Analysis
-
max time kernel
172s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96.exe
Resource
win10v2004-20220812-en
General
-
Target
a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96.exe
-
Size
50KB
-
MD5
31ee7ce727323c249ff9148e1a625ef0
-
SHA1
23f7e70eadf9cbbb482cdb8c5a95b3c9ca39f022
-
SHA256
a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96
-
SHA512
a2bd535d691218b12af903e565116ca6282087242bffa71abb1e73a01a289333268026ef50b902864086f5e30f6e304563440c58c37dbd4a5b6fd155d60be01e
-
SSDEEP
768:FJE/Cp+hXnAd8CW9QPEgkuE2OfSoqcORvZ4LrZ5jq/1H5:/Uhwd8aHkuE9ivZ+Hc
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ohiemobf.exeDgdgijhp.exeBnbeggmi.exeCljomc32.exeDannij32.exeGhegao32.exeAclpap32.exeBfdodjhm.exeOohnonij.exePpopjp32.exeQjlnnemp.exeHgnoki32.exeNmomchdg.exeIpjoee32.exeAompak32.exeDmifkecb.exeHcgjhega.exeEcmeig32.exeNijeec32.exeDpjompqc.exeNifnao32.exeEagaoh32.exeEaindh32.exeJgogbgei.exeNjghbl32.exeHeegad32.exeCjjcfabm.exePfnegggi.exeAqmlknnd.exeEmgblc32.exeGcqhcgqi.exeLpmmhpgp.exeAgjhgngj.exePlimfb32.exeBoikpiie.exeCpjdiadb.exePifgoglh.exeFfhnen32.exeFcloob32.exeOkgaijaj.exeFipkjb32.exeGmpcmkaa.exeKaajfe32.exeNnimia32.exeDmoafjhi.exeBfedoc32.exeDinmhkke.exeJjdjoane.exeMlpokp32.exeGggfme32.exeBjlbhbkn.exeGddqejni.exeHfnpca32.exeMngegmbc.exeBmbiamhi.exeKqbkfkal.exeMjneln32.exeGbfldf32.exeDmhkoaco.exeJgpfmncg.exeQcbfakec.exeHpbiip32.exeOehlkc32.exeBpemkcck.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohiemobf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgdgijhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnbeggmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cljomc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dannij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghegao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aclpap32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfdodjhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oohnonij.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppopjp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjlnnemp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgnoki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmomchdg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipjoee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aompak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmifkecb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcgjhega.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecmeig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nijeec32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpjompqc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nifnao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eagaoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaindh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgogbgei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njghbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Heegad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjjcfabm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfnegggi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqmlknnd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emgblc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcqhcgqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpmmhpgp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agjhgngj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plimfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boikpiie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpjdiadb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pifgoglh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffhnen32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcloob32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okgaijaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fipkjb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmpcmkaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaajfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnimia32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmoafjhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfedoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dinmhkke.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjdjoane.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlpokp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gggfme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjlbhbkn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gddqejni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfnpca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mngegmbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmbiamhi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kqbkfkal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjneln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbfldf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmhkoaco.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgpfmncg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcbfakec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpbiip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oehlkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpemkcck.exe -
Executes dropped EXE 64 IoCs
Processes:
Lfpcdaob.exeLialfl32.exeLfelpq32.exeLmodlkbi.exeMblmdaqq.exeMopmnf32.exeMelffm32.exeMkfncgeo.exeMflbpp32.exeNmjdhi32.exeNnlqpanj.exeNlpaiemd.exeNbjifp32.exeNmomchdg.exeNblfkobn.exeNmajihbd.exeNfjoan32.exeNpbcjc32.exeNeokbj32.exeOngpkpdm.exeOimdihdc.exeOnjmao32.exeOedeniig.exeOpiikbim.exeOmmjdfhg.exeOmpfjf32.exePifgoglh.exePpblaaab.exePepdihoj.exePlimfb32.exePfoackfl.exePllilaed.exePedndg32.exePlnfaaba.exeQbjkckhk.exeQeigpfgo.exeQidcpe32.exeQlcplq32.exeQbmhikfi.exeAekdefel.exeAlelbpmi.exeAgkqoilo.exeAlgigpkf.exeAbaadj32.exeAepmpe32.exeAcdnjjpq.exeAmlombnd.exeBchgei32.exeBckdji32.exeBnphha32.exeBigimb32.exeBneacaei.exeBofnji32.exeBjlbhbkn.exeBoikpiie.exeCnjknp32.exeCokgehgb.exeCjqlca32.exeComdkh32.exeCfgmhbml.exeClaedl32.exeCckmaflf.exeCnqaoo32.exeCobnfgaj.exepid process 3360 Lfpcdaob.exe 4624 Lialfl32.exe 4840 Lfelpq32.exe 4788 Lmodlkbi.exe 4808 Mblmdaqq.exe 4688 Mopmnf32.exe 2308 Melffm32.exe 4476 Mkfncgeo.exe 4672 Mflbpp32.exe 4928 Nmjdhi32.exe 4268 Nnlqpanj.exe 544 Nlpaiemd.exe 1376 Nbjifp32.exe 2808 Nmomchdg.exe 3980 Nblfkobn.exe 2636 Nmajihbd.exe 1388 Nfjoan32.exe 204 Npbcjc32.exe 4892 Neokbj32.exe 3364 Ongpkpdm.exe 5052 Oimdihdc.exe 2652 Onjmao32.exe 3672 Oedeniig.exe 4908 Opiikbim.exe 3708 Ommjdfhg.exe 4228 Ompfjf32.exe 4964 Pifgoglh.exe 1088 Ppblaaab.exe 4048 Pepdihoj.exe 3912 Plimfb32.exe 2248 Pfoackfl.exe 2260 Pllilaed.exe 2616 Pedndg32.exe 2212 Plnfaaba.exe 444 Qbjkckhk.exe 3756 Qeigpfgo.exe 4460 Qidcpe32.exe 3224 Qlcplq32.exe 740 Qbmhikfi.exe 4940 Aekdefel.exe 2600 Alelbpmi.exe 1740 Agkqoilo.exe 4028 Algigpkf.exe 4880 Abaadj32.exe 4796 Aepmpe32.exe 3740 Acdnjjpq.exe 2460 Amlombnd.exe 880 Bchgei32.exe 1408 Bckdji32.exe 1172 Bnphha32.exe 5104 Bigimb32.exe 1404 Bneacaei.exe 4300 Bofnji32.exe 5084 Bjlbhbkn.exe 3712 Boikpiie.exe 1548 Cnjknp32.exe 1768 Cokgehgb.exe 3192 Cjqlca32.exe 1552 Comdkh32.exe 4344 Cfgmhbml.exe 2208 Claedl32.exe 2828 Cckmaflf.exe 1372 Cnqaoo32.exe 4152 Cobnfgaj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Djdflp32.exePmpfcl32.exeCpjdiadb.exeNmjdhi32.exeFmbflm32.exeJopaejlo.exeKolaqh32.exePlimfb32.exeBeglgani.exePgflqkdd.exeLnbklm32.exeIajmmm32.exeJmjojh32.exeBigimb32.exeFnofgk32.exeHhagmm32.exeAcgolj32.exeEiildjag.exeHcbpme32.exeHjdcfp32.exeImpldi32.exeNnlqpanj.exeDnhgoned.exeEjhkjn32.exeDjmibn32.exeFcmnkh32.exeJondojna.exeFjkqgk32.exeEfdjgo32.exeNahgoe32.exeGnoacp32.exeHhmmkcko.exeGpjfng32.exeAqncedbp.exePoodpmca.exeQcdbfk32.exeOogpjbbb.exeHnjaonij.exeCqajpj32.exeCjjcfabm.exeKahpgcch.exeAclpap32.exeDgdgijhp.exePoqckdap.exeDmifkecb.exeGqkajk32.exeAcdnjjpq.exeGmnfnfnf.exeBmkcqn32.exeDmglcj32.exeNcmaai32.exeBnphha32.exeNjiegl32.exeHmlbij32.exeJbdlop32.exeLolcnman.exeDlfniafa.exeAnogiicl.exeBciehh32.exeLeopnglc.exeOoejohhq.exeDmoafjhi.exeFqkfmgbp.exeEekaebcm.exedescription ioc process File created C:\Windows\SysWOW64\Nmiakk32.dll Djdflp32.exe File created C:\Windows\SysWOW64\Poqckdap.exe Pmpfcl32.exe File created C:\Windows\SysWOW64\Ccipelcf.exe Cpjdiadb.exe File opened for modification C:\Windows\SysWOW64\Nnlqpanj.exe Nmjdhi32.exe File created C:\Windows\SysWOW64\Fodobp32.dll Fmbflm32.exe File opened for modification C:\Windows\SysWOW64\Kaonaekb.exe Jopaejlo.exe File opened for modification C:\Windows\SysWOW64\Lpmmhpgp.exe Kolaqh32.exe File created C:\Windows\SysWOW64\Pfoackfl.exe Plimfb32.exe File created C:\Windows\SysWOW64\Hjjdjk32.dll Beglgani.exe File created C:\Windows\SysWOW64\Lmdijf32.dll Pgflqkdd.exe File opened for modification C:\Windows\SysWOW64\Lihpif32.exe Lnbklm32.exe File created C:\Windows\SysWOW64\Ieeimlep.exe Iajmmm32.exe File opened for modification C:\Windows\SysWOW64\Jddggb32.exe Jmjojh32.exe File opened for modification C:\Windows\SysWOW64\Bneacaei.exe Bigimb32.exe File created C:\Windows\SysWOW64\Fcloob32.exe Fnofgk32.exe File created C:\Windows\SysWOW64\Gogiek32.dll Hhagmm32.exe File created C:\Windows\SysWOW64\Ajqgidij.exe Acgolj32.exe File opened for modification C:\Windows\SysWOW64\Eaqdegaj.exe Eiildjag.exe File created C:\Windows\SysWOW64\Kgaljo32.dll Hcbpme32.exe File created C:\Windows\SysWOW64\Hbcbcc32.dll Hjdcfp32.exe File created C:\Windows\SysWOW64\Ddifbphg.dll Impldi32.exe File created C:\Windows\SysWOW64\Nfppejnc.dll Nnlqpanj.exe File opened for modification C:\Windows\SysWOW64\Doidgf32.exe Dnhgoned.exe File created C:\Windows\SysWOW64\Oabghefk.dll Ejhkjn32.exe File created C:\Windows\SysWOW64\Eipinkib.exe Djmibn32.exe File created C:\Windows\SysWOW64\Bdnofdgl.dll Fcmnkh32.exe File opened for modification C:\Windows\SysWOW64\Jgiiclkl.exe Jondojna.exe File opened for modification C:\Windows\SysWOW64\Gmimcg32.exe Fjkqgk32.exe File created C:\Windows\SysWOW64\Gcklla32.dll Efdjgo32.exe File opened for modification C:\Windows\SysWOW64\Niooqcad.exe Nahgoe32.exe File created C:\Windows\SysWOW64\Gdhjpjjd.exe Gnoacp32.exe File created C:\Windows\SysWOW64\Hfajlp32.exe Hhmmkcko.exe File created C:\Windows\SysWOW64\Kennoank.dll Gpjfng32.exe File opened for modification C:\Windows\SysWOW64\Aclpap32.exe Aqncedbp.exe File opened for modification C:\Windows\SysWOW64\Pgflqkdd.exe Poodpmca.exe File created C:\Windows\SysWOW64\Qfbobf32.exe Qcdbfk32.exe File opened for modification C:\Windows\SysWOW64\Heegad32.exe Oogpjbbb.exe File created C:\Windows\SysWOW64\Dmdmpk32.dll Hnjaonij.exe File created C:\Windows\SysWOW64\Qccoeglp.dll Cqajpj32.exe File created C:\Windows\SysWOW64\Iamfph32.dll Cjjcfabm.exe File created C:\Windows\SysWOW64\Kdfmcobk.exe Kahpgcch.exe File created C:\Windows\SysWOW64\Ickfifmb.dll Aclpap32.exe File opened for modification C:\Windows\SysWOW64\Dmnpfd32.exe Dgdgijhp.exe File created C:\Windows\SysWOW64\Kgjlgghg.dll Poqckdap.exe File created C:\Windows\SysWOW64\Ebldoh32.dll Dmifkecb.exe File created C:\Windows\SysWOW64\Foeeml32.dll Gqkajk32.exe File created C:\Windows\SysWOW64\Amlombnd.exe Acdnjjpq.exe File created C:\Windows\SysWOW64\Opkpkh32.dll Gmnfnfnf.exe File created C:\Windows\SysWOW64\Boipmj32.exe Bmkcqn32.exe File created C:\Windows\SysWOW64\Ddadpdmn.exe Dmglcj32.exe File created C:\Windows\SysWOW64\Napameoi.exe Ncmaai32.exe File created C:\Windows\SysWOW64\Edhlbdad.dll Bnphha32.exe File created C:\Windows\SysWOW64\Nonlon32.dll Njiegl32.exe File opened for modification C:\Windows\SysWOW64\Ipjoee32.exe Hmlbij32.exe File created C:\Windows\SysWOW64\Jdbhkk32.exe Jbdlop32.exe File created C:\Windows\SysWOW64\Lkcccn32.exe Lolcnman.exe File created C:\Windows\SysWOW64\Pjqgggni.dll Dlfniafa.exe File opened for modification C:\Windows\SysWOW64\Aqncedbp.exe Anogiicl.exe File opened for modification C:\Windows\SysWOW64\Bgeaifia.exe Bciehh32.exe File created C:\Windows\SysWOW64\Lijlof32.exe Leopnglc.exe File created C:\Windows\SysWOW64\Fipkjb32.exe Ooejohhq.exe File created C:\Windows\SysWOW64\Epalclhk.dll Dmoafjhi.exe File created C:\Windows\SysWOW64\Hgoodiad.dll Fqkfmgbp.exe File created C:\Windows\SysWOW64\Acbmpm32.dll Eekaebcm.exe -
Modifies registry class 64 IoCs
Processes:
Ejmdemoh.exeBmpcfdmg.exeDclkee32.exeHpbiip32.exeAgojdnng.exeNkjqme32.exeEglkdbag.exeBgnkhg32.exeJjdjoane.exeFmgpmg32.exeOohnonij.exeAjhniccb.exeGjnlha32.exeNbjifp32.exeFcloob32.exeJddggb32.exePpopjp32.exeEaindh32.exeLmodlkbi.exeEabbjc32.exeHcembe32.exeJopaejlo.exeLialfl32.exeFplicd32.exeCgndoeag.exeEiijfd32.exeHcbpme32.exePqcjepfo.exeBihjfnmm.exeHjchaf32.exeIlhkigcd.exeKoekpi32.exeLdpoinjq.exeAlbpff32.exeGadimkpb.exeIhagfb32.exeCjqlca32.exeAgiamhdo.exeIdbodn32.exeComdkh32.exeEaqdegaj.exeFfjkdc32.exeCjgbcpap.exeBnkgeg32.exePlhnda32.exeEpeohn32.exeCpjdiadb.exeAjeadd32.exeNahgoe32.exeBckddn32.exeFmbflm32.exeHhbkinel.exeLcjldk32.exeFlhoinbl.exeHmdlhk32.exeHmkeekag.exeGmfpgmil.exeFqkfmgbp.exeNajceeoo.exeFcmnkh32.exeEdmclccp.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejmdemoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmpcfdmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dclkee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpbiip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnpmgngb.dll" Agojdnng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkjqme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jebjhg32.dll" Eglkdbag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgnkhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjdjoane.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmgpmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oohnonij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kidiae32.dll" Ajhniccb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjnlha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbjifp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eglkdbag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcloob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbkdla32.dll" Jddggb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnfafakb.dll" Ppopjp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eaindh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oehmfihf.dll" Lmodlkbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eabbjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcembe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jopaejlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lialfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fplicd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnpnbg32.dll" Cgndoeag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eiijfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcbpme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pqcjepfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bihjfnmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfokdq32.dll" Hjchaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilhkigcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Koekpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldpoinjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Albpff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gadimkpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihagfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hofokb32.dll" Cjqlca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agiamhdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idbodn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Comdkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eaqdegaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Allchp32.dll" Ffjkdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjgbcpap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnkgeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plhnda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Epeohn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpjdiadb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhkmnj32.dll" Ajeadd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Befhip32.dll" Nahgoe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bckddn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fodobp32.dll" Fmbflm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pglcqmml.dll" Jopaejlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhbkinel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcjldk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nblipdgh.dll" Flhoinbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmdlhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpigao32.dll" Hmkeekag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmqcjihb.dll" Gmfpgmil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fqkfmgbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghpldkpc.dll" Najceeoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcjldk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdnofdgl.dll" Fcmnkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edmclccp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96.exeLfpcdaob.exeLialfl32.exeLfelpq32.exeLmodlkbi.exeMblmdaqq.exeMopmnf32.exeMelffm32.exeMkfncgeo.exeMflbpp32.exeNmjdhi32.exeNnlqpanj.exeNlpaiemd.exeNbjifp32.exeNmomchdg.exeNblfkobn.exeNmajihbd.exeNfjoan32.exeNpbcjc32.exeNeokbj32.exeOngpkpdm.exeOimdihdc.exedescription pid process target process PID 2200 wrote to memory of 3360 2200 a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96.exe Lfpcdaob.exe PID 2200 wrote to memory of 3360 2200 a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96.exe Lfpcdaob.exe PID 2200 wrote to memory of 3360 2200 a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96.exe Lfpcdaob.exe PID 3360 wrote to memory of 4624 3360 Lfpcdaob.exe Lialfl32.exe PID 3360 wrote to memory of 4624 3360 Lfpcdaob.exe Lialfl32.exe PID 3360 wrote to memory of 4624 3360 Lfpcdaob.exe Lialfl32.exe PID 4624 wrote to memory of 4840 4624 Lialfl32.exe Lfelpq32.exe PID 4624 wrote to memory of 4840 4624 Lialfl32.exe Lfelpq32.exe PID 4624 wrote to memory of 4840 4624 Lialfl32.exe Lfelpq32.exe PID 4840 wrote to memory of 4788 4840 Lfelpq32.exe Lmodlkbi.exe PID 4840 wrote to memory of 4788 4840 Lfelpq32.exe Lmodlkbi.exe PID 4840 wrote to memory of 4788 4840 Lfelpq32.exe Lmodlkbi.exe PID 4788 wrote to memory of 4808 4788 Lmodlkbi.exe Mblmdaqq.exe PID 4788 wrote to memory of 4808 4788 Lmodlkbi.exe Mblmdaqq.exe PID 4788 wrote to memory of 4808 4788 Lmodlkbi.exe Mblmdaqq.exe PID 4808 wrote to memory of 4688 4808 Mblmdaqq.exe Mopmnf32.exe PID 4808 wrote to memory of 4688 4808 Mblmdaqq.exe Mopmnf32.exe PID 4808 wrote to memory of 4688 4808 Mblmdaqq.exe Mopmnf32.exe PID 4688 wrote to memory of 2308 4688 Mopmnf32.exe Melffm32.exe PID 4688 wrote to memory of 2308 4688 Mopmnf32.exe Melffm32.exe PID 4688 wrote to memory of 2308 4688 Mopmnf32.exe Melffm32.exe PID 2308 wrote to memory of 4476 2308 Melffm32.exe Mkfncgeo.exe PID 2308 wrote to memory of 4476 2308 Melffm32.exe Mkfncgeo.exe PID 2308 wrote to memory of 4476 2308 Melffm32.exe Mkfncgeo.exe PID 4476 wrote to memory of 4672 4476 Mkfncgeo.exe Mflbpp32.exe PID 4476 wrote to memory of 4672 4476 Mkfncgeo.exe Mflbpp32.exe PID 4476 wrote to memory of 4672 4476 Mkfncgeo.exe Mflbpp32.exe PID 4672 wrote to memory of 4928 4672 Mflbpp32.exe Nmjdhi32.exe PID 4672 wrote to memory of 4928 4672 Mflbpp32.exe Nmjdhi32.exe PID 4672 wrote to memory of 4928 4672 Mflbpp32.exe Nmjdhi32.exe PID 4928 wrote to memory of 4268 4928 Nmjdhi32.exe Nnlqpanj.exe PID 4928 wrote to memory of 4268 4928 Nmjdhi32.exe Nnlqpanj.exe PID 4928 wrote to memory of 4268 4928 Nmjdhi32.exe Nnlqpanj.exe PID 4268 wrote to memory of 544 4268 Nnlqpanj.exe Nlpaiemd.exe PID 4268 wrote to memory of 544 4268 Nnlqpanj.exe Nlpaiemd.exe PID 4268 wrote to memory of 544 4268 Nnlqpanj.exe Nlpaiemd.exe PID 544 wrote to memory of 1376 544 Nlpaiemd.exe Nbjifp32.exe PID 544 wrote to memory of 1376 544 Nlpaiemd.exe Nbjifp32.exe PID 544 wrote to memory of 1376 544 Nlpaiemd.exe Nbjifp32.exe PID 1376 wrote to memory of 2808 1376 Nbjifp32.exe Nmomchdg.exe PID 1376 wrote to memory of 2808 1376 Nbjifp32.exe Nmomchdg.exe PID 1376 wrote to memory of 2808 1376 Nbjifp32.exe Nmomchdg.exe PID 2808 wrote to memory of 3980 2808 Nmomchdg.exe Nblfkobn.exe PID 2808 wrote to memory of 3980 2808 Nmomchdg.exe Nblfkobn.exe PID 2808 wrote to memory of 3980 2808 Nmomchdg.exe Nblfkobn.exe PID 3980 wrote to memory of 2636 3980 Nblfkobn.exe Nmajihbd.exe PID 3980 wrote to memory of 2636 3980 Nblfkobn.exe Nmajihbd.exe PID 3980 wrote to memory of 2636 3980 Nblfkobn.exe Nmajihbd.exe PID 2636 wrote to memory of 1388 2636 Nmajihbd.exe Nfjoan32.exe PID 2636 wrote to memory of 1388 2636 Nmajihbd.exe Nfjoan32.exe PID 2636 wrote to memory of 1388 2636 Nmajihbd.exe Nfjoan32.exe PID 1388 wrote to memory of 204 1388 Nfjoan32.exe Npbcjc32.exe PID 1388 wrote to memory of 204 1388 Nfjoan32.exe Npbcjc32.exe PID 1388 wrote to memory of 204 1388 Nfjoan32.exe Npbcjc32.exe PID 204 wrote to memory of 4892 204 Npbcjc32.exe Neokbj32.exe PID 204 wrote to memory of 4892 204 Npbcjc32.exe Neokbj32.exe PID 204 wrote to memory of 4892 204 Npbcjc32.exe Neokbj32.exe PID 4892 wrote to memory of 3364 4892 Neokbj32.exe Ongpkpdm.exe PID 4892 wrote to memory of 3364 4892 Neokbj32.exe Ongpkpdm.exe PID 4892 wrote to memory of 3364 4892 Neokbj32.exe Ongpkpdm.exe PID 3364 wrote to memory of 5052 3364 Ongpkpdm.exe Oimdihdc.exe PID 3364 wrote to memory of 5052 3364 Ongpkpdm.exe Oimdihdc.exe PID 3364 wrote to memory of 5052 3364 Ongpkpdm.exe Oimdihdc.exe PID 5052 wrote to memory of 2652 5052 Oimdihdc.exe Onjmao32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96.exe"C:\Users\Admin\AppData\Local\Temp\a19ae3e43ae6556aa3e0e7ee05c3c07836902f760a43d312778af3b7093ecf96.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\Lfpcdaob.exeC:\Windows\system32\Lfpcdaob.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\Lialfl32.exeC:\Windows\system32\Lialfl32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\Lfelpq32.exeC:\Windows\system32\Lfelpq32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\Lmodlkbi.exeC:\Windows\system32\Lmodlkbi.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Mblmdaqq.exeC:\Windows\system32\Mblmdaqq.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\Mopmnf32.exeC:\Windows\system32\Mopmnf32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\Melffm32.exeC:\Windows\system32\Melffm32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\Mkfncgeo.exeC:\Windows\system32\Mkfncgeo.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\Mflbpp32.exeC:\Windows\system32\Mflbpp32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\Nmjdhi32.exeC:\Windows\system32\Nmjdhi32.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\Nnlqpanj.exeC:\Windows\system32\Nnlqpanj.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\Nlpaiemd.exeC:\Windows\system32\Nlpaiemd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\Nbjifp32.exeC:\Windows\system32\Nbjifp32.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\Nmomchdg.exeC:\Windows\system32\Nmomchdg.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Nblfkobn.exeC:\Windows\system32\Nblfkobn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\Nmajihbd.exeC:\Windows\system32\Nmajihbd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Nfjoan32.exeC:\Windows\system32\Nfjoan32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\Npbcjc32.exeC:\Windows\system32\Npbcjc32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\SysWOW64\Neokbj32.exeC:\Windows\system32\Neokbj32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\Ongpkpdm.exeC:\Windows\system32\Ongpkpdm.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\Oimdihdc.exeC:\Windows\system32\Oimdihdc.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\Onjmao32.exeC:\Windows\system32\Onjmao32.exe23⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\Oedeniig.exeC:\Windows\system32\Oedeniig.exe24⤵
- Executes dropped EXE
PID:3672 -
C:\Windows\SysWOW64\Opiikbim.exeC:\Windows\system32\Opiikbim.exe25⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\Ommjdfhg.exeC:\Windows\system32\Ommjdfhg.exe26⤵
- Executes dropped EXE
PID:3708 -
C:\Windows\SysWOW64\Ompfjf32.exeC:\Windows\system32\Ompfjf32.exe27⤵
- Executes dropped EXE
PID:4228 -
C:\Windows\SysWOW64\Pifgoglh.exeC:\Windows\system32\Pifgoglh.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\Ppblaaab.exeC:\Windows\system32\Ppblaaab.exe29⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\Pepdihoj.exeC:\Windows\system32\Pepdihoj.exe30⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\Plimfb32.exeC:\Windows\system32\Plimfb32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3912 -
C:\Windows\SysWOW64\Pfoackfl.exeC:\Windows\system32\Pfoackfl.exe32⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\Pllilaed.exeC:\Windows\system32\Pllilaed.exe33⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Pedndg32.exeC:\Windows\system32\Pedndg32.exe34⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\Plnfaaba.exeC:\Windows\system32\Plnfaaba.exe35⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\Qbjkckhk.exeC:\Windows\system32\Qbjkckhk.exe36⤵
- Executes dropped EXE
PID:444 -
C:\Windows\SysWOW64\Qeigpfgo.exeC:\Windows\system32\Qeigpfgo.exe37⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\Qidcpe32.exeC:\Windows\system32\Qidcpe32.exe38⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\Qlcplq32.exeC:\Windows\system32\Qlcplq32.exe39⤵
- Executes dropped EXE
PID:3224 -
C:\Windows\SysWOW64\Qbmhikfi.exeC:\Windows\system32\Qbmhikfi.exe40⤵
- Executes dropped EXE
PID:740 -
C:\Windows\SysWOW64\Aekdefel.exeC:\Windows\system32\Aekdefel.exe41⤵
- Executes dropped EXE
PID:4940 -
C:\Windows\SysWOW64\Alelbpmi.exeC:\Windows\system32\Alelbpmi.exe42⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\Agkqoilo.exeC:\Windows\system32\Agkqoilo.exe43⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Algigpkf.exeC:\Windows\system32\Algigpkf.exe44⤵
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\Abaadj32.exeC:\Windows\system32\Abaadj32.exe45⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\Aepmpe32.exeC:\Windows\system32\Aepmpe32.exe46⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\Acdnjjpq.exeC:\Windows\system32\Acdnjjpq.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3740 -
C:\Windows\SysWOW64\Amlombnd.exeC:\Windows\system32\Amlombnd.exe48⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\Bchgei32.exeC:\Windows\system32\Bchgei32.exe49⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\Bckdji32.exeC:\Windows\system32\Bckdji32.exe50⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\Bnphha32.exeC:\Windows\system32\Bnphha32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1172 -
C:\Windows\SysWOW64\Bigimb32.exeC:\Windows\system32\Bigimb32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5104 -
C:\Windows\SysWOW64\Bneacaei.exeC:\Windows\system32\Bneacaei.exe53⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Bofnji32.exeC:\Windows\system32\Bofnji32.exe54⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\Bjlbhbkn.exeC:\Windows\system32\Bjlbhbkn.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\Boikpiie.exeC:\Windows\system32\Boikpiie.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3712 -
C:\Windows\SysWOW64\Cnjknp32.exeC:\Windows\system32\Cnjknp32.exe57⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\Cokgehgb.exeC:\Windows\system32\Cokgehgb.exe58⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\Cjqlca32.exeC:\Windows\system32\Cjqlca32.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:3192 -
C:\Windows\SysWOW64\Comdkh32.exeC:\Windows\system32\Comdkh32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:1552 -
C:\Windows\SysWOW64\Cfgmhbml.exeC:\Windows\system32\Cfgmhbml.exe61⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\Claedl32.exeC:\Windows\system32\Claedl32.exe62⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\Cckmaflf.exeC:\Windows\system32\Cckmaflf.exe63⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Cnqaoo32.exeC:\Windows\system32\Cnqaoo32.exe64⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\SysWOW64\Cobnfgaj.exeC:\Windows\system32\Cobnfgaj.exe65⤵
- Executes dropped EXE
PID:4152 -
C:\Windows\SysWOW64\Cjgbcpap.exeC:\Windows\system32\Cjgbcpap.exe66⤵
- Modifies registry class
PID:2864 -
C:\Windows\SysWOW64\Cqajpj32.exeC:\Windows\system32\Cqajpj32.exe67⤵
- Drops file in System32 directory
PID:428 -
C:\Windows\SysWOW64\Dnhgoned.exeC:\Windows\system32\Dnhgoned.exe68⤵
- Drops file in System32 directory
PID:3820 -
C:\Windows\SysWOW64\Doidgf32.exeC:\Windows\system32\Doidgf32.exe69⤵PID:3952
-
C:\Windows\SysWOW64\Dqhpai32.exeC:\Windows\system32\Dqhpai32.exe70⤵PID:2920
-
C:\Windows\SysWOW64\Dfeiip32.exeC:\Windows\system32\Dfeiip32.exe71⤵PID:4216
-
C:\Windows\SysWOW64\Dmoafjhi.exeC:\Windows\system32\Dmoafjhi.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:508 -
C:\Windows\SysWOW64\Dgeeccho.exeC:\Windows\system32\Dgeeccho.exe73⤵PID:4800
-
C:\Windows\SysWOW64\Eqmjlinp.exeC:\Windows\system32\Eqmjlinp.exe74⤵PID:4108
-
C:\Windows\SysWOW64\Efjbdpmg.exeC:\Windows\system32\Efjbdpmg.exe75⤵PID:3300
-
C:\Windows\SysWOW64\Enajemmi.exeC:\Windows\system32\Enajemmi.exe76⤵PID:2316
-
C:\Windows\SysWOW64\Ecnbndkq.exeC:\Windows\system32\Ecnbndkq.exe77⤵PID:1080
-
C:\Windows\SysWOW64\Ejhkjn32.exeC:\Windows\system32\Ejhkjn32.exe78⤵
- Drops file in System32 directory
PID:4708 -
C:\Windows\SysWOW64\Eqbcghjj.exeC:\Windows\system32\Eqbcghjj.exe79⤵PID:3584
-
C:\Windows\SysWOW64\Eglkdbag.exeC:\Windows\system32\Eglkdbag.exe80⤵
- Modifies registry class
PID:4876 -
C:\Windows\SysWOW64\Enfcql32.exeC:\Windows\system32\Enfcql32.exe81⤵PID:1784
-
C:\Windows\SysWOW64\Eogphdob.exeC:\Windows\system32\Eogphdob.exe82⤵PID:4064
-
C:\Windows\SysWOW64\Ejmdemoh.exeC:\Windows\system32\Ejmdemoh.exe83⤵
- Modifies registry class
PID:3324 -
C:\Windows\SysWOW64\Emkqainl.exeC:\Windows\system32\Emkqainl.exe84⤵PID:316
-
C:\Windows\SysWOW64\Eceinc32.exeC:\Windows\system32\Eceinc32.exe85⤵PID:512
-
C:\Windows\SysWOW64\Enjmlleo.exeC:\Windows\system32\Enjmlleo.exe86⤵PID:1744
-
C:\Windows\SysWOW64\Fplicd32.exeC:\Windows\system32\Fplicd32.exe87⤵
- Modifies registry class
PID:4312 -
C:\Windows\SysWOW64\Fffapnbj.exeC:\Windows\system32\Fffapnbj.exe88⤵PID:2548
-
C:\Windows\SysWOW64\Fqkfmgbp.exeC:\Windows\system32\Fqkfmgbp.exe89⤵
- Drops file in System32 directory
- Modifies registry class
PID:2440 -
C:\Windows\SysWOW64\Ffhnen32.exeC:\Windows\system32\Ffhnen32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3580 -
C:\Windows\SysWOW64\Fnofgk32.exeC:\Windows\system32\Fnofgk32.exe91⤵
- Drops file in System32 directory
PID:2804 -
C:\Windows\SysWOW64\Fcloob32.exeC:\Windows\system32\Fcloob32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4160 -
C:\Windows\SysWOW64\Ffjkkm32.exeC:\Windows\system32\Ffjkkm32.exe93⤵PID:8
-
C:\Windows\SysWOW64\Fnaclk32.exeC:\Windows\system32\Fnaclk32.exe94⤵PID:3160
-
C:\Windows\SysWOW64\Fpcpdcee.exeC:\Windows\system32\Fpcpdcee.exe95⤵PID:548
-
C:\Windows\SysWOW64\Fgjgepeg.exeC:\Windows\system32\Fgjgepeg.exe96⤵PID:1840
-
C:\Windows\SysWOW64\Fndpbjmd.exeC:\Windows\system32\Fndpbjmd.exe97⤵PID:4332
-
C:\Windows\SysWOW64\Fmgpmg32.exeC:\Windows\system32\Fmgpmg32.exe98⤵
- Modifies registry class
PID:4196 -
C:\Windows\SysWOW64\Fpelib32.exeC:\Windows\system32\Fpelib32.exe99⤵PID:3248
-
C:\Windows\SysWOW64\Fjkqgk32.exeC:\Windows\system32\Fjkqgk32.exe100⤵PID:4992
-
C:\Windows\SysWOW64\Fjkqgk32.exeC:\Windows\system32\Fjkqgk32.exe101⤵
- Drops file in System32 directory
PID:3204 -
C:\Windows\SysWOW64\Gmimcg32.exeC:\Windows\system32\Gmimcg32.exe102⤵PID:4948
-
C:\Windows\SysWOW64\Gccepqii.exeC:\Windows\system32\Gccepqii.exe103⤵PID:4444
-
C:\Windows\SysWOW64\Ggoapp32.exeC:\Windows\system32\Ggoapp32.exe104⤵PID:3400
-
C:\Windows\SysWOW64\Gjmmlk32.exeC:\Windows\system32\Gjmmlk32.exe105⤵PID:3128
-
C:\Windows\SysWOW64\Gnhimi32.exeC:\Windows\system32\Gnhimi32.exe106⤵PID:5040
-
C:\Windows\SysWOW64\Gageie32.exeC:\Windows\system32\Gageie32.exe107⤵PID:728
-
C:\Windows\SysWOW64\Gganfooo.exeC:\Windows\system32\Gganfooo.exe108⤵PID:4592
-
C:\Windows\SysWOW64\Gmnfnfnf.exeC:\Windows\system32\Gmnfnfnf.exe109⤵
- Drops file in System32 directory
PID:4012 -
C:\Windows\SysWOW64\Ggcjkoml.exeC:\Windows\system32\Ggcjkoml.exe110⤵PID:1620
-
C:\Windows\SysWOW64\Gjaggjlp.exeC:\Windows\system32\Gjaggjlp.exe111⤵PID:1448
-
C:\Windows\SysWOW64\Galodddm.exeC:\Windows\system32\Galodddm.exe112⤵PID:4820
-
C:\Windows\SysWOW64\Ghegao32.exeC:\Windows\system32\Ghegao32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:896 -
C:\Windows\SysWOW64\Gmbpie32.exeC:\Windows\system32\Gmbpie32.exe114⤵PID:1356
-
C:\Windows\SysWOW64\Gpaleq32.exeC:\Windows\system32\Gpaleq32.exe115⤵PID:3232
-
C:\Windows\SysWOW64\Hjfpbi32.exeC:\Windows\system32\Hjfpbi32.exe116⤵PID:3904
-
C:\Windows\SysWOW64\Hpchkqfb.exeC:\Windows\system32\Hpchkqfb.exe117⤵PID:440
-
C:\Windows\SysWOW64\Hagnpbjp.exeC:\Windows\system32\Hagnpbjp.exe118⤵PID:4644
-
C:\Windows\SysWOW64\Hhagmm32.exeC:\Windows\system32\Hhagmm32.exe119⤵
- Drops file in System32 directory
PID:5232 -
C:\Windows\SysWOW64\Ekemhj32.exeC:\Windows\system32\Ekemhj32.exe120⤵PID:5248
-
C:\Windows\SysWOW64\Ecmeig32.exeC:\Windows\system32\Ecmeig32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5280 -
C:\Windows\SysWOW64\Eekaebcm.exeC:\Windows\system32\Eekaebcm.exe122⤵
- Drops file in System32 directory
PID:5316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-