Analysis
-
max time kernel
163s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 21:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0274f8df41c113330d28fee85430794a.exe
Resource
win7-20240215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0274f8df41c113330d28fee85430794a.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
0274f8df41c113330d28fee85430794a.exe
-
Size
80KB
-
MD5
0274f8df41c113330d28fee85430794a
-
SHA1
156a01903f15c84088dfdf3a7f8d32cad54fd8ab
-
SHA256
53468c4d59b458276e13b88d32d7ca304791517332992714a937046a3567466b
-
SHA512
34dd72e52a4e2721a3e19ff5f49bc5b517cfb19efbf15966d5dc6a8024d2731dd2bd7c21fa98b501cff7b9e5a39f65296336fbbc4dfdcb6dcbd0f50c2d6ca4d4
-
SSDEEP
1536:TbkDrJusdXJ3gsWlD3iXwjUt1jHXVNMMFK2LnS5DUHRbPa9b6i+sIk:TbkDrbwJ1yXfLlN3FXnS5DSCopsIk
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eoconenj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofnhfbjl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmkjdj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oeicopoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qaoofaoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdmfebnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdbejg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clldhljp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcdepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndbnkefp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdjilphb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onkphi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioeineap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acnjbpdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqhbaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oqpeaeel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Canlfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjcidkpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dckobg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bemlap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppblkffp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmhogppb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdmmlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phdngljk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhkdkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnmojj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qepccqlm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nppkkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjgcbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjlcclfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdnincal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcbfjqkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmnkdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blgdnjba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpifoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fghkdjdo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmhogppb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nladpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojdnbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqafbaap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfoahd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaomij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afddge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jognokdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gqohge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcanmlea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmfkin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amcmie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jhgneqha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgiflnoa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebiffc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkepbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkioojpp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abjdbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blakhgoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmbaggce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iiaggc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbihdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afclpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddcekk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccopfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecnlhf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkhofold.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkbkkbdj.exe -
Executes dropped EXE 64 IoCs
pid Process 2760 Eoconenj.exe 3432 Ginenk32.exe 400 Gckcap32.exe 1184 Hcommoin.exe 2896 Hhckeeam.exe 2192 Iqombb32.exe 3404 Imjgbb32.exe 2104 Iiaggc32.exe 1340 Jqklnp32.exe 2376 Ieoapl32.exe 4424 Kfbfmi32.exe 976 Moajmk32.exe 1412 Niadfpcn.exe 3528 Nnbfjf32.exe 2744 Ofnhfbjl.exe 3948 Ommjnlnd.exe 2480 Ppblkffp.exe 2372 Qbeaba32.exe 5056 Affgno32.exe 1912 Amgekh32.exe 916 Agojdnng.exe 2056 Bomknp32.exe 4376 Bnnklg32.exe 2688 Bjielh32.exe 2692 Ccfcpm32.exe 4956 Clohhbli.exe 3120 Cnndbecl.exe 5112 Dnhgidka.exe 3496 Efgehe32.exe 4924 Egnhcgeb.exe 1484 Fpnfbi32.exe 4284 Iffcgoka.exe 3356 Jognokdi.exe 688 Kkioojpp.exe 544 Nbibeo32.exe 3552 Abjdbj32.exe 3088 Bpnncl32.exe 4020 Cemcqcgi.exe 1720 Clldhljp.exe 2028 Cpjmok32.exe 2324 Cefega32.exe 752 Damflb32.exe 4960 Eflhiolf.exe 3776 Eqalfgll.exe 1992 Fokbbcmo.exe 3352 Gqohge32.exe 1380 Gcpaiq32.exe 2800 Hfhqkk32.exe 3376 Hcpjpn32.exe 3292 Ibhdgjap.exe 5000 Ifhibhfc.exe 4988 Kdophj32.exe 2192 Lkbkkbdj.exe 2760 Ljlagndl.exe 2968 Mcdepd32.exe 4088 Ndbnkefp.exe 228 Njogdldg.exe 3832 Nnmojj32.exe 700 Ojfmdk32.exe 2344 Oqpeaeel.exe 4900 Okeinn32.exe 456 Obdkfg32.exe 4748 Ojopki32.exe 3308 Pbkagfba.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Iedanb32.dll 0274f8df41c113330d28fee85430794a.exe File created C:\Windows\SysWOW64\Kabgoifk.dll Cgioah32.exe File created C:\Windows\SysWOW64\Eoollocp.exe Dacebkko.exe File created C:\Windows\SysWOW64\Nophgffg.dll Pdmpck32.exe File created C:\Windows\SysWOW64\Nlkffifj.dll Aoifoa32.exe File created C:\Windows\SysWOW64\Khplia32.exe Ioebdomd.exe File created C:\Windows\SysWOW64\Pjlalacf.dll Cemcqcgi.exe File opened for modification C:\Windows\SysWOW64\Njfaalao.exe Nmbaggce.exe File created C:\Windows\SysWOW64\Onglec32.dll Fnfmlchf.exe File opened for modification C:\Windows\SysWOW64\Ioeineap.exe Iocliecb.exe File opened for modification C:\Windows\SysWOW64\Clohhbli.exe Ccfcpm32.exe File opened for modification C:\Windows\SysWOW64\Nogngp32.exe Nijeoikf.exe File opened for modification C:\Windows\SysWOW64\Okjnhpee.exe Oihapg32.exe File created C:\Windows\SysWOW64\Ckfpai32.exe Blhpjnbe.exe File created C:\Windows\SysWOW64\Qhigbl32.exe Qaoofaoi.exe File created C:\Windows\SysWOW64\Blakhgoo.exe Bhohfj32.exe File opened for modification C:\Windows\SysWOW64\Kglmbd32.exe Kdigkjpl.exe File opened for modification C:\Windows\SysWOW64\Binhgd32.exe Bbcpkjkg.exe File created C:\Windows\SysWOW64\Nbpafkdf.exe Nkeiia32.exe File created C:\Windows\SysWOW64\Lbcembci.exe Lhmapi32.exe File created C:\Windows\SysWOW64\Cnndbecl.exe Clohhbli.exe File opened for modification C:\Windows\SysWOW64\Nbibeo32.exe Kkioojpp.exe File created C:\Windows\SysWOW64\Akcjel32.exe Aomipkic.exe File opened for modification C:\Windows\SysWOW64\Nmgjbg32.exe Ncofjaho.exe File created C:\Windows\SysWOW64\Qdakiidg.dll Iliihipi.exe File opened for modification C:\Windows\SysWOW64\Noehlgol.exe Nppkkj32.exe File opened for modification C:\Windows\SysWOW64\Cjmpeffh.exe Cpbbln32.exe File created C:\Windows\SysWOW64\Blhpjnbe.exe Bbbkmebo.exe File created C:\Windows\SysWOW64\Cdmfebnk.exe Caojigoh.exe File created C:\Windows\SysWOW64\Afqipdle.exe Apfqbj32.exe File created C:\Windows\SysWOW64\Achmpagb.dll Ginenk32.exe File created C:\Windows\SysWOW64\Dacebkko.exe Donceaac.exe File opened for modification C:\Windows\SysWOW64\Jebfgl32.exe Jndenjmo.exe File opened for modification C:\Windows\SysWOW64\Dkpjnd32.exe Dnljdqkh.exe File created C:\Windows\SysWOW64\Pbgpmedl.dll Mdneki32.exe File opened for modification C:\Windows\SysWOW64\Qcbfjqkp.exe Pcmloa32.exe File created C:\Windows\SysWOW64\Fhbolp32.dll Dnpdom32.exe File opened for modification C:\Windows\SysWOW64\Khplia32.exe Ioebdomd.exe File created C:\Windows\SysWOW64\Niadfpcn.exe Moajmk32.exe File created C:\Windows\SysWOW64\Oaeghn32.dll Ommjnlnd.exe File opened for modification C:\Windows\SysWOW64\Fdcjfg32.exe Efhcld32.exe File created C:\Windows\SysWOW64\Lneccc32.dll Ebimqi32.exe File opened for modification C:\Windows\SysWOW64\Dckobg32.exe Dkpjnd32.exe File opened for modification C:\Windows\SysWOW64\Iqombb32.exe Hhckeeam.exe File created C:\Windows\SysWOW64\Pjhpfp32.dll Gbabblkg.exe File created C:\Windows\SysWOW64\Omhicj32.exe Ncpejd32.exe File opened for modification C:\Windows\SysWOW64\Lolchc32.exe Lahboo32.exe File opened for modification C:\Windows\SysWOW64\Bemlap32.exe Bppcii32.exe File created C:\Windows\SysWOW64\Niidli32.dll Njogdldg.exe File created C:\Windows\SysWOW64\Cbllfboa.exe Ciakhmkc.exe File created C:\Windows\SysWOW64\Bhohfj32.exe Bbbpnc32.exe File opened for modification C:\Windows\SysWOW64\Aiifeg32.exe Qamaae32.exe File created C:\Windows\SysWOW64\Pjjfnlho.exe Paaaeg32.exe File opened for modification C:\Windows\SysWOW64\Caijca32.exe Cgdefhok.exe File opened for modification C:\Windows\SysWOW64\Clldhljp.exe Cemcqcgi.exe File opened for modification C:\Windows\SysWOW64\Gbcohl32.exe Gikkof32.exe File created C:\Windows\SysWOW64\Ofkkpagl.dll Jkgpleaf.exe File created C:\Windows\SysWOW64\Lkchoaif.exe Lmpkkjcj.exe File created C:\Windows\SysWOW64\Peljdi32.dll Ncfbdfgp.exe File created C:\Windows\SysWOW64\Epcengma.dll Aceijg32.exe File created C:\Windows\SysWOW64\Aeiooi32.exe Afhoaahg.exe File created C:\Windows\SysWOW64\Pqafgq32.dll Liocgc32.exe File opened for modification C:\Windows\SysWOW64\Gckcap32.exe Ginenk32.exe File created C:\Windows\SysWOW64\Joalnp32.dll Moajmk32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfdfjbne.dll" Fdcjfg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnjmoqmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egkdne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbjpohpp.dll" Pjmjnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmqbln32.dll" Bdjjnoje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iagngp32.dll" Ealopnol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkioojpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkieoo32.dll" Hmfkin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcpkmlpo.dll" Bcmolimg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geleenbj.dll" Alimnj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lofklp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Liocgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icneeq32.dll" Nmbaggce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbphqahb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcikcekm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Peqcodce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlnijmhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgofoamj.dll" Oegejc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Delhpnop.dll" Iiaggc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfelgknf.dll" Dpqonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bikdgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpebbije.dll" Iffcgoka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcfcdnqn.dll" Ajnkmjqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbfddh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpifoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdhenk32.dll" Gqohge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qcbmegol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghnikdhc.dll" Kmhejk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Piapehkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Banjhbio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idkgpm32.dll" Mcdepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlkffifj.dll" Aoifoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akcjel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eomgog32.dll" Noehlgol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Endfdo32.dll" Jhgneqha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkgpleaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llmpco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amneleek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcbllh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Peqcodce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efnbqi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Paaaeg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbllfboa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iqombb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnbfjf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfhqkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nimbdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkgpleaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogpooc32.dll" Pclnon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dacebkko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qaoofaoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ioebdomd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Niaadm32.dll" Cmedca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hagodlge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clldhljp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfdbblqn.dll" Eqalfgll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oqpeaeel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oihapg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akcjel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eoconenj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dibmfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jebfgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apfqbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bpnncl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 2760 4988 0274f8df41c113330d28fee85430794a.exe 97 PID 4988 wrote to memory of 2760 4988 0274f8df41c113330d28fee85430794a.exe 97 PID 4988 wrote to memory of 2760 4988 0274f8df41c113330d28fee85430794a.exe 97 PID 2760 wrote to memory of 3432 2760 Eoconenj.exe 98 PID 2760 wrote to memory of 3432 2760 Eoconenj.exe 98 PID 2760 wrote to memory of 3432 2760 Eoconenj.exe 98 PID 3432 wrote to memory of 400 3432 Ginenk32.exe 99 PID 3432 wrote to memory of 400 3432 Ginenk32.exe 99 PID 3432 wrote to memory of 400 3432 Ginenk32.exe 99 PID 400 wrote to memory of 1184 400 Gckcap32.exe 100 PID 400 wrote to memory of 1184 400 Gckcap32.exe 100 PID 400 wrote to memory of 1184 400 Gckcap32.exe 100 PID 1184 wrote to memory of 2896 1184 Hcommoin.exe 101 PID 1184 wrote to memory of 2896 1184 Hcommoin.exe 101 PID 1184 wrote to memory of 2896 1184 Hcommoin.exe 101 PID 2896 wrote to memory of 2192 2896 Hhckeeam.exe 102 PID 2896 wrote to memory of 2192 2896 Hhckeeam.exe 102 PID 2896 wrote to memory of 2192 2896 Hhckeeam.exe 102 PID 2192 wrote to memory of 3404 2192 Iqombb32.exe 103 PID 2192 wrote to memory of 3404 2192 Iqombb32.exe 103 PID 2192 wrote to memory of 3404 2192 Iqombb32.exe 103 PID 3404 wrote to memory of 2104 3404 Imjgbb32.exe 105 PID 3404 wrote to memory of 2104 3404 Imjgbb32.exe 105 PID 3404 wrote to memory of 2104 3404 Imjgbb32.exe 105 PID 2104 wrote to memory of 1340 2104 Iiaggc32.exe 106 PID 2104 wrote to memory of 1340 2104 Iiaggc32.exe 106 PID 2104 wrote to memory of 1340 2104 Iiaggc32.exe 106 PID 3780 wrote to memory of 2376 3780 Hobcgdjm.exe 108 PID 3780 wrote to memory of 2376 3780 Hobcgdjm.exe 108 PID 3780 wrote to memory of 2376 3780 Hobcgdjm.exe 108 PID 2376 wrote to memory of 4424 2376 Ieoapl32.exe 109 PID 2376 wrote to memory of 4424 2376 Ieoapl32.exe 109 PID 2376 wrote to memory of 4424 2376 Ieoapl32.exe 109 PID 4424 wrote to memory of 976 4424 Kfbfmi32.exe 110 PID 4424 wrote to memory of 976 4424 Kfbfmi32.exe 110 PID 4424 wrote to memory of 976 4424 Kfbfmi32.exe 110 PID 976 wrote to memory of 1412 976 Moajmk32.exe 111 PID 976 wrote to memory of 1412 976 Moajmk32.exe 111 PID 976 wrote to memory of 1412 976 Moajmk32.exe 111 PID 1412 wrote to memory of 3528 1412 Niadfpcn.exe 112 PID 1412 wrote to memory of 3528 1412 Niadfpcn.exe 112 PID 1412 wrote to memory of 3528 1412 Niadfpcn.exe 112 PID 3528 wrote to memory of 2744 3528 Nnbfjf32.exe 113 PID 3528 wrote to memory of 2744 3528 Nnbfjf32.exe 113 PID 3528 wrote to memory of 2744 3528 Nnbfjf32.exe 113 PID 2744 wrote to memory of 3948 2744 Ofnhfbjl.exe 114 PID 2744 wrote to memory of 3948 2744 Ofnhfbjl.exe 114 PID 2744 wrote to memory of 3948 2744 Ofnhfbjl.exe 114 PID 3948 wrote to memory of 2480 3948 Ommjnlnd.exe 115 PID 3948 wrote to memory of 2480 3948 Ommjnlnd.exe 115 PID 3948 wrote to memory of 2480 3948 Ommjnlnd.exe 115 PID 2480 wrote to memory of 2372 2480 Ppblkffp.exe 116 PID 2480 wrote to memory of 2372 2480 Ppblkffp.exe 116 PID 2480 wrote to memory of 2372 2480 Ppblkffp.exe 116 PID 2372 wrote to memory of 5056 2372 Qbeaba32.exe 117 PID 2372 wrote to memory of 5056 2372 Qbeaba32.exe 117 PID 2372 wrote to memory of 5056 2372 Qbeaba32.exe 117 PID 5056 wrote to memory of 1912 5056 Affgno32.exe 118 PID 5056 wrote to memory of 1912 5056 Affgno32.exe 118 PID 5056 wrote to memory of 1912 5056 Affgno32.exe 118 PID 1912 wrote to memory of 916 1912 Amgekh32.exe 119 PID 1912 wrote to memory of 916 1912 Amgekh32.exe 119 PID 1912 wrote to memory of 916 1912 Amgekh32.exe 119 PID 916 wrote to memory of 2056 916 Agojdnng.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\0274f8df41c113330d28fee85430794a.exe"C:\Users\Admin\AppData\Local\Temp\0274f8df41c113330d28fee85430794a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\Eoconenj.exeC:\Windows\system32\Eoconenj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Ginenk32.exeC:\Windows\system32\Ginenk32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\Gckcap32.exeC:\Windows\system32\Gckcap32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\Hcommoin.exeC:\Windows\system32\Hcommoin.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\Hhckeeam.exeC:\Windows\system32\Hhckeeam.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\Iqombb32.exeC:\Windows\system32\Iqombb32.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Imjgbb32.exeC:\Windows\system32\Imjgbb32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\Iiaggc32.exeC:\Windows\system32\Iiaggc32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Jqklnp32.exeC:\Windows\system32\Jqklnp32.exe10⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\Hobcgdjm.exeC:\Windows\system32\Hobcgdjm.exe11⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\Ieoapl32.exeC:\Windows\system32\Ieoapl32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Kfbfmi32.exeC:\Windows\system32\Kfbfmi32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\Moajmk32.exeC:\Windows\system32\Moajmk32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\Niadfpcn.exeC:\Windows\system32\Niadfpcn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\Nnbfjf32.exeC:\Windows\system32\Nnbfjf32.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\Ofnhfbjl.exeC:\Windows\system32\Ofnhfbjl.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Ommjnlnd.exeC:\Windows\system32\Ommjnlnd.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\Ppblkffp.exeC:\Windows\system32\Ppblkffp.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\Qbeaba32.exeC:\Windows\system32\Qbeaba32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\Affgno32.exeC:\Windows\system32\Affgno32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\Amgekh32.exeC:\Windows\system32\Amgekh32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\Agojdnng.exeC:\Windows\system32\Agojdnng.exe23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\Bomknp32.exeC:\Windows\system32\Bomknp32.exe24⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Bnnklg32.exeC:\Windows\system32\Bnnklg32.exe25⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\Bjielh32.exeC:\Windows\system32\Bjielh32.exe26⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Ccfcpm32.exeC:\Windows\system32\Ccfcpm32.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\Clohhbli.exeC:\Windows\system32\Clohhbli.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4956 -
C:\Windows\SysWOW64\Cnndbecl.exeC:\Windows\system32\Cnndbecl.exe29⤵
- Executes dropped EXE
PID:3120 -
C:\Windows\SysWOW64\Dnhgidka.exeC:\Windows\system32\Dnhgidka.exe30⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\Efgehe32.exeC:\Windows\system32\Efgehe32.exe31⤵
- Executes dropped EXE
PID:3496 -
C:\Windows\SysWOW64\Egnhcgeb.exeC:\Windows\system32\Egnhcgeb.exe32⤵
- Executes dropped EXE
PID:4924 -
C:\Windows\SysWOW64\Fpnfbi32.exeC:\Windows\system32\Fpnfbi32.exe33⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\Iffcgoka.exeC:\Windows\system32\Iffcgoka.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:4284 -
C:\Windows\SysWOW64\Jognokdi.exeC:\Windows\system32\Jognokdi.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3356 -
C:\Windows\SysWOW64\Kkioojpp.exeC:\Windows\system32\Kkioojpp.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:688 -
C:\Windows\SysWOW64\Nbibeo32.exeC:\Windows\system32\Nbibeo32.exe37⤵
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\Abjdbj32.exeC:\Windows\system32\Abjdbj32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\Bpnncl32.exeC:\Windows\system32\Bpnncl32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:3088 -
C:\Windows\SysWOW64\Cemcqcgi.exeC:\Windows\system32\Cemcqcgi.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4020 -
C:\Windows\SysWOW64\Clldhljp.exeC:\Windows\system32\Clldhljp.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1720 -
C:\Windows\SysWOW64\Cpjmok32.exeC:\Windows\system32\Cpjmok32.exe42⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Cefega32.exeC:\Windows\system32\Cefega32.exe43⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\Damflb32.exeC:\Windows\system32\Damflb32.exe44⤵
- Executes dropped EXE
PID:752 -
C:\Windows\SysWOW64\Eflhiolf.exeC:\Windows\system32\Eflhiolf.exe45⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\Eqalfgll.exeC:\Windows\system32\Eqalfgll.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:3776 -
C:\Windows\SysWOW64\Fokbbcmo.exeC:\Windows\system32\Fokbbcmo.exe47⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\Gqohge32.exeC:\Windows\system32\Gqohge32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3352 -
C:\Windows\SysWOW64\Gcpaiq32.exeC:\Windows\system32\Gcpaiq32.exe49⤵
- Executes dropped EXE
PID:1380 -
C:\Windows\SysWOW64\Hfhqkk32.exeC:\Windows\system32\Hfhqkk32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:2800 -
C:\Windows\SysWOW64\Hcpjpn32.exeC:\Windows\system32\Hcpjpn32.exe51⤵
- Executes dropped EXE
PID:3376 -
C:\Windows\SysWOW64\Ibhdgjap.exeC:\Windows\system32\Ibhdgjap.exe52⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\Ifhibhfc.exeC:\Windows\system32\Ifhibhfc.exe53⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\Kdophj32.exeC:\Windows\system32\Kdophj32.exe54⤵
- Executes dropped EXE
PID:4988 -
C:\Windows\SysWOW64\Lkbkkbdj.exeC:\Windows\system32\Lkbkkbdj.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\Ljlagndl.exeC:\Windows\system32\Ljlagndl.exe56⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\SysWOW64\Mcdepd32.exeC:\Windows\system32\Mcdepd32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\Ndbnkefp.exeC:\Windows\system32\Ndbnkefp.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4088 -
C:\Windows\SysWOW64\Njogdldg.exeC:\Windows\system32\Njogdldg.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:228 -
C:\Windows\SysWOW64\Nnmojj32.exeC:\Windows\system32\Nnmojj32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3832 -
C:\Windows\SysWOW64\Ojfmdk32.exeC:\Windows\system32\Ojfmdk32.exe61⤵
- Executes dropped EXE
PID:700 -
C:\Windows\SysWOW64\Oqpeaeel.exeC:\Windows\system32\Oqpeaeel.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Okeinn32.exeC:\Windows\system32\Okeinn32.exe63⤵
- Executes dropped EXE
PID:4900 -
C:\Windows\SysWOW64\Obdkfg32.exeC:\Windows\system32\Obdkfg32.exe64⤵
- Executes dropped EXE
PID:456 -
C:\Windows\SysWOW64\Ojopki32.exeC:\Windows\system32\Ojopki32.exe65⤵
- Executes dropped EXE
PID:4748 -
C:\Windows\SysWOW64\Pbkagfba.exeC:\Windows\system32\Pbkagfba.exe66⤵
- Executes dropped EXE
PID:3308 -
C:\Windows\SysWOW64\Pclnon32.exeC:\Windows\system32\Pclnon32.exe67⤵
- Modifies registry class
PID:3736 -
C:\Windows\SysWOW64\Qepccqlm.exeC:\Windows\system32\Qepccqlm.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1184 -
C:\Windows\SysWOW64\Qlmhfj32.exeC:\Windows\system32\Qlmhfj32.exe69⤵PID:4156
-
C:\Windows\SysWOW64\Abfqbdhd.exeC:\Windows\system32\Abfqbdhd.exe70⤵PID:1008
-
C:\Windows\SysWOW64\Bbbpnc32.exeC:\Windows\system32\Bbbpnc32.exe71⤵
- Drops file in System32 directory
PID:4652 -
C:\Windows\SysWOW64\Bhohfj32.exeC:\Windows\system32\Bhohfj32.exe72⤵
- Drops file in System32 directory
PID:4892 -
C:\Windows\SysWOW64\Blakhgoo.exeC:\Windows\system32\Blakhgoo.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3328 -
C:\Windows\SysWOW64\Bdmpljlj.exeC:\Windows\system32\Bdmpljlj.exe74⤵PID:3500
-
C:\Windows\SysWOW64\Cbqlpabf.exeC:\Windows\system32\Cbqlpabf.exe75⤵PID:3972
-
C:\Windows\SysWOW64\Donceaac.exeC:\Windows\system32\Donceaac.exe76⤵
- Drops file in System32 directory
PID:3964 -
C:\Windows\SysWOW64\Dacebkko.exeC:\Windows\system32\Dacebkko.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:5084 -
C:\Windows\SysWOW64\Eoollocp.exeC:\Windows\system32\Eoollocp.exe78⤵PID:4032
-
C:\Windows\SysWOW64\Eehdii32.exeC:\Windows\system32\Eehdii32.exe79⤵PID:2172
-
C:\Windows\SysWOW64\Fcanmlea.exeC:\Windows\system32\Fcanmlea.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4780 -
C:\Windows\SysWOW64\Fojlhmic.exeC:\Windows\system32\Fojlhmic.exe81⤵PID:1240
-
C:\Windows\SysWOW64\Gmhogppb.exeC:\Windows\system32\Gmhogppb.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5040 -
C:\Windows\SysWOW64\Hmfkin32.exeC:\Windows\system32\Hmfkin32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4428 -
C:\Windows\SysWOW64\Jmfdpkeo.exeC:\Windows\system32\Jmfdpkeo.exe84⤵PID:804
-
C:\Windows\SysWOW64\Jcplle32.exeC:\Windows\system32\Jcplle32.exe85⤵PID:2960
-
C:\Windows\SysWOW64\Jbgfca32.exeC:\Windows\system32\Jbgfca32.exe86⤵PID:4880
-
C:\Windows\SysWOW64\Kdnincal.exeC:\Windows\system32\Kdnincal.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4980 -
C:\Windows\SysWOW64\Lbjlpo32.exeC:\Windows\system32\Lbjlpo32.exe88⤵PID:3780
-
C:\Windows\SysWOW64\Mdckpqod.exeC:\Windows\system32\Mdckpqod.exe89⤵PID:1340
-
C:\Windows\SysWOW64\Pncggqbg.exeC:\Windows\system32\Pncggqbg.exe90⤵PID:2388
-
C:\Windows\SysWOW64\Pdmpck32.exeC:\Windows\system32\Pdmpck32.exe91⤵
- Drops file in System32 directory
PID:3868 -
C:\Windows\SysWOW64\Qnfdlpqd.exeC:\Windows\system32\Qnfdlpqd.exe92⤵PID:4280
-
C:\Windows\SysWOW64\Qcbmegol.exeC:\Windows\system32\Qcbmegol.exe93⤵
- Modifies registry class
PID:3892 -
C:\Windows\SysWOW64\Aceijg32.exeC:\Windows\system32\Aceijg32.exe94⤵
- Drops file in System32 directory
PID:2128 -
C:\Windows\SysWOW64\Aqijdk32.exeC:\Windows\system32\Aqijdk32.exe95⤵PID:4268
-
C:\Windows\SysWOW64\Afhoaahg.exeC:\Windows\system32\Afhoaahg.exe96⤵
- Drops file in System32 directory
PID:4352 -
C:\Windows\SysWOW64\Aeiooi32.exeC:\Windows\system32\Aeiooi32.exe97⤵PID:5168
-
C:\Windows\SysWOW64\Bmkjdj32.exeC:\Windows\system32\Bmkjdj32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5216 -
C:\Windows\SysWOW64\Canlfh32.exeC:\Windows\system32\Canlfh32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5260 -
C:\Windows\SysWOW64\Cnbmolhd.exeC:\Windows\system32\Cnbmolhd.exe100⤵PID:5364
-
C:\Windows\SysWOW64\Dffdjmme.exeC:\Windows\system32\Dffdjmme.exe101⤵PID:5460
-
C:\Windows\SysWOW64\Ekefgi32.exeC:\Windows\system32\Ekefgi32.exe102⤵PID:5512
-
C:\Windows\SysWOW64\Fahajbek.exeC:\Windows\system32\Fahajbek.exe103⤵PID:5560
-
C:\Windows\SysWOW64\Ggqingie.exeC:\Windows\system32\Ggqingie.exe104⤵PID:5612
-
C:\Windows\SysWOW64\Kblidkhp.exeC:\Windows\system32\Kblidkhp.exe105⤵PID:5680
-
C:\Windows\SysWOW64\Liocgc32.exeC:\Windows\system32\Liocgc32.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:5720 -
C:\Windows\SysWOW64\Llmpco32.exeC:\Windows\system32\Llmpco32.exe107⤵
- Modifies registry class
PID:5776 -
C:\Windows\SysWOW64\Mlnijmhc.exeC:\Windows\system32\Mlnijmhc.exe108⤵
- Modifies registry class
PID:5816 -
C:\Windows\SysWOW64\Mefmbbod.exeC:\Windows\system32\Mefmbbod.exe109⤵PID:5860
-
C:\Windows\SysWOW64\Nfhfbedd.exeC:\Windows\system32\Nfhfbedd.exe110⤵PID:5900
-
C:\Windows\SysWOW64\Nppkkj32.exeC:\Windows\system32\Nppkkj32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5940 -
C:\Windows\SysWOW64\Noehlgol.exeC:\Windows\system32\Noehlgol.exe112⤵
- Modifies registry class
PID:6008 -
C:\Windows\SysWOW64\Oeicopoo.exeC:\Windows\system32\Oeicopoo.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6060 -
C:\Windows\SysWOW64\Pljalipc.exeC:\Windows\system32\Pljalipc.exe114⤵PID:6112
-
C:\Windows\SysWOW64\Ppjghgdg.exeC:\Windows\system32\Ppjghgdg.exe115⤵PID:5148
-
C:\Windows\SysWOW64\Pcmloa32.exeC:\Windows\system32\Pcmloa32.exe116⤵
- Drops file in System32 directory
PID:2900 -
C:\Windows\SysWOW64\Qcbfjqkp.exeC:\Windows\system32\Qcbfjqkp.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4764 -
C:\Windows\SysWOW64\Aoifoa32.exeC:\Windows\system32\Aoifoa32.exe118⤵
- Drops file in System32 directory
- Modifies registry class
PID:1716 -
C:\Windows\SysWOW64\Ajnkmjqj.exeC:\Windows\system32\Ajnkmjqj.exe119⤵
- Modifies registry class
PID:5268 -
C:\Windows\SysWOW64\Aokceaoa.exeC:\Windows\system32\Aokceaoa.exe120⤵PID:5288
-
C:\Windows\SysWOW64\Agbkfood.exeC:\Windows\system32\Agbkfood.exe121⤵PID:4512
-
C:\Windows\SysWOW64\Amodnenk.exeC:\Windows\system32\Amodnenk.exe122⤵PID:3840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-