc.exe Ehfjah32.exe File opened for modification C:\Windows\SysWOW64\Oeicejia.exe Nbadcpbh.exe File created C:\Windows\SysWOW64\Hlegnjbm.exe Higjaoci.exe File opened for modification C:\Windows\SysWOW64\Ibaeen32.exe Hoeieolb.exe File created C:\Windows\SysWOW64\Icdoeg32.exe Ignnpf32.exe File created C:\Windows\SysWOW64\Hacfoh32.dll Lpjebcmj.exe File created C:\Windows\SysWOW64\Fpnfic32.exe Fgcada32.exe File created C:\Windows\SysWOW64\Gdibmd32.dll Bhlocipo.exe File opened for modification C:\Windows\SysWOW64\Oigllh32.exe Oghppm32.exe File created C:\Windows\SysWOW64\Hdmoohbo.exe Hlegnjbm.exe File created C:\Windows\SysWOW64\Dplfklim.dll Oiehndeb.exe File created C:\Windows\SysWOW64\Alblpg32.dll Bnafmnaf.exe File created C:\Windows\SysWOW64\Jgklij32.dll Cgjclaid.exe File created C:\Windows\SysWOW64\Kolegg32.dll Ebndkhmj.exe File created C:\Windows\SysWOW64\Ppebjo32.dll Qoifflkg.exe File created C:\Windows\SysWOW64\Ionqbdem.dll Qjnkcekm.exe File created C:\Windows\SysWOW64\Ohoblmci.exe Nkkabhdp.exe File created C:\Windows\SysWOW64\Cqnojg32.exe Cjdfmmlm.exe File opened for modification C:\Windows\SysWOW64\Beppmmoi.exe Bbacqape.exe File created C:\Windows\SysWOW64\Cdlgno32.dll Qcgffqei.exe File created C:\Windows\SysWOW64\Lhcjiq32.exe Lpjebcmj.exe File created C:\Windows\SysWOW64\Pdpfglqc.exe Pijaic32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5752 1688 WerFault.exe 427 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogfcjnaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlgdkeje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dephckaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppmcdq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ionqbdem.dll" Qjnkcekm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcfbkpab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebmdcp32.dll" Adbkci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhepjaab.dll" Qnamfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mejmbkpj.dll" Iaekaq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iijaka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anhcfoiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkkiho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdibmd32.dll" Bhlocipo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlnldg32.dll" Bbacqape.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cedihl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcopbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Koijai32.dll" Hdlpneli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kckqbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggfohi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hladbnbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omogic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hoogfnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efcknj32.dll" Jfehed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dccdcfha.dll" Qgpogili.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbklgfdh.dll" Iliinc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deejfdbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijkgfioq.dll" Fgcada32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odailf32.dll" Fapohf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gjaggjlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ipoopgnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmbgbhhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjggclhi.dll" Mglhma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pccopc32.dll" Hemdlj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aoeniefo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nincmhle.dll" Lhkgoiqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maenpfhk.dll" Ookoaokf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gipbjech.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbbdoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pllilaed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbljeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikaqhj32.dll" Llipehgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppebjo32.dll" Qoifflkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbdaeied.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpelib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gnfmgjka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkanma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chphoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iohejo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nijhbfop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjhked32.dll" Ighhln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbadcpbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abgiapmj.dll" Ppamophb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifmqfm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhpelfhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iejnnl32.dll" Opfekl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cqjenbhh.dll" Oghppm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqcejcha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pciqnk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhgfkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcfjmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjokdbmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhigpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oajohd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahamlm32.dll" Ghniielm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3084 2228 e232f3e3c55dd22f8d9587f0e35c2564ae2533ed594c75c4145d659fafb68d9c.exe 79 PID 2228 wrote to memory of 3084 2228 e232f3e3c55dd22f8d9587f0e35c2564ae2533ed594c75c4145d659fafb68d9c.exe 79 PID 2228 wrote to memory of 3084 2228 e232f3e3c55dd22f8d9587f0e35c2564ae2533ed594c75c4145d659fafb68d9c.exe 79 PID 3084 wrote to memory of 1800 3084 Febicgma.exe 80 PID 3084 wrote to memory of 1800 3084 Febicgma.exe 80 PID 3084 wrote to memory of 1800 3084 Febicgma.exe 80 PID 1800 wrote to memory of 4580 1800 Fcfjmk32.exe 81 PID 1800 wrote to memory of 4580 1800 Fcfjmk32.exe 81 PID 1800 wrote to memory of 4580 1800 Fcfjmk32.exe 81 PID 4580 wrote to memory of 4104 4580 Gipbjech.exe 82 PID 4580 wrote to memory of 4104 4580 Gipbjech.exe 82 PID 4580 wrote to memory of 4104 4580 Gipbjech.exe 82 PID 4104 wrote to memory of 1252 4104 Gchfbk32.exe 83 PID 4104 wrote to memory of 1252 4104 Gchfbk32.exe 83 PID 4104 wrote to memory of 1252 4104 Gchfbk32.exe 83 PID 1252 wrote to memory of 1780 1252 Ggfohi32.exe 84 PID 1252 wrote to memory of 1780 1252 Ggfohi32.exe 84 PID 1252 wrote to memory of 1780 1252 Ggfohi32.exe 84 PID 1780 wrote to memory of 3536 1780 Goadmk32.exe 85 PID 1780 wrote to memory of 3536 1780 Goadmk32.exe 85 PID 1780 wrote to memory of 3536 1780 Goadmk32.exe 85 PID 3536 wrote to memory of 4908 3536 Hcfcdinh.exe 86 PID 3536 wrote to memory of 4908 3536 Hcfcdinh.exe 86 PID 3536 wrote to memory of 4908 3536 Hcfcdinh.exe 86 PID 4908 wrote to memory of 4824 4908 Hladbnbf.exe 87 PID 4908 wrote to memory of 4824 4908 Hladbnbf.exe 87 PID 4908 wrote to memory of 4824 4908 Hladbnbf.exe 87 PID 4824 wrote to memory of 4864 4824 Ijgaabom.exe 88 PID 4824 wrote to memory of 4864 4824 Ijgaabom.exe 88 PID 4824 wrote to memory of 4864 4824 Ijgaabom.exe 88 PID 4864 wrote to memory of 4772 4864 Icpfjgfn.exe 89 PID 4864 wrote to memory of 4772 4864 Icpfjgfn.exe 89 PID 4864 wrote to memory of 4772 4864 Icpfjgfn.exe 89 PID 4772 wrote to memory of 384 4772 Ihmnbnde.exe 90 PID 4772 wrote to memory of 384 4772 Ihmnbnde.exe 90 PID 4772 wrote to memory of 384 4772 Ihmnbnde.exe 90 PID 384 wrote to memory of 3412 384 Ignnpf32.exe 91 PID 384 wrote to memory of 3412 384 Ignnpf32.exe 91 PID 384 wrote to memory of 3412 384 Ignnpf32.exe 91 PID 3412 wrote to memory of 4776 3412 Icdoeg32.exe 92 PID 3412 wrote to memory of 4776 3412 Icdoeg32.exe 92 PID 3412 wrote to memory of 4776 3412 Icdoeg32.exe 92 PID 4776 wrote to memory of 3204 4776 Iqhpok32.exe 93 PID 4776 wrote to memory of 3204 4776 Iqhpok32.exe 93 PID 4776 wrote to memory of 3204 4776 Iqhpok32.exe 93 PID 3204 wrote to memory of 4656 3204 Imopclff.exe 94 PID 3204 wrote to memory of 4656 3204 Imopclff.exe 94 PID 3204 wrote to memory of 4656 3204 Imopclff.exe 94 PID 4656 wrote to memory of 1848 4656 Jqmijjlm.exe 95 PID 4656 wrote to memory of 1848 4656 Jqmijjlm.exe 95 PID 4656 wrote to memory of 1848 4656 Jqmijjlm.exe 95 PID 1848 wrote to memory of 4136 1848 Kjamnnip.exe 96 PID 1848 wrote to memory of 4136 1848 Kjamnnip.exe 96 PID 1848 wrote to memory of 4136 1848 Kjamnnip.exe 96 PID 4136 wrote to memory of 2680 4136 Kggjmbeg.exe 97 PID 4136 wrote to memory of 2680 4136 Kggjmbeg.exe 97 PID 4136 wrote to memory of 2680 4136 Kggjmbeg.exe 97 PID 2680 wrote to memory of 344 2680 Lpelgd32.exe 98 PID 2680 wrote to memory of 344 2680 Lpelgd32.exe 98 PID 2680 wrote to memory of 344 2680 Lpelgd32.exe 98 PID 344 wrote to memory of 1996 344 Lpjebcmj.exe 99 PID 344 wrote to memory of 1996 344 Lpjebcmj.exe 99 PID 344 wrote to memory of 1996 344 Lpjebcmj.exe 99 PID 1996 wrote to memory of 3440 1996 Lhcjiq32.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e232f3e3c55dd22f8d9587f0e35c2564ae2533ed594c75c4145d659fafb68d9c.exe"C:\Users\Admin\AppData\Local\Temp\e232f3e3c55dd22f8d9587f0e35c2564ae2533ed594c75c4145d659fafb68d9c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\Febicgma.exeC:\Windows\system32\Febicgma.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\Fcfjmk32.exeC:\Windows\system32\Fcfjmk32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\Gipbjech.exeC:\Windows\system32\Gipbjech.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\Gchfbk32.exeC:\Windows\system32\Gchfbk32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\Ggfohi32.exeC:\Windows\system32\Ggfohi32.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\Goadmk32.exeC:\Windows\system32\Goadmk32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\Hcfcdinh.exeC:\Windows\system32\Hcfcdinh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\Hladbnbf.exeC:\Windows\system32\Hladbnbf.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\Ijgaabom.exeC:\Windows\system32\Ijgaabom.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\Icpfjgfn.exeC:\Windows\system32\Icpfjgfn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\Ihmnbnde.exeC:\Windows\system32\Ihmnbnde.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\Ignnpf32.exeC:\Windows\system32\Ignnpf32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Icdoeg32.exeC:\Windows\system32\Icdoeg32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\Iqhpok32.exeC:\Windows\system32\Iqhpok32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\Imopclff.exeC:\Windows\system32\Imopclff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\Jqmijjlm.exeC:\Windows\system32\Jqmijjlm.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\Kjamnnip.exeC:\Windows\system32\Kjamnnip.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\Kggjmbeg.exeC:\Windows\system32\Kggjmbeg.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\Lpelgd32.exeC:\Windows\system32\Lpelgd32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\Lpjebcmj.exeC:\Windows\system32\Lpjebcmj.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\Lhcjiq32.exeC:\Windows\system32\Lhcjiq32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\Lhefop32.exeC:\Windows\system32\Lhefop32.exe23⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\Mjfopkfh.exeC:\Windows\system32\Mjfopkfh.exe24⤵
- Executes dropped EXE
PID:1240 -
C:\Windows\SysWOW64\Mfmpel32.exeC:\Windows\system32\Mfmpel32.exe25⤵
- Executes dropped EXE
PID:3768 -
C:\Windows\SysWOW64\Mdaqoq32.exeC:\Windows\system32\Mdaqoq32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\Nijhbfop.exeC:\Windows\system32\Nijhbfop.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:4400 -
C:\Windows\SysWOW64\Ngniljni.exeC:\Windows\system32\Ngniljni.exe28⤵
- Executes dropped EXE
PID:3180 -
C:\Windows\SysWOW64\Nilehemm.exeC:\Windows\system32\Nilehemm.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3456 -
C:\Windows\SysWOW64\Nkkabhdp.exeC:\Windows\system32\Nkkabhdp.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3328 -
C:\Windows\SysWOW64\Ohoblmci.exeC:\Windows\system32\Ohoblmci.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\Omlkdcaq.exeC:\Windows\system32\Omlkdcaq.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1348 -
C:\Windows\SysWOW64\Ogdomiha.exeC:\Windows\system32\Ogdomiha.exe33⤵
- Executes dropped EXE
PID:4672 -
C:\Windows\SysWOW64\Omogic32.exeC:\Windows\system32\Omogic32.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Opmceo32.exeC:\Windows\system32\Opmceo32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4124 -
C:\Windows\SysWOW64\Ogglbifo.exeC:\Windows\system32\Ogglbifo.exe36⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\Oiehndeb.exeC:\Windows\system32\Oiehndeb.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\Odkllm32.exeC:\Windows\system32\Odkllm32.exe38⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\Oihedd32.exeC:\Windows\system32\Oihedd32.exe39⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\Oglemh32.exeC:\Windows\system32\Oglemh32.exe40⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\Pijaic32.exeC:\Windows\system32\Pijaic32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3800 -
C:\Windows\SysWOW64\Pdpfglqc.exeC:\Windows\system32\Pdpfglqc.exe42⤵
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\Pjokdbmg.exeC:\Windows\system32\Pjokdbmg.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\Ppkpgmba.exeC:\Windows\system32\Ppkpgmba.exe44⤵
- Executes dropped EXE
PID:4208 -
C:\Windows\SysWOW64\Ppmmllpo.exeC:\Windows\system32\Ppmmllpo.exe45⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\SysWOW64\Qnamfq32.exeC:\Windows\system32\Qnamfq32.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:1156 -
C:\Windows\SysWOW64\Qjhnkaem.exeC:\Windows\system32\Qjhnkaem.exe47⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\Anhcfoiq.exeC:\Windows\system32\Anhcfoiq.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:4048 -
C:\Windows\SysWOW64\Adbkci32.exeC:\Windows\system32\Adbkci32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Aklcpchj.exeC:\Windows\system32\Aklcpchj.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Abflmnog.exeC:\Windows\system32\Abflmnog.exe51⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\Agcdedno.exeC:\Windows\system32\Agcdedno.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\Aqkinj32.exeC:\Windows\system32\Aqkinj32.exe53⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Ageajdkl.exeC:\Windows\system32\Ageajdkl.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2004 -
C:\Windows\SysWOW64\Anoign32.exeC:\Windows\system32\Anoign32.exe55⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\Bnafmnaf.exeC:\Windows\system32\Bnafmnaf.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\Bkeffbpp.exeC:\Windows\system32\Bkeffbpp.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1700 -
C:\Windows\SysWOW64\Bhigpf32.exeC:\Windows\system32\Bhigpf32.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:1824 -
C:\Windows\SysWOW64\Bnfphm32.exeC:\Windows\system32\Bnfphm32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\Bqeldi32.exeC:\Windows\system32\Bqeldi32.exe60⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\Bkjpaa32.exeC:\Windows\system32\Bkjpaa32.exe61⤵
- Executes dropped EXE
PID:3460 -
C:\Windows\SysWOW64\Bnilmm32.exeC:\Windows\system32\Bnilmm32.exe62⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\Bgaqfb32.exeC:\Windows\system32\Bgaqfb32.exe63⤵
- Executes dropped EXE
PID:3148 -
C:\Windows\SysWOW64\Ceeapg32.exeC:\Windows\system32\Ceeapg32.exe64⤵
- Executes dropped EXE
PID:4112 -
C:\Windows\SysWOW64\Ckoilage.exeC:\Windows\system32\Ckoilage.exe65⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\Cbiaik32.exeC:\Windows\system32\Cbiaik32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4648 -
C:\Windows\SysWOW64\Cicjfe32.exeC:\Windows\system32\Cicjfe32.exe67⤵PID:2136
-
C:\Windows\SysWOW64\Cjdfmmlm.exeC:\Windows\system32\Cjdfmmlm.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2828 -
C:\Windows\SysWOW64\Cqnojg32.exeC:\Windows\system32\Cqnojg32.exe69⤵PID:4896
-
C:\Windows\SysWOW64\Ciefke32.exeC:\Windows\system32\Ciefke32.exe70⤵PID:2968
-
C:\Windows\SysWOW64\Cnbocl32.exeC:\Windows\system32\Cnbocl32.exe71⤵PID:4468
-
C:\Windows\SysWOW64\Cgjclaid.exeC:\Windows\system32\Cgjclaid.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4220 -
C:\Windows\SysWOW64\Cbphjj32.exeC:\Windows\system32\Cbphjj32.exe73⤵PID:4660
-
C:\Windows\SysWOW64\Cgmpba32.exeC:\Windows\system32\Cgmpba32.exe74⤵PID:2496
-
C:\Windows\SysWOW64\Cbbdoj32.exeC:\Windows\system32\Cbbdoj32.exe75⤵
- Modifies registry class
PID:3956 -
C:\Windows\SysWOW64\Dkkiho32.exeC:\Windows\system32\Dkkiho32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4568 -
C:\Windows\SysWOW64\Dbdaeied.exeC:\Windows\system32\Dbdaeied.exe77⤵
- Modifies registry class
PID:2084 -
C:\Windows\SysWOW64\Decmaedh.exeC:\Windows\system32\Decmaedh.exe78⤵
- Drops file in System32 directory
PID:4680 -
C:\Windows\SysWOW64\Dgajmpcl.exeC:\Windows\system32\Dgajmpcl.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4044 -
C:\Windows\SysWOW64\Dnkbjj32.exeC:\Windows\system32\Dnkbjj32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4892 -
C:\Windows\SysWOW64\Deejfdbe.exeC:\Windows\system32\Deejfdbe.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:4788 -
C:\Windows\SysWOW64\Dldlnnem.exeC:\Windows\system32\Dldlnnem.exe82⤵PID:4504
-
C:\Windows\SysWOW64\Ebndkhmj.exeC:\Windows\system32\Ebndkhmj.exe83⤵
- Drops file in System32 directory
PID:3284 -
C:\Windows\SysWOW64\Elfhdn32.exeC:\Windows\system32\Elfhdn32.exe84⤵PID:4944
-
C:\Windows\SysWOW64\Ebpqqhkg.exeC:\Windows\system32\Ebpqqhkg.exe85⤵PID:1196
-
C:\Windows\SysWOW64\Pimmpfep.exeC:\Windows\system32\Pimmpfep.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:216 -
C:\Windows\SysWOW64\Pllilaed.exeC:\Windows\system32\Pllilaed.exe87⤵
- Modifies registry class
PID:3520 -
C:\Windows\SysWOW64\Pfanijdj.exeC:\Windows\system32\Pfanijdj.exe88⤵PID:4884
-
C:\Windows\SysWOW64\Pedndg32.exeC:\Windows\system32\Pedndg32.exe89⤵PID:1476
-
C:\Windows\SysWOW64\Plnfaaba.exeC:\Windows\system32\Plnfaaba.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4728 -
C:\Windows\SysWOW64\Ppjbbp32.exeC:\Windows\system32\Ppjbbp32.exe91⤵PID:4268
-
C:\Windows\SysWOW64\Pfcjojbg.exeC:\Windows\system32\Pfcjojbg.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1212 -
C:\Windows\SysWOW64\Qlqcga32.exeC:\Windows\system32\Qlqcga32.exe93⤵PID:4732
-
C:\Windows\SysWOW64\Clfnplpd.exeC:\Windows\system32\Clfnplpd.exe94⤵PID:1092
-
C:\Windows\SysWOW64\Dcpflf32.exeC:\Windows\system32\Dcpflf32.exe95⤵PID:3640
-
C:\Windows\SysWOW64\Dfqonada.exeC:\Windows\system32\Dfqonada.exe96⤵PID:4748
-
C:\Windows\SysWOW64\Djlkop32.exeC:\Windows\system32\Djlkop32.exe97⤵PID:1292
-
C:\Windows\SysWOW64\Dnjdenca.exeC:\Windows\system32\Dnjdenca.exe98⤵PID:1960
-
C:\Windows\SysWOW64\Dmmdpkjl.exeC:\Windows\system32\Dmmdpkjl.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:60 -
C:\Windows\SysWOW64\Dgeeccho.exeC:\Windows\system32\Dgeeccho.exe100⤵PID:3276
-
C:\Windows\SysWOW64\Eclfhdmc.exeC:\Windows\system32\Eclfhdmc.exe101⤵PID:1544
-
C:\Windows\SysWOW64\Egionb32.exeC:\Windows\system32\Egionb32.exe102⤵
- Drops file in System32 directory
PID:4988 -
C:\Windows\SysWOW64\Efoloo32.exeC:\Windows\system32\Efoloo32.exe103⤵PID:1592
-
C:\Windows\SysWOW64\Eqdpmh32.exeC:\Windows\system32\Eqdpmh32.exe104⤵PID:1464
-
C:\Windows\SysWOW64\Ejmdemoh.exeC:\Windows\system32\Ejmdemoh.exe105⤵PID:3748
-
C:\Windows\SysWOW64\Fqiihgdb.exeC:\Windows\system32\Fqiihgdb.exe106⤵
- Drops file in System32 directory
PID:3484 -
C:\Windows\SysWOW64\Fgcada32.exeC:\Windows\system32\Fgcada32.exe107⤵
- Drops file in System32 directory
- Modifies registry class
PID:4812 -
C:\Windows\SysWOW64\Fpnfic32.exeC:\Windows\system32\Fpnfic32.exe108⤵PID:4684
-
C:\Windows\SysWOW64\Ffhnen32.exeC:\Windows\system32\Ffhnen32.exe109⤵PID:2492
-
C:\Windows\SysWOW64\Fmbgbhhd.exeC:\Windows\system32\Fmbgbhhd.exe110⤵
- Modifies registry class
PID:5124 -
C:\Windows\SysWOW64\Fcloob32.exeC:\Windows\system32\Fcloob32.exe111⤵PID:5148
-
C:\Windows\SysWOW64\Ffjkkm32.exeC:\Windows\system32\Ffjkkm32.exe112⤵PID:5188
-
C:\Windows\SysWOW64\Fapohf32.exeC:\Windows\system32\Fapohf32.exe113⤵
- Drops file in System32 directory
- Modifies registry class
PID:5204 -
C:\Windows\SysWOW64\Fgjgepeg.exeC:\Windows\system32\Fgjgepeg.exe114⤵
- Drops file in System32 directory
PID:5220 -
C:\Windows\SysWOW64\Fpelib32.exeC:\Windows\system32\Fpelib32.exe115⤵
- Modifies registry class
PID:5236 -
C:\Windows\SysWOW64\Gnfmgjka.exeC:\Windows\system32\Gnfmgjka.exe116⤵
- Modifies registry class
PID:5252 -
C:\Windows\SysWOW64\Gccepqii.exeC:\Windows\system32\Gccepqii.exe117⤵PID:5268
-
C:\Windows\SysWOW64\Gpjfdbom.exeC:\Windows\system32\Gpjfdbom.exe118⤵PID:5284
-
C:\Windows\SysWOW64\Gjojbkoc.exeC:\Windows\system32\Gjojbkoc.exe119⤵PID:5300
-
C:\Windows\SysWOW64\Gjaggjlp.exeC:\Windows\system32\Gjaggjlp.exe120⤵
- Modifies registry class
PID:5364 -
C:\Windows\SysWOW64\Iaekaq32.exeC:\Windows\system32\Iaekaq32.exe121⤵
- Drops file in System32 directory
- Modifies registry class
PID:5384 -
C:\Windows\SysWOW64\Iddgml32.exeC:\Windows\system32\Iddgml32.exe122⤵PID:5412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-