Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 09:04
Static task
static1
Behavioral task
behavioral1
Sample
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe
Resource
win10v2004-20220812-en
General
-
Target
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe
-
Size
50KB
-
MD5
fce9148493315ca2d1650cb6f22882d0
-
SHA1
661929a6602af34c11a55a155d8a52c531c29988
-
SHA256
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430
-
SHA512
d7afab27eb2adca34b621c76c239cd864ef92187f3f8943939142014aa2da7bf652bd24acec0b29b892274e156f2c0a5aad35d507f1880209bf5ec2614b0ba24
-
SSDEEP
768:++jx/Qc5QtHKaNlKanbuVv1rbERwif21kIZe2YtuFkkvj5V99999999aieCHRe/T:1jx/Qcut/qanIFbDif2LZe2YkaeEFN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Gaibod32.exeHpeeppdp.exeNklfoi32.exeFcneeo32.exeHnmeodjc.exeBkcjqbab.exeDbgnjicb.exeGpjfdbom.exeFacjlhil.exeGejoei32.exePclneicb.exeEbnddn32.exeGqkhda32.exeFiaogfai.exeBpfkdl32.exeJjmhppqd.exeDohfbj32.exeEadopc32.exeIkjcmi32.exeGjiepdkm.exePpkpgmba.exeFpcpdcee.exeOilmnbpg.exeFhgjblfq.exeHkohchko.exeIelfgmnj.exeDmkcpdao.exeDidqkeeq.exeImgbkb32.exeEhekqe32.exeJdhine32.exeOdbgim32.exeImeeeb32.exeAifiko32.exeMpolqa32.exeDpemacql.exeOcgdji32.exeOmjpeo32.exeGedohfmp.exeMibbbg32.exeAddhiink.exeBegcad32.exeHebkid32.exeCoojfa32.exeFmficqpc.exeLkeekk32.exeBehiln32.exeFdgdgnbm.exeDhcfleff.exe50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exeBnkicmik.exeLnfgcn32.exeGndbie32.exeKdmlkfjb.exeKkqefcdk.exeNicjhchb.exeNghgipmj.exeJlanpfkj.exeJhejgl32.exeEpopgbia.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaibod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpeeppdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nklfoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcneeo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnmeodjc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkcjqbab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbgnjicb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpjfdbom.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Facjlhil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gejoei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pclneicb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebnddn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqkhda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fiaogfai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpfkdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjmhppqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dohfbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eadopc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikjcmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjiepdkm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppkpgmba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpcpdcee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oilmnbpg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhgjblfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkohchko.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ielfgmnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmkcpdao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Didqkeeq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imgbkb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehekqe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdhine32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odbgim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikjcmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imeeeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aifiko32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpolqa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpemacql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocgdji32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omjpeo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gedohfmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mibbbg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Addhiink.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Begcad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hebkid32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coojfa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmficqpc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkeekk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Behiln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdgdgnbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhcfleff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnkicmik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnfgcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gndbie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdmlkfjb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkqefcdk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nicjhchb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nghgipmj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlanpfkj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhejgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epopgbia.exe -
Executes dropped EXE 64 IoCs
Processes:
Dbhdeofn.exeDbjajo32.exeDlbfcdkk.exeDiffmi32.exeDlebid32.exeEpbkoboo.exeEohhpodg.exeElliiccq.exeEfamflbg.exeElneoc32.exeEefjhhgo.exeEplneagd.exeEeifmhel.exeFlcojb32.exeFbmggl32.exeFigocflb.exeFochlmjj.exeFcaqblpp.exeFpeakpoj.exeFojnll32.exeGchfbk32.exeGheoka32.exeGckchj32.exeGieled32.exeGgilni32.exeGodqbk32.exeGjiepdkm.exeGcbiii32.exeHhobap32.exeHcdfni32.exeHpmpbm32.exeHcnidh32.exeIqainlfj.exeImkghm32.exeIfckab32.exeIqhpok32.exeIgbhkeho.exeIqkldk32.exeJgedqe32.exeJifahmlj.exeJfjabakd.exeJqpfojjj.exeJjhjhpaj.exeJcpoae32.exeJjmcco32.exeKggjmbeg.exeKcnkbckk.exeKikcjjib.exeLpelgd32.exeLimppjgp.exeLgopnapo.exeLmkifhnf.exeLfdmon32.exeLibiki32.exeLhcjiq32.exeLcjjnaan.exeLigcfhoe.exeMibbbg32.exeNdhgop32.exeNdjceo32.exeNiglmfab.exeNhhlkn32.exeNmedcd32.exeNmgaidef.exepid process 3468 Dbhdeofn.exe 4580 Dbjajo32.exe 3064 Dlbfcdkk.exe 2412 Diffmi32.exe 4536 Dlebid32.exe 2368 Epbkoboo.exe 4908 Eohhpodg.exe 4900 Elliiccq.exe 4816 Efamflbg.exe 1388 Elneoc32.exe 4360 Eefjhhgo.exe 3904 Eplneagd.exe 5092 Eeifmhel.exe 4136 Flcojb32.exe 3212 Fbmggl32.exe 3848 Figocflb.exe 4228 Fochlmjj.exe 4188 Fcaqblpp.exe 208 Fpeakpoj.exe 2484 Fojnll32.exe 2788 Gchfbk32.exe 1256 Gheoka32.exe 5060 Gckchj32.exe 3984 Gieled32.exe 3432 Ggilni32.exe 4548 Godqbk32.exe 4304 Gjiepdkm.exe 3136 Gcbiii32.exe 4024 Hhobap32.exe 1504 Hcdfni32.exe 4616 Hpmpbm32.exe 2380 Hcnidh32.exe 1636 Iqainlfj.exe 2044 Imkghm32.exe 3700 Ifckab32.exe 860 Iqhpok32.exe 4512 Igbhkeho.exe 332 Iqkldk32.exe 1480 Jgedqe32.exe 3024 Jifahmlj.exe 1476 Jfjabakd.exe 1304 Jqpfojjj.exe 540 Jjhjhpaj.exe 1384 Jcpoae32.exe 440 Jjmcco32.exe 1776 Kggjmbeg.exe 1952 Kcnkbckk.exe 4656 Kikcjjib.exe 3808 Lpelgd32.exe 4716 Limppjgp.exe 60 Lgopnapo.exe 2460 Lmkifhnf.exe 4724 Lfdmon32.exe 536 Libiki32.exe 3488 Lhcjiq32.exe 4988 Lcjjnaan.exe 3440 Ligcfhoe.exe 3472 Mibbbg32.exe 2916 Ndhgop32.exe 1000 Ndjceo32.exe 4720 Niglmfab.exe 888 Nhhlkn32.exe 3556 Nmedcd32.exe 3596 Nmgaidef.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dbdano32.exePafcfpnj.exeHndiih32.exeAliobieh.exeDllmfd32.exeDchbhn32.exeMpaifalo.exePhaahggp.exeDqhpai32.exeGjojbkoc.exeBlpechop.exeEelpqi32.exeJfbdpabn.exeFcaqblpp.exeBigimb32.exeCfbcke32.exeDhclmp32.exeBqnemp32.exeEefjhhgo.exeOdmiam32.exeFhfedgmh.exeLddikg32.exeHannao32.exeGkeakl32.exeIfphkbep.exeGchfbk32.exeLfdmon32.exeDjgljk32.exeHlnqln32.exeCggibe32.exeMqbpqgpj.exePagdol32.exeFhgjblfq.exePhigif32.exeBlnoga32.exeJqpfojjj.exePajlao32.exeAoeniefo.exeElccfc32.exeHjfihc32.exeIpqnahgf.exePdkoch32.exeJhoeef32.exeMhiabbdi.exeGlinjqhb.exeCeeapg32.exeAepmpe32.exeDlojkddn.exeFneoma32.exeDfclcqbo.exeJgdpog32.exeDokjbp32.exeLekmnajj.exeGclimi32.exeEfoloo32.exeQnkdhpjn.exeAhdged32.exedescription ioc process File created C:\Windows\SysWOW64\Dagajlal.exe Dbdano32.exe File opened for modification C:\Windows\SysWOW64\Pgbkng32.exe Pafcfpnj.exe File created C:\Windows\SysWOW64\Hpeeppdp.exe Hndiih32.exe File opened for modification C:\Windows\SysWOW64\Apekch32.exe Aliobieh.exe File opened for modification C:\Windows\SysWOW64\Dokjbp32.exe Dllmfd32.exe File opened for modification C:\Windows\SysWOW64\Dakbckbe.exe Dchbhn32.exe File created C:\Windows\SysWOW64\Mcpebmkb.exe Mpaifalo.exe File created C:\Windows\SysWOW64\Fklenm32.dll Phaahggp.exe File opened for modification C:\Windows\SysWOW64\Egionb32.exe Dqhpai32.exe File created C:\Windows\SysWOW64\Gaibod32.exe Gjojbkoc.exe File created C:\Windows\SysWOW64\Booaodnd.exe Blpechop.exe File created C:\Windows\SysWOW64\Bhcbdkfh.dll Eelpqi32.exe File created C:\Windows\SysWOW64\Cdfbfb32.dll Jfbdpabn.exe File created C:\Windows\SysWOW64\Kjipmoai.exe File created C:\Windows\SysWOW64\Adabbe32.dll File opened for modification C:\Windows\SysWOW64\Fpeakpoj.exe Fcaqblpp.exe File created C:\Windows\SysWOW64\Bpaaimgp.exe Bigimb32.exe File opened for modification C:\Windows\SysWOW64\Dokgdkeh.exe Cfbcke32.exe File created C:\Windows\SysWOW64\Dkahilkl.exe Dhclmp32.exe File opened for modification C:\Windows\SysWOW64\Bjfjee32.exe Bqnemp32.exe File opened for modification C:\Windows\SysWOW64\Eplneagd.exe Eefjhhgo.exe File created C:\Windows\SysWOW64\Pijaic32.exe Odmiam32.exe File created C:\Windows\SysWOW64\Fnpmaa32.exe Fhfedgmh.exe File created C:\Windows\SysWOW64\Ejcnod32.dll Lddikg32.exe File created C:\Windows\SysWOW64\Hcljmj32.exe Hannao32.exe File opened for modification C:\Windows\SysWOW64\Gclimi32.exe Gkeakl32.exe File created C:\Windows\SysWOW64\Iljpgl32.exe Ifphkbep.exe File opened for modification C:\Windows\SysWOW64\Gheoka32.exe Gchfbk32.exe File created C:\Windows\SysWOW64\Libiki32.exe Lfdmon32.exe File created C:\Windows\SysWOW64\Jpgcaa32.dll Djgljk32.exe File opened for modification C:\Windows\SysWOW64\Hakidd32.exe Hlnqln32.exe File created C:\Windows\SysWOW64\Qciebg32.exe File created C:\Windows\SysWOW64\Lfbpae32.dll File opened for modification C:\Windows\SysWOW64\Apfhajjf.exe File created C:\Windows\SysWOW64\Mfhjna32.dll Cggibe32.exe File created C:\Windows\SysWOW64\Mklcagpj.dll Mqbpqgpj.exe File opened for modification C:\Windows\SysWOW64\Qcepkg32.exe Pagdol32.exe File created C:\Windows\SysWOW64\Bojlop32.dll Fhgjblfq.exe File created C:\Windows\SysWOW64\Pocpfphe.exe Phigif32.exe File created C:\Windows\SysWOW64\Bjjhhfnd.dll Blnoga32.exe File created C:\Windows\SysWOW64\Jjhjhpaj.exe Jqpfojjj.exe File created C:\Windows\SysWOW64\Phddniaa.exe Pajlao32.exe File created C:\Windows\SysWOW64\Molpnchg.dll Aoeniefo.exe File created C:\Windows\SysWOW64\Epopgbia.exe Elccfc32.exe File created C:\Windows\SysWOW64\Hcnnaikp.exe Hjfihc32.exe File created C:\Windows\SysWOW64\Fojkiimn.dll Ipqnahgf.exe File created C:\Windows\SysWOW64\Phfjcf32.exe Pdkoch32.exe File opened for modification C:\Windows\SysWOW64\Kbeibo32.exe Jhoeef32.exe File opened for modification C:\Windows\SysWOW64\Maaekg32.exe Mhiabbdi.exe File created C:\Windows\SysWOW64\Bcdqnmmm.dll Glinjqhb.exe File created C:\Windows\SysWOW64\Fqogjk32.dll Ceeapg32.exe File created C:\Windows\SysWOW64\Apeannam.exe Aepmpe32.exe File opened for modification C:\Windows\SysWOW64\Dchbhn32.exe Dlojkddn.exe File created C:\Windows\SysWOW64\Ibkonk32.dll Fneoma32.exe File created C:\Windows\SysWOW64\Kcfnqccd.exe File created C:\Windows\SysWOW64\Acbhhf32.exe File opened for modification C:\Windows\SysWOW64\Dqhpai32.exe Dfclcqbo.exe File created C:\Windows\SysWOW64\Jkplpfbn.exe Jgdpog32.exe File created C:\Windows\SysWOW64\Kpmkpqcp.dll Dokjbp32.exe File opened for modification C:\Windows\SysWOW64\Lkeekk32.exe Lekmnajj.exe File created C:\Windows\SysWOW64\Gekeie32.exe Gclimi32.exe File created C:\Windows\SysWOW64\Lonaca32.dll Efoloo32.exe File created C:\Windows\SysWOW64\Qeemej32.exe Qnkdhpjn.exe File opened for modification C:\Windows\SysWOW64\Aehgnied.exe Ahdged32.exe -
Modifies registry class 64 IoCs
Processes:
Jomeoggk.exeBilcef32.exeFpcpdcee.exeDpefaq32.exeGekeie32.exeCgaqphgl.exeHlgjko32.exeJkplpfbn.exeHimcoo32.exeKkihknfg.exeMcklgm32.exePknqoc32.exeKmegbjgn.exeCpacqg32.exeFfnglc32.exeCbknhqbl.exeHpmpbm32.exeDoggag32.exeAcjjfggb.exeAjneip32.exeJbbmmo32.exeEmikfocj.exeMdpalp32.exeCgejkh32.exePdkoch32.exeIljpgl32.exeHcdfni32.exeHffcni32.exeQiappono.exeLgbnmm32.exeClkndpag.exeMqnfeh32.exeOpkoflco.exeGcjdam32.exeIameid32.exeBbalaoda.exeCmgjee32.exePpdjfnhj.exeBkcjqbab.exeDfclcqbo.exeFmpjmh32.exeGkalbj32.exeIqhpok32.exeDohfbj32.exeKhkdad32.exeAbcppq32.exeCbdhgaid.exeOkmfpm32.exeDlojkddn.exeKdkoef32.exeDaeddlco.exeFalcli32.exeGkhbbi32.exeIlfodgeg.exeLehhqg32.exeAimhmkgn.exeEblgon32.exeKblpcndd.exeDeejpjgc.exeGmecikkj.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jomeoggk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bilcef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpcpdcee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpcpdcee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpefaq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gekeie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgaqphgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbiiah32.dll" Hlgjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgfqmlko.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkplpfbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Himcoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkihknfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcklgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngbjmd32.dll" Pknqoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmegbjgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpacqg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffnglc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbknhqbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhbplf32.dll" Hpmpbm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Doggag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acjjfggb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfcibe32.dll" Ajneip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbbmmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emikfocj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdpalp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phbcfe32.dll" Cgejkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hopnfa32.dll" Pdkoch32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iljpgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcdfni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hffcni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qiappono.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgbnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnigkegh.dll" Clkndpag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mqnfeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Opkoflco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apocmn32.dll" Gcjdam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iameid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbalaoda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmgjee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppdjfnhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkcjqbab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdejgmgi.dll" Dfclcqbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gqoakock.dll" Fmpjmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eocmgd32.dll" Gkalbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iqhpok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dohfbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khkdad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abcppq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbdhgaid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dqdhibia.dll" Okmfpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlojkddn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbbojb32.dll" Kdkoef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmdqfa32.dll" Daeddlco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Falcli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkhbbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pinffi32.dll" Ilfodgeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpjepamq.dll" Lehhqg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aimhmkgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lifmdfkg.dll" Eblgon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kblpcndd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmgjee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gacbag32.dll" Deejpjgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ichhbe32.dll" Gmecikkj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exeDbhdeofn.exeDbjajo32.exeDlbfcdkk.exeDiffmi32.exeDlebid32.exeEpbkoboo.exeEohhpodg.exeElliiccq.exeEfamflbg.exeElneoc32.exeEefjhhgo.exeEplneagd.exeEeifmhel.exeFlcojb32.exeFbmggl32.exeFigocflb.exeFochlmjj.exeFcaqblpp.exeFpeakpoj.exeFojnll32.exeGchfbk32.exedescription pid process target process PID 680 wrote to memory of 3468 680 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe Dbhdeofn.exe PID 680 wrote to memory of 3468 680 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe Dbhdeofn.exe PID 680 wrote to memory of 3468 680 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe Dbhdeofn.exe PID 3468 wrote to memory of 4580 3468 Dbhdeofn.exe Dbjajo32.exe PID 3468 wrote to memory of 4580 3468 Dbhdeofn.exe Dbjajo32.exe PID 3468 wrote to memory of 4580 3468 Dbhdeofn.exe Dbjajo32.exe PID 4580 wrote to memory of 3064 4580 Dbjajo32.exe Dlbfcdkk.exe PID 4580 wrote to memory of 3064 4580 Dbjajo32.exe Dlbfcdkk.exe PID 4580 wrote to memory of 3064 4580 Dbjajo32.exe Dlbfcdkk.exe PID 3064 wrote to memory of 2412 3064 Dlbfcdkk.exe Diffmi32.exe PID 3064 wrote to memory of 2412 3064 Dlbfcdkk.exe Diffmi32.exe PID 3064 wrote to memory of 2412 3064 Dlbfcdkk.exe Diffmi32.exe PID 2412 wrote to memory of 4536 2412 Diffmi32.exe Dlebid32.exe PID 2412 wrote to memory of 4536 2412 Diffmi32.exe Dlebid32.exe PID 2412 wrote to memory of 4536 2412 Diffmi32.exe Dlebid32.exe PID 4536 wrote to memory of 2368 4536 Dlebid32.exe Epbkoboo.exe PID 4536 wrote to memory of 2368 4536 Dlebid32.exe Epbkoboo.exe PID 4536 wrote to memory of 2368 4536 Dlebid32.exe Epbkoboo.exe PID 2368 wrote to memory of 4908 2368 Epbkoboo.exe Eohhpodg.exe PID 2368 wrote to memory of 4908 2368 Epbkoboo.exe Eohhpodg.exe PID 2368 wrote to memory of 4908 2368 Epbkoboo.exe Eohhpodg.exe PID 4908 wrote to memory of 4900 4908 Eohhpodg.exe Elliiccq.exe PID 4908 wrote to memory of 4900 4908 Eohhpodg.exe Elliiccq.exe PID 4908 wrote to memory of 4900 4908 Eohhpodg.exe Elliiccq.exe PID 4900 wrote to memory of 4816 4900 Elliiccq.exe Efamflbg.exe PID 4900 wrote to memory of 4816 4900 Elliiccq.exe Efamflbg.exe PID 4900 wrote to memory of 4816 4900 Elliiccq.exe Efamflbg.exe PID 4816 wrote to memory of 1388 4816 Efamflbg.exe Elneoc32.exe PID 4816 wrote to memory of 1388 4816 Efamflbg.exe Elneoc32.exe PID 4816 wrote to memory of 1388 4816 Efamflbg.exe Elneoc32.exe PID 1388 wrote to memory of 4360 1388 Elneoc32.exe Eefjhhgo.exe PID 1388 wrote to memory of 4360 1388 Elneoc32.exe Eefjhhgo.exe PID 1388 wrote to memory of 4360 1388 Elneoc32.exe Eefjhhgo.exe PID 4360 wrote to memory of 3904 4360 Eefjhhgo.exe Eplneagd.exe PID 4360 wrote to memory of 3904 4360 Eefjhhgo.exe Eplneagd.exe PID 4360 wrote to memory of 3904 4360 Eefjhhgo.exe Eplneagd.exe PID 3904 wrote to memory of 5092 3904 Eplneagd.exe Eeifmhel.exe PID 3904 wrote to memory of 5092 3904 Eplneagd.exe Eeifmhel.exe PID 3904 wrote to memory of 5092 3904 Eplneagd.exe Eeifmhel.exe PID 5092 wrote to memory of 4136 5092 Eeifmhel.exe Flcojb32.exe PID 5092 wrote to memory of 4136 5092 Eeifmhel.exe Flcojb32.exe PID 5092 wrote to memory of 4136 5092 Eeifmhel.exe Flcojb32.exe PID 4136 wrote to memory of 3212 4136 Flcojb32.exe Fbmggl32.exe PID 4136 wrote to memory of 3212 4136 Flcojb32.exe Fbmggl32.exe PID 4136 wrote to memory of 3212 4136 Flcojb32.exe Fbmggl32.exe PID 3212 wrote to memory of 3848 3212 Fbmggl32.exe Figocflb.exe PID 3212 wrote to memory of 3848 3212 Fbmggl32.exe Figocflb.exe PID 3212 wrote to memory of 3848 3212 Fbmggl32.exe Figocflb.exe PID 3848 wrote to memory of 4228 3848 Figocflb.exe Fochlmjj.exe PID 3848 wrote to memory of 4228 3848 Figocflb.exe Fochlmjj.exe PID 3848 wrote to memory of 4228 3848 Figocflb.exe Fochlmjj.exe PID 4228 wrote to memory of 4188 4228 Fochlmjj.exe Fcaqblpp.exe PID 4228 wrote to memory of 4188 4228 Fochlmjj.exe Fcaqblpp.exe PID 4228 wrote to memory of 4188 4228 Fochlmjj.exe Fcaqblpp.exe PID 4188 wrote to memory of 208 4188 Fcaqblpp.exe Fpeakpoj.exe PID 4188 wrote to memory of 208 4188 Fcaqblpp.exe Fpeakpoj.exe PID 4188 wrote to memory of 208 4188 Fcaqblpp.exe Fpeakpoj.exe PID 208 wrote to memory of 2484 208 Fpeakpoj.exe Fojnll32.exe PID 208 wrote to memory of 2484 208 Fpeakpoj.exe Fojnll32.exe PID 208 wrote to memory of 2484 208 Fpeakpoj.exe Fojnll32.exe PID 2484 wrote to memory of 2788 2484 Fojnll32.exe Gchfbk32.exe PID 2484 wrote to memory of 2788 2484 Fojnll32.exe Gchfbk32.exe PID 2484 wrote to memory of 2788 2484 Fojnll32.exe Gchfbk32.exe PID 2788 wrote to memory of 1256 2788 Gchfbk32.exe Gheoka32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe"C:\Users\Admin\AppData\Local\Temp\50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\Dbhdeofn.exeC:\Windows\system32\Dbhdeofn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\Dbjajo32.exeC:\Windows\system32\Dbjajo32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\Dlbfcdkk.exeC:\Windows\system32\Dlbfcdkk.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\Diffmi32.exeC:\Windows\system32\Diffmi32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\Dlebid32.exeC:\Windows\system32\Dlebid32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\Epbkoboo.exeC:\Windows\system32\Epbkoboo.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\Eohhpodg.exeC:\Windows\system32\Eohhpodg.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\Elliiccq.exeC:\Windows\system32\Elliiccq.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\Efamflbg.exeC:\Windows\system32\Efamflbg.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\Elneoc32.exeC:\Windows\system32\Elneoc32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\Eefjhhgo.exeC:\Windows\system32\Eefjhhgo.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\Eplneagd.exeC:\Windows\system32\Eplneagd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\Eeifmhel.exeC:\Windows\system32\Eeifmhel.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\Flcojb32.exeC:\Windows\system32\Flcojb32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\Fbmggl32.exeC:\Windows\system32\Fbmggl32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\Figocflb.exeC:\Windows\system32\Figocflb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\Fochlmjj.exeC:\Windows\system32\Fochlmjj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\Fcaqblpp.exeC:\Windows\system32\Fcaqblpp.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\Fpeakpoj.exeC:\Windows\system32\Fpeakpoj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\Fojnll32.exeC:\Windows\system32\Fojnll32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Gchfbk32.exeC:\Windows\system32\Gchfbk32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Gheoka32.exeC:\Windows\system32\Gheoka32.exe23⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\SysWOW64\Gckchj32.exeC:\Windows\system32\Gckchj32.exe24⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\Gieled32.exeC:\Windows\system32\Gieled32.exe25⤵
- Executes dropped EXE
PID:3984 -
C:\Windows\SysWOW64\Ggilni32.exeC:\Windows\system32\Ggilni32.exe26⤵
- Executes dropped EXE
PID:3432 -
C:\Windows\SysWOW64\Godqbk32.exeC:\Windows\system32\Godqbk32.exe27⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\SysWOW64\Gjiepdkm.exeC:\Windows\system32\Gjiepdkm.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4304 -
C:\Windows\SysWOW64\Gcbiii32.exeC:\Windows\system32\Gcbiii32.exe29⤵
- Executes dropped EXE
PID:3136 -
C:\Windows\SysWOW64\Hhobap32.exeC:\Windows\system32\Hhobap32.exe30⤵
- Executes dropped EXE
PID:4024 -
C:\Windows\SysWOW64\Hcdfni32.exeC:\Windows\system32\Hcdfni32.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:1504 -
C:\Windows\SysWOW64\Hpmpbm32.exeC:\Windows\system32\Hpmpbm32.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:4616 -
C:\Windows\SysWOW64\Hcnidh32.exeC:\Windows\system32\Hcnidh32.exe33⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Iqainlfj.exeC:\Windows\system32\Iqainlfj.exe34⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\Imkghm32.exeC:\Windows\system32\Imkghm32.exe35⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Ifckab32.exeC:\Windows\system32\Ifckab32.exe36⤵
- Executes dropped EXE
PID:3700 -
C:\Windows\SysWOW64\Iqhpok32.exeC:\Windows\system32\Iqhpok32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\Igbhkeho.exeC:\Windows\system32\Igbhkeho.exe38⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\SysWOW64\Iqkldk32.exeC:\Windows\system32\Iqkldk32.exe39⤵
- Executes dropped EXE
PID:332 -
C:\Windows\SysWOW64\Jgedqe32.exeC:\Windows\system32\Jgedqe32.exe40⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\Jifahmlj.exeC:\Windows\system32\Jifahmlj.exe41⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Jfjabakd.exeC:\Windows\system32\Jfjabakd.exe42⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\Jqpfojjj.exeC:\Windows\system32\Jqpfojjj.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1304 -
C:\Windows\SysWOW64\Jjhjhpaj.exeC:\Windows\system32\Jjhjhpaj.exe44⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\Jcpoae32.exeC:\Windows\system32\Jcpoae32.exe45⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\SysWOW64\Jjmcco32.exeC:\Windows\system32\Jjmcco32.exe46⤵
- Executes dropped EXE
PID:440 -
C:\Windows\SysWOW64\Kggjmbeg.exeC:\Windows\system32\Kggjmbeg.exe47⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\SysWOW64\Kcnkbckk.exeC:\Windows\system32\Kcnkbckk.exe48⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Kikcjjib.exeC:\Windows\system32\Kikcjjib.exe49⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\SysWOW64\Lpelgd32.exeC:\Windows\system32\Lpelgd32.exe50⤵
- Executes dropped EXE
PID:3808 -
C:\Windows\SysWOW64\Limppjgp.exeC:\Windows\system32\Limppjgp.exe51⤵
- Executes dropped EXE
PID:4716 -
C:\Windows\SysWOW64\Lgopnapo.exeC:\Windows\system32\Lgopnapo.exe52⤵
- Executes dropped EXE
PID:60 -
C:\Windows\SysWOW64\Lmkifhnf.exeC:\Windows\system32\Lmkifhnf.exe53⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\Lfdmon32.exeC:\Windows\system32\Lfdmon32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4724 -
C:\Windows\SysWOW64\Libiki32.exeC:\Windows\system32\Libiki32.exe55⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\Lhcjiq32.exeC:\Windows\system32\Lhcjiq32.exe56⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\Lcjjnaan.exeC:\Windows\system32\Lcjjnaan.exe57⤵
- Executes dropped EXE
PID:4988 -
C:\Windows\SysWOW64\Ligcfhoe.exeC:\Windows\system32\Ligcfhoe.exe58⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\Mibbbg32.exeC:\Windows\system32\Mibbbg32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3472 -
C:\Windows\SysWOW64\Ndhgop32.exeC:\Windows\system32\Ndhgop32.exe60⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Ndjceo32.exeC:\Windows\system32\Ndjceo32.exe61⤵
- Executes dropped EXE
PID:1000 -
C:\Windows\SysWOW64\Niglmfab.exeC:\Windows\system32\Niglmfab.exe62⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\SysWOW64\Nhhlkn32.exeC:\Windows\system32\Nhhlkn32.exe63⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\Nmedcd32.exeC:\Windows\system32\Nmedcd32.exe64⤵
- Executes dropped EXE
PID:3556 -
C:\Windows\SysWOW64\Nmgaidef.exeC:\Windows\system32\Nmgaidef.exe65⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\Nhmefmel.exeC:\Windows\system32\Nhmefmel.exe66⤵PID:1420
-
C:\Windows\SysWOW64\Oaejob32.exeC:\Windows\system32\Oaejob32.exe67⤵PID:2880
-
C:\Windows\SysWOW64\Ogbbgi32.exeC:\Windows\system32\Ogbbgi32.exe68⤵PID:4032
-
C:\Windows\SysWOW64\Oahgdbjj.exeC:\Windows\system32\Oahgdbjj.exe69⤵PID:4180
-
C:\Windows\SysWOW64\Okpkmh32.exeC:\Windows\system32\Okpkmh32.exe70⤵PID:1596
-
C:\Windows\SysWOW64\Opmceo32.exeC:\Windows\system32\Opmceo32.exe71⤵PID:3464
-
C:\Windows\SysWOW64\Oiehndeb.exeC:\Windows\system32\Oiehndeb.exe72⤵PID:2008
-
C:\Windows\SysWOW64\Odkllm32.exeC:\Windows\system32\Odkllm32.exe73⤵PID:2888
-
C:\Windows\SysWOW64\Oihedd32.exeC:\Windows\system32\Oihedd32.exe74⤵PID:4928
-
C:\Windows\SysWOW64\Odmiam32.exeC:\Windows\system32\Odmiam32.exe75⤵
- Drops file in System32 directory
PID:4252 -
C:\Windows\SysWOW64\Pijaic32.exeC:\Windows\system32\Pijaic32.exe76⤵PID:2200
-
C:\Windows\SysWOW64\Ppdjfnhj.exeC:\Windows\system32\Ppdjfnhj.exe77⤵
- Modifies registry class
PID:5004 -
C:\Windows\SysWOW64\Pkincf32.exeC:\Windows\system32\Pkincf32.exe78⤵PID:1360
-
C:\Windows\SysWOW64\Ppfflm32.exeC:\Windows\system32\Ppfflm32.exe79⤵PID:4532
-
C:\Windows\SysWOW64\Pklkif32.exeC:\Windows\system32\Pklkif32.exe80⤵PID:1868
-
C:\Windows\SysWOW64\Pafcfpnj.exeC:\Windows\system32\Pafcfpnj.exe81⤵
- Drops file in System32 directory
PID:4124 -
C:\Windows\SysWOW64\Pgbkng32.exeC:\Windows\system32\Pgbkng32.exe82⤵PID:720
-
C:\Windows\SysWOW64\Ppkpgmba.exeC:\Windows\system32\Ppkpgmba.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2040 -
C:\Windows\SysWOW64\Pgehcf32.exeC:\Windows\system32\Pgehcf32.exe84⤵PID:4072
-
C:\Windows\SysWOW64\Pajlao32.exeC:\Windows\system32\Pajlao32.exe85⤵
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\Phddniaa.exeC:\Windows\system32\Phddniaa.exe86⤵PID:232
-
C:\Windows\SysWOW64\Qnamfq32.exeC:\Windows\system32\Qnamfq32.exe87⤵PID:752
-
C:\Windows\SysWOW64\Qdkebjfe.exeC:\Windows\system32\Qdkebjfe.exe88⤵PID:4832
-
C:\Windows\SysWOW64\Adbkci32.exeC:\Windows\system32\Adbkci32.exe89⤵PID:4972
-
C:\Windows\SysWOW64\Aklcpchj.exeC:\Windows\system32\Aklcpchj.exe90⤵PID:3508
-
C:\Windows\SysWOW64\Addhiink.exeC:\Windows\system32\Addhiink.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3920 -
C:\Windows\SysWOW64\Akopec32.exeC:\Windows\system32\Akopec32.exe92⤵PID:1188
-
C:\Windows\SysWOW64\Aqkinj32.exeC:\Windows\system32\Aqkinj32.exe93⤵PID:1120
-
C:\Windows\SysWOW64\Ageajdkl.exeC:\Windows\system32\Ageajdkl.exe94⤵PID:3252
-
C:\Windows\SysWOW64\Abkehm32.exeC:\Windows\system32\Abkehm32.exe95⤵PID:1548
-
C:\Windows\SysWOW64\Bhendgbo.exeC:\Windows\system32\Bhendgbo.exe96⤵PID:852
-
C:\Windows\SysWOW64\Bkcjqbab.exeC:\Windows\system32\Bkcjqbab.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3608 -
C:\Windows\SysWOW64\Bqpbiipj.exeC:\Windows\system32\Bqpbiipj.exe98⤵PID:2716
-
C:\Windows\SysWOW64\Bjhgao32.exeC:\Windows\system32\Bjhgao32.exe99⤵PID:1588
-
C:\Windows\SysWOW64\Bqboni32.exeC:\Windows\system32\Bqboni32.exe100⤵PID:3672
-
C:\Windows\SysWOW64\Bglgkced.exeC:\Windows\system32\Bglgkced.exe101⤵PID:4308
-
C:\Windows\SysWOW64\Bjkcgodg.exeC:\Windows\system32\Bjkcgodg.exe102⤵PID:1160
-
C:\Windows\SysWOW64\Bqeldi32.exeC:\Windows\system32\Bqeldi32.exe103⤵PID:5080
-
C:\Windows\SysWOW64\Bilcef32.exeC:\Windows\system32\Bilcef32.exe104⤵
- Modifies registry class
PID:3404 -
C:\Windows\SysWOW64\Bjmpmnbe.exeC:\Windows\system32\Bjmpmnbe.exe105⤵PID:4460
-
C:\Windows\SysWOW64\Bqghih32.exeC:\Windows\system32\Bqghih32.exe106⤵PID:784
-
C:\Windows\SysWOW64\Binpkfjd.exeC:\Windows\system32\Binpkfjd.exe107⤵PID:4044
-
C:\Windows\SysWOW64\Bnkicmik.exeC:\Windows\system32\Bnkicmik.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4804 -
C:\Windows\SysWOW64\Ceeapg32.exeC:\Windows\system32\Ceeapg32.exe109⤵
- Drops file in System32 directory
PID:4284 -
C:\Windows\SysWOW64\Ckoilage.exeC:\Windows\system32\Ckoilage.exe110⤵PID:3764
-
C:\Windows\SysWOW64\Cbiaik32.exeC:\Windows\system32\Cbiaik32.exe111⤵PID:3656
-
C:\Windows\SysWOW64\Cgfjabmi.exeC:\Windows\system32\Cgfjabmi.exe112⤵PID:3748
-
C:\Windows\SysWOW64\Cjdfmmlm.exeC:\Windows\system32\Cjdfmmlm.exe113⤵PID:4620
-
C:\Windows\SysWOW64\Cqnojg32.exeC:\Windows\system32\Cqnojg32.exe114⤵PID:2800
-
C:\Windows\SysWOW64\Caqkpg32.exeC:\Windows\system32\Caqkpg32.exe115⤵PID:2576
-
C:\Windows\SysWOW64\Cgjclaid.exeC:\Windows\system32\Cgjclaid.exe116⤵PID:1524
-
C:\Windows\SysWOW64\Cbphjj32.exeC:\Windows\system32\Cbphjj32.exe117⤵PID:2864
-
C:\Windows\SysWOW64\Cijpfdpg.exeC:\Windows\system32\Cijpfdpg.exe118⤵PID:5128
-
C:\Windows\SysWOW64\Cjklnl32.exeC:\Windows\system32\Cjklnl32.exe119⤵PID:5144
-
C:\Windows\SysWOW64\Deqqke32.exeC:\Windows\system32\Deqqke32.exe120⤵PID:5160
-
C:\Windows\SysWOW64\Dniedk32.exeC:\Windows\system32\Dniedk32.exe121⤵PID:5176
-
C:\Windows\SysWOW64\Dbdaeied.exeC:\Windows\system32\Dbdaeied.exe122⤵PID:5192
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-