Analysis
-
max time kernel
158s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 09:05
Static task
static1
Behavioral task
behavioral1
Sample
6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exe
Resource
win10v2004-20220812-en
General
-
Target
6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exe
-
Size
101KB
-
MD5
15e45aa4afd08ecc2a101a97f6367130
-
SHA1
d98fbfb7675f2d5e3c8f1d4067305a5077bc0b8d
-
SHA256
6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c
-
SHA512
040d7c477cd89656026bb98c66f3356d60db1ac32cf6c0347e81704307d2d6c2c1e33de2d2a7874f122562aef4b3fd37a1eb847dd87b906032423bbe420bffee
-
SSDEEP
1536:mFaM0hv/CW+GhEt6H3efxWd4AvfkFVxX/m25gwclGQNM6jM4goo:mFrte3eJUTsVxOCgc0h1o
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Pgkegn32.exeCbdhgaid.exePbbnbkpe.exeJfdinf32.exeCmhigf32.exeAogkhjii.exeDagiba32.exeFglnkm32.exePoajkgnc.exeGphphj32.exeAdkelplc.exeFhflhcfa.exeOpgciodi.exeBafgdfim.exeCimhlakl.exeHoadkn32.exeCobciblp.exeFdbked32.exeMciokcgg.exeEaenkj32.exeHchihhng.exeKemhei32.exeKkdnjd32.exeMkepineo.exeDlckik32.exeNjcpok32.exeHkckeo32.exeCnboma32.exeMaefnk32.exeAjdbmf32.exeEjccgi32.exeBehbkmgb.exeFkopgn32.exeApcllk32.exeLolcnman.exeAnhcpeon.exePehghhgc.exeEjbknnid.exeIdljll32.exeLnepbm32.exeQcccom32.exeHdpbon32.exeQiocde32.exeEplckh32.exeElepei32.exeLdjodh32.exeAloekjod.exeCfqmpl32.exeCadcfd32.exeKdophj32.exeFoebmn32.exeDnkbcp32.exeAealll32.exeBbljoh32.exeDidnmp32.exeOqmhlego.exePanabc32.exeFhofmq32.exeAllpejfe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgkegn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbdhgaid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbbnbkpe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfdinf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmhigf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aogkhjii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dagiba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fglnkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Poajkgnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gphphj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adkelplc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhflhcfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opgciodi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bafgdfim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cimhlakl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hoadkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cobciblp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdbked32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mciokcgg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaenkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hchihhng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mciokcgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kemhei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkdnjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkepineo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlckik32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njcpok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkckeo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnboma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Maefnk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajdbmf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejccgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Behbkmgb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkopgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apcllk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lolcnman.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anhcpeon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pehghhgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejbknnid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idljll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnepbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcccom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdpbon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbbnbkpe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qiocde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eplckh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elepei32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldjodh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maefnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aloekjod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfqmpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qiocde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cadcfd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdophj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Foebmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnkbcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfqmpl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aealll32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbljoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Didnmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqmhlego.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Panabc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhofmq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Allpejfe.exe -
Executes dropped EXE 64 IoCs
Processes:
Jagqlj32.exeJcioiood.exeLboeaifi.exeGdgfce32.exeHakgmjoh.exeHkckeo32.exeHdlpneli.exeHoadkn32.exeHglipp32.exeHdpiid32.exeHninbj32.exeHkmnln32.exeIgcoqocb.exeIdgojc32.exeIkcdlmgf.exePhjenbhp.exeQjnkcekm.exeAihaoqlp.exeAgiamhdo.exeAimkjp32.exeBfchidda.exeBiadeoce.exeBgeaifia.exeBjfjka32.exeCikglnkj.exeCfogeb32.exeCpglnhad.exeCippgm32.exeCgqqdeod.exeCjomap32.exeCcgajfeh.exeDmpfbk32.exeDannij32.exeDhjckcgi.exeDdcqedkk.exeDjmibn32.exeEdhjqc32.exeEalkjh32.exeEangpgcl.exeEiildjag.exeEpcdqd32.exeEfmmmn32.exeFhofmq32.exeGigheh32.exeGpfjma32.exeHkbdki32.exeHaafcb32.exeHdpbon32.exeIgqkqiai.exeIkndgg32.exeIqklon32.exeIdieem32.exeIgjngh32.exeIjhjcchb.exeIqbbpm32.exeJnhpoamf.exeJkaicd32.exeKiejmi32.exeKelkaj32.exeKgjgne32.exeKnflpoqf.exePibdmp32.exePoomegpf.exePidabppl.exepid process 1752 Jagqlj32.exe 2264 Jcioiood.exe 332 Lboeaifi.exe 4880 Gdgfce32.exe 3112 Hakgmjoh.exe 4760 Hkckeo32.exe 2752 Hdlpneli.exe 3748 Hoadkn32.exe 1200 Hglipp32.exe 2708 Hdpiid32.exe 1132 Hninbj32.exe 460 Hkmnln32.exe 2504 Igcoqocb.exe 3428 Idgojc32.exe 216 Ikcdlmgf.exe 100 Phjenbhp.exe 5108 Qjnkcekm.exe 3320 Aihaoqlp.exe 752 Agiamhdo.exe 2132 Aimkjp32.exe 4824 Bfchidda.exe 1304 Biadeoce.exe 2844 Bgeaifia.exe 4332 Bjfjka32.exe 4496 Cikglnkj.exe 4196 Cfogeb32.exe 4408 Cpglnhad.exe 1640 Cippgm32.exe 2568 Cgqqdeod.exe 1956 Cjomap32.exe 4948 Ccgajfeh.exe 1520 Dmpfbk32.exe 4316 Dannij32.exe 4508 Dhjckcgi.exe 1960 Ddcqedkk.exe 2676 Djmibn32.exe 4156 Edhjqc32.exe 1784 Ealkjh32.exe 3396 Eangpgcl.exe 1096 Eiildjag.exe 4492 Epcdqd32.exe 3236 Efmmmn32.exe 4996 Fhofmq32.exe 3116 Gigheh32.exe 4376 Gpfjma32.exe 2016 Hkbdki32.exe 2088 Haafcb32.exe 5008 Hdpbon32.exe 732 Igqkqiai.exe 1684 Ikndgg32.exe 4280 Iqklon32.exe 4924 Idieem32.exe 2316 Igjngh32.exe 3200 Ijhjcchb.exe 3588 Iqbbpm32.exe 1308 Jnhpoamf.exe 3260 Jkaicd32.exe 364 Kiejmi32.exe 644 Kelkaj32.exe 916 Kgjgne32.exe 4144 Knflpoqf.exe 2404 Pibdmp32.exe 2236 Poomegpf.exe 1040 Pidabppl.exe -
Drops file in System32 directory 64 IoCs
Processes:
Bdiamnpc.exeFbqiak32.exeMnochl32.exeOkgfdm32.exeGkalbj32.exeCafpkc32.exeEjpnin32.exeLcpledob.exeNcpelbap.exeGigheh32.exePabblb32.exeKlgqabib.exeOpgciodi.exePmpmnb32.exeGiqlbqcc.exeEhlakjig.exeLpcmoi32.exePecpknke.exeQfgfpp32.exeApcllk32.exeIgjngh32.exeFmoclg32.exeAjdbmf32.exeCdaigi32.exeAaofedkl.exeAenpeoom.exeCldgmgml.exeCefolk32.exeGdnjabab.exeIiaein32.exeEdhjqc32.exePkedbmab.exeBjbnndgl.exeFhofmq32.exeEhhpge32.exeKpepmkjl.exeLjlagndl.exeEbifha32.exeHfiffd32.exeCfogeb32.exeKiejmi32.exeQbekgknb.exeAdadbi32.exePkaijl32.exeFlgfqb32.exeCaimachg.exeGbbkjgpl.exeBfchidda.exePifnhpmi.exeNlphmafm.exeMfjlolpp.exeAejmdegn.exeAcmfel32.exeIdieem32.exeGphphj32.exeJaqcnl32.exeCplckbmc.exeOdelpm32.exeHjjbmhfg.exeIjcecgnl.exeCcbadp32.exeGjaphgpl.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Bggnijof.exe Bdiamnpc.exe File created C:\Windows\SysWOW64\Dhglhbni.dll Fbqiak32.exe File opened for modification C:\Windows\SysWOW64\Mpmodg32.exe Mnochl32.exe File opened for modification C:\Windows\SysWOW64\Obanqgkl.exe Okgfdm32.exe File created C:\Windows\SysWOW64\Nneilmna.dll Gkalbj32.exe File opened for modification C:\Windows\SysWOW64\Facjlhil.exe Fbqiak32.exe File created C:\Windows\SysWOW64\Cimhlakl.exe Cafpkc32.exe File created C:\Windows\SysWOW64\Bkibdp32.dll Ejpnin32.exe File created C:\Windows\SysWOW64\Lkgdfb32.exe Lcpledob.exe File created C:\Windows\SysWOW64\Gecedf32.dll Ncpelbap.exe File created C:\Windows\SysWOW64\Gpfjma32.exe Gigheh32.exe File opened for modification C:\Windows\SysWOW64\Pemomqcn.exe Pabblb32.exe File created C:\Windows\SysWOW64\Lbqinm32.exe Klgqabib.exe File created C:\Windows\SysWOW64\Ofalfi32.exe Opgciodi.exe File created C:\Windows\SysWOW64\Ppoijn32.exe Pmpmnb32.exe File opened for modification C:\Windows\SysWOW64\Gokdoj32.exe Giqlbqcc.exe File created C:\Windows\SysWOW64\Fqcilgji.exe Ehlakjig.exe File created C:\Windows\SysWOW64\Ichkdj32.dll Lpcmoi32.exe File created C:\Windows\SysWOW64\Jkiigchm.dll Pecpknke.exe File created C:\Windows\SysWOW64\Hlkjom32.dll Qfgfpp32.exe File opened for modification C:\Windows\SysWOW64\Agndidce.exe Apcllk32.exe File created C:\Windows\SysWOW64\Ijhjcchb.exe Igjngh32.exe File created C:\Windows\SysWOW64\Fqjolfda.exe Fmoclg32.exe File created C:\Windows\SysWOW64\Aiedaoip.dll Ajdbmf32.exe File created C:\Windows\SysWOW64\Cliahf32.exe Cdaigi32.exe File created C:\Windows\SysWOW64\Pemomqcn.exe Pabblb32.exe File created C:\Windows\SysWOW64\Gafnik32.dll Aaofedkl.exe File opened for modification C:\Windows\SysWOW64\Ahmlaj32.exe Aenpeoom.exe File opened for modification C:\Windows\SysWOW64\Cobciblp.exe Cldgmgml.exe File opened for modification C:\Windows\SysWOW64\Dhdkig32.exe Cefolk32.exe File opened for modification C:\Windows\SysWOW64\Glebbpbd.exe Gdnjabab.exe File created C:\Windows\SysWOW64\Dpogkqjo.dll Iiaein32.exe File created C:\Windows\SysWOW64\Ealkjh32.exe Edhjqc32.exe File created C:\Windows\SysWOW64\Pgkegn32.exe Pkedbmab.exe File created C:\Windows\SysWOW64\Bbifobho.exe Bjbnndgl.exe File created C:\Windows\SysWOW64\Dcdepb32.dll Fhofmq32.exe File created C:\Windows\SysWOW64\Eaenkj32.exe Ehhpge32.exe File opened for modification C:\Windows\SysWOW64\Kdalni32.exe Kpepmkjl.exe File created C:\Windows\SysWOW64\Fbhacioj.dll Ljlagndl.exe File created C:\Windows\SysWOW64\Bndkgp32.dll Ebifha32.exe File created C:\Windows\SysWOW64\Qcnhngkp.dll Hfiffd32.exe File opened for modification C:\Windows\SysWOW64\Cpglnhad.exe Cfogeb32.exe File created C:\Windows\SysWOW64\Kelkaj32.exe Kiejmi32.exe File created C:\Windows\SysWOW64\Pemfefqc.dll Qbekgknb.exe File created C:\Windows\SysWOW64\Hkjbjg32.dll Adadbi32.exe File opened for modification C:\Windows\SysWOW64\Panabc32.exe Pkaijl32.exe File created C:\Windows\SysWOW64\Kcklaa32.dll Flgfqb32.exe File created C:\Windows\SysWOW64\Cipebqij.exe Caimachg.exe File created C:\Windows\SysWOW64\Hapgkmbf.dll Gbbkjgpl.exe File created C:\Windows\SysWOW64\Biadeoce.exe Bfchidda.exe File opened for modification C:\Windows\SysWOW64\Pkhjph32.exe Pifnhpmi.exe File created C:\Windows\SysWOW64\Dmjmjebk.dll Nlphmafm.exe File opened for modification C:\Windows\SysWOW64\Mmdekf32.exe Mfjlolpp.exe File created C:\Windows\SysWOW64\Mmjdpi32.dll Aejmdegn.exe File created C:\Windows\SysWOW64\Ahhbfkbf.exe Acmfel32.exe File created C:\Windows\SysWOW64\Igjngh32.exe Idieem32.exe File created C:\Windows\SysWOW64\Ddcebe32.exe Gphphj32.exe File created C:\Windows\SysWOW64\Bibokqno.dll Jaqcnl32.exe File opened for modification C:\Windows\SysWOW64\Cbjogmlf.exe Cplckbmc.exe File opened for modification C:\Windows\SysWOW64\Ofdhlh32.exe Odelpm32.exe File created C:\Windows\SysWOW64\Himche32.exe Hjjbmhfg.exe File opened for modification C:\Windows\SysWOW64\Iannpa32.exe Ijcecgnl.exe File created C:\Windows\SysWOW64\Cfqmpl32.exe Ccbadp32.exe File opened for modification C:\Windows\SysWOW64\Gkalbj32.exe Gjaphgpl.exe -
Modifies registry class 64 IoCs
Processes:
Fiajfi32.exeAnqfepaj.exeAdkelplc.exeBjqjpp32.exeHbknqeha.exeCplckbmc.exeAhdpea32.exeHadkib32.exeOmnqhbap.exeIapbodql.exeCemcqcgi.exeEhlakjig.exeDccbln32.exeFdbked32.exeHihbco32.exeBgeaifia.exeCjofambd.exeCaimachg.exeFoebmn32.exeJfbdpabn.exeKmegkp32.exeEjbknnid.exeGcdkdpih.exeIjbbfc32.exeAhnclp32.exeFcckcl32.exeGbbkjgpl.exeGphphj32.exePeajngoi.exeDcopke32.exeKcfiof32.exeIehfno32.exe6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exeIfjfhh32.exeCogmdb32.exeMmdekf32.exeNdliin32.exeGcbnopkj.exeOboakhmo.exePkaijl32.exeGkalbj32.exeLhdggb32.exeQhddgofo.exeBekfkc32.exeFfggdmbi.exeKphmbjhi.exeMcnhfb32.exeBlkdgheg.exeBhaeli32.exeClfdcgkj.exeFhofmq32.exeKdmlkfjb.exeOpgciodi.exeAacjofkp.exeBpggbm32.exeBidefbcg.exeOkgfdm32.exeCcdnjp32.exeCpjmok32.exeOjfmdk32.exeKoimbpbc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fiajfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anqfepaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adkelplc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iocmbmem.dll" Bjqjpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbknqeha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iqhqndlf.dll" Cplckbmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahdpea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oiejckcq.dll" Hadkib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Omnqhbap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iapbodql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cemcqcgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehlakjig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dccbln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdbked32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlhnob32.dll" Hihbco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgeaifia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjofambd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Caimachg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Foebmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfbdpabn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmegkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejbknnid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gclnidpl.dll" Gcdkdpih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijbbfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahnclp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcckcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hapgkmbf.dll" Gbbkjgpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aammfkln.dll" Gphphj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Peajngoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcopke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcfiof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iehfno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmdknbko.dll" Dcopke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifjfhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cogmdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmdekf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndliin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gcbnopkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oboakhmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohpanalb.dll" Pkaijl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkalbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Coffcf32.dll" Lhdggb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qhddgofo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgeaifia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcbnopkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bekfkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffggdmbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjjqmgmj.dll" Kphmbjhi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcnhfb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blkdgheg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocimikpg.dll" Bhaeli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhfceklb.dll" Clfdcgkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcdepb32.dll" Fhofmq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdmlkfjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Opgciodi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aacjofkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpggbm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bidefbcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okgfdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccdnjp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpjmok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojfmdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhodke32.dll" Koimbpbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exeJagqlj32.exeJcioiood.exeLboeaifi.exeGdgfce32.exeHakgmjoh.exeHkckeo32.exeHdlpneli.exeHoadkn32.exeHglipp32.exeHdpiid32.exeHninbj32.exeHkmnln32.exeIgcoqocb.exeIdgojc32.exeIkcdlmgf.exePhjenbhp.exeQjnkcekm.exeAihaoqlp.exeAgiamhdo.exeAimkjp32.exeBfchidda.exedescription pid process target process PID 5088 wrote to memory of 1752 5088 6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exe Jagqlj32.exe PID 5088 wrote to memory of 1752 5088 6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exe Jagqlj32.exe PID 5088 wrote to memory of 1752 5088 6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exe Jagqlj32.exe PID 1752 wrote to memory of 2264 1752 Jagqlj32.exe Jcioiood.exe PID 1752 wrote to memory of 2264 1752 Jagqlj32.exe Jcioiood.exe PID 1752 wrote to memory of 2264 1752 Jagqlj32.exe Jcioiood.exe PID 2264 wrote to memory of 332 2264 Jcioiood.exe Lboeaifi.exe PID 2264 wrote to memory of 332 2264 Jcioiood.exe Lboeaifi.exe PID 2264 wrote to memory of 332 2264 Jcioiood.exe Lboeaifi.exe PID 332 wrote to memory of 4880 332 Lboeaifi.exe Gdgfce32.exe PID 332 wrote to memory of 4880 332 Lboeaifi.exe Gdgfce32.exe PID 332 wrote to memory of 4880 332 Lboeaifi.exe Gdgfce32.exe PID 4880 wrote to memory of 3112 4880 Gdgfce32.exe Hakgmjoh.exe PID 4880 wrote to memory of 3112 4880 Gdgfce32.exe Hakgmjoh.exe PID 4880 wrote to memory of 3112 4880 Gdgfce32.exe Hakgmjoh.exe PID 3112 wrote to memory of 4760 3112 Hakgmjoh.exe Hkckeo32.exe PID 3112 wrote to memory of 4760 3112 Hakgmjoh.exe Hkckeo32.exe PID 3112 wrote to memory of 4760 3112 Hakgmjoh.exe Hkckeo32.exe PID 4760 wrote to memory of 2752 4760 Hkckeo32.exe Hdlpneli.exe PID 4760 wrote to memory of 2752 4760 Hkckeo32.exe Hdlpneli.exe PID 4760 wrote to memory of 2752 4760 Hkckeo32.exe Hdlpneli.exe PID 2752 wrote to memory of 3748 2752 Hdlpneli.exe Hoadkn32.exe PID 2752 wrote to memory of 3748 2752 Hdlpneli.exe Hoadkn32.exe PID 2752 wrote to memory of 3748 2752 Hdlpneli.exe Hoadkn32.exe PID 3748 wrote to memory of 1200 3748 Hoadkn32.exe Hglipp32.exe PID 3748 wrote to memory of 1200 3748 Hoadkn32.exe Hglipp32.exe PID 3748 wrote to memory of 1200 3748 Hoadkn32.exe Hglipp32.exe PID 1200 wrote to memory of 2708 1200 Hglipp32.exe Hdpiid32.exe PID 1200 wrote to memory of 2708 1200 Hglipp32.exe Hdpiid32.exe PID 1200 wrote to memory of 2708 1200 Hglipp32.exe Hdpiid32.exe PID 2708 wrote to memory of 1132 2708 Hdpiid32.exe Hninbj32.exe PID 2708 wrote to memory of 1132 2708 Hdpiid32.exe Hninbj32.exe PID 2708 wrote to memory of 1132 2708 Hdpiid32.exe Hninbj32.exe PID 1132 wrote to memory of 460 1132 Hninbj32.exe Hkmnln32.exe PID 1132 wrote to memory of 460 1132 Hninbj32.exe Hkmnln32.exe PID 1132 wrote to memory of 460 1132 Hninbj32.exe Hkmnln32.exe PID 460 wrote to memory of 2504 460 Hkmnln32.exe Igcoqocb.exe PID 460 wrote to memory of 2504 460 Hkmnln32.exe Igcoqocb.exe PID 460 wrote to memory of 2504 460 Hkmnln32.exe Igcoqocb.exe PID 2504 wrote to memory of 3428 2504 Igcoqocb.exe Idgojc32.exe PID 2504 wrote to memory of 3428 2504 Igcoqocb.exe Idgojc32.exe PID 2504 wrote to memory of 3428 2504 Igcoqocb.exe Idgojc32.exe PID 3428 wrote to memory of 216 3428 Idgojc32.exe Ikcdlmgf.exe PID 3428 wrote to memory of 216 3428 Idgojc32.exe Ikcdlmgf.exe PID 3428 wrote to memory of 216 3428 Idgojc32.exe Ikcdlmgf.exe PID 216 wrote to memory of 100 216 Ikcdlmgf.exe Phjenbhp.exe PID 216 wrote to memory of 100 216 Ikcdlmgf.exe Phjenbhp.exe PID 216 wrote to memory of 100 216 Ikcdlmgf.exe Phjenbhp.exe PID 100 wrote to memory of 5108 100 Phjenbhp.exe Qjnkcekm.exe PID 100 wrote to memory of 5108 100 Phjenbhp.exe Qjnkcekm.exe PID 100 wrote to memory of 5108 100 Phjenbhp.exe Qjnkcekm.exe PID 5108 wrote to memory of 3320 5108 Qjnkcekm.exe Aihaoqlp.exe PID 5108 wrote to memory of 3320 5108 Qjnkcekm.exe Aihaoqlp.exe PID 5108 wrote to memory of 3320 5108 Qjnkcekm.exe Aihaoqlp.exe PID 3320 wrote to memory of 752 3320 Aihaoqlp.exe Agiamhdo.exe PID 3320 wrote to memory of 752 3320 Aihaoqlp.exe Agiamhdo.exe PID 3320 wrote to memory of 752 3320 Aihaoqlp.exe Agiamhdo.exe PID 752 wrote to memory of 2132 752 Agiamhdo.exe Aimkjp32.exe PID 752 wrote to memory of 2132 752 Agiamhdo.exe Aimkjp32.exe PID 752 wrote to memory of 2132 752 Agiamhdo.exe Aimkjp32.exe PID 2132 wrote to memory of 4824 2132 Aimkjp32.exe Bfchidda.exe PID 2132 wrote to memory of 4824 2132 Aimkjp32.exe Bfchidda.exe PID 2132 wrote to memory of 4824 2132 Aimkjp32.exe Bfchidda.exe PID 4824 wrote to memory of 1304 4824 Bfchidda.exe Biadeoce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exe"C:\Users\Admin\AppData\Local\Temp\6d932c0fbf08926bde61a575e6a9a8ae9c288a8c64519076e0caa55f262b4c3c.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\Jagqlj32.exeC:\Windows\system32\Jagqlj32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\Jcioiood.exeC:\Windows\system32\Jcioiood.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Lboeaifi.exeC:\Windows\system32\Lboeaifi.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\Gdgfce32.exeC:\Windows\system32\Gdgfce32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\Hakgmjoh.exeC:\Windows\system32\Hakgmjoh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\Hkckeo32.exeC:\Windows\system32\Hkckeo32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\Hdlpneli.exeC:\Windows\system32\Hdlpneli.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\Hoadkn32.exeC:\Windows\system32\Hoadkn32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\Hglipp32.exeC:\Windows\system32\Hglipp32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Hdpiid32.exeC:\Windows\system32\Hdpiid32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Hninbj32.exeC:\Windows\system32\Hninbj32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\Hkmnln32.exeC:\Windows\system32\Hkmnln32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\Igcoqocb.exeC:\Windows\system32\Igcoqocb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\Idgojc32.exeC:\Windows\system32\Idgojc32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\Ikcdlmgf.exeC:\Windows\system32\Ikcdlmgf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\Phjenbhp.exeC:\Windows\system32\Phjenbhp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\SysWOW64\Qjnkcekm.exeC:\Windows\system32\Qjnkcekm.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\Aihaoqlp.exeC:\Windows\system32\Aihaoqlp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\Agiamhdo.exeC:\Windows\system32\Agiamhdo.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\Aimkjp32.exeC:\Windows\system32\Aimkjp32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Bfchidda.exeC:\Windows\system32\Bfchidda.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\Biadeoce.exeC:\Windows\system32\Biadeoce.exe23⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\Bgeaifia.exeC:\Windows\system32\Bgeaifia.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\Bjfjka32.exeC:\Windows\system32\Bjfjka32.exe25⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\Cikglnkj.exeC:\Windows\system32\Cikglnkj.exe26⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\Cfogeb32.exeC:\Windows\system32\Cfogeb32.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4196 -
C:\Windows\SysWOW64\Cpglnhad.exeC:\Windows\system32\Cpglnhad.exe28⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\Cippgm32.exeC:\Windows\system32\Cippgm32.exe29⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Cgqqdeod.exeC:\Windows\system32\Cgqqdeod.exe30⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Cjomap32.exeC:\Windows\system32\Cjomap32.exe31⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Ccgajfeh.exeC:\Windows\system32\Ccgajfeh.exe32⤵
- Executes dropped EXE
PID:4948 -
C:\Windows\SysWOW64\Dmpfbk32.exeC:\Windows\system32\Dmpfbk32.exe33⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\Dannij32.exeC:\Windows\system32\Dannij32.exe34⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\Dhjckcgi.exeC:\Windows\system32\Dhjckcgi.exe35⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\Ddcqedkk.exeC:\Windows\system32\Ddcqedkk.exe36⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Djmibn32.exeC:\Windows\system32\Djmibn32.exe37⤵
- Executes dropped EXE
PID:2676 -
C:\Windows\SysWOW64\Edhjqc32.exeC:\Windows\system32\Edhjqc32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4156 -
C:\Windows\SysWOW64\Ealkjh32.exeC:\Windows\system32\Ealkjh32.exe39⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\Eangpgcl.exeC:\Windows\system32\Eangpgcl.exe40⤵
- Executes dropped EXE
PID:3396 -
C:\Windows\SysWOW64\Eiildjag.exeC:\Windows\system32\Eiildjag.exe41⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\SysWOW64\Epcdqd32.exeC:\Windows\system32\Epcdqd32.exe42⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\Efmmmn32.exeC:\Windows\system32\Efmmmn32.exe43⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\SysWOW64\Fhofmq32.exeC:\Windows\system32\Fhofmq32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4996 -
C:\Windows\SysWOW64\Gigheh32.exeC:\Windows\system32\Gigheh32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3116 -
C:\Windows\SysWOW64\Gpfjma32.exeC:\Windows\system32\Gpfjma32.exe46⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\Hkbdki32.exeC:\Windows\system32\Hkbdki32.exe47⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\Haafcb32.exeC:\Windows\system32\Haafcb32.exe48⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\Hdpbon32.exeC:\Windows\system32\Hdpbon32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\Igqkqiai.exeC:\Windows\system32\Igqkqiai.exe50⤵
- Executes dropped EXE
PID:732 -
C:\Windows\SysWOW64\Ikndgg32.exeC:\Windows\system32\Ikndgg32.exe51⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\Iqklon32.exeC:\Windows\system32\Iqklon32.exe52⤵
- Executes dropped EXE
PID:4280 -
C:\Windows\SysWOW64\Idieem32.exeC:\Windows\system32\Idieem32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4924 -
C:\Windows\SysWOW64\Igjngh32.exeC:\Windows\system32\Igjngh32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2316 -
C:\Windows\SysWOW64\Ijhjcchb.exeC:\Windows\system32\Ijhjcchb.exe55⤵
- Executes dropped EXE
PID:3200 -
C:\Windows\SysWOW64\Iqbbpm32.exeC:\Windows\system32\Iqbbpm32.exe56⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\SysWOW64\Jnhpoamf.exeC:\Windows\system32\Jnhpoamf.exe57⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\Jkaicd32.exeC:\Windows\system32\Jkaicd32.exe58⤵
- Executes dropped EXE
PID:3260 -
C:\Windows\SysWOW64\Kiejmi32.exeC:\Windows\system32\Kiejmi32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:364 -
C:\Windows\SysWOW64\Kelkaj32.exeC:\Windows\system32\Kelkaj32.exe60⤵
- Executes dropped EXE
PID:644 -
C:\Windows\SysWOW64\Kgjgne32.exeC:\Windows\system32\Kgjgne32.exe61⤵
- Executes dropped EXE
PID:916 -
C:\Windows\SysWOW64\Knflpoqf.exeC:\Windows\system32\Knflpoqf.exe62⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\Pibdmp32.exeC:\Windows\system32\Pibdmp32.exe63⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\Poomegpf.exeC:\Windows\system32\Poomegpf.exe64⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\Pidabppl.exeC:\Windows\system32\Pidabppl.exe65⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\Poajkgnc.exeC:\Windows\system32\Poajkgnc.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3700 -
C:\Windows\SysWOW64\Pifnhpmi.exeC:\Windows\system32\Pifnhpmi.exe67⤵
- Drops file in System32 directory
PID:3960 -
C:\Windows\SysWOW64\Pkhjph32.exeC:\Windows\system32\Pkhjph32.exe68⤵PID:1588
-
C:\Windows\SysWOW64\Pabblb32.exeC:\Windows\system32\Pabblb32.exe69⤵
- Drops file in System32 directory
PID:4652 -
C:\Windows\SysWOW64\Pemomqcn.exeC:\Windows\system32\Pemomqcn.exe70⤵PID:976
-
C:\Windows\SysWOW64\Qlggjk32.exeC:\Windows\system32\Qlggjk32.exe71⤵PID:3388
-
C:\Windows\SysWOW64\Qadoba32.exeC:\Windows\system32\Qadoba32.exe72⤵PID:3384
-
C:\Windows\SysWOW64\Qljcoj32.exeC:\Windows\system32\Qljcoj32.exe73⤵PID:1376
-
C:\Windows\SysWOW64\Qcclld32.exeC:\Windows\system32\Qcclld32.exe74⤵PID:1208
-
C:\Windows\SysWOW64\Ajndioga.exeC:\Windows\system32\Ajndioga.exe75⤵PID:948
-
C:\Windows\SysWOW64\Allpejfe.exeC:\Windows\system32\Allpejfe.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3284 -
C:\Windows\SysWOW64\Cobkhb32.exeC:\Windows\system32\Cobkhb32.exe77⤵PID:2220
-
C:\Windows\SysWOW64\Cbphdn32.exeC:\Windows\system32\Cbphdn32.exe78⤵PID:3764
-
C:\Windows\SysWOW64\Cjgpfk32.exeC:\Windows\system32\Cjgpfk32.exe79⤵PID:996
-
C:\Windows\SysWOW64\Codhnb32.exeC:\Windows\system32\Codhnb32.exe80⤵PID:3544
-
C:\Windows\SysWOW64\Cbbdjm32.exeC:\Windows\system32\Cbbdjm32.exe81⤵PID:1652
-
C:\Windows\SysWOW64\Cmhigf32.exeC:\Windows\system32\Cmhigf32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2884 -
C:\Windows\SysWOW64\Ccbadp32.exeC:\Windows\system32\Ccbadp32.exe83⤵
- Drops file in System32 directory
PID:4016 -
C:\Windows\SysWOW64\Cfqmpl32.exeC:\Windows\system32\Cfqmpl32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4208 -
C:\Windows\SysWOW64\Cmjemflb.exeC:\Windows\system32\Cmjemflb.exe85⤵PID:3928
-
C:\Windows\SysWOW64\Ccdnjp32.exeC:\Windows\system32\Ccdnjp32.exe86⤵
- Modifies registry class
PID:2604 -
C:\Windows\SysWOW64\Ciafbg32.exeC:\Windows\system32\Ciafbg32.exe87⤵PID:2704
-
C:\Windows\SysWOW64\Gkkgpc32.exeC:\Windows\system32\Gkkgpc32.exe88⤵PID:5032
-
C:\Windows\SysWOW64\Gphphj32.exeC:\Windows\system32\Gphphj32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4484 -
C:\Windows\SysWOW64\Ddcebe32.exeC:\Windows\system32\Ddcebe32.exe90⤵PID:1380
-
C:\Windows\SysWOW64\Egbken32.exeC:\Windows\system32\Egbken32.exe91⤵PID:1828
-
C:\Windows\SysWOW64\Ejccgi32.exeC:\Windows\system32\Ejccgi32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3228 -
C:\Windows\SysWOW64\Famhmfkl.exeC:\Windows\system32\Famhmfkl.exe93⤵PID:3592
-
C:\Windows\SysWOW64\Fqbeoc32.exeC:\Windows\system32\Fqbeoc32.exe94⤵PID:4360
-
C:\Windows\SysWOW64\Fglnkm32.exeC:\Windows\system32\Fglnkm32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4540 -
C:\Windows\SysWOW64\Fgqgfl32.exeC:\Windows\system32\Fgqgfl32.exe96⤵PID:2732
-
C:\Windows\SysWOW64\Gjaphgpl.exeC:\Windows\system32\Gjaphgpl.exe97⤵
- Drops file in System32 directory
PID:392 -
C:\Windows\SysWOW64\Gkalbj32.exeC:\Windows\system32\Gkalbj32.exe98⤵
- Drops file in System32 directory
- Modifies registry class
PID:3996 -
C:\Windows\SysWOW64\Gbkdod32.exeC:\Windows\system32\Gbkdod32.exe99⤵PID:1836
-
C:\Windows\SysWOW64\Gkcigjel.exeC:\Windows\system32\Gkcigjel.exe100⤵PID:3600
-
C:\Windows\SysWOW64\Gcnnllcg.exeC:\Windows\system32\Gcnnllcg.exe101⤵PID:2900
-
C:\Windows\SysWOW64\Gbpnjdkg.exeC:\Windows\system32\Gbpnjdkg.exe102⤵PID:2004
-
C:\Windows\SysWOW64\Hqdkkp32.exeC:\Windows\system32\Hqdkkp32.exe103⤵PID:3352
-
C:\Windows\SysWOW64\Hkcbnh32.exeC:\Windows\system32\Hkcbnh32.exe104⤵PID:1672
-
C:\Windows\SysWOW64\Indkpcdk.exeC:\Windows\system32\Indkpcdk.exe105⤵PID:4600
-
C:\Windows\SysWOW64\Ilhkigcd.exeC:\Windows\system32\Ilhkigcd.exe106⤵PID:4536
-
C:\Windows\SysWOW64\Ijmhkchl.exeC:\Windows\system32\Ijmhkchl.exe107⤵PID:4796
-
C:\Windows\SysWOW64\Inkaqb32.exeC:\Windows\system32\Inkaqb32.exe108⤵PID:3580
-
C:\Windows\SysWOW64\Ijbbfc32.exeC:\Windows\system32\Ijbbfc32.exe109⤵
- Modifies registry class
PID:5076 -
C:\Windows\SysWOW64\Jnnnfalp.exeC:\Windows\system32\Jnnnfalp.exe110⤵PID:1620
-
C:\Windows\SysWOW64\Jaljbmkd.exeC:\Windows\system32\Jaljbmkd.exe111⤵PID:4972
-
C:\Windows\SysWOW64\Jehfcl32.exeC:\Windows\system32\Jehfcl32.exe112⤵PID:2364
-
C:\Windows\SysWOW64\Janghmia.exeC:\Windows\system32\Janghmia.exe113⤵PID:4160
-
C:\Windows\SysWOW64\Jnbgaa32.exeC:\Windows\system32\Jnbgaa32.exe114⤵PID:3900
-
C:\Windows\SysWOW64\Jaqcnl32.exeC:\Windows\system32\Jaqcnl32.exe115⤵
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\Jelonkph.exeC:\Windows\system32\Jelonkph.exe116⤵PID:4348
-
C:\Windows\SysWOW64\Jlfhke32.exeC:\Windows\system32\Jlfhke32.exe117⤵PID:1740
-
C:\Windows\SysWOW64\Jnedgq32.exeC:\Windows\system32\Jnedgq32.exe118⤵PID:4936
-
C:\Windows\SysWOW64\Jlidpe32.exeC:\Windows\system32\Jlidpe32.exe119⤵PID:4052
-
C:\Windows\SysWOW64\Jjnaaa32.exeC:\Windows\system32\Jjnaaa32.exe120⤵PID:4780
-
C:\Windows\SysWOW64\Koimbpbc.exeC:\Windows\system32\Koimbpbc.exe121⤵
- Modifies registry class
PID:544 -
C:\Windows\SysWOW64\Kkpnga32.exeC:\Windows\system32\Kkpnga32.exe122⤵PID:2480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-