Analysis
-
max time kernel
173s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 05:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2b0365d01833a09b03170ce8cf0bf18d.exe
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2b0365d01833a09b03170ce8cf0bf18d.exe
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
2b0365d01833a09b03170ce8cf0bf18d.exe
-
Size
109KB
-
MD5
2b0365d01833a09b03170ce8cf0bf18d
-
SHA1
9c0765e25968d161e12db27bd04a97334144b3be
-
SHA256
21cf074ebdd36a367c022b6c7c653726fe4948e59278093dc303e87db85b42cd
-
SHA512
ec35af5723befa161dd8db98cbb742d968a76c3258d9ccd04aabe2062bc5b630c219f1014ec2548bf2dd2c012676373ae56209c3dc68b61f2121ab5749bb776e
-
SSDEEP
3072:XIBVjhYgTDeifo+8fo3PXl9Z7S/yCsKh2EzZA/z:4bj2KDZo+go35e/yCthvUz
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Leenanik.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhpepoel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2b0365d01833a09b03170ce8cf0bf18d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjlgnh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glghhmdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nanmhf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpdhdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qecgcfmf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baepjpea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pmnbpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kagbmkch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnebfm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqdgan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lofklp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qjdpoacp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhfmic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdmcnnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kklkej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kjepcqnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kjhccf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohggah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlmhfj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ednajepe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Objphn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nconal32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkgnpn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aehghn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gfemfhje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Andqia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cipppc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Naejcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nonajj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfgcjpdk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmhkpacg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckjbbbga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ahofidlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Idhgkcln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bkobfdao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djelqo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oanfodmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mbqkfhfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kqpoja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Medggidb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aaenlj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnacfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leenanik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oqdgan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ackiqpce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lcdcbokq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nadlnoaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gagebknp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Algbfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Licfgmpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pdfeandd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cbqlpabf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ncakglka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ehpamnaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oagpne32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akpojpic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oocdme32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggnenagl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aeoppbge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aocmbdco.exe -
Executes dropped EXE 64 IoCs
pid Process 392 Nblfee32.exe 1000 Abmhbplf.exe 2520 Aofemaog.exe 3736 Bckddn32.exe 2932 Cphgca32.exe 4724 Dlcaca32.exe 4804 Ejjgic32.exe 2072 Fnacfp32.exe 4728 Gagebknp.exe 456 Habeni32.exe 4468 Idhgkcln.exe 1360 Jknocljn.exe 1084 Kkgbjkac.exe 2480 Kklkej32.exe 2852 Lamjbc32.exe 1216 Lqfpoope.exe 2980 Mglhgg32.exe 4560 Ogmaneoa.exe 2500 Qecgcfmf.exe 2536 Aiclodaj.exe 4252 Algbfo32.exe 1388 Alioloje.exe 4160 Bhibgo32.exe 3696 Clldhljp.exe 1376 Damflb32.exe 1596 Dhlhcl32.exe 1008 Eomfae32.exe 3260 Ffekom32.exe 1464 Fifdqhal.exe 3520 Fckhnaab.exe 2592 Gpkliaol.exe 1312 Ijcecgnl.exe 4480 Jaljaoii.exe 4768 Kgmlde32.exe 3632 Mjcghm32.exe 2308 Mdhkefnj.exe 4080 Nglala32.exe 5012 Odidld32.exe 1928 Pjalpida.exe 3672 Qlmhfj32.exe 1208 Baepjpea.exe 696 Blkdgheg.exe 2160 Balfko32.exe 3252 Bblcda32.exe 2636 Chhkmh32.exe 4708 Cbqlpabf.exe 3064 Chpangnk.exe 4376 Docmqp32.exe 2124 Elkfed32.exe 2516 Ednajepe.exe 4364 Fhngfcdi.exe 3724 Ffdddg32.exe 4400 Gdqgfbop.exe 1128 Gfpcpefb.exe 232 Hkaedk32.exe 1492 Hbknqeha.exe 3244 Hkdbik32.exe 572 Hodgei32.exe 5112 Jidkek32.exe 4972 Kpncbemh.exe 4780 Kmijliej.exe 2152 Kbebdpca.exe 4568 Lgkakm32.exe 5036 Mphoob32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Genbjogo.dll Bkgekock.exe File created C:\Windows\SysWOW64\Bhgncmbq.dll Piocoi32.exe File created C:\Windows\SysWOW64\Ikaebnoj.exe Hkohmnal.exe File opened for modification C:\Windows\SysWOW64\Kagbmkch.exe Iglhhhmm.exe File created C:\Windows\SysWOW64\Dlcaca32.exe Cphgca32.exe File created C:\Windows\SysWOW64\Ldffcmjf.dll Bblcda32.exe File created C:\Windows\SysWOW64\Pmgcidqm.exe Oanfodmk.exe File opened for modification C:\Windows\SysWOW64\Kmijliej.exe Kpncbemh.exe File opened for modification C:\Windows\SysWOW64\Jcphkhad.exe Jkdcffci.exe File opened for modification C:\Windows\SysWOW64\Kjhccf32.exe Kqpoja32.exe File created C:\Windows\SysWOW64\Qgeoah32.exe Pdkcinco.exe File created C:\Windows\SysWOW64\Ckifpg32.dll Cfmijkhj.exe File created C:\Windows\SysWOW64\Okgofl32.dll Afocdkac.exe File created C:\Windows\SysWOW64\Mdneki32.exe Mdkhficp.exe File opened for modification C:\Windows\SysWOW64\Gdqgfbop.exe Ffdddg32.exe File created C:\Windows\SysWOW64\Chmofekk.dll Nconal32.exe File created C:\Windows\SysWOW64\Pceife32.dll Mcbpcm32.exe File created C:\Windows\SysWOW64\Apmhbf32.exe Akpojpic.exe File created C:\Windows\SysWOW64\Flekbm32.exe Elilgo32.exe File opened for modification C:\Windows\SysWOW64\Iacbbh32.exe Hkgnpn32.exe File created C:\Windows\SysWOW64\Dffclo32.dll Jcphkhad.exe File created C:\Windows\SysWOW64\Ffiblg32.exe Fldnoo32.exe File created C:\Windows\SysWOW64\Nnccmddi.exe Ncifdlii.exe File opened for modification C:\Windows\SysWOW64\Bdojdd32.exe Bkgekock.exe File opened for modification C:\Windows\SysWOW64\Abdfdp32.exe Akjnhehc.exe File created C:\Windows\SysWOW64\Liickdeg.dll Leenanik.exe File opened for modification C:\Windows\SysWOW64\Onnmmipj.exe Oeehdcij.exe File created C:\Windows\SysWOW64\Nlbkifhp.dll Hdclbopg.exe File created C:\Windows\SysWOW64\Ljdanq32.dll Aeoppbge.exe File opened for modification C:\Windows\SysWOW64\Ggmlefcd.exe Glghhmdn.exe File created C:\Windows\SysWOW64\Hapgkmbf.dll Ffdddg32.exe File opened for modification C:\Windows\SysWOW64\Lkmihi32.exe Lebalokn.exe File created C:\Windows\SysWOW64\Mjahfl32.exe Maggggaf.exe File created C:\Windows\SysWOW64\Kklkej32.exe Kkgbjkac.exe File created C:\Windows\SysWOW64\Bfkeej32.dll Ackiqpce.exe File created C:\Windows\SysWOW64\Dgfbgipl.dll Lebalokn.exe File created C:\Windows\SysWOW64\Bdnoniae.dll Jpdhdl32.exe File created C:\Windows\SysWOW64\Pmjfjn32.dll Kjhccf32.exe File created C:\Windows\SysWOW64\Naejcl32.exe Nbqmbo32.exe File opened for modification C:\Windows\SysWOW64\Jpdhdl32.exe Jcphkhad.exe File created C:\Windows\SysWOW64\Hbhbfh32.dll Bkobfdao.exe File created C:\Windows\SysWOW64\Fdiijemd.dll Ffiblg32.exe File opened for modification C:\Windows\SysWOW64\Acnjbpdb.exe Qfepnmjn.exe File created C:\Windows\SysWOW64\Gdqgfbop.exe Ffdddg32.exe File opened for modification C:\Windows\SysWOW64\Hkgnpn32.exe Hpaibe32.exe File opened for modification C:\Windows\SysWOW64\Ochafm32.exe Nddklhke.exe File created C:\Windows\SysWOW64\Jgpfjnig.dll Flekbm32.exe File created C:\Windows\SysWOW64\Jqofjd32.dll Ogndki32.exe File created C:\Windows\SysWOW64\Hlkfle32.exe Faeihogj.exe File created C:\Windows\SysWOW64\Ciaiem32.dll Lqfpoope.exe File created C:\Windows\SysWOW64\Edfofg32.dll Nahdkffc.exe File opened for modification C:\Windows\SysWOW64\Ehpamnaj.exe Ddfikaeq.exe File created C:\Windows\SysWOW64\Qcobjk32.exe Qlejnqbj.exe File created C:\Windows\SysWOW64\Ncplekbq.exe Nnccmddi.exe File created C:\Windows\SysWOW64\Acnjbpdb.exe Qfepnmjn.exe File created C:\Windows\SysWOW64\Gekckpgl.exe Fgbmliee.exe File created C:\Windows\SysWOW64\Ccinggcj.exe Bicjjncd.exe File opened for modification C:\Windows\SysWOW64\Ddbfkh32.exe Ckjbbbga.exe File created C:\Windows\SysWOW64\Oemcac32.exe Ndmghqpo.exe File created C:\Windows\SysWOW64\Pdmpck32.exe Pqknbmhc.exe File opened for modification C:\Windows\SysWOW64\Cipppc32.exe Bqfokblg.exe File created C:\Windows\SysWOW64\Mcbpcm32.exe Lcdcbokq.exe File created C:\Windows\SysWOW64\Ncifdlii.exe Mnhdae32.exe File created C:\Windows\SysWOW64\Cmpine32.dll Iglhhhmm.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlmpoh32.dll" Aofemaog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oanfodmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mokogcbg.dll" Glghhmdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Beglljko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acjnfh32.dll" Blkdgheg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kiejfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ohfafn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ffiblg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abdflhfh.dll" Odbpcpli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngnill32.dll" Damflb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmjfjn32.dll" Kjhccf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bginkk32.dll" Qcobjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpmknf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Faeihogj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kagbmkch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bllhppld.dll" Aocmbdco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nblfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhodilni.dll" Fnacfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oeffbpak.dll" Gfpcpefb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gdglfqjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pknqhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jhlgpp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddfikaeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knboee32.dll" Gdqgfbop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfggoh32.dll" Pmgcidqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jaljlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlindcmm.dll" Ogmaneoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bqfokblg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddbfkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hbenio32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kagbmkch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gecedf32.dll" Mdhkefnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Idbfhiko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mlhidg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phldlh32.dll" Dfgcjpdk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qpahghbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlbkifhp.dll" Hdclbopg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dbkpokhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apildl32.dll" Galcjkmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iacbbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mdkhficp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbkdla32.dll" Idhgkcln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifefggbd.dll" Cbqlpabf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdiijemd.dll" Ffiblg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opnefa32.dll" Akmjmefq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cpklja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jaljaoii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpoknjfd.dll" Pimkkfka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afpjoaeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbmaeqda.dll" Nonajj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qakkgnpi.dll" Chhkmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdahkafp.dll" Beomhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Beomhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdlkho32.dll" Qpolahdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Akjnhehc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ldckkdfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bblcda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bjlgnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjeefpma.dll" Cipppc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lhpepoel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lakfodjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jaljaoii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdqgfbop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hpaibe32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 392 4580 2b0365d01833a09b03170ce8cf0bf18d.exe 99 PID 4580 wrote to memory of 392 4580 2b0365d01833a09b03170ce8cf0bf18d.exe 99 PID 4580 wrote to memory of 392 4580 2b0365d01833a09b03170ce8cf0bf18d.exe 99 PID 392 wrote to memory of 1000 392 Nblfee32.exe 100 PID 392 wrote to memory of 1000 392 Nblfee32.exe 100 PID 392 wrote to memory of 1000 392 Nblfee32.exe 100 PID 1000 wrote to memory of 2520 1000 Abmhbplf.exe 101 PID 1000 wrote to memory of 2520 1000 Abmhbplf.exe 101 PID 1000 wrote to memory of 2520 1000 Abmhbplf.exe 101 PID 2520 wrote to memory of 3736 2520 Aofemaog.exe 102 PID 2520 wrote to memory of 3736 2520 Aofemaog.exe 102 PID 2520 wrote to memory of 3736 2520 Aofemaog.exe 102 PID 3736 wrote to memory of 2932 3736 Bckddn32.exe 103 PID 3736 wrote to memory of 2932 3736 Bckddn32.exe 103 PID 3736 wrote to memory of 2932 3736 Bckddn32.exe 103 PID 2932 wrote to memory of 4724 2932 Cphgca32.exe 104 PID 2932 wrote to memory of 4724 2932 Cphgca32.exe 104 PID 2932 wrote to memory of 4724 2932 Cphgca32.exe 104 PID 4724 wrote to memory of 4804 4724 Dlcaca32.exe 105 PID 4724 wrote to memory of 4804 4724 Dlcaca32.exe 105 PID 4724 wrote to memory of 4804 4724 Dlcaca32.exe 105 PID 4804 wrote to memory of 2072 4804 Ejjgic32.exe 106 PID 4804 wrote to memory of 2072 4804 Ejjgic32.exe 106 PID 4804 wrote to memory of 2072 4804 Ejjgic32.exe 106 PID 2072 wrote to memory of 4728 2072 Fnacfp32.exe 107 PID 2072 wrote to memory of 4728 2072 Fnacfp32.exe 107 PID 2072 wrote to memory of 4728 2072 Fnacfp32.exe 107 PID 4728 wrote to memory of 456 4728 Gagebknp.exe 108 PID 4728 wrote to memory of 456 4728 Gagebknp.exe 108 PID 4728 wrote to memory of 456 4728 Gagebknp.exe 108 PID 456 wrote to memory of 4468 456 Habeni32.exe 109 PID 456 wrote to memory of 4468 456 Habeni32.exe 109 PID 456 wrote to memory of 4468 456 Habeni32.exe 109 PID 4468 wrote to memory of 1360 4468 Idhgkcln.exe 110 PID 4468 wrote to memory of 1360 4468 Idhgkcln.exe 110 PID 4468 wrote to memory of 1360 4468 Idhgkcln.exe 110 PID 1360 wrote to memory of 1084 1360 Jknocljn.exe 111 PID 1360 wrote to memory of 1084 1360 Jknocljn.exe 111 PID 1360 wrote to memory of 1084 1360 Jknocljn.exe 111 PID 1084 wrote to memory of 2480 1084 Kkgbjkac.exe 112 PID 1084 wrote to memory of 2480 1084 Kkgbjkac.exe 112 PID 1084 wrote to memory of 2480 1084 Kkgbjkac.exe 112 PID 2480 wrote to memory of 2852 2480 Kklkej32.exe 113 PID 2480 wrote to memory of 2852 2480 Kklkej32.exe 113 PID 2480 wrote to memory of 2852 2480 Kklkej32.exe 113 PID 2852 wrote to memory of 1216 2852 Lamjbc32.exe 114 PID 2852 wrote to memory of 1216 2852 Lamjbc32.exe 114 PID 2852 wrote to memory of 1216 2852 Lamjbc32.exe 114 PID 1216 wrote to memory of 2980 1216 Lqfpoope.exe 115 PID 1216 wrote to memory of 2980 1216 Lqfpoope.exe 115 PID 1216 wrote to memory of 2980 1216 Lqfpoope.exe 115 PID 2980 wrote to memory of 4560 2980 Mglhgg32.exe 116 PID 2980 wrote to memory of 4560 2980 Mglhgg32.exe 116 PID 2980 wrote to memory of 4560 2980 Mglhgg32.exe 116 PID 4560 wrote to memory of 2500 4560 Ogmaneoa.exe 117 PID 4560 wrote to memory of 2500 4560 Ogmaneoa.exe 117 PID 4560 wrote to memory of 2500 4560 Ogmaneoa.exe 117 PID 2500 wrote to memory of 2536 2500 Qecgcfmf.exe 118 PID 2500 wrote to memory of 2536 2500 Qecgcfmf.exe 118 PID 2500 wrote to memory of 2536 2500 Qecgcfmf.exe 118 PID 2536 wrote to memory of 4252 2536 Aiclodaj.exe 119 PID 2536 wrote to memory of 4252 2536 Aiclodaj.exe 119 PID 2536 wrote to memory of 4252 2536 Aiclodaj.exe 119 PID 4252 wrote to memory of 1388 4252 Algbfo32.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b0365d01833a09b03170ce8cf0bf18d.exe"C:\Users\Admin\AppData\Local\Temp\2b0365d01833a09b03170ce8cf0bf18d.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\Nblfee32.exeC:\Windows\system32\Nblfee32.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\Abmhbplf.exeC:\Windows\system32\Abmhbplf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\Aofemaog.exeC:\Windows\system32\Aofemaog.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Bckddn32.exeC:\Windows\system32\Bckddn32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\Cphgca32.exeC:\Windows\system32\Cphgca32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Dlcaca32.exeC:\Windows\system32\Dlcaca32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\Ejjgic32.exeC:\Windows\system32\Ejjgic32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\Fnacfp32.exeC:\Windows\system32\Fnacfp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\Gagebknp.exeC:\Windows\system32\Gagebknp.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\Habeni32.exeC:\Windows\system32\Habeni32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Idhgkcln.exeC:\Windows\system32\Idhgkcln.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\Jknocljn.exeC:\Windows\system32\Jknocljn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\Kkgbjkac.exeC:\Windows\system32\Kkgbjkac.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\Kklkej32.exeC:\Windows\system32\Kklkej32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\Lamjbc32.exeC:\Windows\system32\Lamjbc32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Lqfpoope.exeC:\Windows\system32\Lqfpoope.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\Mglhgg32.exeC:\Windows\system32\Mglhgg32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Ogmaneoa.exeC:\Windows\system32\Ogmaneoa.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Qecgcfmf.exeC:\Windows\system32\Qecgcfmf.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\Aiclodaj.exeC:\Windows\system32\Aiclodaj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Algbfo32.exeC:\Windows\system32\Algbfo32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\Alioloje.exeC:\Windows\system32\Alioloje.exe23⤵
- Executes dropped EXE
PID:1388 -
C:\Windows\SysWOW64\Bhibgo32.exeC:\Windows\system32\Bhibgo32.exe24⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\Clldhljp.exeC:\Windows\system32\Clldhljp.exe25⤵
- Executes dropped EXE
PID:3696 -
C:\Windows\SysWOW64\Damflb32.exeC:\Windows\system32\Damflb32.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:1376 -
C:\Windows\SysWOW64\Dhlhcl32.exeC:\Windows\system32\Dhlhcl32.exe27⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\Eomfae32.exeC:\Windows\system32\Eomfae32.exe28⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\Ffekom32.exeC:\Windows\system32\Ffekom32.exe29⤵
- Executes dropped EXE
PID:3260 -
C:\Windows\SysWOW64\Fifdqhal.exeC:\Windows\system32\Fifdqhal.exe30⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\SysWOW64\Fckhnaab.exeC:\Windows\system32\Fckhnaab.exe31⤵
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\Gpkliaol.exeC:\Windows\system32\Gpkliaol.exe32⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\Hcpjpn32.exeC:\Windows\system32\Hcpjpn32.exe33⤵PID:4956
-
C:\Windows\SysWOW64\Ijcecgnl.exeC:\Windows\system32\Ijcecgnl.exe34⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\Jaljaoii.exeC:\Windows\system32\Jaljaoii.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:4480 -
C:\Windows\SysWOW64\Kgmlde32.exeC:\Windows\system32\Kgmlde32.exe36⤵
- Executes dropped EXE
PID:4768 -
C:\Windows\SysWOW64\Mjcghm32.exeC:\Windows\system32\Mjcghm32.exe37⤵
- Executes dropped EXE
PID:3632 -
C:\Windows\SysWOW64\Mdhkefnj.exeC:\Windows\system32\Mdhkefnj.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\Nglala32.exeC:\Windows\system32\Nglala32.exe39⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\Odidld32.exeC:\Windows\system32\Odidld32.exe40⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\Pjalpida.exeC:\Windows\system32\Pjalpida.exe41⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\Qlmhfj32.exeC:\Windows\system32\Qlmhfj32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3672 -
C:\Windows\SysWOW64\Baepjpea.exeC:\Windows\system32\Baepjpea.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1208 -
C:\Windows\SysWOW64\Blkdgheg.exeC:\Windows\system32\Blkdgheg.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:696 -
C:\Windows\SysWOW64\Balfko32.exeC:\Windows\system32\Balfko32.exe45⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\Bblcda32.exeC:\Windows\system32\Bblcda32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\Chhkmh32.exeC:\Windows\system32\Chhkmh32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\Cbqlpabf.exeC:\Windows\system32\Cbqlpabf.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4708 -
C:\Windows\SysWOW64\Chpangnk.exeC:\Windows\system32\Chpangnk.exe49⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Docmqp32.exeC:\Windows\system32\Docmqp32.exe50⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\Elkfed32.exeC:\Windows\system32\Elkfed32.exe51⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\Ednajepe.exeC:\Windows\system32\Ednajepe.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\Fhngfcdi.exeC:\Windows\system32\Fhngfcdi.exe53⤵
- Executes dropped EXE
PID:4364 -
C:\Windows\SysWOW64\Ffdddg32.exeC:\Windows\system32\Ffdddg32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3724 -
C:\Windows\SysWOW64\Gdqgfbop.exeC:\Windows\system32\Gdqgfbop.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:4400 -
C:\Windows\SysWOW64\Gfpcpefb.exeC:\Windows\system32\Gfpcpefb.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:1128 -
C:\Windows\SysWOW64\Hkaedk32.exeC:\Windows\system32\Hkaedk32.exe57⤵
- Executes dropped EXE
PID:232 -
C:\Windows\SysWOW64\Hbknqeha.exeC:\Windows\system32\Hbknqeha.exe58⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\Hkdbik32.exeC:\Windows\system32\Hkdbik32.exe59⤵
- Executes dropped EXE
PID:3244 -
C:\Windows\SysWOW64\Hodgei32.exeC:\Windows\system32\Hodgei32.exe60⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\Jidkek32.exeC:\Windows\system32\Jidkek32.exe61⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\Kpncbemh.exeC:\Windows\system32\Kpncbemh.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4972 -
C:\Windows\SysWOW64\Kmijliej.exeC:\Windows\system32\Kmijliej.exe63⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\Kbebdpca.exeC:\Windows\system32\Kbebdpca.exe64⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\Lgkakm32.exeC:\Windows\system32\Lgkakm32.exe65⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\Mphoob32.exeC:\Windows\system32\Mphoob32.exe66⤵
- Executes dropped EXE
PID:5036 -
C:\Windows\SysWOW64\Medggidb.exeC:\Windows\system32\Medggidb.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2364 -
C:\Windows\SysWOW64\Nconal32.exeC:\Windows\system32\Nconal32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\Ncakglka.exeC:\Windows\system32\Ncakglka.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:220 -
C:\Windows\SysWOW64\Nloikqnl.exeC:\Windows\system32\Nloikqnl.exe70⤵PID:1652
-
C:\Windows\SysWOW64\Oqdgan32.exeC:\Windows\system32\Oqdgan32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3788 -
C:\Windows\SysWOW64\Ognpoheh.exeC:\Windows\system32\Ognpoheh.exe72⤵PID:2940
-
C:\Windows\SysWOW64\Pqknbmhc.exeC:\Windows\system32\Pqknbmhc.exe73⤵
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\Pdmpck32.exeC:\Windows\system32\Pdmpck32.exe74⤵PID:1764
-
C:\Windows\SysWOW64\Qnfdlpqd.exeC:\Windows\system32\Qnfdlpqd.exe75⤵PID:5068
-
C:\Windows\SysWOW64\Eehnnb32.exeC:\Windows\system32\Eehnnb32.exe76⤵PID:5148
-
C:\Windows\SysWOW64\Emcbcd32.exeC:\Windows\system32\Emcbcd32.exe77⤵PID:5196
-
C:\Windows\SysWOW64\Fgbmliee.exeC:\Windows\system32\Fgbmliee.exe78⤵
- Drops file in System32 directory
PID:5240 -
C:\Windows\SysWOW64\Gekckpgl.exeC:\Windows\system32\Gekckpgl.exe79⤵PID:5288
-
C:\Windows\SysWOW64\Ghpehjph.exeC:\Windows\system32\Ghpehjph.exe80⤵PID:5340
-
C:\Windows\SysWOW64\Idbfhiko.exeC:\Windows\system32\Idbfhiko.exe81⤵
- Modifies registry class
PID:5380 -
C:\Windows\SysWOW64\Iohjebkd.exeC:\Windows\system32\Iohjebkd.exe82⤵PID:5444
-
C:\Windows\SysWOW64\Jgakkb32.exeC:\Windows\system32\Jgakkb32.exe83⤵PID:5512
-
C:\Windows\SysWOW64\Mbqkfhfh.exeC:\Windows\system32\Mbqkfhfh.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5588 -
C:\Windows\SysWOW64\Nboggf32.exeC:\Windows\system32\Nboggf32.exe85⤵PID:5636
-
C:\Windows\SysWOW64\Oocdme32.exeC:\Windows\system32\Oocdme32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5688 -
C:\Windows\SysWOW64\Phqbaj32.exeC:\Windows\system32\Phqbaj32.exe87⤵PID:5732
-
C:\Windows\SysWOW64\Phekliab.exeC:\Windows\system32\Phekliab.exe88⤵PID:5780
-
C:\Windows\SysWOW64\Ackiqpce.exeC:\Windows\system32\Ackiqpce.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5820 -
C:\Windows\SysWOW64\Bogcqpdd.exeC:\Windows\system32\Bogcqpdd.exe90⤵PID:5868
-
C:\Windows\SysWOW64\Bjlgnh32.exeC:\Windows\system32\Bjlgnh32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5908 -
C:\Windows\SysWOW64\Bqfokblg.exeC:\Windows\system32\Bqfokblg.exe92⤵
- Drops file in System32 directory
- Modifies registry class
PID:5976 -
C:\Windows\SysWOW64\Cipppc32.exeC:\Windows\system32\Cipppc32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6048 -
C:\Windows\SysWOW64\Gpmgph32.exeC:\Windows\system32\Gpmgph32.exe94⤵PID:6100
-
C:\Windows\SysWOW64\Galcjkmj.exeC:\Windows\system32\Galcjkmj.exe95⤵
- Modifies registry class
PID:228 -
C:\Windows\SysWOW64\Gaqmej32.exeC:\Windows\system32\Gaqmej32.exe96⤵PID:5132
-
C:\Windows\SysWOW64\Ggnenagl.exeC:\Windows\system32\Ggnenagl.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5188 -
C:\Windows\SysWOW64\Hpaibe32.exeC:\Windows\system32\Hpaibe32.exe98⤵
- Drops file in System32 directory
- Modifies registry class
PID:4044 -
C:\Windows\SysWOW64\Hkgnpn32.exeC:\Windows\system32\Hkgnpn32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4740 -
C:\Windows\SysWOW64\Iacbbh32.exeC:\Windows\system32\Iacbbh32.exe100⤵
- Modifies registry class
PID:4804 -
C:\Windows\SysWOW64\Igpkjo32.exeC:\Windows\system32\Igpkjo32.exe101⤵PID:4432
-
C:\Windows\SysWOW64\Ihpgda32.exeC:\Windows\system32\Ihpgda32.exe102⤵PID:5376
-
C:\Windows\SysWOW64\Idfhibdn.exeC:\Windows\system32\Idfhibdn.exe103⤵PID:1400
-
C:\Windows\SysWOW64\Jhlgpp32.exeC:\Windows\system32\Jhlgpp32.exe104⤵
- Modifies registry class
PID:5428 -
C:\Windows\SysWOW64\Kiejfo32.exeC:\Windows\system32\Kiejfo32.exe105⤵
- Modifies registry class
PID:4656 -
C:\Windows\SysWOW64\Kqpoja32.exeC:\Windows\system32\Kqpoja32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:772 -
C:\Windows\SysWOW64\Kjhccf32.exeC:\Windows\system32\Kjhccf32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5532 -
C:\Windows\SysWOW64\Lebalokn.exeC:\Windows\system32\Lebalokn.exe108⤵
- Drops file in System32 directory
PID:3552 -
C:\Windows\SysWOW64\Lkmihi32.exeC:\Windows\system32\Lkmihi32.exe109⤵PID:5608
-
C:\Windows\SysWOW64\Leenanik.exeC:\Windows\system32\Leenanik.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5664 -
C:\Windows\SysWOW64\Lbinkb32.exeC:\Windows\system32\Lbinkb32.exe111⤵PID:5744
-
C:\Windows\SysWOW64\Licfgmpa.exeC:\Windows\system32\Licfgmpa.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2244 -
C:\Windows\SysWOW64\Mbpdkabl.exeC:\Windows\system32\Mbpdkabl.exe113⤵PID:3412
-
C:\Windows\SysWOW64\Mlhidg32.exeC:\Windows\system32\Mlhidg32.exe114⤵
- Modifies registry class
PID:5864 -
C:\Windows\SysWOW64\Malgmm32.exeC:\Windows\system32\Malgmm32.exe115⤵PID:5776
-
C:\Windows\SysWOW64\Nlfeeelm.exeC:\Windows\system32\Nlfeeelm.exe116⤵PID:1536
-
C:\Windows\SysWOW64\Nbqmbo32.exeC:\Windows\system32\Nbqmbo32.exe117⤵
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\Naejcl32.exeC:\Windows\system32\Naejcl32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6008 -
C:\Windows\SysWOW64\Objphn32.exeC:\Windows\system32\Objphn32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6084 -
C:\Windows\SysWOW64\Oidhehcl.exeC:\Windows\system32\Oidhehcl.exe120⤵PID:5084
-
C:\Windows\SysWOW64\Ohiefdhd.exeC:\Windows\system32\Ohiefdhd.exe121⤵PID:392
-
C:\Windows\SysWOW64\Pimkkfka.exeC:\Windows\system32\Pimkkfka.exe122⤵
- Modifies registry class
PID:5176
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-