Analysis
-
max time kernel
257s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 11:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b9e640b1dff3d9e00707708810f10dff_JC.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
b9e640b1dff3d9e00707708810f10dff_JC.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
b9e640b1dff3d9e00707708810f10dff_JC.exe
-
Size
79KB
-
MD5
b9e640b1dff3d9e00707708810f10dff
-
SHA1
fffc180f08ba0236789cdafe299a621d5b0cb0ff
-
SHA256
99416e317523b3e22474fbb0b766c258914fedae71f06cc7b5824ddedd957ef4
-
SHA512
319b1e27a4c0d10a75fab8f5c4d44b16e200b439126da66727686be5f8c116f1c85abefa9e2afec7b30af848304ebbe362428612ad97893b1aea845ba25b4ceb
-
SSDEEP
1536:PKX+kczNq2iR8Wej7XQwxXtstVQZrI1jHJZrR:PKOkmm8lXPJtstVQu1jHJ9R
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhmlbfcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcgeab32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhhmki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkhenlcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hljnbo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Empclg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phpnol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjbljh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imgjfe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kachbmoe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqknhmdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofaeef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppkccn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgplicod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hciijc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkbjed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Giiibqdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldchff32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjgakkac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Igfmdadd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjpbeecn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdjnge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jomadaga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdonpjbi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjkije32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmigke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbhlilip.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebgbkihn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igacia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jomadaga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgcmpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kklmkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oafjco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oemigaln.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lklijfha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gplgmodq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejpkjlgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpmmce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kklmkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddjpjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Naaphoai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmebkg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppkccn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khfjohmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdpgiipl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gqgjlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnklol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jioqhlje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpiief32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leoofkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdkbhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdonpjbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Leallkbl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imommm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcjafaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idhplaoe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehaonphg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lelbak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihphofpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hihnhjna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibellopm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpiief32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iogkaf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaigab32.exe -
Executes dropped EXE 64 IoCs
pid Process 2740 Oqajqi32.exe 2268 Ddjpjj32.exe 2520 Dbnpcn32.exe 2636 Dkfdlclg.exe 2652 Efglmpbn.exe 2864 Ecklgdag.exe 2988 Eiheok32.exe 1216 Endmgb32.exe 2716 Fijadk32.exe 1492 Flkjffkm.exe 580 Fagcnmie.exe 1420 Gfpkbbmo.exe 860 Glmckikf.exe 2232 Gajlcp32.exe 2104 Gkbplepn.exe 988 Hopibdfd.exe 2360 Hhhmki32.exe 1668 Hdonpjbi.exe 1648 Hpfoekhm.exe 888 Iogkaf32.exe 1332 Jgbpfhpc.exe 2152 Jqjdon32.exe 2432 Jmaedolh.exe 2036 Jfijmdbh.exe 1916 Jgiffg32.exe 2964 Jcpglhpo.exe 924 Jmhkdnfp.exe 2140 Kbedmedg.exe 1604 Kkmhej32.exe 2620 Kfcmcckn.exe 2496 Kiaiooja.exe 2468 Kehidp32.exe 2516 Knqnmeff.exe 1860 Kcmfeldm.exe 1508 Kmeknakn.exe 2528 Lmmaoq32.exe 564 Lbijgg32.exe 768 Onplmp32.exe 2776 Ooaiehhj.exe 1516 Lfhdeoqh.exe 620 Fjkije32.exe 3020 Ffbjpfmg.exe 1092 Fmlblq32.exe 1796 Fojnhlch.exe 2276 Fjpbeecn.exe 1536 Gkehhlef.exe 1000 Gndedhdj.exe 900 Giiibqdp.exe 1960 Gkhenlcd.exe 1944 Gbbnkfjq.exe 2172 Gccjbo32.exe 2392 Gkjbcl32.exe 1956 Gjmbohhl.exe 1324 Gqgjlb32.exe 1440 Gceghn32.exe 1592 Gfdcdi32.exe 1692 Gnkkeg32.exe 2672 Gaigab32.exe 2588 Gplgmodq.exe 852 Hgconl32.exe 2484 Hjbljh32.exe 2660 Hidledja.exe 1672 Hlhamp32.exe 388 Hnfnik32.exe -
Loads dropped DLL 64 IoCs
pid Process 2732 b9e640b1dff3d9e00707708810f10dff_JC.exe 2732 b9e640b1dff3d9e00707708810f10dff_JC.exe 2740 Oqajqi32.exe 2740 Oqajqi32.exe 2268 Ddjpjj32.exe 2268 Ddjpjj32.exe 2520 Dbnpcn32.exe 2520 Dbnpcn32.exe 2636 Dkfdlclg.exe 2636 Dkfdlclg.exe 2652 Efglmpbn.exe 2652 Efglmpbn.exe 2864 Ecklgdag.exe 2864 Ecklgdag.exe 2988 Eiheok32.exe 2988 Eiheok32.exe 1216 Endmgb32.exe 1216 Endmgb32.exe 2716 Fijadk32.exe 2716 Fijadk32.exe 1492 Flkjffkm.exe 1492 Flkjffkm.exe 580 Fagcnmie.exe 580 Fagcnmie.exe 1420 Gfpkbbmo.exe 1420 Gfpkbbmo.exe 860 Glmckikf.exe 860 Glmckikf.exe 2232 Gajlcp32.exe 2232 Gajlcp32.exe 2104 Gkbplepn.exe 2104 Gkbplepn.exe 988 Hopibdfd.exe 988 Hopibdfd.exe 2360 Hhhmki32.exe 2360 Hhhmki32.exe 1668 Hdonpjbi.exe 1668 Hdonpjbi.exe 1648 Hpfoekhm.exe 1648 Hpfoekhm.exe 888 Iogkaf32.exe 888 Iogkaf32.exe 1332 Jgbpfhpc.exe 1332 Jgbpfhpc.exe 2152 Jqjdon32.exe 2152 Jqjdon32.exe 2432 Jmaedolh.exe 2432 Jmaedolh.exe 2036 Jfijmdbh.exe 2036 Jfijmdbh.exe 1916 Jgiffg32.exe 1916 Jgiffg32.exe 2964 Jcpglhpo.exe 2964 Jcpglhpo.exe 924 Jmhkdnfp.exe 924 Jmhkdnfp.exe 2140 Kbedmedg.exe 2140 Kbedmedg.exe 1604 Kkmhej32.exe 1604 Kkmhej32.exe 2620 Kfcmcckn.exe 2620 Kfcmcckn.exe 2496 Kiaiooja.exe 2496 Kiaiooja.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kfcmcckn.exe Kkmhej32.exe File created C:\Windows\SysWOW64\Bjicnk32.dll Mphhbblp.exe File created C:\Windows\SysWOW64\Miciqgqn.exe Mbiadm32.exe File created C:\Windows\SysWOW64\Gingqjgd.exe Ggpjdohp.exe File opened for modification C:\Windows\SysWOW64\Hppjpd32.exe Hmamci32.exe File created C:\Windows\SysWOW64\Ofaeef32.exe Opgmilfa.exe File opened for modification C:\Windows\SysWOW64\Kkmhej32.exe Kbedmedg.exe File created C:\Windows\SysWOW64\Glcbon32.dll Kdpgiipl.exe File opened for modification C:\Windows\SysWOW64\Kachbmoe.exe Kkjpfc32.exe File opened for modification C:\Windows\SysWOW64\Hjbljh32.exe Hgconl32.exe File created C:\Windows\SysWOW64\Ejehmm32.dll Fjgakkac.exe File created C:\Windows\SysWOW64\Kpmmce32.exe Kmoagi32.exe File created C:\Windows\SysWOW64\Ldidljao.dll Phpnol32.exe File created C:\Windows\SysWOW64\Egooijaa.dll Kehidp32.exe File created C:\Windows\SysWOW64\Kcofnejq.exe Jbnjfm32.exe File created C:\Windows\SysWOW64\Ijqqqamh.exe Idfhdg32.exe File opened for modification C:\Windows\SysWOW64\Ijcmfa32.exe Iefenj32.exe File created C:\Windows\SysWOW64\Dfnlkl32.dll Jlodma32.exe File created C:\Windows\SysWOW64\Jcndqobj.dll Jbhlilip.exe File created C:\Windows\SysWOW64\Knfoloio.exe Kglgpe32.exe File created C:\Windows\SysWOW64\Jmigke32.exe Jebojh32.exe File created C:\Windows\SysWOW64\Igacia32.exe Ifqgaibk.exe File created C:\Windows\SysWOW64\Ofmkjibg.dll Kcgapeca.exe File opened for modification C:\Windows\SysWOW64\Fmlblq32.exe Ffbjpfmg.exe File opened for modification C:\Windows\SysWOW64\Mfkjnmje.exe Mdjnge32.exe File created C:\Windows\SysWOW64\Oblmkmdg.dll Mqqolfik.exe File created C:\Windows\SysWOW64\Fdgghmcc.dll Iqjhbgoj.exe File created C:\Windows\SysWOW64\Chocdhha.dll Khfjohmj.exe File opened for modification C:\Windows\SysWOW64\Ldqkqf32.exe Lbbodk32.exe File created C:\Windows\SysWOW64\Kmldajml.exe Kgplicod.exe File opened for modification C:\Windows\SysWOW64\Iafpbl32.exe Ingcfq32.exe File opened for modification C:\Windows\SysWOW64\Lqhabmfi.exe Lklijfha.exe File opened for modification C:\Windows\SysWOW64\Nlehphcb.exe Ndnpnkbp.exe File opened for modification C:\Windows\SysWOW64\Kbedmedg.exe Jmhkdnfp.exe File created C:\Windows\SysWOW64\Lbbodk32.exe Lkhfhaea.exe File created C:\Windows\SysWOW64\Ihmbpdjj.dll Mgkghp32.exe File opened for modification C:\Windows\SysWOW64\Faqihe32.exe Fjgakkac.exe File created C:\Windows\SysWOW64\Cneiai32.dll Kgkbnc32.exe File created C:\Windows\SysWOW64\Bnbejo32.dll Knjign32.exe File opened for modification C:\Windows\SysWOW64\Hpejcnlf.exe Hljnbo32.exe File created C:\Windows\SysWOW64\Hklkhk32.dll Idhplaoe.exe File opened for modification C:\Windows\SysWOW64\Jcjafaoc.exe Jkbjed32.exe File created C:\Windows\SysWOW64\Ghbnaq32.exe Gahfefae.exe File created C:\Windows\SysWOW64\Cmoade32.dll Jgiffg32.exe File created C:\Windows\SysWOW64\Mdkbhf32.exe Monjpp32.exe File created C:\Windows\SysWOW64\Kcedje32.exe Kachbmoe.exe File opened for modification C:\Windows\SysWOW64\Ifkecl32.exe Ianmke32.exe File created C:\Windows\SysWOW64\Jckiolgm.exe Jaklei32.exe File created C:\Windows\SysWOW64\Ifjkaajp.dll Kklmkc32.exe File created C:\Windows\SysWOW64\Egpdpfbb.dll Lodgja32.exe File opened for modification C:\Windows\SysWOW64\Leallkbl.exe Lpdcddde.exe File created C:\Windows\SysWOW64\Hpbfed32.exe Hihnhjna.exe File opened for modification C:\Windows\SysWOW64\Mnonaa32.exe Mcijdh32.exe File created C:\Windows\SysWOW64\Nelgkhdp.exe Nbnkomel.exe File opened for modification C:\Windows\SysWOW64\Hdonpjbi.exe Hhhmki32.exe File created C:\Windows\SysWOW64\Llmipdhh.dll Nelgkhdp.exe File created C:\Windows\SysWOW64\Iahlhl32.exe Ibellopm.exe File created C:\Windows\SysWOW64\Naaphoai.exe Nncdlcbf.exe File created C:\Windows\SysWOW64\Dbnpcn32.exe Ddjpjj32.exe File opened for modification C:\Windows\SysWOW64\Iqldgg32.exe Innhkknc.exe File created C:\Windows\SysWOW64\Lklijfha.exe Lhmmnkin.exe File created C:\Windows\SysWOW64\Hmkjkp32.dll Lbijgg32.exe File created C:\Windows\SysWOW64\Ifmbilhq.exe Iapjad32.exe File opened for modification C:\Windows\SysWOW64\Miciqgqn.exe Mbiadm32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbnjfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmldajml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phkecmkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffbjpfmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbieejff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icmnkn32.dll" Mjkpjkni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opqeppae.dll" Ghbnaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkjcgmjl.dll" Gaigab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcagma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhdace32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikmpipqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcjafaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfgfjmhi.dll" Pojfkfni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdignkkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnkdno32.dll" Ndpmdkpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akojljcj.dll" Idabbpgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbnkomel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebgbkihn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkkobhoo.dll" Kmldajml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idfhdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkbjed32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfijmdbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gnkkeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igdpoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idhplaoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkcgpgkm.dll" Jgficdgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gglgigkp.dll" Jcjafaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pacjefjn.dll" Jmigke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfabpc32.dll" Poempg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hofieg32.dll" Phnailio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Inpeak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhfniekh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpejcnlf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iiiapg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbieejff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phpnol32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkijpnbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Igijjqba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idfhdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkfodlnp.dll" Ehaonphg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbfoolnh.dll" Eajcgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahmgih32.dll" Kglgpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chocdhha.dll" Khfjohmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjggegdf.dll" Nfoipfoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgekphld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnndoemk.dll" Kbedmedg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbijgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjhlbk32.dll" Jkbjed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmakkqqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkbplepn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bffhjdki.dll" Gjmbohhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajhgfe32.dll" Ikmpipqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jebojh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhmfhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkopkigo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llehokkn.dll" Hfnjlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imommm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nahhgfka.dll" Jefamm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kglgpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnbejo32.dll" Knjign32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noqgaa32.dll" Fjpbeecn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gfdcdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbpnjh32.dll" Gdckncfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnpbgjma.dll" Hjbljh32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2740 2732 b9e640b1dff3d9e00707708810f10dff_JC.exe 27 PID 2732 wrote to memory of 2740 2732 b9e640b1dff3d9e00707708810f10dff_JC.exe 27 PID 2732 wrote to memory of 2740 2732 b9e640b1dff3d9e00707708810f10dff_JC.exe 27 PID 2732 wrote to memory of 2740 2732 b9e640b1dff3d9e00707708810f10dff_JC.exe 27 PID 2740 wrote to memory of 2268 2740 Oqajqi32.exe 28 PID 2740 wrote to memory of 2268 2740 Oqajqi32.exe 28 PID 2740 wrote to memory of 2268 2740 Oqajqi32.exe 28 PID 2740 wrote to memory of 2268 2740 Oqajqi32.exe 28 PID 2268 wrote to memory of 2520 2268 Ddjpjj32.exe 29 PID 2268 wrote to memory of 2520 2268 Ddjpjj32.exe 29 PID 2268 wrote to memory of 2520 2268 Ddjpjj32.exe 29 PID 2268 wrote to memory of 2520 2268 Ddjpjj32.exe 29 PID 2520 wrote to memory of 2636 2520 Dbnpcn32.exe 30 PID 2520 wrote to memory of 2636 2520 Dbnpcn32.exe 30 PID 2520 wrote to memory of 2636 2520 Dbnpcn32.exe 30 PID 2520 wrote to memory of 2636 2520 Dbnpcn32.exe 30 PID 2636 wrote to memory of 2652 2636 Dkfdlclg.exe 31 PID 2636 wrote to memory of 2652 2636 Dkfdlclg.exe 31 PID 2636 wrote to memory of 2652 2636 Dkfdlclg.exe 31 PID 2636 wrote to memory of 2652 2636 Dkfdlclg.exe 31 PID 2652 wrote to memory of 2864 2652 Efglmpbn.exe 32 PID 2652 wrote to memory of 2864 2652 Efglmpbn.exe 32 PID 2652 wrote to memory of 2864 2652 Efglmpbn.exe 32 PID 2652 wrote to memory of 2864 2652 Efglmpbn.exe 32 PID 2864 wrote to memory of 2988 2864 Ecklgdag.exe 35 PID 2864 wrote to memory of 2988 2864 Ecklgdag.exe 35 PID 2864 wrote to memory of 2988 2864 Ecklgdag.exe 35 PID 2864 wrote to memory of 2988 2864 Ecklgdag.exe 35 PID 2988 wrote to memory of 1216 2988 Eiheok32.exe 34 PID 2988 wrote to memory of 1216 2988 Eiheok32.exe 34 PID 2988 wrote to memory of 1216 2988 Eiheok32.exe 34 PID 2988 wrote to memory of 1216 2988 Eiheok32.exe 34 PID 1216 wrote to memory of 2716 1216 Endmgb32.exe 33 PID 1216 wrote to memory of 2716 1216 Endmgb32.exe 33 PID 1216 wrote to memory of 2716 1216 Endmgb32.exe 33 PID 1216 wrote to memory of 2716 1216 Endmgb32.exe 33 PID 2716 wrote to memory of 1492 2716 Fijadk32.exe 36 PID 2716 wrote to memory of 1492 2716 Fijadk32.exe 36 PID 2716 wrote to memory of 1492 2716 Fijadk32.exe 36 PID 2716 wrote to memory of 1492 2716 Fijadk32.exe 36 PID 1492 wrote to memory of 580 1492 Flkjffkm.exe 37 PID 1492 wrote to memory of 580 1492 Flkjffkm.exe 37 PID 1492 wrote to memory of 580 1492 Flkjffkm.exe 37 PID 1492 wrote to memory of 580 1492 Flkjffkm.exe 37 PID 580 wrote to memory of 1420 580 Fagcnmie.exe 38 PID 580 wrote to memory of 1420 580 Fagcnmie.exe 38 PID 580 wrote to memory of 1420 580 Fagcnmie.exe 38 PID 580 wrote to memory of 1420 580 Fagcnmie.exe 38 PID 1420 wrote to memory of 860 1420 Gfpkbbmo.exe 40 PID 1420 wrote to memory of 860 1420 Gfpkbbmo.exe 40 PID 1420 wrote to memory of 860 1420 Gfpkbbmo.exe 40 PID 1420 wrote to memory of 860 1420 Gfpkbbmo.exe 40 PID 860 wrote to memory of 2232 860 Glmckikf.exe 39 PID 860 wrote to memory of 2232 860 Glmckikf.exe 39 PID 860 wrote to memory of 2232 860 Glmckikf.exe 39 PID 860 wrote to memory of 2232 860 Glmckikf.exe 39 PID 2232 wrote to memory of 2104 2232 Gajlcp32.exe 41 PID 2232 wrote to memory of 2104 2232 Gajlcp32.exe 41 PID 2232 wrote to memory of 2104 2232 Gajlcp32.exe 41 PID 2232 wrote to memory of 2104 2232 Gajlcp32.exe 41 PID 2104 wrote to memory of 988 2104 Gkbplepn.exe 42 PID 2104 wrote to memory of 988 2104 Gkbplepn.exe 42 PID 2104 wrote to memory of 988 2104 Gkbplepn.exe 42 PID 2104 wrote to memory of 988 2104 Gkbplepn.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9e640b1dff3d9e00707708810f10dff_JC.exe"C:\Users\Admin\AppData\Local\Temp\b9e640b1dff3d9e00707708810f10dff_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Oqajqi32.exeC:\Windows\system32\Oqajqi32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Ddjpjj32.exeC:\Windows\system32\Ddjpjj32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\Dbnpcn32.exeC:\Windows\system32\Dbnpcn32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Dkfdlclg.exeC:\Windows\system32\Dkfdlclg.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Efglmpbn.exeC:\Windows\system32\Efglmpbn.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Ecklgdag.exeC:\Windows\system32\Ecklgdag.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Eiheok32.exeC:\Windows\system32\Eiheok32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Fijadk32.exeC:\Windows\system32\Fijadk32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Flkjffkm.exeC:\Windows\system32\Flkjffkm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\Fagcnmie.exeC:\Windows\system32\Fagcnmie.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\Gfpkbbmo.exeC:\Windows\system32\Gfpkbbmo.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\Glmckikf.exeC:\Windows\system32\Glmckikf.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:860
-
-
-
-
-
C:\Windows\SysWOW64\Endmgb32.exeC:\Windows\system32\Endmgb32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1216
-
C:\Windows\SysWOW64\Gajlcp32.exeC:\Windows\system32\Gajlcp32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Gkbplepn.exeC:\Windows\system32\Gkbplepn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Hopibdfd.exeC:\Windows\system32\Hopibdfd.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:988 -
C:\Windows\SysWOW64\Hhhmki32.exeC:\Windows\system32\Hhhmki32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\Hdonpjbi.exeC:\Windows\system32\Hdonpjbi.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Windows\SysWOW64\Hpfoekhm.exeC:\Windows\system32\Hpfoekhm.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648 -
C:\Windows\SysWOW64\Iogkaf32.exeC:\Windows\system32\Iogkaf32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Windows\SysWOW64\Jgbpfhpc.exeC:\Windows\system32\Jgbpfhpc.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332 -
C:\Windows\SysWOW64\Jqjdon32.exeC:\Windows\system32\Jqjdon32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152 -
C:\Windows\SysWOW64\Jmaedolh.exeC:\Windows\system32\Jmaedolh.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2432 -
C:\Windows\SysWOW64\Jfijmdbh.exeC:\Windows\system32\Jfijmdbh.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\Jgiffg32.exeC:\Windows\system32\Jgiffg32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\Jcpglhpo.exeC:\Windows\system32\Jcpglhpo.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2964 -
C:\Windows\SysWOW64\Jmhkdnfp.exeC:\Windows\system32\Jmhkdnfp.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:924 -
C:\Windows\SysWOW64\Kbedmedg.exeC:\Windows\system32\Kbedmedg.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\Kkmhej32.exeC:\Windows\system32\Kkmhej32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\Kfcmcckn.exeC:\Windows\system32\Kfcmcckn.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2620 -
C:\Windows\SysWOW64\Kiaiooja.exeC:\Windows\system32\Kiaiooja.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2496 -
C:\Windows\SysWOW64\Kehidp32.exeC:\Windows\system32\Kehidp32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2468 -
C:\Windows\SysWOW64\Knqnmeff.exeC:\Windows\system32\Knqnmeff.exe20⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\Kcmfeldm.exeC:\Windows\system32\Kcmfeldm.exe21⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\SysWOW64\Kmeknakn.exeC:\Windows\system32\Kmeknakn.exe22⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\Lmmaoq32.exeC:\Windows\system32\Lmmaoq32.exe23⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\Lbijgg32.exeC:\Windows\system32\Lbijgg32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:564 -
C:\Windows\SysWOW64\Onplmp32.exeC:\Windows\system32\Onplmp32.exe25⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\Ooaiehhj.exeC:\Windows\system32\Ooaiehhj.exe26⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Lfhdeoqh.exeC:\Windows\system32\Lfhdeoqh.exe27⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\Fjkije32.exeC:\Windows\system32\Fjkije32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:620 -
C:\Windows\SysWOW64\Ffbjpfmg.exeC:\Windows\system32\Ffbjpfmg.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3020 -
C:\Windows\SysWOW64\Fmlblq32.exeC:\Windows\system32\Fmlblq32.exe30⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Fojnhlch.exeC:\Windows\system32\Fojnhlch.exe31⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Fjpbeecn.exeC:\Windows\system32\Fjpbeecn.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Gkehhlef.exeC:\Windows\system32\Gkehhlef.exe33⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Gndedhdj.exeC:\Windows\system32\Gndedhdj.exe34⤵
- Executes dropped EXE
PID:1000 -
C:\Windows\SysWOW64\Giiibqdp.exeC:\Windows\system32\Giiibqdp.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:900 -
C:\Windows\SysWOW64\Gkhenlcd.exeC:\Windows\system32\Gkhenlcd.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Gbbnkfjq.exeC:\Windows\system32\Gbbnkfjq.exe37⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\SysWOW64\Gccjbo32.exeC:\Windows\system32\Gccjbo32.exe38⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\Gkjbcl32.exeC:\Windows\system32\Gkjbcl32.exe39⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\Gjmbohhl.exeC:\Windows\system32\Gjmbohhl.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:1956 -
C:\Windows\SysWOW64\Gqgjlb32.exeC:\Windows\system32\Gqgjlb32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1324 -
C:\Windows\SysWOW64\Gceghn32.exeC:\Windows\system32\Gceghn32.exe42⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\SysWOW64\Gfdcdi32.exeC:\Windows\system32\Gfdcdi32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\Gnkkeg32.exeC:\Windows\system32\Gnkkeg32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:1692 -
C:\Windows\SysWOW64\Gaigab32.exeC:\Windows\system32\Gaigab32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2672 -
C:\Windows\SysWOW64\Gplgmodq.exeC:\Windows\system32\Gplgmodq.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Hgconl32.exeC:\Windows\system32\Hgconl32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:852 -
C:\Windows\SysWOW64\Hjbljh32.exeC:\Windows\system32\Hjbljh32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\Hidledja.exeC:\Windows\system32\Hidledja.exe49⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\Hlhamp32.exeC:\Windows\system32\Hlhamp32.exe50⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\Hnfnik32.exeC:\Windows\system32\Hnfnik32.exe51⤵
- Executes dropped EXE
PID:388 -
C:\Windows\SysWOW64\Hilbfc32.exeC:\Windows\system32\Hilbfc32.exe52⤵PID:2164
-
C:\Windows\SysWOW64\Hljnbo32.exeC:\Windows\system32\Hljnbo32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:528 -
C:\Windows\SysWOW64\Hpejcnlf.exeC:\Windows\system32\Hpejcnlf.exe54⤵
- Modifies registry class
PID:568 -
C:\Windows\SysWOW64\Hebckd32.exeC:\Windows\system32\Hebckd32.exe55⤵PID:2788
-
C:\Windows\SysWOW64\Hllkhoaj.exeC:\Windows\system32\Hllkhoaj.exe56⤵PID:2476
-
C:\Windows\SysWOW64\Ibfcei32.exeC:\Windows\system32\Ibfcei32.exe57⤵PID:3016
-
C:\Windows\SysWOW64\Idhplaoe.exeC:\Windows\system32\Idhplaoe.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1544 -
C:\Windows\SysWOW64\Ihclmp32.exeC:\Windows\system32\Ihclmp32.exe59⤵PID:2216
-
C:\Windows\SysWOW64\Ieglfd32.exeC:\Windows\system32\Ieglfd32.exe60⤵PID:2072
-
C:\Windows\SysWOW64\Ifhinl32.exeC:\Windows\system32\Ifhinl32.exe61⤵PID:2988
-
C:\Windows\SysWOW64\Ianmke32.exeC:\Windows\system32\Ianmke32.exe62⤵
- Drops file in System32 directory
PID:1144 -
C:\Windows\SysWOW64\Ifkecl32.exeC:\Windows\system32\Ifkecl32.exe63⤵PID:824
-
C:\Windows\SysWOW64\Iiiapg32.exeC:\Windows\system32\Iiiapg32.exe64⤵
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Iapjad32.exeC:\Windows\system32\Iapjad32.exe65⤵
- Drops file in System32 directory
PID:1288 -
C:\Windows\SysWOW64\Ifmbilhq.exeC:\Windows\system32\Ifmbilhq.exe66⤵PID:928
-
C:\Windows\SysWOW64\Imgjfe32.exeC:\Windows\system32\Imgjfe32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2248 -
C:\Windows\SysWOW64\Idabbpgj.exeC:\Windows\system32\Idabbpgj.exe68⤵
- Modifies registry class
PID:2300 -
C:\Windows\SysWOW64\Jebojh32.exeC:\Windows\system32\Jebojh32.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:2900 -
C:\Windows\SysWOW64\Jmigke32.exeC:\Windows\system32\Jmigke32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Jedlph32.exeC:\Windows\system32\Jedlph32.exe71⤵PID:992
-
C:\Windows\SysWOW64\Jiphpf32.exeC:\Windows\system32\Jiphpf32.exe72⤵PID:2596
-
C:\Windows\SysWOW64\Jlodma32.exeC:\Windows\system32\Jlodma32.exe73⤵
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\Jbhlilip.exeC:\Windows\system32\Jbhlilip.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\Jaklei32.exeC:\Windows\system32\Jaklei32.exe75⤵
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\Jckiolgm.exeC:\Windows\system32\Jckiolgm.exe76⤵PID:2544
-
C:\Windows\SysWOW64\Jlcmhann.exeC:\Windows\system32\Jlcmhann.exe77⤵PID:2448
-
C:\Windows\SysWOW64\Jndjoi32.exeC:\Windows\system32\Jndjoi32.exe78⤵PID:2840
-
C:\Windows\SysWOW64\Kfiajj32.exeC:\Windows\system32\Kfiajj32.exe79⤵PID:1420
-
C:\Windows\SysWOW64\Klcjfdqi.exeC:\Windows\system32\Klcjfdqi.exe80⤵PID:2808
-
C:\Windows\SysWOW64\Kfknpj32.exeC:\Windows\system32\Kfknpj32.exe81⤵PID:748
-
C:\Windows\SysWOW64\Lhjjle32.exeC:\Windows\system32\Lhjjle32.exe82⤵PID:2208
-
C:\Windows\SysWOW64\Lkhfhaea.exeC:\Windows\system32\Lkhfhaea.exe83⤵
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\Lbbodk32.exeC:\Windows\system32\Lbbodk32.exe84⤵
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\Ldqkqf32.exeC:\Windows\system32\Ldqkqf32.exe85⤵PID:2924
-
C:\Windows\SysWOW64\Lnipilbb.exeC:\Windows\system32\Lnipilbb.exe86⤵PID:2532
-
C:\Windows\SysWOW64\Ldchff32.exeC:\Windows\system32\Ldchff32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1684 -
C:\Windows\SysWOW64\Lgadba32.exeC:\Windows\system32\Lgadba32.exe88⤵PID:1980
-
C:\Windows\SysWOW64\Lnklol32.exeC:\Windows\system32\Lnklol32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1952 -
C:\Windows\SysWOW64\Lqjhkg32.exeC:\Windows\system32\Lqjhkg32.exe90⤵PID:2936
-
C:\Windows\SysWOW64\Lkomhp32.exeC:\Windows\system32\Lkomhp32.exe91⤵PID:2368
-
C:\Windows\SysWOW64\Lbieejff.exeC:\Windows\system32\Lbieejff.exe92⤵
- Modifies registry class
PID:2716 -
C:\Windows\SysWOW64\Lqleqg32.exeC:\Windows\system32\Lqleqg32.exe93⤵PID:1900
-
C:\Windows\SysWOW64\Lgfmmaem.exeC:\Windows\system32\Lgfmmaem.exe94⤵PID:2224
-
C:\Windows\SysWOW64\Ljdjildq.exeC:\Windows\system32\Ljdjildq.exe95⤵PID:684
-
C:\Windows\SysWOW64\Lnpejklj.exeC:\Windows\system32\Lnpejklj.exe96⤵PID:1752
-
C:\Windows\SysWOW64\Lqnbffkn.exeC:\Windows\system32\Lqnbffkn.exe97⤵PID:2980
-
C:\Windows\SysWOW64\Mdjnge32.exeC:\Windows\system32\Mdjnge32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2096 -
C:\Windows\SysWOW64\Mfkjnmje.exeC:\Windows\system32\Mfkjnmje.exe99⤵PID:3044
-
C:\Windows\SysWOW64\Mmebkg32.exeC:\Windows\system32\Mmebkg32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2680 -
C:\Windows\SysWOW64\Mqqolfik.exeC:\Windows\system32\Mqqolfik.exe101⤵
- Drops file in System32 directory
PID:2628 -
C:\Windows\SysWOW64\Mgkghp32.exeC:\Windows\system32\Mgkghp32.exe102⤵
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\Mmgoqg32.exeC:\Windows\system32\Mmgoqg32.exe103⤵PID:2892
-
C:\Windows\SysWOW64\Mcagma32.exeC:\Windows\system32\Mcagma32.exe104⤵
- Modifies registry class
PID:2820 -
C:\Windows\SysWOW64\Mjkpjkni.exeC:\Windows\system32\Mjkpjkni.exe105⤵
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Mphhbblp.exeC:\Windows\system32\Mphhbblp.exe106⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\Meeqkijg.exeC:\Windows\system32\Meeqkijg.exe107⤵PID:580
-
C:\Windows\SysWOW64\Mmlilfkj.exeC:\Windows\system32\Mmlilfkj.exe108⤵PID:2792
-
C:\Windows\SysWOW64\Mbiadm32.exeC:\Windows\system32\Mbiadm32.exe109⤵
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\Miciqgqn.exeC:\Windows\system32\Miciqgqn.exe110⤵PID:268
-
C:\Windows\SysWOW64\Mgfjld32.exeC:\Windows\system32\Mgfjld32.exe111⤵PID:3064
-
C:\Windows\SysWOW64\Npmana32.exeC:\Windows\system32\Npmana32.exe112⤵PID:2104
-
C:\Windows\SysWOW64\Nejjfh32.exeC:\Windows\system32\Nejjfh32.exe113⤵PID:2760
-
C:\Windows\SysWOW64\Nbnkomel.exeC:\Windows\system32\Nbnkomel.exe114⤵
- Drops file in System32 directory
- Modifies registry class
PID:1868 -
C:\Windows\SysWOW64\Nelgkhdp.exeC:\Windows\system32\Nelgkhdp.exe115⤵
- Drops file in System32 directory
PID:1396 -
C:\Windows\SysWOW64\Ncogge32.exeC:\Windows\system32\Ncogge32.exe116⤵PID:2652
-
C:\Windows\SysWOW64\Eagfaf32.exeC:\Windows\system32\Eagfaf32.exe117⤵PID:2112
-
C:\Windows\SysWOW64\Ehaonphg.exeC:\Windows\system32\Ehaonphg.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\Ejpkjlgk.exeC:\Windows\system32\Ejpkjlgk.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2584 -
C:\Windows\SysWOW64\Ebgbkihn.exeC:\Windows\system32\Ebgbkihn.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3000 -
C:\Windows\SysWOW64\Eajcgf32.exeC:\Windows\system32\Eajcgf32.exe121⤵
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Ehckdp32.exeC:\Windows\system32\Ehckdp32.exe122⤵PID:2540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-