Analysis
-
max time kernel
76s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe
Resource
win10v2004-20220812-en
General
-
Target
dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe
-
Size
92KB
-
MD5
0c1f1b0f375f44a85243be6a2fec0cc0
-
SHA1
f093d230047c2581976351281046234a9769989f
-
SHA256
dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810
-
SHA512
49248578114805a5f74d81b64dcaf9c5284ab52382a115bbdc97288fc96e886616d0bc37f25ff29862349a06f9846bb739fc0a88ecd41ed9ec8b2abe25958e56
-
SSDEEP
1536:VWESaBvKzyvyKrd+e5Ct8JmorxFazBg3jLV3BGnMPJKEsztuJO:TTrd+e5Ct8IVEjLlBRh1sN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgdflfcb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fllgke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcdhoa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjhbdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joifna32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmoplhqf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dficmb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghjjohaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khkojj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enomql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oicgmbqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gojhkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dficmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dioejm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnhohg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhicpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jphdeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpclon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfpbel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alboje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khoheimm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qmchhd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Encflkaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhbnnhfk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dndqgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfmhkpda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlbphimj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hoibah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fopmbpjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ooebogjc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndggcj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofmmfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgdflfcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oknmqo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmjdhqmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmqjhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpmpoaol.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekpqdq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmlcfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggbggaak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpbkcemc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdfhbf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phphaina.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dndqgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fopmbpjh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faflcf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcjbde32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olgeblkp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nalapmlc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maphap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojiifqll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oknmqo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qhicpc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kelcnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Magimbfi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghppocfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpcpnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cogdbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdcgjiec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Keopcnpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bilbah32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddiinc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpmlhdpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngajdfec.exe -
Executes dropped EXE 64 IoCs
pid Process 1516 Ophcfddi.exe 744 Bmabeioo.exe 1776 Cogdbd32.exe 1888 Cgdflfcb.exe 1896 Dficmb32.exe 892 Dpbgfh32.exe 1176 Dioejm32.exe 1864 Emednopp.exe 1948 Eafijmdd.exe 808 Fcnlbddj.exe 936 Gkpggfkm.exe 1308 Hoibah32.exe 1408 Jnhohg32.exe 1816 Mjdace32.exe 1696 Njodgi32.exe 1804 Ncjefn32.exe 1876 Oknmqo32.exe 1884 Pmfpif32.exe 1380 Pplbea32.exe 1192 Qhicpc32.exe 1200 Adenpclj.exe 2040 Alboje32.exe 1568 Blghed32.exe 1244 Bojnlo32.exe 1588 Bedfiifi.exe 1652 Cqbqdf32.exe 592 Cfbfbmkg.exe 1780 Dndqgn32.exe 952 Daejiiok.exe 840 Enfjlabb.exe 1832 Fllgke32.exe 268 Fjadla32.exe 652 Ffhdqbjf.exe 756 Fopmbpjh.exe 1328 Ggbggaak.exe 960 Gckeabem.exe 1484 Ghjjohaa.exe 1616 Hpeock32.exe 1488 Hgogpefi.exe 428 Hdcgjiec.exe 1536 Hlnlnk32.exe 1036 Hfgqgain.exe 1916 Hjdimo32.exe 1716 Ikkopg32.exe 1100 Idepnl32.exe 540 Ikoikfmh.exe 1752 Inpama32.exe 1076 Jgkckf32.exe 1680 Jphdeh32.exe 772 Kicecn32.exe 1676 Kelcnn32.exe 932 Khkojj32.exe 884 Keopcnpl.exe 560 Kfplkf32.exe 2016 Kmjdhqmg.exe 1872 Khoheimm.exe 816 Ljpagd32.exe 1740 Lmqjhp32.exe 1812 Lbncqf32.exe 1636 Lhjkimcn.exe 612 Magimbfi.exe 2028 Mpclon32.exe 980 Nnbplf32.exe 676 Oicgmbqk.exe -
Loads dropped DLL 64 IoCs
pid Process 2020 dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe 2020 dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe 1516 Ophcfddi.exe 1516 Ophcfddi.exe 744 Bmabeioo.exe 744 Bmabeioo.exe 1776 Cogdbd32.exe 1776 Cogdbd32.exe 1888 Cgdflfcb.exe 1888 Cgdflfcb.exe 1896 Dficmb32.exe 1896 Dficmb32.exe 892 Dpbgfh32.exe 892 Dpbgfh32.exe 1176 Dioejm32.exe 1176 Dioejm32.exe 1864 Emednopp.exe 1864 Emednopp.exe 1948 Eafijmdd.exe 1948 Eafijmdd.exe 808 Fcnlbddj.exe 808 Fcnlbddj.exe 936 Gkpggfkm.exe 936 Gkpggfkm.exe 1308 Hoibah32.exe 1308 Hoibah32.exe 1408 Jnhohg32.exe 1408 Jnhohg32.exe 1816 Mjdace32.exe 1816 Mjdace32.exe 1696 Njodgi32.exe 1696 Njodgi32.exe 1804 Ncjefn32.exe 1804 Ncjefn32.exe 1876 Oknmqo32.exe 1876 Oknmqo32.exe 1884 Pmfpif32.exe 1884 Pmfpif32.exe 1380 Pplbea32.exe 1380 Pplbea32.exe 1192 Qhicpc32.exe 1192 Qhicpc32.exe 1200 Adenpclj.exe 1200 Adenpclj.exe 2040 Alboje32.exe 2040 Alboje32.exe 1568 Blghed32.exe 1568 Blghed32.exe 1244 Bojnlo32.exe 1244 Bojnlo32.exe 1588 Bedfiifi.exe 1588 Bedfiifi.exe 1652 Cqbqdf32.exe 1652 Cqbqdf32.exe 592 Cfbfbmkg.exe 592 Cfbfbmkg.exe 1780 Dndqgn32.exe 1780 Dndqgn32.exe 952 Daejiiok.exe 952 Daejiiok.exe 840 Enfjlabb.exe 840 Enfjlabb.exe 1832 Fllgke32.exe 1832 Fllgke32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dggejn32.exe Ddiinc32.exe File opened for modification C:\Windows\SysWOW64\Kpcpnf32.exe Kmbgmkpd.exe File opened for modification C:\Windows\SysWOW64\Kedbblgg.exe Kbfffahc.exe File created C:\Windows\SysWOW64\Igdocplc.exe Iagfkinl.exe File created C:\Windows\SysWOW64\Ahgngicb.exe Abjfobek.exe File opened for modification C:\Windows\SysWOW64\Ajekcdbf.exe Ahgngicb.exe File opened for modification C:\Windows\SysWOW64\Njodgi32.exe Mjdace32.exe File created C:\Windows\SysWOW64\Daejiiok.exe Dndqgn32.exe File created C:\Windows\SysWOW64\Pndafb32.exe Obigfb32.exe File created C:\Windows\SysWOW64\Inedqdpi.dll Fcnlbddj.exe File created C:\Windows\SysWOW64\Kbfffahc.exe Kpgiieip.exe File created C:\Windows\SysWOW64\Fcdhoa32.exe Faflcf32.exe File opened for modification C:\Windows\SysWOW64\Moaled32.exe Mlbphimj.exe File created C:\Windows\SysWOW64\Njodgi32.exe Mjdace32.exe File created C:\Windows\SysWOW64\Qmchhd32.exe Pmoomdko.exe File created C:\Windows\SysWOW64\Lmlcfi32.exe Kihagf32.exe File created C:\Windows\SysWOW64\Dgapnlel.dll Lpkobd32.exe File created C:\Windows\SysWOW64\Lcalbe32.dll Ibiahpde.exe File created C:\Windows\SysWOW64\Ifeflpbm.dll Ljhqkb32.exe File created C:\Windows\SysWOW64\Idpcnj32.dll Impnhh32.exe File created C:\Windows\SysWOW64\Poegcdic.exe Ocddhd32.exe File opened for modification C:\Windows\SysWOW64\Kfplkf32.exe Keopcnpl.exe File created C:\Windows\SysWOW64\Mhbmpcml.dll Nnbplf32.exe File created C:\Windows\SysWOW64\Majhkj32.exe Molloo32.exe File opened for modification C:\Windows\SysWOW64\Nlmlbgpo.exe Neccemhb.exe File created C:\Windows\SysWOW64\Jphdeh32.exe Jgkckf32.exe File opened for modification C:\Windows\SysWOW64\Ooebogjc.exe Olgeblkp.exe File opened for modification C:\Windows\SysWOW64\Faflcf32.exe Efnkpnnd.exe File created C:\Windows\SysWOW64\Ampaga32.exe Qjhbdg32.exe File created C:\Windows\SysWOW64\Qgbcmc32.dll Inpama32.exe File opened for modification C:\Windows\SysWOW64\Aolkpk32.exe Qmchhd32.exe File created C:\Windows\SysWOW64\Cbimodab.dll Ooebogjc.exe File created C:\Windows\SysWOW64\Kqeqgn32.dll Ofpjka32.exe File created C:\Windows\SysWOW64\Fcnlbddj.exe Eafijmdd.exe File created C:\Windows\SysWOW64\Inpama32.exe Ibiahpde.exe File opened for modification C:\Windows\SysWOW64\Kinamkab.exe Kfmhkpda.exe File created C:\Windows\SysWOW64\Iagfkinl.exe Bkoddi32.exe File created C:\Windows\SysWOW64\Lgbgcabo.exe Lpkobd32.exe File created C:\Windows\SysWOW64\Pmfpif32.exe Oknmqo32.exe File opened for modification C:\Windows\SysWOW64\Ljpagd32.exe Khoheimm.exe File opened for modification C:\Windows\SysWOW64\Pqbnbn32.exe Pndafb32.exe File created C:\Windows\SysWOW64\Ppniccic.dll Igdocplc.exe File opened for modification C:\Windows\SysWOW64\Hdcgjiec.exe Hgogpefi.exe File opened for modification C:\Windows\SysWOW64\Oeldhcdl.exe Oicgmbqk.exe File created C:\Windows\SysWOW64\Ikkopg32.exe Hjdimo32.exe File created C:\Windows\SysWOW64\Gpbkcemc.exe Glgocf32.exe File created C:\Windows\SysWOW64\Fbgkqq32.dll Pqbnbn32.exe File opened for modification C:\Windows\SysWOW64\Ljcpempp.exe Lblhdoon.exe File created C:\Windows\SysWOW64\Omiqge32.dll Poegcdic.exe File created C:\Windows\SysWOW64\Gbbpkk32.dll Bmabeioo.exe File created C:\Windows\SysWOW64\Fllgke32.exe Enfjlabb.exe File created C:\Windows\SysWOW64\Bkoddi32.exe Bdelgo32.exe File opened for modification C:\Windows\SysWOW64\Jjehek32.exe Ihckmccf.exe File created C:\Windows\SysWOW64\Ghjjohaa.exe Gckeabem.exe File created C:\Windows\SysWOW64\Edghdahp.dll Kfmhkpda.exe File opened for modification C:\Windows\SysWOW64\Eaabhgpm.exe Encflkaj.exe File created C:\Windows\SysWOW64\Gmmigjdh.exe Gojhkn32.exe File created C:\Windows\SysWOW64\Pfaacjcm.dll Kpcpnf32.exe File opened for modification C:\Windows\SysWOW64\Kpgiieip.exe Kinamkab.exe File created C:\Windows\SysWOW64\Kedbblgg.exe Kbfffahc.exe File created C:\Windows\SysWOW64\Dcemhijj.dll Ngajdfec.exe File created C:\Windows\SysWOW64\Hoibah32.exe Gkpggfkm.exe File created C:\Windows\SysWOW64\Jjqlij32.dll Gkpggfkm.exe File opened for modification C:\Windows\SysWOW64\Pqhqqlmo.exe Poegcdic.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2904 2800 WerFault.exe 196 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnlpklga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppniccic.dll" Igdocplc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nonecbmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pplbea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cqbqdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nalapmlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emednopp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gidlhdpk.dll" Lhjkimcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pqbnbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncnhnhfm.dll" Iagfkinl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gkpggfkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oeldhcdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igdocplc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhbnnhfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pifligdc.dll" Mdndmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maphfcab.dll" Eaabhgpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgapnlel.dll" Lpkobd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdcgjiec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oicgmbqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncoajf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Poegcdic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpbgfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efkblh32.dll" Ncjefn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbjkmj32.dll" Ojiifqll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Joifna32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Licdkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlmpcc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aefefnfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfgqgain.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecpodboa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khkojj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Magimbfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gihcgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpmlhdpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Alboje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fllgke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kihagf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmlaqnbf.dll" Ecpodboa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlbphimj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndpqmplo.dll" Moaled32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jqffbdki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knppdmdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Majhkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecpodboa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpbkcemc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibiahpde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jphdeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aolkpk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eaoebg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpcpnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffhbld32.dll" Hoibah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnhohg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idepnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmikid32.dll" Nfhdkbhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lpkobd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hijcflog.dll" Njodgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfpkgnch.dll" Ffhdqbjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmjdhqmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fiaqgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocddhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chgmhjid.dll" Kedbblgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iagfkinl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocddhd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1516 2020 dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe 26 PID 2020 wrote to memory of 1516 2020 dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe 26 PID 2020 wrote to memory of 1516 2020 dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe 26 PID 2020 wrote to memory of 1516 2020 dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe 26 PID 1516 wrote to memory of 744 1516 Ophcfddi.exe 27 PID 1516 wrote to memory of 744 1516 Ophcfddi.exe 27 PID 1516 wrote to memory of 744 1516 Ophcfddi.exe 27 PID 1516 wrote to memory of 744 1516 Ophcfddi.exe 27 PID 744 wrote to memory of 1776 744 Bmabeioo.exe 28 PID 744 wrote to memory of 1776 744 Bmabeioo.exe 28 PID 744 wrote to memory of 1776 744 Bmabeioo.exe 28 PID 744 wrote to memory of 1776 744 Bmabeioo.exe 28 PID 1776 wrote to memory of 1888 1776 Cogdbd32.exe 29 PID 1776 wrote to memory of 1888 1776 Cogdbd32.exe 29 PID 1776 wrote to memory of 1888 1776 Cogdbd32.exe 29 PID 1776 wrote to memory of 1888 1776 Cogdbd32.exe 29 PID 1888 wrote to memory of 1896 1888 Cgdflfcb.exe 30 PID 1888 wrote to memory of 1896 1888 Cgdflfcb.exe 30 PID 1888 wrote to memory of 1896 1888 Cgdflfcb.exe 30 PID 1888 wrote to memory of 1896 1888 Cgdflfcb.exe 30 PID 1896 wrote to memory of 892 1896 Dficmb32.exe 31 PID 1896 wrote to memory of 892 1896 Dficmb32.exe 31 PID 1896 wrote to memory of 892 1896 Dficmb32.exe 31 PID 1896 wrote to memory of 892 1896 Dficmb32.exe 31 PID 892 wrote to memory of 1176 892 Dpbgfh32.exe 32 PID 892 wrote to memory of 1176 892 Dpbgfh32.exe 32 PID 892 wrote to memory of 1176 892 Dpbgfh32.exe 32 PID 892 wrote to memory of 1176 892 Dpbgfh32.exe 32 PID 1176 wrote to memory of 1864 1176 Dioejm32.exe 33 PID 1176 wrote to memory of 1864 1176 Dioejm32.exe 33 PID 1176 wrote to memory of 1864 1176 Dioejm32.exe 33 PID 1176 wrote to memory of 1864 1176 Dioejm32.exe 33 PID 1864 wrote to memory of 1948 1864 Emednopp.exe 34 PID 1864 wrote to memory of 1948 1864 Emednopp.exe 34 PID 1864 wrote to memory of 1948 1864 Emednopp.exe 34 PID 1864 wrote to memory of 1948 1864 Emednopp.exe 34 PID 1948 wrote to memory of 808 1948 Eafijmdd.exe 35 PID 1948 wrote to memory of 808 1948 Eafijmdd.exe 35 PID 1948 wrote to memory of 808 1948 Eafijmdd.exe 35 PID 1948 wrote to memory of 808 1948 Eafijmdd.exe 35 PID 808 wrote to memory of 936 808 Fcnlbddj.exe 36 PID 808 wrote to memory of 936 808 Fcnlbddj.exe 36 PID 808 wrote to memory of 936 808 Fcnlbddj.exe 36 PID 808 wrote to memory of 936 808 Fcnlbddj.exe 36 PID 936 wrote to memory of 1308 936 Gkpggfkm.exe 37 PID 936 wrote to memory of 1308 936 Gkpggfkm.exe 37 PID 936 wrote to memory of 1308 936 Gkpggfkm.exe 37 PID 936 wrote to memory of 1308 936 Gkpggfkm.exe 37 PID 1308 wrote to memory of 1408 1308 Hoibah32.exe 38 PID 1308 wrote to memory of 1408 1308 Hoibah32.exe 38 PID 1308 wrote to memory of 1408 1308 Hoibah32.exe 38 PID 1308 wrote to memory of 1408 1308 Hoibah32.exe 38 PID 1408 wrote to memory of 1816 1408 Jnhohg32.exe 39 PID 1408 wrote to memory of 1816 1408 Jnhohg32.exe 39 PID 1408 wrote to memory of 1816 1408 Jnhohg32.exe 39 PID 1408 wrote to memory of 1816 1408 Jnhohg32.exe 39 PID 1816 wrote to memory of 1696 1816 Mjdace32.exe 40 PID 1816 wrote to memory of 1696 1816 Mjdace32.exe 40 PID 1816 wrote to memory of 1696 1816 Mjdace32.exe 40 PID 1816 wrote to memory of 1696 1816 Mjdace32.exe 40 PID 1696 wrote to memory of 1804 1696 Njodgi32.exe 41 PID 1696 wrote to memory of 1804 1696 Njodgi32.exe 41 PID 1696 wrote to memory of 1804 1696 Njodgi32.exe 41 PID 1696 wrote to memory of 1804 1696 Njodgi32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe"C:\Users\Admin\AppData\Local\Temp\dc6f3cb095aa9d210ecd947de06cc37ca2560a6352b01ac4dd39fcce6d08b810.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\Ophcfddi.exeC:\Windows\system32\Ophcfddi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\Bmabeioo.exeC:\Windows\system32\Bmabeioo.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\Cogdbd32.exeC:\Windows\system32\Cogdbd32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\Cgdflfcb.exeC:\Windows\system32\Cgdflfcb.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Dficmb32.exeC:\Windows\system32\Dficmb32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\Dpbgfh32.exeC:\Windows\system32\Dpbgfh32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\Dioejm32.exeC:\Windows\system32\Dioejm32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\Emednopp.exeC:\Windows\system32\Emednopp.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\Eafijmdd.exeC:\Windows\system32\Eafijmdd.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\Fcnlbddj.exeC:\Windows\system32\Fcnlbddj.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\Gkpggfkm.exeC:\Windows\system32\Gkpggfkm.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\Hoibah32.exeC:\Windows\system32\Hoibah32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\Jnhohg32.exeC:\Windows\system32\Jnhohg32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\Mjdace32.exeC:\Windows\system32\Mjdace32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\Njodgi32.exeC:\Windows\system32\Njodgi32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\Ncjefn32.exeC:\Windows\system32\Ncjefn32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1804 -
C:\Windows\SysWOW64\Oknmqo32.exeC:\Windows\system32\Oknmqo32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1876 -
C:\Windows\SysWOW64\Pmfpif32.exeC:\Windows\system32\Pmfpif32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884 -
C:\Windows\SysWOW64\Pplbea32.exeC:\Windows\system32\Pplbea32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1380 -
C:\Windows\SysWOW64\Qhicpc32.exeC:\Windows\system32\Qhicpc32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1192 -
C:\Windows\SysWOW64\Adenpclj.exeC:\Windows\system32\Adenpclj.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1200 -
C:\Windows\SysWOW64\Alboje32.exeC:\Windows\system32\Alboje32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2040 -
C:\Windows\SysWOW64\Blghed32.exeC:\Windows\system32\Blghed32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1568 -
C:\Windows\SysWOW64\Bojnlo32.exeC:\Windows\system32\Bojnlo32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1244 -
C:\Windows\SysWOW64\Bedfiifi.exeC:\Windows\system32\Bedfiifi.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1588 -
C:\Windows\SysWOW64\Cqbqdf32.exeC:\Windows\system32\Cqbqdf32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\Cfbfbmkg.exeC:\Windows\system32\Cfbfbmkg.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:592 -
C:\Windows\SysWOW64\Dndqgn32.exeC:\Windows\system32\Dndqgn32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1780 -
C:\Windows\SysWOW64\Daejiiok.exeC:\Windows\system32\Daejiiok.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:952 -
C:\Windows\SysWOW64\Enfjlabb.exeC:\Windows\system32\Enfjlabb.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\Fllgke32.exeC:\Windows\system32\Fllgke32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1832 -
C:\Windows\SysWOW64\Fjadla32.exeC:\Windows\system32\Fjadla32.exe33⤵
- Executes dropped EXE
PID:268 -
C:\Windows\SysWOW64\Ffhdqbjf.exeC:\Windows\system32\Ffhdqbjf.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:652 -
C:\Windows\SysWOW64\Fopmbpjh.exeC:\Windows\system32\Fopmbpjh.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\Ggbggaak.exeC:\Windows\system32\Ggbggaak.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1328 -
C:\Windows\SysWOW64\Gckeabem.exeC:\Windows\system32\Gckeabem.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:960 -
C:\Windows\SysWOW64\Ghjjohaa.exeC:\Windows\system32\Ghjjohaa.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\Hpeock32.exeC:\Windows\system32\Hpeock32.exe39⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Hgogpefi.exeC:\Windows\system32\Hgogpefi.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1488 -
C:\Windows\SysWOW64\Hdcgjiec.exeC:\Windows\system32\Hdcgjiec.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:428 -
C:\Windows\SysWOW64\Hlnlnk32.exeC:\Windows\system32\Hlnlnk32.exe42⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Hfgqgain.exeC:\Windows\system32\Hfgqgain.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1036 -
C:\Windows\SysWOW64\Hjdimo32.exeC:\Windows\system32\Hjdimo32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\Ikkopg32.exeC:\Windows\system32\Ikkopg32.exe45⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\Idepnl32.exeC:\Windows\system32\Idepnl32.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:1100 -
C:\Windows\SysWOW64\Ikoikfmh.exeC:\Windows\system32\Ikoikfmh.exe47⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\Ibiahpde.exeC:\Windows\system32\Ibiahpde.exe48⤵
- Drops file in System32 directory
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\Inpama32.exeC:\Windows\system32\Inpama32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\Jgkckf32.exeC:\Windows\system32\Jgkckf32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1076 -
C:\Windows\SysWOW64\Jphdeh32.exeC:\Windows\system32\Jphdeh32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\Kicecn32.exeC:\Windows\system32\Kicecn32.exe52⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SysWOW64\Kelcnn32.exeC:\Windows\system32\Kelcnn32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\Khkojj32.exeC:\Windows\system32\Khkojj32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:932 -
C:\Windows\SysWOW64\Keopcnpl.exeC:\Windows\system32\Keopcnpl.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\Kfplkf32.exeC:\Windows\system32\Kfplkf32.exe56⤵
- Executes dropped EXE
PID:560 -
C:\Windows\SysWOW64\Kmjdhqmg.exeC:\Windows\system32\Kmjdhqmg.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Khoheimm.exeC:\Windows\system32\Khoheimm.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1872 -
C:\Windows\SysWOW64\Ljpagd32.exeC:\Windows\system32\Ljpagd32.exe59⤵
- Executes dropped EXE
PID:816 -
C:\Windows\SysWOW64\Lmqjhp32.exeC:\Windows\system32\Lmqjhp32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Lbncqf32.exeC:\Windows\system32\Lbncqf32.exe61⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\Lhjkimcn.exeC:\Windows\system32\Lhjkimcn.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Magimbfi.exeC:\Windows\system32\Magimbfi.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:612 -
C:\Windows\SysWOW64\Mpclon32.exeC:\Windows\system32\Mpclon32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Nnbplf32.exeC:\Windows\system32\Nnbplf32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:980 -
C:\Windows\SysWOW64\Oicgmbqk.exeC:\Windows\system32\Oicgmbqk.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:676 -
C:\Windows\SysWOW64\Oeldhcdl.exeC:\Windows\system32\Oeldhcdl.exe67⤵
- Modifies registry class
PID:1576 -
C:\Windows\SysWOW64\Pngefhij.exeC:\Windows\system32\Pngefhij.exe68⤵PID:1532
-
C:\Windows\SysWOW64\Pmoomdko.exeC:\Windows\system32\Pmoomdko.exe69⤵
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\Qmchhd32.exeC:\Windows\system32\Qmchhd32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1828 -
C:\Windows\SysWOW64\Aolkpk32.exeC:\Windows\system32\Aolkpk32.exe71⤵
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\Akblel32.exeC:\Windows\system32\Akblel32.exe72⤵PID:1460
-
C:\Windows\SysWOW64\Bilbah32.exeC:\Windows\system32\Bilbah32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1660 -
C:\Windows\SysWOW64\Bpmpoaol.exeC:\Windows\system32\Bpmpoaol.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1736 -
C:\Windows\SysWOW64\Chmonb32.exeC:\Windows\system32\Chmonb32.exe75⤵PID:1856
-
C:\Windows\SysWOW64\Caecghob.exeC:\Windows\system32\Caecghob.exe76⤵PID:1848
-
C:\Windows\SysWOW64\Ddiinc32.exeC:\Windows\system32\Ddiinc32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:280 -
C:\Windows\SysWOW64\Dggejn32.exeC:\Windows\system32\Dggejn32.exe78⤵PID:1116
-
C:\Windows\SysWOW64\Dogcjp32.exeC:\Windows\system32\Dogcjp32.exe79⤵PID:604
-
C:\Windows\SysWOW64\Dnlpklga.exeC:\Windows\system32\Dnlpklga.exe80⤵
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Eiadhegg.exeC:\Windows\system32\Eiadhegg.exe81⤵PID:1860
-
C:\Windows\SysWOW64\Ekpqdq32.exeC:\Windows\system32\Ekpqdq32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:360 -
C:\Windows\SysWOW64\Enomql32.exeC:\Windows\system32\Enomql32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1140 -
C:\Windows\SysWOW64\Eamimg32.exeC:\Windows\system32\Eamimg32.exe84⤵PID:2052
-
C:\Windows\SysWOW64\Eaoebg32.exeC:\Windows\system32\Eaoebg32.exe85⤵
- Modifies registry class
PID:2076 -
C:\Windows\SysWOW64\Encflkaj.exeC:\Windows\system32\Encflkaj.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\Eaabhgpm.exeC:\Windows\system32\Eaabhgpm.exe87⤵
- Modifies registry class
PID:2092 -
C:\Windows\SysWOW64\Ecpodboa.exeC:\Windows\system32\Ecpodboa.exe88⤵
- Modifies registry class
PID:2100 -
C:\Windows\SysWOW64\Efnkpnnd.exeC:\Windows\system32\Efnkpnnd.exe89⤵
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\Faflcf32.exeC:\Windows\system32\Faflcf32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\Fcdhoa32.exeC:\Windows\system32\Fcdhoa32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2124 -
C:\Windows\SysWOW64\Fjopllbh.exeC:\Windows\system32\Fjopllbh.exe92⤵PID:2132
-
C:\Windows\SysWOW64\Fiaqgh32.exeC:\Windows\system32\Fiaqgh32.exe93⤵
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\Fhijnd32.exeC:\Windows\system32\Fhijnd32.exe94⤵PID:2148
-
C:\Windows\SysWOW64\Gdddne32.exeC:\Windows\system32\Gdddne32.exe95⤵PID:2156
-
C:\Windows\SysWOW64\Ghppocfp.exeC:\Windows\system32\Ghppocfp.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2164 -
C:\Windows\SysWOW64\Gojhkn32.exeC:\Windows\system32\Gojhkn32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\Gmmigjdh.exeC:\Windows\system32\Gmmigjdh.exe98⤵PID:2180
-
C:\Windows\SysWOW64\Gihcgk32.exeC:\Windows\system32\Gihcgk32.exe99⤵
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\Glgocf32.exeC:\Windows\system32\Glgocf32.exe100⤵
- Drops file in System32 directory
PID:2196 -
C:\Windows\SysWOW64\Gpbkcemc.exeC:\Windows\system32\Gpbkcemc.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2340 -
C:\Windows\SysWOW64\Impnhh32.exeC:\Windows\system32\Impnhh32.exe102⤵
- Drops file in System32 directory
PID:2348 -
C:\Windows\SysWOW64\Kcjbde32.exeC:\Windows\system32\Kcjbde32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2356 -
C:\Windows\SysWOW64\Kmbgmkpd.exeC:\Windows\system32\Kmbgmkpd.exe104⤵
- Drops file in System32 directory
PID:2364 -
C:\Windows\SysWOW64\Kpcpnf32.exeC:\Windows\system32\Kpcpnf32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2400 -
C:\Windows\SysWOW64\Kfmhkpda.exeC:\Windows\system32\Kfmhkpda.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2420 -
C:\Windows\SysWOW64\Kinamkab.exeC:\Windows\system32\Kinamkab.exe107⤵
- Drops file in System32 directory
PID:2428 -
C:\Windows\SysWOW64\Kpgiieip.exeC:\Windows\system32\Kpgiieip.exe108⤵
- Drops file in System32 directory
PID:2436 -
C:\Windows\SysWOW64\Kbfffahc.exeC:\Windows\system32\Kbfffahc.exe109⤵
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\Kedbblgg.exeC:\Windows\system32\Kedbblgg.exe110⤵
- Modifies registry class
PID:2452 -
C:\Windows\SysWOW64\Lhbnnhfk.exeC:\Windows\system32\Lhbnnhfk.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2464 -
C:\Windows\SysWOW64\Ljhqkb32.exeC:\Windows\system32\Ljhqkb32.exe112⤵
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\Mlbphimj.exeC:\Windows\system32\Mlbphimj.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Moaled32.exeC:\Windows\system32\Moaled32.exe114⤵
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Maphap32.exeC:\Windows\system32\Maphap32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2496 -
C:\Windows\SysWOW64\Mdndmk32.exeC:\Windows\system32\Mdndmk32.exe116⤵
- Modifies registry class
PID:2504 -
C:\Windows\SysWOW64\Ngajdfec.exeC:\Windows\system32\Ngajdfec.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\Ndggcj32.exeC:\Windows\system32\Ndggcj32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2524 -
C:\Windows\SysWOW64\Nfhdkbhh.exeC:\Windows\system32\Nfhdkbhh.exe119⤵
- Modifies registry class
PID:2652 -
C:\Windows\SysWOW64\Ncoajf32.exeC:\Windows\system32\Ncoajf32.exe120⤵
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Ofmmfa32.exeC:\Windows\system32\Ofmmfa32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2668 -
C:\Windows\SysWOW64\Ojiifqll.exeC:\Windows\system32\Ojiifqll.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-