Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe
Resource
win10v2004-20220901-en
General
-
Target
0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe
-
Size
50KB
-
MD5
0eb636c2d23e0a633f14bbc2fd606b20
-
SHA1
bfcd45fa874683f1263312462d3db6fc9f346ad4
-
SHA256
0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7
-
SHA512
85e72228c4b485d1286c0e896b298b1faf533fa39c396acd6dd1a7074034cde5699a00e2eb2ae2269c7c752cd0e7f90f0121ab96301ef06826ab0f7f2d948f68
-
SSDEEP
768:6kwBZx09Jf9FWTbcsqIUCVZfexxe3d/8XOPzHHag7ln3nf/IGqQ+X+FPK7WES/1E:6kwBEnP8cdEeCpHaghn3XCXOKavk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdahke32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Donmbfgm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggcjkoml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hnfeng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifkmihbo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpqcncgg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkalajgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abaadj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnphha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcmqphhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bljodmja.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqhpai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnofgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmnfnfnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqigkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnnqla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imeeeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejmdemoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggcjkoml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgcohjmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deimgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hnblchqd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faepnlnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clcajlbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gplbjamj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjimhifh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmpcce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Faepnlnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gaglck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idkkad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccnjgf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfeiip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmankjff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggoapp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Haeajc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdfklnic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khcpenhc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bljodmja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqbcghjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpnfic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhmmameb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bklflk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlfcgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqfmbg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnofgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnblchqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjkinide.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhkopf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khcpenhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amdilc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cphgjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Encgkmkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpjfdbom.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaglck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hajbpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmacejam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amblfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcgmme32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjkqgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqpfahlm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmeloe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Haeajc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcegbk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glpmfdia.exe -
Executes dropped EXE 64 IoCs
pid Process 2508 Bklflk32.exe 2032 Cmpoic32.exe 3204 Cmblob32.exe 3896 Cdkpfpfd.exe 2872 Djmbif32.exe 3844 Dcegbk32.exe 3984 Dqigkp32.exe 348 Dgcohjmn.exe 4412 Degpanlg.exe 1988 Dnpdjcch.exe 3216 Deimgn32.exe 4744 Ekcedhaa.exe 4400 Ecoihjol.exe 952 Eabjan32.exe 1108 Ejkojddf.exe 552 Eecoml32.exe 4116 Eeelcl32.exe 4184 Fnnqla32.exe 3724 Fegihlnd.exe 3908 Fcmfih32.exe 4632 Fjfnfbji.exe 732 Faqfclaf.exe 2780 Fhkopf32.exe 2152 Feooik32.exe 2744 Faepnlnq.exe 3380 Gjndgada.exe 4188 Gaglck32.exe 4552 Golmmp32.exe 2432 Glpmfdia.exe 4820 Gonibohe.exe 4972 Gjdjgp32.exe 1280 Gobcno32.exe 768 Hlfcgc32.exe 4784 Hdahke32.exe 5068 Hafieion.exe 3592 Hecakh32.exe 4540 Hlnihbma.exe 4424 Hajbpi32.exe 3284 Hmacejam.exe 1092 Idkkad32.exe 1316 Imcpji32.exe 4532 Idmhgcfg.exe 4960 Ikgpdn32.exe 484 Inflpi32.exe 1568 Ilglnqeg.exe 1776 Inhiei32.exe 3756 Iafalg32.exe 5012 Iddnhb32.exe 2316 Jedjbe32.exe 4548 Jdigcalj.exe 3772 Jkelelad.exe 5064 Jnfeggoe.exe 1372 Jdpmcq32.exe 3328 Kfpjnc32.exe 3748 Kljbjnea.exe 4620 Kohnfide.exe 4728 Kfbfcc32.exe 4256 Khcpenhc.exe 4428 Kkalajgf.exe 3648 Kdlmoold.exe 4892 Pbfahl32.exe 3996 Qefkjg32.exe 2548 Qeigpfgo.exe 2640 Amblfc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Hecakh32.exe Hafieion.exe File created C:\Windows\SysWOW64\Abaadj32.exe Amdilc32.exe File created C:\Windows\SysWOW64\Bodaei32.exe Bnbemagl.exe File created C:\Windows\SysWOW64\Pdnkib32.dll Fpqcncgg.exe File created C:\Windows\SysWOW64\Cfepbboo.exe Ccfcfg32.exe File created C:\Windows\SysWOW64\Plpfmhnn.dll Copaqh32.exe File created C:\Windows\SysWOW64\Gjmmlk32.exe Ggoapp32.exe File created C:\Windows\SysWOW64\Ohgmcihl.dll Hpeeppdp.exe File opened for modification C:\Windows\SysWOW64\Dfclcqbo.exe Cncndo32.exe File created C:\Windows\SysWOW64\Hmeloe32.exe Hnblchqd.exe File created C:\Windows\SysWOW64\Ipcaan32.exe Imeeeb32.exe File opened for modification C:\Windows\SysWOW64\Deimgn32.exe Dnpdjcch.exe File created C:\Windows\SysWOW64\Hafieion.exe Hdahke32.exe File created C:\Windows\SysWOW64\Hdeocc32.dll Apeannam.exe File opened for modification C:\Windows\SysWOW64\Cjnomaik.exe Bljodmja.exe File opened for modification C:\Windows\SysWOW64\Gaglck32.exe Gjndgada.exe File opened for modification C:\Windows\SysWOW64\Eqbcghjj.exe Encgkmkg.exe File created C:\Windows\SysWOW64\Lemomfoe.dll Ggoapp32.exe File opened for modification C:\Windows\SysWOW64\Iddnhb32.exe Iafalg32.exe File created C:\Windows\SysWOW64\Fcqhjakk.exe Fablnflh.exe File created C:\Windows\SysWOW64\Klhhlkea.dll Gjaggjlp.exe File created C:\Windows\SysWOW64\Gjdcmj32.exe Ghegao32.exe File opened for modification C:\Windows\SysWOW64\Ccnjgf32.exe Clcajlbf.exe File opened for modification C:\Windows\SysWOW64\Idmamm32.exe Hdfklnic.exe File created C:\Windows\SysWOW64\Gpoacm32.dll Idkkad32.exe File created C:\Windows\SysWOW64\Fjhdal32.exe Fgjgepeg.exe File created C:\Windows\SysWOW64\Mmpmidap.dll Fjkqgk32.exe File opened for modification C:\Windows\SysWOW64\Dnpdjcch.exe Degpanlg.exe File opened for modification C:\Windows\SysWOW64\Imcpji32.exe Idkkad32.exe File opened for modification C:\Windows\SysWOW64\Ilglnqeg.exe Inflpi32.exe File opened for modification C:\Windows\SysWOW64\Jnfeggoe.exe Jkelelad.exe File created C:\Windows\SysWOW64\Gbhing32.dll Donmbfgm.exe File created C:\Windows\SysWOW64\Fnaclk32.exe Ffjkkm32.exe File created C:\Windows\SysWOW64\Golmmp32.exe Gaglck32.exe File opened for modification C:\Windows\SysWOW64\Fjfnfbji.exe Fcmfih32.exe File created C:\Windows\SysWOW64\Imcpji32.exe Idkkad32.exe File created C:\Windows\SysWOW64\Fpgflq32.dll Iddnhb32.exe File created C:\Windows\SysWOW64\Cjnomaik.exe Bljodmja.exe File created C:\Windows\SysWOW64\Inflpi32.exe Ikgpdn32.exe File opened for modification C:\Windows\SysWOW64\Kdlmoold.exe Kkalajgf.exe File created C:\Windows\SysWOW64\Qnienneo.dll Cjchha32.exe File opened for modification C:\Windows\SysWOW64\Cncndo32.exe Ccnjgf32.exe File created C:\Windows\SysWOW64\Gpgiob32.exe Gmimcg32.exe File created C:\Windows\SysWOW64\Fcmfih32.exe Fegihlnd.exe File created C:\Windows\SysWOW64\Fbdifn32.dll Hafieion.exe File created C:\Windows\SysWOW64\Jnfeggoe.exe Jkelelad.exe File created C:\Windows\SysWOW64\Kldekbfi.dll Dfheop32.exe File opened for modification C:\Windows\SysWOW64\Egnhibpd.exe Eqdpmh32.exe File created C:\Windows\SysWOW64\Koqnnf32.dll Fplicd32.exe File opened for modification C:\Windows\SysWOW64\Cmblob32.exe Cmpoic32.exe File opened for modification C:\Windows\SysWOW64\Idmhgcfg.exe Imcpji32.exe File created C:\Windows\SysWOW64\Kohnfide.exe Kljbjnea.exe File opened for modification C:\Windows\SysWOW64\Gmimcg32.exe Fjkqgk32.exe File created C:\Windows\SysWOW64\Cbqpafdl.dll Glpmfdia.exe File created C:\Windows\SysWOW64\Jiphaoab.dll 0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe File opened for modification C:\Windows\SysWOW64\Feooik32.exe Fhkopf32.exe File opened for modification C:\Windows\SysWOW64\Gjndgada.exe Faepnlnq.exe File created C:\Windows\SysWOW64\Lfamnfdp.dll Qeigpfgo.exe File created C:\Windows\SysWOW64\Opkpkh32.dll Gplbjamj.exe File opened for modification C:\Windows\SysWOW64\Ikgpdn32.exe Idmhgcfg.exe File created C:\Windows\SysWOW64\Cknbfd32.dll Ecpocc32.exe File created C:\Windows\SysWOW64\Kpaaah32.dll Fgenjqil.exe File created C:\Windows\SysWOW64\Gfkdbkpa.exe Gpaleq32.exe File created C:\Windows\SysWOW64\Hafnbmbf.dll Cfepbboo.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 6040 5972 WerFault.exe 238 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnnqla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhkhba32.dll" Ccfcfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnnobc32.dll" Gjdcmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpgccmdn.dll" Hjkinide.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bklflk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khcpenhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oabghefk.dll" Encgkmkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpcpdcee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gjdcmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knejehee.dll" Bklflk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Degpanlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jqooceii.dll" Cmpoic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbhnihdi.dll" Ecoihjol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eecoml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egnhibpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncdpkp32.dll" Iafalg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddgbpkcj.dll" Hnfeng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmpoic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Keippf32.dll" Feooik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjocbc32.dll" Hajbpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amlmgl32.dll" Kohnfide.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpcpdcee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Meajlb32.dll" Eecoml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jojgmdbj.dll" Boohjjap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccfcfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejmdemoh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gobcno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfeiip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbafod32.dll" Haeajc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipcaan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Angljiji.dll" Degpanlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmacejam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgpkemkf.dll" Fgjgepeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggoapp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgcohjmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eggbic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eqpfahlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idmamm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnfeng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lejahfjp.dll" Fjfnfbji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Golmmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilglnqeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmkihfpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efbacc32.dll" Hmgiddel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnpdjcch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcmfih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjchha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dqigkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apeannam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpjfdbom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eqfmbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hnblchqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imeeeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hajbpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qeigpfgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmdaji32.dll" Abaadj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcgmme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Migpkfbb.dll" Hdfklnic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Agafph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdgeck32.dll" Ejmdemoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idmamm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdlmoold.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjkqgk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2508 2348 0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe 82 PID 2348 wrote to memory of 2508 2348 0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe 82 PID 2348 wrote to memory of 2508 2348 0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe 82 PID 2508 wrote to memory of 2032 2508 Bklflk32.exe 83 PID 2508 wrote to memory of 2032 2508 Bklflk32.exe 83 PID 2508 wrote to memory of 2032 2508 Bklflk32.exe 83 PID 2032 wrote to memory of 3204 2032 Cmpoic32.exe 84 PID 2032 wrote to memory of 3204 2032 Cmpoic32.exe 84 PID 2032 wrote to memory of 3204 2032 Cmpoic32.exe 84 PID 3204 wrote to memory of 3896 3204 Cmblob32.exe 85 PID 3204 wrote to memory of 3896 3204 Cmblob32.exe 85 PID 3204 wrote to memory of 3896 3204 Cmblob32.exe 85 PID 3896 wrote to memory of 2872 3896 Cdkpfpfd.exe 86 PID 3896 wrote to memory of 2872 3896 Cdkpfpfd.exe 86 PID 3896 wrote to memory of 2872 3896 Cdkpfpfd.exe 86 PID 2872 wrote to memory of 3844 2872 Djmbif32.exe 87 PID 2872 wrote to memory of 3844 2872 Djmbif32.exe 87 PID 2872 wrote to memory of 3844 2872 Djmbif32.exe 87 PID 3844 wrote to memory of 3984 3844 Dcegbk32.exe 88 PID 3844 wrote to memory of 3984 3844 Dcegbk32.exe 88 PID 3844 wrote to memory of 3984 3844 Dcegbk32.exe 88 PID 3984 wrote to memory of 348 3984 Dqigkp32.exe 89 PID 3984 wrote to memory of 348 3984 Dqigkp32.exe 89 PID 3984 wrote to memory of 348 3984 Dqigkp32.exe 89 PID 348 wrote to memory of 4412 348 Dgcohjmn.exe 90 PID 348 wrote to memory of 4412 348 Dgcohjmn.exe 90 PID 348 wrote to memory of 4412 348 Dgcohjmn.exe 90 PID 4412 wrote to memory of 1988 4412 Degpanlg.exe 91 PID 4412 wrote to memory of 1988 4412 Degpanlg.exe 91 PID 4412 wrote to memory of 1988 4412 Degpanlg.exe 91 PID 1988 wrote to memory of 3216 1988 Dnpdjcch.exe 92 PID 1988 wrote to memory of 3216 1988 Dnpdjcch.exe 92 PID 1988 wrote to memory of 3216 1988 Dnpdjcch.exe 92 PID 3216 wrote to memory of 4744 3216 Deimgn32.exe 93 PID 3216 wrote to memory of 4744 3216 Deimgn32.exe 93 PID 3216 wrote to memory of 4744 3216 Deimgn32.exe 93 PID 4744 wrote to memory of 4400 4744 Ekcedhaa.exe 94 PID 4744 wrote to memory of 4400 4744 Ekcedhaa.exe 94 PID 4744 wrote to memory of 4400 4744 Ekcedhaa.exe 94 PID 4400 wrote to memory of 952 4400 Ecoihjol.exe 95 PID 4400 wrote to memory of 952 4400 Ecoihjol.exe 95 PID 4400 wrote to memory of 952 4400 Ecoihjol.exe 95 PID 952 wrote to memory of 1108 952 Eabjan32.exe 96 PID 952 wrote to memory of 1108 952 Eabjan32.exe 96 PID 952 wrote to memory of 1108 952 Eabjan32.exe 96 PID 1108 wrote to memory of 552 1108 Ejkojddf.exe 97 PID 1108 wrote to memory of 552 1108 Ejkojddf.exe 97 PID 1108 wrote to memory of 552 1108 Ejkojddf.exe 97 PID 552 wrote to memory of 4116 552 Eecoml32.exe 98 PID 552 wrote to memory of 4116 552 Eecoml32.exe 98 PID 552 wrote to memory of 4116 552 Eecoml32.exe 98 PID 4116 wrote to memory of 4184 4116 Eeelcl32.exe 99 PID 4116 wrote to memory of 4184 4116 Eeelcl32.exe 99 PID 4116 wrote to memory of 4184 4116 Eeelcl32.exe 99 PID 4184 wrote to memory of 3724 4184 Fnnqla32.exe 100 PID 4184 wrote to memory of 3724 4184 Fnnqla32.exe 100 PID 4184 wrote to memory of 3724 4184 Fnnqla32.exe 100 PID 3724 wrote to memory of 3908 3724 Fegihlnd.exe 101 PID 3724 wrote to memory of 3908 3724 Fegihlnd.exe 101 PID 3724 wrote to memory of 3908 3724 Fegihlnd.exe 101 PID 3908 wrote to memory of 4632 3908 Fcmfih32.exe 102 PID 3908 wrote to memory of 4632 3908 Fcmfih32.exe 102 PID 3908 wrote to memory of 4632 3908 Fcmfih32.exe 102 PID 4632 wrote to memory of 732 4632 Fjfnfbji.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe"C:\Users\Admin\AppData\Local\Temp\0159dd44b9fdec419bc32b8538bd1a38e1ce37cb27f5a2c464e174698bd302e7.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\Bklflk32.exeC:\Windows\system32\Bklflk32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Cmpoic32.exeC:\Windows\system32\Cmpoic32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\Cmblob32.exeC:\Windows\system32\Cmblob32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\Cdkpfpfd.exeC:\Windows\system32\Cdkpfpfd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\Djmbif32.exeC:\Windows\system32\Djmbif32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\Dcegbk32.exeC:\Windows\system32\Dcegbk32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\Dqigkp32.exeC:\Windows\system32\Dqigkp32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\Dgcohjmn.exeC:\Windows\system32\Dgcohjmn.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\Degpanlg.exeC:\Windows\system32\Degpanlg.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\Dnpdjcch.exeC:\Windows\system32\Dnpdjcch.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\Deimgn32.exeC:\Windows\system32\Deimgn32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\Ekcedhaa.exeC:\Windows\system32\Ekcedhaa.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\Ecoihjol.exeC:\Windows\system32\Ecoihjol.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\Eabjan32.exeC:\Windows\system32\Eabjan32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\Ejkojddf.exeC:\Windows\system32\Ejkojddf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\Eecoml32.exeC:\Windows\system32\Eecoml32.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\Eeelcl32.exeC:\Windows\system32\Eeelcl32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\Fnnqla32.exeC:\Windows\system32\Fnnqla32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Fegihlnd.exeC:\Windows\system32\Fegihlnd.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\Fcmfih32.exeC:\Windows\system32\Fcmfih32.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\Fjfnfbji.exeC:\Windows\system32\Fjfnfbji.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\Faqfclaf.exeC:\Windows\system32\Faqfclaf.exe23⤵
- Executes dropped EXE
PID:732 -
C:\Windows\SysWOW64\Fhkopf32.exeC:\Windows\system32\Fhkopf32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Feooik32.exeC:\Windows\system32\Feooik32.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:2152 -
C:\Windows\SysWOW64\Faepnlnq.exeC:\Windows\system32\Faepnlnq.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2744 -
C:\Windows\SysWOW64\Gjndgada.exeC:\Windows\system32\Gjndgada.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3380 -
C:\Windows\SysWOW64\Gaglck32.exeC:\Windows\system32\Gaglck32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4188 -
C:\Windows\SysWOW64\Golmmp32.exeC:\Windows\system32\Golmmp32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:4552 -
C:\Windows\SysWOW64\Glpmfdia.exeC:\Windows\system32\Glpmfdia.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Gonibohe.exeC:\Windows\system32\Gonibohe.exe31⤵
- Executes dropped EXE
PID:4820 -
C:\Windows\SysWOW64\Gjdjgp32.exeC:\Windows\system32\Gjdjgp32.exe32⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\Gobcno32.exeC:\Windows\system32\Gobcno32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:1280 -
C:\Windows\SysWOW64\Hlfcgc32.exeC:\Windows\system32\Hlfcgc32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\Hdahke32.exeC:\Windows\system32\Hdahke32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4784 -
C:\Windows\SysWOW64\Hafieion.exeC:\Windows\system32\Hafieion.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5068 -
C:\Windows\SysWOW64\Hecakh32.exeC:\Windows\system32\Hecakh32.exe37⤵
- Executes dropped EXE
PID:3592 -
C:\Windows\SysWOW64\Hlnihbma.exeC:\Windows\system32\Hlnihbma.exe38⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\Hajbpi32.exeC:\Windows\system32\Hajbpi32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4424 -
C:\Windows\SysWOW64\Hmacejam.exeC:\Windows\system32\Hmacejam.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3284 -
C:\Windows\SysWOW64\Idkkad32.exeC:\Windows\system32\Idkkad32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1092 -
C:\Windows\SysWOW64\Imcpji32.exeC:\Windows\system32\Imcpji32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1316 -
C:\Windows\SysWOW64\Idmhgcfg.exeC:\Windows\system32\Idmhgcfg.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4532 -
C:\Windows\SysWOW64\Ikgpdn32.exeC:\Windows\system32\Ikgpdn32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4960 -
C:\Windows\SysWOW64\Inflpi32.exeC:\Windows\system32\Inflpi32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:484 -
C:\Windows\SysWOW64\Ilglnqeg.exeC:\Windows\system32\Ilglnqeg.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:1568 -
C:\Windows\SysWOW64\Inhiei32.exeC:\Windows\system32\Inhiei32.exe47⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\SysWOW64\Iafalg32.exeC:\Windows\system32\Iafalg32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3756 -
C:\Windows\SysWOW64\Iddnhb32.exeC:\Windows\system32\Iddnhb32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5012 -
C:\Windows\SysWOW64\Jedjbe32.exeC:\Windows\system32\Jedjbe32.exe50⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\Jdigcalj.exeC:\Windows\system32\Jdigcalj.exe51⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\SysWOW64\Jkelelad.exeC:\Windows\system32\Jkelelad.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3772 -
C:\Windows\SysWOW64\Jnfeggoe.exeC:\Windows\system32\Jnfeggoe.exe53⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\Jdpmcq32.exeC:\Windows\system32\Jdpmcq32.exe54⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\SysWOW64\Kfpjnc32.exeC:\Windows\system32\Kfpjnc32.exe55⤵
- Executes dropped EXE
PID:3328 -
C:\Windows\SysWOW64\Kljbjnea.exeC:\Windows\system32\Kljbjnea.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3748 -
C:\Windows\SysWOW64\Kohnfide.exeC:\Windows\system32\Kohnfide.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:4620 -
C:\Windows\SysWOW64\Kfbfcc32.exeC:\Windows\system32\Kfbfcc32.exe58⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\Khcpenhc.exeC:\Windows\system32\Khcpenhc.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4256 -
C:\Windows\SysWOW64\Kkalajgf.exeC:\Windows\system32\Kkalajgf.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4428 -
C:\Windows\SysWOW64\Kdlmoold.exeC:\Windows\system32\Kdlmoold.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:3648 -
C:\Windows\SysWOW64\Pbfahl32.exeC:\Windows\system32\Pbfahl32.exe62⤵
- Executes dropped EXE
PID:4892 -
C:\Windows\SysWOW64\Qefkjg32.exeC:\Windows\system32\Qefkjg32.exe63⤵
- Executes dropped EXE
PID:3996 -
C:\Windows\SysWOW64\Qeigpfgo.exeC:\Windows\system32\Qeigpfgo.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2548 -
C:\Windows\SysWOW64\Amblfc32.exeC:\Windows\system32\Amblfc32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\Amdilc32.exeC:\Windows\system32\Amdilc32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\Abaadj32.exeC:\Windows\system32\Abaadj32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3468 -
C:\Windows\SysWOW64\Apeannam.exeC:\Windows\system32\Apeannam.exe68⤵
- Drops file in System32 directory
- Modifies registry class
PID:4884 -
C:\Windows\SysWOW64\Aebjfeod.exeC:\Windows\system32\Aebjfeod.exe69⤵PID:224
-
C:\Windows\SysWOW64\Agafph32.exeC:\Windows\system32\Agafph32.exe70⤵
- Modifies registry class
PID:4172 -
C:\Windows\SysWOW64\Boohjjap.exeC:\Windows\system32\Boohjjap.exe71⤵
- Modifies registry class
PID:3828 -
C:\Windows\SysWOW64\Bnphha32.exeC:\Windows\system32\Bnphha32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2292 -
C:\Windows\SysWOW64\Bcmqphhf.exeC:\Windows\system32\Bcmqphhf.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:528 -
C:\Windows\SysWOW64\Bnbemagl.exeC:\Windows\system32\Bnbemagl.exe74⤵
- Drops file in System32 directory
PID:3864 -
C:\Windows\SysWOW64\Bodaei32.exeC:\Windows\system32\Bodaei32.exe75⤵PID:1264
-
C:\Windows\SysWOW64\Bljodmja.exeC:\Windows\system32\Bljodmja.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4592 -
C:\Windows\SysWOW64\Cjnomaik.exeC:\Windows\system32\Cjnomaik.exe77⤵PID:2340
-
C:\Windows\SysWOW64\Cphgjl32.exeC:\Windows\system32\Cphgjl32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4940 -
C:\Windows\SysWOW64\Ccfcfg32.exeC:\Windows\system32\Ccfcfg32.exe79⤵
- Drops file in System32 directory
- Modifies registry class
PID:4316 -
C:\Windows\SysWOW64\Cfepbboo.exeC:\Windows\system32\Cfepbboo.exe80⤵
- Drops file in System32 directory
PID:3480 -
C:\Windows\SysWOW64\Cjqlca32.exeC:\Windows\system32\Cjqlca32.exe81⤵PID:4292
-
C:\Windows\SysWOW64\Cpjdpkoe.exeC:\Windows\system32\Cpjdpkoe.exe82⤵PID:2352
-
C:\Windows\SysWOW64\Cciplgni.exeC:\Windows\system32\Cciplgni.exe83⤵PID:1884
-
C:\Windows\SysWOW64\Cgdlle32.exeC:\Windows\system32\Cgdlle32.exe84⤵PID:1428
-
C:\Windows\SysWOW64\Cjchha32.exeC:\Windows\system32\Cjchha32.exe85⤵
- Drops file in System32 directory
- Modifies registry class
PID:4608 -
C:\Windows\SysWOW64\Copaqh32.exeC:\Windows\system32\Copaqh32.exe86⤵
- Drops file in System32 directory
PID:1844 -
C:\Windows\SysWOW64\Cfjimbkj.exeC:\Windows\system32\Cfjimbkj.exe87⤵PID:5084
-
C:\Windows\SysWOW64\Clcajlbf.exeC:\Windows\system32\Clcajlbf.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\Ccnjgf32.exeC:\Windows\system32\Ccnjgf32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3456 -
C:\Windows\SysWOW64\Cncndo32.exeC:\Windows\system32\Cncndo32.exe90⤵
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\Dfclcqbo.exeC:\Windows\system32\Dfclcqbo.exe91⤵PID:4324
-
C:\Windows\SysWOW64\Dqhpai32.exeC:\Windows\system32\Dqhpai32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4808 -
C:\Windows\SysWOW64\Dcgmme32.exeC:\Windows\system32\Dcgmme32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4920 -
C:\Windows\SysWOW64\Dfeiip32.exeC:\Windows\system32\Dfeiip32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4556 -
C:\Windows\SysWOW64\Donmbfgm.exeC:\Windows\system32\Donmbfgm.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3424 -
C:\Windows\SysWOW64\Dfheop32.exeC:\Windows\system32\Dfheop32.exe96⤵
- Drops file in System32 directory
PID:5004 -
C:\Windows\SysWOW64\Dmankjff.exeC:\Windows\system32\Dmankjff.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3120 -
C:\Windows\SysWOW64\Eggbic32.exeC:\Windows\system32\Eggbic32.exe98⤵
- Modifies registry class
PID:4512 -
C:\Windows\SysWOW64\Eqpfahlm.exeC:\Windows\system32\Eqpfahlm.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4200 -
C:\Windows\SysWOW64\Encgkmkg.exeC:\Windows\system32\Encgkmkg.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1524 -
C:\Windows\SysWOW64\Eqbcghjj.exeC:\Windows\system32\Eqbcghjj.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3408 -
C:\Windows\SysWOW64\Ecpocc32.exeC:\Windows\system32\Ecpocc32.exe102⤵
- Drops file in System32 directory
PID:4616 -
C:\Windows\SysWOW64\Ejjgpnak.exeC:\Windows\system32\Ejjgpnak.exe103⤵PID:1608
-
C:\Windows\SysWOW64\Eqdpmh32.exeC:\Windows\system32\Eqdpmh32.exe104⤵
- Drops file in System32 directory
PID:524 -
C:\Windows\SysWOW64\Egnhibpd.exeC:\Windows\system32\Egnhibpd.exe105⤵
- Modifies registry class
PID:4704 -
C:\Windows\SysWOW64\Ejmdemoh.exeC:\Windows\system32\Ejmdemoh.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3396 -
C:\Windows\SysWOW64\Eqfmbg32.exeC:\Windows\system32\Eqfmbg32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1008 -
C:\Windows\SysWOW64\Eceinc32.exeC:\Windows\system32\Eceinc32.exe108⤵PID:5080
-
C:\Windows\SysWOW64\Fmmmgh32.exeC:\Windows\system32\Fmmmgh32.exe109⤵PID:3808
-
C:\Windows\SysWOW64\Fplicd32.exeC:\Windows\system32\Fplicd32.exe110⤵
- Drops file in System32 directory
PID:3012 -
C:\Windows\SysWOW64\Fmpjmh32.exeC:\Windows\system32\Fmpjmh32.exe111⤵PID:4792
-
C:\Windows\SysWOW64\Fpnfic32.exeC:\Windows\system32\Fpnfic32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4828 -
C:\Windows\SysWOW64\Fgenjqil.exeC:\Windows\system32\Fgenjqil.exe113⤵
- Drops file in System32 directory
PID:3740 -
C:\Windows\SysWOW64\Fnofgk32.exeC:\Windows\system32\Fnofgk32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5132 -
C:\Windows\SysWOW64\Fpqcncgg.exeC:\Windows\system32\Fpqcncgg.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5148 -
C:\Windows\SysWOW64\Ffjkkm32.exeC:\Windows\system32\Ffjkkm32.exe116⤵
- Drops file in System32 directory
PID:5160 -
C:\Windows\SysWOW64\Fnaclk32.exeC:\Windows\system32\Fnaclk32.exe117⤵PID:5180
-
C:\Windows\SysWOW64\Fpcpdcee.exeC:\Windows\system32\Fpcpdcee.exe118⤵
- Modifies registry class
PID:5196 -
C:\Windows\SysWOW64\Fgjgepeg.exeC:\Windows\system32\Fgjgepeg.exe119⤵
- Drops file in System32 directory
- Modifies registry class
PID:5212 -
C:\Windows\SysWOW64\Fjhdal32.exeC:\Windows\system32\Fjhdal32.exe120⤵PID:5228
-
C:\Windows\SysWOW64\Fablnflh.exeC:\Windows\system32\Fablnflh.exe121⤵
- Drops file in System32 directory
PID:5244 -
C:\Windows\SysWOW64\Fcqhjakk.exeC:\Windows\system32\Fcqhjakk.exe122⤵PID:5260
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-