Analysis
-
max time kernel
114s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0.exe
Resource
win10v2004-20220812-en
General
-
Target
5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0.exe
-
Size
50KB
-
MD5
f9837d182ac4964dcd767a348134cd50
-
SHA1
429058378ad78619e30d53b4e94816aaa1a7f8a7
-
SHA256
5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0
-
SHA512
d9f8d3a18c5bd60036fa2f446f11046ab1a6d03001fac6480d499f43d461d47cd08d482390f223467b523d981ea5b546f47151391e6b5ffea3ef051c6850d052
-
SSDEEP
1536:SV7Gm4jOSMoK+rZgmBWqaL5iuTu89nO5E4:SVQMN+rnBWqaNu8p4
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Cklhcfle.exeEojiqb32.exeHioflcbj.exeHkkhqd32.exeAdhdjpjf.exePnonbk32.exeNiakfbpa.exeGpaihooo.exeModpib32.exePpdbljkd.exeOcgdji32.exeQmhlgmmm.exeAkccap32.exeLcdciiec.exeOnmfimga.exeDqnjgl32.exeEbfign32.exeKdopod32.exeObjpoh32.exeHahokfag.exeHaaaaeim.exeHkjjlhle.exeAolblopj.exeOgekbb32.exeQlpllkmc.exeIcgjmapi.exeDkkcge32.exeBckkca32.exeLdpophdc.exeOdocigqg.exeEhndnh32.exeBkibgh32.exeNbnpcj32.exeLokdnjkg.exeOiagde32.exeMhgklebo.exeHfaajnfb.exeOqhoeb32.exeHibjli32.exePccahbmn.exeMcklgm32.exeNjcpee32.exeOjhpimhp.exeCammjakm.exeOophlo32.exeObnehj32.exePcpnhl32.exeJbjcolha.exeHpchib32.exeImnocf32.exeNjbgmjgl.exeAafemk32.exeLmccchkn.exeNhlpfgbb.exePgbbek32.exeFmnkkg32.exeFmfgek32.exeDjpnohej.exeQloebdig.exeGdaociml.exeJafdcbge.exeMjhqjg32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cklhcfle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eojiqb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hioflcbj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkkhqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adhdjpjf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnonbk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niakfbpa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpaihooo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Modpib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppdbljkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocgdji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qmhlgmmm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akccap32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcdciiec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onmfimga.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqnjgl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebfign32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdopod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Objpoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hahokfag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Haaaaeim.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkjjlhle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aolblopj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogekbb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlpllkmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icgjmapi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bckkca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldpophdc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odocigqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehndnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkibgh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbnpcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lokdnjkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oiagde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhgklebo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfaajnfb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqhoeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hibjli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pccahbmn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcklgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njcpee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojhpimhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cammjakm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oophlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obnehj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcpnhl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbjcolha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpchib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imnocf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbjcolha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aafemk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmccchkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhlpfgbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgbbek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmnkkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmfgek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldpophdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djpnohej.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qloebdig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gdaociml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jafdcbge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjhqjg32.exe -
Executes dropped EXE 64 IoCs
Processes:
Gplbjamj.exeHjmfch32.exeHhccbloj.exeImchpcko.exeIpfngn32.exeJgbcig32.exeJkplpfbn.exeJggmdgha.exeJopakdfa.exeJdmjck32.exeKpfgnk32.exeKgpokepg.exeKpmmojbb.exeLdpophdc.exeLgqhac32.exeLqimjihe.exeMnojim32.exeMhgklebo.exeMhldgd32.exeNqgilg32.exeNbibki32.exeNbkoai32.exeNelhbdlc.exeOajohd32.exeOgdgencl.exeOpmllk32.exePneebg32.exePpdbljkd.exePimfep32.exePiockppb.exeQlpllkmc.exeQhfmalbg.exeAifiko32.exeAbnnddpj.exeAlgbmjgk.exeAbqjjd32.exeAafgkpcp.exeAiolam32.exeBaaggo32.exeCohdebfi.exeDenlnk32.exeDjpnohej.exeFfbnph32.exeFhajlc32.exeFbioei32.exeGfqjafdq.exeGmkbnp32.exeGidphq32.exeGjclbc32.exeGmaioo32.exeHaggelfd.exeHmmhjm32.exeIjdeiaio.exeIpckgh32.exeIjkljp32.exeJjpeepnb.exeJidbflcj.exeJkfkfohj.exeKaqcbi32.exeKdopod32.exeKkihknfg.exeKphmie32.exeKajfig32.exeLgikfn32.exepid process 4876 Gplbjamj.exe 4108 Hjmfch32.exe 1384 Hhccbloj.exe 4144 Imchpcko.exe 1652 Ipfngn32.exe 1588 Jgbcig32.exe 2300 Jkplpfbn.exe 824 Jggmdgha.exe 456 Jopakdfa.exe 1772 Jdmjck32.exe 224 Kpfgnk32.exe 3840 Kgpokepg.exe 4212 Kpmmojbb.exe 5036 Ldpophdc.exe 3592 Lgqhac32.exe 3696 Lqimjihe.exe 3724 Mnojim32.exe 2852 Mhgklebo.exe 3112 Mhldgd32.exe 2776 Nqgilg32.exe 2592 Nbibki32.exe 4356 Nbkoai32.exe 1268 Nelhbdlc.exe 3860 Oajohd32.exe 1252 Ogdgencl.exe 864 Opmllk32.exe 3800 Pneebg32.exe 4352 Ppdbljkd.exe 2560 Pimfep32.exe 4004 Piockppb.exe 2688 Qlpllkmc.exe 3052 Qhfmalbg.exe 4100 Aifiko32.exe 4136 Abnnddpj.exe 2396 Algbmjgk.exe 4608 Abqjjd32.exe 4852 Aafgkpcp.exe 3540 Aiolam32.exe 1836 Baaggo32.exe 1300 Cohdebfi.exe 5032 Denlnk32.exe 4204 Djpnohej.exe 4512 Ffbnph32.exe 5080 Fhajlc32.exe 4380 Fbioei32.exe 5064 Gfqjafdq.exe 3516 Gmkbnp32.exe 3404 Gidphq32.exe 4336 Gjclbc32.exe 1844 Gmaioo32.exe 3560 Haggelfd.exe 3952 Hmmhjm32.exe 1412 Ijdeiaio.exe 4620 Ipckgh32.exe 1236 Ijkljp32.exe 3356 Jjpeepnb.exe 2380 Jidbflcj.exe 1188 Jkfkfohj.exe 4776 Kaqcbi32.exe 3548 Kdopod32.exe 3636 Kkihknfg.exe 4824 Kphmie32.exe 4764 Kajfig32.exe 4248 Lgikfn32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Glhimp32.exeIkbnacmd.exeElnoopdj.exeGfhndpol.exeBaannc32.exeJbjcolha.exeQffbbldm.exeCjpckf32.exeKmkbfeab.exeHjmfch32.exeDenlnk32.exeJidbflcj.exeDlgmpogj.exeOfckhj32.exeOjbacd32.exeGpaihooo.exeIacngdgj.exeLpgmhg32.exeKlggli32.exeLgikfn32.exeIihkpg32.exeJokkgl32.exeDkekjdck.exeLlodgnja.exeFbplml32.exeKcoccc32.exeNjedbjej.exePgopffec.exeOdocigqg.exeCbphdn32.exeLcdciiec.exeOmdieb32.exeKidben32.exeEmaedo32.exeEfhlhh32.exeNeclenfo.exeIpbaol32.exeImiehfao.exeJimldogg.exeLpappc32.exeCeoibflm.exeCdhhdlid.exeNbnpcj32.exeQfpbmfdf.exeLaiipofp.exeQlpllkmc.exeMciobn32.exeMjhqjg32.exePgbbek32.exeBemqih32.exeDqnjgl32.exeHpioin32.exeOqhoeb32.exeGmkbnp32.exeKkihknfg.exeDllfkn32.exeGmbmkpie.exeLphfpbdi.exeImchpcko.exeOgcnmc32.exeCpmapodj.exeFcniglmb.exeDojqjdbl.exeKpfgnk32.exedescription ioc process File created C:\Windows\SysWOW64\Cnnjancb.dll Glhimp32.exe File created C:\Windows\SysWOW64\Ipdejo32.dll Ikbnacmd.exe File created C:\Windows\SysWOW64\Fpjqcaao.dll Elnoopdj.exe File created C:\Windows\SysWOW64\Hfaajnfb.exe Gfhndpol.exe File created C:\Windows\SysWOW64\Bdojjo32.exe Baannc32.exe File opened for modification C:\Windows\SysWOW64\Jmbdbd32.exe Jbjcolha.exe File created C:\Windows\SysWOW64\Pkmlea32.dll Qffbbldm.exe File created C:\Windows\SysWOW64\Ffpmlcim.dll Cjpckf32.exe File created C:\Windows\SysWOW64\Lmbhgd32.exe Kmkbfeab.exe File created C:\Windows\SysWOW64\Hhccbloj.exe Hjmfch32.exe File opened for modification C:\Windows\SysWOW64\Djpnohej.exe Denlnk32.exe File opened for modification C:\Windows\SysWOW64\Jkfkfohj.exe Jidbflcj.exe File opened for modification C:\Windows\SysWOW64\Doeiljfn.exe Dlgmpogj.exe File created C:\Windows\SysWOW64\Oiagde32.exe Ofckhj32.exe File opened for modification C:\Windows\SysWOW64\Olanmgig.exe Ojbacd32.exe File created C:\Windows\SysWOW64\Coffgmig.dll Gpaihooo.exe File created C:\Windows\SysWOW64\Iijfhbhl.exe Iacngdgj.exe File created C:\Windows\SysWOW64\Emlmcm32.dll Lpgmhg32.exe File created C:\Windows\SysWOW64\Ncjakdno.dll Klggli32.exe File created C:\Windows\SysWOW64\Lmccchkn.exe Lgikfn32.exe File created C:\Windows\SysWOW64\Ihoofe32.dll Iihkpg32.exe File created C:\Windows\SysWOW64\Jlolpq32.exe Jokkgl32.exe File created C:\Windows\SysWOW64\Kpjccmbf.dll Dkekjdck.exe File created C:\Windows\SysWOW64\Kpdjljdk.dll Llodgnja.exe File opened for modification C:\Windows\SysWOW64\Fbgbnkfm.exe Fbplml32.exe File created C:\Windows\SysWOW64\Kemooo32.exe Kcoccc32.exe File opened for modification C:\Windows\SysWOW64\Nqoloc32.exe Njedbjej.exe File created C:\Windows\SysWOW64\Qloebdig.exe Pgopffec.exe File opened for modification C:\Windows\SysWOW64\Ognpebpj.exe Odocigqg.exe File created C:\Windows\SysWOW64\Cfqmpl32.exe Cbphdn32.exe File created C:\Windows\SysWOW64\Ljnlecmp.exe Lcdciiec.exe File opened for modification C:\Windows\SysWOW64\Ocnabm32.exe Omdieb32.exe File opened for modification C:\Windows\SysWOW64\Kekbjo32.exe Kidben32.exe File opened for modification C:\Windows\SysWOW64\Edknqiho.exe Emaedo32.exe File created C:\Windows\SysWOW64\Fcniglmb.exe Efhlhh32.exe File opened for modification C:\Windows\SysWOW64\Ojbacd32.exe Neclenfo.exe File opened for modification C:\Windows\SysWOW64\Iacngdgj.exe Ipbaol32.exe File opened for modification C:\Windows\SysWOW64\Ipgbdbqb.exe Imiehfao.exe File created C:\Windows\SysWOW64\Jllhpkfk.exe Jimldogg.exe File created C:\Windows\SysWOW64\Kgkocp32.dll Lpappc32.exe File created C:\Windows\SysWOW64\Cliaoq32.exe Ceoibflm.exe File created C:\Windows\SysWOW64\Danecp32.exe Cdhhdlid.exe File opened for modification C:\Windows\SysWOW64\Nemmoe32.exe Nbnpcj32.exe File created C:\Windows\SysWOW64\Mmgdfa32.dll Qfpbmfdf.exe File created C:\Windows\SysWOW64\Ljpaqmgb.exe Laiipofp.exe File created C:\Windows\SysWOW64\Qhfmalbg.exe Qlpllkmc.exe File created C:\Windows\SysWOW64\Mjcgohig.exe Mciobn32.exe File created C:\Windows\SysWOW64\Pbcfgejn.dll Mjhqjg32.exe File created C:\Windows\SysWOW64\Phcomcng.exe Pgbbek32.exe File created C:\Windows\SysWOW64\Ddhpmfbl.dll Bemqih32.exe File created C:\Windows\SysWOW64\Ogpmdqpl.dll Dqnjgl32.exe File opened for modification C:\Windows\SysWOW64\Hhimhobl.exe Hpioin32.exe File opened for modification C:\Windows\SysWOW64\Objkmkjj.exe Oqhoeb32.exe File opened for modification C:\Windows\SysWOW64\Gidphq32.exe Gmkbnp32.exe File created C:\Windows\SysWOW64\Mkeebhjc.dll Kkihknfg.exe File created C:\Windows\SysWOW64\Gjihje32.dll Dllfkn32.exe File opened for modification C:\Windows\SysWOW64\Gpqjglii.exe Gmbmkpie.exe File opened for modification C:\Windows\SysWOW64\Mciobn32.exe Lphfpbdi.exe File created C:\Windows\SysWOW64\Ipfngn32.exe Imchpcko.exe File created C:\Windows\SysWOW64\Onmfimga.exe Ogcnmc32.exe File opened for modification C:\Windows\SysWOW64\Cammjakm.exe Cpmapodj.exe File created C:\Windows\SysWOW64\Ffmfchle.exe Fcniglmb.exe File created C:\Windows\SysWOW64\Dnonkq32.exe Dojqjdbl.exe File created C:\Windows\SysWOW64\Kgpokepg.exe Kpfgnk32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8156 8024 WerFault.exe Pififb32.exe -
Modifies registry class 64 IoCs
Processes:
Kmkbfeab.exeKiidgeki.exeLppbkgcj.exeNiklpj32.exeHkjjlhle.exeOmjpeo32.exeObdkma32.exeDlgmpogj.exeJmbdbd32.exePcicklnn.exePimfpc32.exeIkbnacmd.exeOlfobjbg.exeAjfhnjhq.exeEnpfan32.exeEjalcgkg.exeFplpll32.exePaeelgnj.exeHpioin32.exeKpfgnk32.exeBhaebcen.exeCdhhdlid.exeDanecp32.exeJiiicf32.exeCliaoq32.exeDboigi32.exeNafjjf32.exeMaiccajf.exeMnegbp32.exeOqhoeb32.exeDdpeoafg.exeEcoangbg.exeQmhlgmmm.exeFlkdfh32.exePahpfc32.exeCfqmpl32.exeLgibpf32.exeAdhdjpjf.exeGfqjafdq.exeLmppcbjd.exeCagobalc.exeEbifmm32.exeKidben32.exeObjkmkjj.exeNbibki32.exeOokjdn32.exeAafemk32.exeHkkhqd32.exeKofdhd32.exeHppeim32.exeNnneknob.exeLhijijbg.exeCnfaohbj.exeGpaihooo.exeDllfkn32.exeJjjpnlbd.exeLfeljd32.exeOgekbb32.exeGidphq32.exeKphmie32.exeMjcgohig.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmkbfeab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kiidgeki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lppbkgcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kaijleme.dll" Niklpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hijeeipc.dll" Hkjjlhle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aqhblk32.dll" Omjpeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obdkma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlgmpogj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jmbdbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcicklnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlmadjhb.dll" Pimfpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ikbnacmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olfobjbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlklhm32.dll" Ajfhnjhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enpfan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejalcgkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fplpll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhdbgapf.dll" Paeelgnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpioin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpfgnk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhaebcen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdhhdlid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jiiicf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cliaoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dboigi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nafjjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlfcoqpl.dll" Maiccajf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mnegbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oqhoeb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddpeoafg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecoangbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qmhlgmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhnjoi32.dll" Flkdfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pahpfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfqmpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgibpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adhdjpjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnfmmb32.dll" Gfqjafdq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlgmpogj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmppcbjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cagobalc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebifmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kidben32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Objkmkjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eecngcdn.dll" Nbibki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dboigi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ookjdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aafemk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpaqkn32.dll" Ecoangbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkkhqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahfmjddg.dll" Kofdhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hppeim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnneknob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhijijbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnfaohbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Coffgmig.dll" Gpaihooo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dllfkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjjpnlbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lfeljd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogekbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gidphq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kphmie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epmjjbbj.dll" Mjcgohig.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0.exeGplbjamj.exeHjmfch32.exeHhccbloj.exeImchpcko.exeIpfngn32.exeJgbcig32.exeJkplpfbn.exeJggmdgha.exeJopakdfa.exeJdmjck32.exeKpfgnk32.exeKgpokepg.exeKpmmojbb.exeLdpophdc.exeLgqhac32.exeLqimjihe.exeMnojim32.exeMhgklebo.exeMhldgd32.exeNqgilg32.exeNbibki32.exedescription pid process target process PID 4804 wrote to memory of 4876 4804 5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0.exe Gplbjamj.exe PID 4804 wrote to memory of 4876 4804 5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0.exe Gplbjamj.exe PID 4804 wrote to memory of 4876 4804 5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0.exe Gplbjamj.exe PID 4876 wrote to memory of 4108 4876 Gplbjamj.exe Hjmfch32.exe PID 4876 wrote to memory of 4108 4876 Gplbjamj.exe Hjmfch32.exe PID 4876 wrote to memory of 4108 4876 Gplbjamj.exe Hjmfch32.exe PID 4108 wrote to memory of 1384 4108 Hjmfch32.exe Hhccbloj.exe PID 4108 wrote to memory of 1384 4108 Hjmfch32.exe Hhccbloj.exe PID 4108 wrote to memory of 1384 4108 Hjmfch32.exe Hhccbloj.exe PID 1384 wrote to memory of 4144 1384 Hhccbloj.exe Imchpcko.exe PID 1384 wrote to memory of 4144 1384 Hhccbloj.exe Imchpcko.exe PID 1384 wrote to memory of 4144 1384 Hhccbloj.exe Imchpcko.exe PID 4144 wrote to memory of 1652 4144 Imchpcko.exe Ipfngn32.exe PID 4144 wrote to memory of 1652 4144 Imchpcko.exe Ipfngn32.exe PID 4144 wrote to memory of 1652 4144 Imchpcko.exe Ipfngn32.exe PID 1652 wrote to memory of 1588 1652 Ipfngn32.exe Jgbcig32.exe PID 1652 wrote to memory of 1588 1652 Ipfngn32.exe Jgbcig32.exe PID 1652 wrote to memory of 1588 1652 Ipfngn32.exe Jgbcig32.exe PID 1588 wrote to memory of 2300 1588 Jgbcig32.exe Jkplpfbn.exe PID 1588 wrote to memory of 2300 1588 Jgbcig32.exe Jkplpfbn.exe PID 1588 wrote to memory of 2300 1588 Jgbcig32.exe Jkplpfbn.exe PID 2300 wrote to memory of 824 2300 Jkplpfbn.exe Jggmdgha.exe PID 2300 wrote to memory of 824 2300 Jkplpfbn.exe Jggmdgha.exe PID 2300 wrote to memory of 824 2300 Jkplpfbn.exe Jggmdgha.exe PID 824 wrote to memory of 456 824 Jggmdgha.exe Jopakdfa.exe PID 824 wrote to memory of 456 824 Jggmdgha.exe Jopakdfa.exe PID 824 wrote to memory of 456 824 Jggmdgha.exe Jopakdfa.exe PID 456 wrote to memory of 1772 456 Jopakdfa.exe Jdmjck32.exe PID 456 wrote to memory of 1772 456 Jopakdfa.exe Jdmjck32.exe PID 456 wrote to memory of 1772 456 Jopakdfa.exe Jdmjck32.exe PID 1772 wrote to memory of 224 1772 Jdmjck32.exe Kpfgnk32.exe PID 1772 wrote to memory of 224 1772 Jdmjck32.exe Kpfgnk32.exe PID 1772 wrote to memory of 224 1772 Jdmjck32.exe Kpfgnk32.exe PID 224 wrote to memory of 3840 224 Kpfgnk32.exe Kgpokepg.exe PID 224 wrote to memory of 3840 224 Kpfgnk32.exe Kgpokepg.exe PID 224 wrote to memory of 3840 224 Kpfgnk32.exe Kgpokepg.exe PID 3840 wrote to memory of 4212 3840 Kgpokepg.exe Kpmmojbb.exe PID 3840 wrote to memory of 4212 3840 Kgpokepg.exe Kpmmojbb.exe PID 3840 wrote to memory of 4212 3840 Kgpokepg.exe Kpmmojbb.exe PID 4212 wrote to memory of 5036 4212 Kpmmojbb.exe Ldpophdc.exe PID 4212 wrote to memory of 5036 4212 Kpmmojbb.exe Ldpophdc.exe PID 4212 wrote to memory of 5036 4212 Kpmmojbb.exe Ldpophdc.exe PID 5036 wrote to memory of 3592 5036 Ldpophdc.exe Lgqhac32.exe PID 5036 wrote to memory of 3592 5036 Ldpophdc.exe Lgqhac32.exe PID 5036 wrote to memory of 3592 5036 Ldpophdc.exe Lgqhac32.exe PID 3592 wrote to memory of 3696 3592 Lgqhac32.exe Lqimjihe.exe PID 3592 wrote to memory of 3696 3592 Lgqhac32.exe Lqimjihe.exe PID 3592 wrote to memory of 3696 3592 Lgqhac32.exe Lqimjihe.exe PID 3696 wrote to memory of 3724 3696 Lqimjihe.exe Mnojim32.exe PID 3696 wrote to memory of 3724 3696 Lqimjihe.exe Mnojim32.exe PID 3696 wrote to memory of 3724 3696 Lqimjihe.exe Mnojim32.exe PID 3724 wrote to memory of 2852 3724 Mnojim32.exe Mhgklebo.exe PID 3724 wrote to memory of 2852 3724 Mnojim32.exe Mhgklebo.exe PID 3724 wrote to memory of 2852 3724 Mnojim32.exe Mhgklebo.exe PID 2852 wrote to memory of 3112 2852 Mhgklebo.exe Mhldgd32.exe PID 2852 wrote to memory of 3112 2852 Mhgklebo.exe Mhldgd32.exe PID 2852 wrote to memory of 3112 2852 Mhgklebo.exe Mhldgd32.exe PID 3112 wrote to memory of 2776 3112 Mhldgd32.exe Nqgilg32.exe PID 3112 wrote to memory of 2776 3112 Mhldgd32.exe Nqgilg32.exe PID 3112 wrote to memory of 2776 3112 Mhldgd32.exe Nqgilg32.exe PID 2776 wrote to memory of 2592 2776 Nqgilg32.exe Nbibki32.exe PID 2776 wrote to memory of 2592 2776 Nqgilg32.exe Nbibki32.exe PID 2776 wrote to memory of 2592 2776 Nqgilg32.exe Nbibki32.exe PID 2592 wrote to memory of 4356 2592 Nbibki32.exe Nbkoai32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0.exe"C:\Users\Admin\AppData\Local\Temp\5180ec511b4ff0bde4bd17719f7efe11602d23ce036c43a93dab026e16b54ba0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\Gplbjamj.exeC:\Windows\system32\Gplbjamj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\Hjmfch32.exeC:\Windows\system32\Hjmfch32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\Hhccbloj.exeC:\Windows\system32\Hhccbloj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Imchpcko.exeC:\Windows\system32\Imchpcko.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\Ipfngn32.exeC:\Windows\system32\Ipfngn32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\Jgbcig32.exeC:\Windows\system32\Jgbcig32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\Jkplpfbn.exeC:\Windows\system32\Jkplpfbn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Jggmdgha.exeC:\Windows\system32\Jggmdgha.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\Jopakdfa.exeC:\Windows\system32\Jopakdfa.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Jdmjck32.exeC:\Windows\system32\Jdmjck32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\Kpfgnk32.exeC:\Windows\system32\Kpfgnk32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\Kgpokepg.exeC:\Windows\system32\Kgpokepg.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\Kpmmojbb.exeC:\Windows\system32\Kpmmojbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\Ldpophdc.exeC:\Windows\system32\Ldpophdc.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\Lgqhac32.exeC:\Windows\system32\Lgqhac32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\Lqimjihe.exeC:\Windows\system32\Lqimjihe.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\Mnojim32.exeC:\Windows\system32\Mnojim32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\Mhgklebo.exeC:\Windows\system32\Mhgklebo.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Mhldgd32.exeC:\Windows\system32\Mhldgd32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\Nqgilg32.exeC:\Windows\system32\Nqgilg32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\Nbibki32.exeC:\Windows\system32\Nbibki32.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Nbkoai32.exeC:\Windows\system32\Nbkoai32.exe23⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\Nelhbdlc.exeC:\Windows\system32\Nelhbdlc.exe24⤵
- Executes dropped EXE
PID:1268 -
C:\Windows\SysWOW64\Oajohd32.exeC:\Windows\system32\Oajohd32.exe25⤵
- Executes dropped EXE
PID:3860 -
C:\Windows\SysWOW64\Ogdgencl.exeC:\Windows\system32\Ogdgencl.exe26⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\SysWOW64\Opmllk32.exeC:\Windows\system32\Opmllk32.exe27⤵
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\Pneebg32.exeC:\Windows\system32\Pneebg32.exe28⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\Ppdbljkd.exeC:\Windows\system32\Ppdbljkd.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\Pimfep32.exeC:\Windows\system32\Pimfep32.exe30⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\SysWOW64\Piockppb.exeC:\Windows\system32\Piockppb.exe31⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\SysWOW64\Qlpllkmc.exeC:\Windows\system32\Qlpllkmc.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\Qhfmalbg.exeC:\Windows\system32\Qhfmalbg.exe33⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\Aifiko32.exeC:\Windows\system32\Aifiko32.exe34⤵
- Executes dropped EXE
PID:4100 -
C:\Windows\SysWOW64\Abnnddpj.exeC:\Windows\system32\Abnnddpj.exe35⤵
- Executes dropped EXE
PID:4136 -
C:\Windows\SysWOW64\Algbmjgk.exeC:\Windows\system32\Algbmjgk.exe36⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\Abqjjd32.exeC:\Windows\system32\Abqjjd32.exe37⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\Aafgkpcp.exeC:\Windows\system32\Aafgkpcp.exe38⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\Aiolam32.exeC:\Windows\system32\Aiolam32.exe39⤵
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\Baaggo32.exeC:\Windows\system32\Baaggo32.exe40⤵
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\Cohdebfi.exeC:\Windows\system32\Cohdebfi.exe41⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\Denlnk32.exeC:\Windows\system32\Denlnk32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5032 -
C:\Windows\SysWOW64\Djpnohej.exeC:\Windows\system32\Djpnohej.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4204 -
C:\Windows\SysWOW64\Ffbnph32.exeC:\Windows\system32\Ffbnph32.exe44⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\SysWOW64\Fhajlc32.exeC:\Windows\system32\Fhajlc32.exe45⤵
- Executes dropped EXE
PID:5080 -
C:\Windows\SysWOW64\Fbioei32.exeC:\Windows\system32\Fbioei32.exe46⤵
- Executes dropped EXE
PID:4380 -
C:\Windows\SysWOW64\Gfqjafdq.exeC:\Windows\system32\Gfqjafdq.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\Gmkbnp32.exeC:\Windows\system32\Gmkbnp32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3516 -
C:\Windows\SysWOW64\Gidphq32.exeC:\Windows\system32\Gidphq32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:3404 -
C:\Windows\SysWOW64\Gjclbc32.exeC:\Windows\system32\Gjclbc32.exe50⤵
- Executes dropped EXE
PID:4336 -
C:\Windows\SysWOW64\Gmaioo32.exeC:\Windows\system32\Gmaioo32.exe51⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\Haggelfd.exeC:\Windows\system32\Haggelfd.exe52⤵
- Executes dropped EXE
PID:3560 -
C:\Windows\SysWOW64\Hmmhjm32.exeC:\Windows\system32\Hmmhjm32.exe53⤵
- Executes dropped EXE
PID:3952 -
C:\Windows\SysWOW64\Ijdeiaio.exeC:\Windows\system32\Ijdeiaio.exe54⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\Ipckgh32.exeC:\Windows\system32\Ipckgh32.exe55⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\Ijkljp32.exeC:\Windows\system32\Ijkljp32.exe56⤵
- Executes dropped EXE
PID:1236 -
C:\Windows\SysWOW64\Jjpeepnb.exeC:\Windows\system32\Jjpeepnb.exe57⤵
- Executes dropped EXE
PID:3356 -
C:\Windows\SysWOW64\Jidbflcj.exeC:\Windows\system32\Jidbflcj.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\Jkfkfohj.exeC:\Windows\system32\Jkfkfohj.exe59⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\Kaqcbi32.exeC:\Windows\system32\Kaqcbi32.exe60⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\Kdopod32.exeC:\Windows\system32\Kdopod32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3548 -
C:\Windows\SysWOW64\Kkihknfg.exeC:\Windows\system32\Kkihknfg.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3636 -
C:\Windows\SysWOW64\Kphmie32.exeC:\Windows\system32\Kphmie32.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:4824 -
C:\Windows\SysWOW64\Kajfig32.exeC:\Windows\system32\Kajfig32.exe64⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4248 -
C:\Windows\SysWOW64\Lmccchkn.exeC:\Windows\system32\Lmccchkn.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1196 -
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe67⤵
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\Lilanioo.exeC:\Windows\system32\Lilanioo.exe68⤵PID:4500
-
C:\Windows\SysWOW64\Lgpagm32.exeC:\Windows\system32\Lgpagm32.exe69⤵PID:4924
-
C:\Windows\SysWOW64\Lphfpbdi.exeC:\Windows\system32\Lphfpbdi.exe70⤵
- Drops file in System32 directory
PID:1800 -
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe71⤵
- Drops file in System32 directory
PID:1864 -
C:\Windows\SysWOW64\Mjcgohig.exeC:\Windows\system32\Mjcgohig.exe72⤵
- Modifies registry class
PID:4896 -
C:\Windows\SysWOW64\Mcklgm32.exeC:\Windows\system32\Mcklgm32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3732 -
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe74⤵PID:1492
-
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe75⤵PID:5012
-
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4812 -
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe77⤵PID:4196
-
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe78⤵PID:3972
-
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe79⤵PID:3476
-
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe80⤵PID:1680
-
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe81⤵PID:3992
-
C:\Windows\SysWOW64\Ngpjnkpf.exeC:\Windows\system32\Ngpjnkpf.exe82⤵PID:1852
-
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe83⤵PID:4324
-
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4544 -
C:\Windows\SysWOW64\Nbmelbid.exeC:\Windows\system32\Nbmelbid.exe85⤵PID:1304
-
C:\Windows\SysWOW64\Ondeac32.exeC:\Windows\system32\Ondeac32.exe86⤵PID:2832
-
C:\Windows\SysWOW64\Okhfjh32.exeC:\Windows\system32\Okhfjh32.exe87⤵PID:564
-
C:\Windows\SysWOW64\Obangb32.exeC:\Windows\system32\Obangb32.exe88⤵PID:1440
-
C:\Windows\SysWOW64\Obdkma32.exeC:\Windows\system32\Obdkma32.exe89⤵
- Modifies registry class
PID:2748 -
C:\Windows\SysWOW64\Odbgim32.exeC:\Windows\system32\Odbgim32.exe90⤵PID:2284
-
C:\Windows\SysWOW64\Ocgdji32.exeC:\Windows\system32\Ocgdji32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2504 -
C:\Windows\SysWOW64\Pkaiqf32.exeC:\Windows\system32\Pkaiqf32.exe92⤵PID:1960
-
C:\Windows\SysWOW64\Pgopffec.exeC:\Windows\system32\Pgopffec.exe93⤵
- Drops file in System32 directory
PID:640 -
C:\Windows\SysWOW64\Qloebdig.exeC:\Windows\system32\Qloebdig.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4448 -
C:\Windows\SysWOW64\Qbimoo32.exeC:\Windows\system32\Qbimoo32.exe95⤵PID:1944
-
C:\Windows\SysWOW64\Aelcfilb.exeC:\Windows\system32\Aelcfilb.exe96⤵PID:4912
-
C:\Windows\SysWOW64\Bahmfj32.exeC:\Windows\system32\Bahmfj32.exe97⤵PID:3896
-
C:\Windows\SysWOW64\Bhaebcen.exeC:\Windows\system32\Bhaebcen.exe98⤵
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\Blbknaib.exeC:\Windows\system32\Blbknaib.exe99⤵PID:4832
-
C:\Windows\SysWOW64\Bdmpcdfm.exeC:\Windows\system32\Bdmpcdfm.exe100⤵PID:1948
-
C:\Windows\SysWOW64\Ceoibflm.exeC:\Windows\system32\Ceoibflm.exe101⤵
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\Cliaoq32.exeC:\Windows\system32\Cliaoq32.exe102⤵
- Modifies registry class
PID:3468 -
C:\Windows\SysWOW64\Cecbmf32.exeC:\Windows\system32\Cecbmf32.exe103⤵PID:2604
-
C:\Windows\SysWOW64\Colffknh.exeC:\Windows\system32\Colffknh.exe104⤵PID:4000
-
C:\Windows\SysWOW64\Cdiooblp.exeC:\Windows\system32\Cdiooblp.exe105⤵PID:4976
-
C:\Windows\SysWOW64\Clpgpp32.exeC:\Windows\system32\Clpgpp32.exe106⤵PID:3208
-
C:\Windows\SysWOW64\Cdkldb32.exeC:\Windows\system32\Cdkldb32.exe107⤵PID:5136
-
C:\Windows\SysWOW64\Doqpak32.exeC:\Windows\system32\Doqpak32.exe108⤵PID:5192
-
C:\Windows\SysWOW64\Dboigi32.exeC:\Windows\system32\Dboigi32.exe109⤵
- Modifies registry class
PID:5208 -
C:\Windows\SysWOW64\Ddpeoafg.exeC:\Windows\system32\Ddpeoafg.exe110⤵
- Modifies registry class
PID:5224 -
C:\Windows\SysWOW64\Dlgmpogj.exeC:\Windows\system32\Dlgmpogj.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:5240 -
C:\Windows\SysWOW64\Doeiljfn.exeC:\Windows\system32\Doeiljfn.exe112⤵PID:5256
-
C:\Windows\SysWOW64\Dadeieea.exeC:\Windows\system32\Dadeieea.exe113⤵PID:5272
-
C:\Windows\SysWOW64\Ddbbeade.exeC:\Windows\system32\Ddbbeade.exe114⤵PID:5288
-
C:\Windows\SysWOW64\Dkljak32.exeC:\Windows\system32\Dkljak32.exe115⤵PID:5304
-
C:\Windows\SysWOW64\Dllfkn32.exeC:\Windows\system32\Dllfkn32.exe116⤵
- Drops file in System32 directory
- Modifies registry class
PID:5328 -
C:\Windows\SysWOW64\Dlncan32.exeC:\Windows\system32\Dlncan32.exe117⤵PID:5344
-
C:\Windows\SysWOW64\Ekemhj32.exeC:\Windows\system32\Ekemhj32.exe118⤵PID:5360
-
C:\Windows\SysWOW64\Eekaebcm.exeC:\Windows\system32\Eekaebcm.exe119⤵PID:5380
-
C:\Windows\SysWOW64\Ecoangbg.exeC:\Windows\system32\Ecoangbg.exe120⤵
- Modifies registry class
PID:5444 -
C:\Windows\SysWOW64\Fljcmlfd.exeC:\Windows\system32\Fljcmlfd.exe121⤵PID:5460
-
C:\Windows\SysWOW64\Fcckif32.exeC:\Windows\system32\Fcckif32.exe122⤵PID:5480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-