Analysis
-
max time kernel
163s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 05:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
385ba00ee0e3f72f16c0feb765aa7e03.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
385ba00ee0e3f72f16c0feb765aa7e03.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
385ba00ee0e3f72f16c0feb765aa7e03.exe
-
Size
93KB
-
MD5
385ba00ee0e3f72f16c0feb765aa7e03
-
SHA1
dad34899984b720348992d6aa20b15976417310a
-
SHA256
2e0a60163e393d731d7910d06ace1afd80216bb9ccd19bb5f6605862ada44098
-
SHA512
4b500d6641e4f67bd52fde1be2b09531ff41bf8a4070f7011e792da43a4e2119f68b94b18108d2ac19a7ab143bf8925f36deb1249fad9163bccd78a1428a565c
-
SSDEEP
1536:UgkiI+w6Sun8QRnf/sF/2c798gtLTq5VrJRbviGIQQxlzbVPehHTXjiwg58:PPSY8QRnO/2WLTqLzbviGbQ7YHHY58
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imeeohoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qbbggeli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbiakf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kengqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmmmoppl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofjqbndk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gonilenb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfbfmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlnnfghd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjhaeklb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmafjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjhaeklb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cocamaam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqbehh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bpmobi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ionbcb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jefgak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Chlomnfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndokko32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddekfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eikfej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjhfgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Acclejeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfolki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdhjjopa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iecmabmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddekfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gnoame32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Npqmipjq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alioloje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lifqbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndcdfnpa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfhani32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjnipc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oenljoji.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dajbjoao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nlnpbe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abemof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Omhpcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ioopfa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnmbjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fndpfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hkhblo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pbpjmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bihhbocn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qgmbkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Akcjel32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eodjdocj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfgnnedj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djegoanj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmcabd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pplhab32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjjjanla.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcekocqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjjlme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nfknfj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alkdbllo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bcnlog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ggpbcaei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nogngp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imfill32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbjqkl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejlmppha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hcpcqkbf.exe -
Executes dropped EXE 64 IoCs
pid Process 3716 Fhiinbdo.exe 1304 Kiajck32.exe 2160 Kjqfmn32.exe 3524 Lfcfnm32.exe 4720 Mflidl32.exe 2596 Npqmipjq.exe 4760 Oibdhd32.exe 4684 Pdchakoo.exe 3340 Qpmfklbq.exe 4440 Akdfndpd.exe 2364 Almifk32.exe 1848 Bjqjpp32.exe 4628 Bpmobi32.exe 2100 Ccgjjc32.exe 2280 Gonilenb.exe 1004 Haclio32.exe 916 Ionbcb32.exe 2120 Ildpbfmf.exe 3372 Jefgak32.exe 1804 Kfbfmi32.exe 2672 Loaafnah.exe 4292 Mbiphhhq.exe 2152 Omhpcm32.exe 3540 Pbjbfclk.exe 1372 Plimpg32.exe 2320 Qbhnga32.exe 4912 Bmlofhca.exe 4136 Comddn32.exe 880 Dfnbbg32.exe 4044 Eqbcqnph.exe 1204 Fgqehgco.exe 3528 Hmginjki.exe 3688 Ipjoee32.exe 1648 Imeeohoi.exe 980 Mnojcb32.exe 2940 Oghgbe32.exe 4692 Alioloje.exe 3316 Bhblfpng.exe 3024 Chlomnfl.exe 5108 Cefega32.exe 4444 Dcalae32.exe 3188 Dljqjjnp.exe 4568 Ejegdngb.exe 1492 Fjqgpl32.exe 5036 Fomohc32.exe 2932 Ffjdjmpf.exe 1404 Gcggjp32.exe 4984 Hakhcd32.exe 5104 Hjhfgi32.exe 3992 Ijaimg32.exe 4624 Ibmmbj32.exe 2448 Jmihpa32.exe 1148 Kkdnjd32.exe 1724 Kmiqfoie.exe 1036 Njjmil32.exe 4000 Ojopki32.exe 696 Pengna32.exe 3440 Qbbggeli.exe 3684 Ajfobfaj.exe 2532 Becipn32.exe 1092 Cobciblp.exe 1160 Cdolbijg.exe 1040 Cbcieqpd.exe 2064 Elkfed32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kmeikl32.dll Fomohc32.exe File created C:\Windows\SysWOW64\Jhijjp32.exe Hjhaeklb.exe File opened for modification C:\Windows\SysWOW64\Kllodfpd.exe Jenmlmll.exe File created C:\Windows\SysWOW64\Pnogdqme.dll Ckbnlfeb.exe File created C:\Windows\SysWOW64\Fjhifg32.dll 385ba00ee0e3f72f16c0feb765aa7e03.exe File created C:\Windows\SysWOW64\Gqicdqoc.dll Fjeikh32.exe File opened for modification C:\Windows\SysWOW64\Imfill32.exe Ioeineap.exe File opened for modification C:\Windows\SysWOW64\Ccmcaicm.exe Ckbnlfeb.exe File created C:\Windows\SysWOW64\Jgpgfn32.dll Ajndbd32.exe File opened for modification C:\Windows\SysWOW64\Dpehikja.exe Cgijnk32.exe File opened for modification C:\Windows\SysWOW64\Ecefjckj.exe Dpphcf32.exe File opened for modification C:\Windows\SysWOW64\Gibhihko.exe Eiaobjia.exe File created C:\Windows\SysWOW64\Agkejbik.dll Kkgicccd.exe File opened for modification C:\Windows\SysWOW64\Gfgnnedj.exe Gmmmoppl.exe File opened for modification C:\Windows\SysWOW64\Cbcieqpd.exe Cdolbijg.exe File opened for modification C:\Windows\SysWOW64\Cpacjm32.exe Ccmcaicm.exe File created C:\Windows\SysWOW64\Mdikpjeb.exe Llfqkhno.exe File created C:\Windows\SysWOW64\Abonimmp.exe Qmphkg32.exe File opened for modification C:\Windows\SysWOW64\Kihdqkaf.exe Kfhkop32.exe File created C:\Windows\SysWOW64\Ghiogkfp.exe Cenaaf32.exe File created C:\Windows\SysWOW64\Cgnkpfji.dll Gcggjp32.exe File created C:\Windows\SysWOW64\Hdhemn32.exe Gljgkb32.exe File opened for modification C:\Windows\SysWOW64\Aiifeg32.exe Abonimmp.exe File opened for modification C:\Windows\SysWOW64\Fqbehh32.exe Fjhmknnd.exe File created C:\Windows\SysWOW64\Bihhbocn.exe Bbnped32.exe File opened for modification C:\Windows\SysWOW64\Elcmqfja.exe Eeiddl32.exe File opened for modification C:\Windows\SysWOW64\Ibmmbj32.exe Ijaimg32.exe File created C:\Windows\SysWOW64\Gbbkjd32.dll Kckqlpck.exe File created C:\Windows\SysWOW64\Amfokf32.exe Ajhboj32.exe File created C:\Windows\SysWOW64\Oakakomd.dll Dgdnmfai.exe File opened for modification C:\Windows\SysWOW64\Fdpnng32.exe Fjjjanla.exe File opened for modification C:\Windows\SysWOW64\Pmhkpacg.exe Pfnccg32.exe File created C:\Windows\SysWOW64\Pbodojdg.dll Eennoknp.exe File created C:\Windows\SysWOW64\Ecefjckj.exe Dpphcf32.exe File created C:\Windows\SysWOW64\Jlnnfghd.exe Hijohoki.exe File opened for modification C:\Windows\SysWOW64\Kihnfdmj.exe Jphcmp32.exe File created C:\Windows\SysWOW64\Gfgnnedj.exe Gmmmoppl.exe File created C:\Windows\SysWOW64\Benegbbi.dll Jnnnpg32.exe File created C:\Windows\SysWOW64\Hakhcd32.exe Gcggjp32.exe File created C:\Windows\SysWOW64\Ckbnlfeb.exe Cmnncb32.exe File created C:\Windows\SysWOW64\Mlkldmjf.exe Lldfcn32.exe File created C:\Windows\SysWOW64\Ejegdngb.exe Dljqjjnp.exe File created C:\Windows\SysWOW64\Llabchoe.exe Lnmbjd32.exe File created C:\Windows\SysWOW64\Hoobnf32.exe Hbeece32.exe File opened for modification C:\Windows\SysWOW64\Qkablmdj.exe Qehjoc32.exe File created C:\Windows\SysWOW64\Eebgjk32.exe Epeobdlc.exe File created C:\Windows\SysWOW64\Elenahhh.dll Eqbcqnph.exe File created C:\Windows\SysWOW64\Fkldjeil.dll Aflabj32.exe File created C:\Windows\SysWOW64\Oammna32.dll Ijaimg32.exe File created C:\Windows\SysWOW64\Hlalhlfd.dll Eijbge32.exe File opened for modification C:\Windows\SysWOW64\Loaafnah.exe Kfbfmi32.exe File created C:\Windows\SysWOW64\Ifadqd32.dll Bhblfpng.exe File opened for modification C:\Windows\SysWOW64\Ammnclcj.exe Pjaefc32.exe File created C:\Windows\SysWOW64\Pecknb32.dll Gaqhdmmm.exe File created C:\Windows\SysWOW64\Hjgohf32.exe Hcngkldi.exe File created C:\Windows\SysWOW64\Lniphngj.dll Mflidl32.exe File opened for modification C:\Windows\SysWOW64\Hmginjki.exe Fgqehgco.exe File created C:\Windows\SysWOW64\Beeock32.dll Fndpfc32.exe File created C:\Windows\SysWOW64\Cjljlijg.dll Aiifeg32.exe File created C:\Windows\SysWOW64\Gbbfag32.dll Ildpbfmf.exe File opened for modification C:\Windows\SysWOW64\Emjgcc32.exe Ebdcejpk.exe File created C:\Windows\SysWOW64\Geelllgg.dll Bdgmio32.exe File opened for modification C:\Windows\SysWOW64\Feddpj32.exe Ellpgeag.exe File opened for modification C:\Windows\SysWOW64\Qbhnga32.exe Plimpg32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdmkka32.dll" Bjqjpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qkoefnfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fomohc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oenljoji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Alkdbllo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hjjlme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mflidl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mbiphhhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oeobfc32.dll" Jnqbmadp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qcbhdmai.dll" Joekkl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajhboj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djdoogmm.dll" Hcpcqkbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jhlgpp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Obgccn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hbeece32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iiicin32.dll" Bgimepmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Papmeigc.dll" Amfokf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emkhfj32.dll" Ampkil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gielinlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eomool32.dll" Dckobg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Djegoanj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ecnlhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oeicopoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fbellhbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffpdbfpg.dll" Fckacknf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nomcig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aeodkfcm.dll" Abcgdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjomaada.dll" Jhhonl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 385ba00ee0e3f72f16c0feb765aa7e03.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Akdfndpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cpacjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmeikl32.dll" Fomohc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lfckjnjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnogdqme.dll" Ckbnlfeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afiemi32.dll" Gljlhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Acclejeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hdhemn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kckqlpck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgnkpfji.dll" Gcggjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aaiiffjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bfolki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ejjqjp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jhhonl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hjhaeklb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aaiiffjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oagoeala.dll" Loaafnah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fbellhbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eglkhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jggglm32.dll" Ajhboj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dajbjoao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iholhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mffajo32.dll" Lfcfnm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oibdhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifogknee.dll" Obbnlkbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekoniian.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Locoilae.dll" Cefega32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gplpfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Obgccn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Plbmhadm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jhhonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Feddpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mnojcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldnkeajq.dll" Kfhkop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geelllgg.dll" Bdgmio32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 3716 2488 385ba00ee0e3f72f16c0feb765aa7e03.exe 98 PID 2488 wrote to memory of 3716 2488 385ba00ee0e3f72f16c0feb765aa7e03.exe 98 PID 2488 wrote to memory of 3716 2488 385ba00ee0e3f72f16c0feb765aa7e03.exe 98 PID 3716 wrote to memory of 1304 3716 Fhiinbdo.exe 99 PID 3716 wrote to memory of 1304 3716 Fhiinbdo.exe 99 PID 3716 wrote to memory of 1304 3716 Fhiinbdo.exe 99 PID 1304 wrote to memory of 2160 1304 Kiajck32.exe 100 PID 1304 wrote to memory of 2160 1304 Kiajck32.exe 100 PID 1304 wrote to memory of 2160 1304 Kiajck32.exe 100 PID 2160 wrote to memory of 3524 2160 Kjqfmn32.exe 101 PID 2160 wrote to memory of 3524 2160 Kjqfmn32.exe 101 PID 2160 wrote to memory of 3524 2160 Kjqfmn32.exe 101 PID 3524 wrote to memory of 4720 3524 Lfcfnm32.exe 102 PID 3524 wrote to memory of 4720 3524 Lfcfnm32.exe 102 PID 3524 wrote to memory of 4720 3524 Lfcfnm32.exe 102 PID 4720 wrote to memory of 2596 4720 Mflidl32.exe 103 PID 4720 wrote to memory of 2596 4720 Mflidl32.exe 103 PID 4720 wrote to memory of 2596 4720 Mflidl32.exe 103 PID 2596 wrote to memory of 4760 2596 Npqmipjq.exe 104 PID 2596 wrote to memory of 4760 2596 Npqmipjq.exe 104 PID 2596 wrote to memory of 4760 2596 Npqmipjq.exe 104 PID 4760 wrote to memory of 4684 4760 Oibdhd32.exe 105 PID 4760 wrote to memory of 4684 4760 Oibdhd32.exe 105 PID 4760 wrote to memory of 4684 4760 Oibdhd32.exe 105 PID 4684 wrote to memory of 3340 4684 Pdchakoo.exe 106 PID 4684 wrote to memory of 3340 4684 Pdchakoo.exe 106 PID 4684 wrote to memory of 3340 4684 Pdchakoo.exe 106 PID 3340 wrote to memory of 4440 3340 Qpmfklbq.exe 107 PID 3340 wrote to memory of 4440 3340 Qpmfklbq.exe 107 PID 3340 wrote to memory of 4440 3340 Qpmfklbq.exe 107 PID 4440 wrote to memory of 2364 4440 Akdfndpd.exe 108 PID 4440 wrote to memory of 2364 4440 Akdfndpd.exe 108 PID 4440 wrote to memory of 2364 4440 Akdfndpd.exe 108 PID 2364 wrote to memory of 1848 2364 Almifk32.exe 109 PID 2364 wrote to memory of 1848 2364 Almifk32.exe 109 PID 2364 wrote to memory of 1848 2364 Almifk32.exe 109 PID 1848 wrote to memory of 4628 1848 Bjqjpp32.exe 110 PID 1848 wrote to memory of 4628 1848 Bjqjpp32.exe 110 PID 1848 wrote to memory of 4628 1848 Bjqjpp32.exe 110 PID 4628 wrote to memory of 2100 4628 Bpmobi32.exe 111 PID 4628 wrote to memory of 2100 4628 Bpmobi32.exe 111 PID 4628 wrote to memory of 2100 4628 Bpmobi32.exe 111 PID 2100 wrote to memory of 2280 2100 Ccgjjc32.exe 112 PID 2100 wrote to memory of 2280 2100 Ccgjjc32.exe 112 PID 2100 wrote to memory of 2280 2100 Ccgjjc32.exe 112 PID 2280 wrote to memory of 1004 2280 Gonilenb.exe 113 PID 2280 wrote to memory of 1004 2280 Gonilenb.exe 113 PID 2280 wrote to memory of 1004 2280 Gonilenb.exe 113 PID 1004 wrote to memory of 916 1004 Haclio32.exe 114 PID 1004 wrote to memory of 916 1004 Haclio32.exe 114 PID 1004 wrote to memory of 916 1004 Haclio32.exe 114 PID 916 wrote to memory of 2120 916 Ionbcb32.exe 115 PID 916 wrote to memory of 2120 916 Ionbcb32.exe 115 PID 916 wrote to memory of 2120 916 Ionbcb32.exe 115 PID 2120 wrote to memory of 3372 2120 Ildpbfmf.exe 116 PID 2120 wrote to memory of 3372 2120 Ildpbfmf.exe 116 PID 2120 wrote to memory of 3372 2120 Ildpbfmf.exe 116 PID 3372 wrote to memory of 1804 3372 Jefgak32.exe 117 PID 3372 wrote to memory of 1804 3372 Jefgak32.exe 117 PID 3372 wrote to memory of 1804 3372 Jefgak32.exe 117 PID 1804 wrote to memory of 2672 1804 Kfbfmi32.exe 118 PID 1804 wrote to memory of 2672 1804 Kfbfmi32.exe 118 PID 1804 wrote to memory of 2672 1804 Kfbfmi32.exe 118 PID 2672 wrote to memory of 4292 2672 Loaafnah.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\385ba00ee0e3f72f16c0feb765aa7e03.exe"C:\Users\Admin\AppData\Local\Temp\385ba00ee0e3f72f16c0feb765aa7e03.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\Fhiinbdo.exeC:\Windows\system32\Fhiinbdo.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\Kiajck32.exeC:\Windows\system32\Kiajck32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\Kjqfmn32.exeC:\Windows\system32\Kjqfmn32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\Lfcfnm32.exeC:\Windows\system32\Lfcfnm32.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\Mflidl32.exeC:\Windows\system32\Mflidl32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\Npqmipjq.exeC:\Windows\system32\Npqmipjq.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\Oibdhd32.exeC:\Windows\system32\Oibdhd32.exe8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\Pdchakoo.exeC:\Windows\system32\Pdchakoo.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\Qpmfklbq.exeC:\Windows\system32\Qpmfklbq.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\Akdfndpd.exeC:\Windows\system32\Akdfndpd.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\Almifk32.exeC:\Windows\system32\Almifk32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\Bjqjpp32.exeC:\Windows\system32\Bjqjpp32.exe13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\Bpmobi32.exeC:\Windows\system32\Bpmobi32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\Ccgjjc32.exeC:\Windows\system32\Ccgjjc32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\Gonilenb.exeC:\Windows\system32\Gonilenb.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\Haclio32.exeC:\Windows\system32\Haclio32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\Ionbcb32.exeC:\Windows\system32\Ionbcb32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\Ildpbfmf.exeC:\Windows\system32\Ildpbfmf.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Jefgak32.exeC:\Windows\system32\Jefgak32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\Kfbfmi32.exeC:\Windows\system32\Kfbfmi32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Loaafnah.exeC:\Windows\system32\Loaafnah.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Mbiphhhq.exeC:\Windows\system32\Mbiphhhq.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:4292 -
C:\Windows\SysWOW64\Omhpcm32.exeC:\Windows\system32\Omhpcm32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\Pbjbfclk.exeC:\Windows\system32\Pbjbfclk.exe25⤵
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\Plimpg32.exeC:\Windows\system32\Plimpg32.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1372 -
C:\Windows\SysWOW64\Qbhnga32.exeC:\Windows\system32\Qbhnga32.exe27⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Bmlofhca.exeC:\Windows\system32\Bmlofhca.exe28⤵
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\Comddn32.exeC:\Windows\system32\Comddn32.exe29⤵
- Executes dropped EXE
PID:4136 -
C:\Windows\SysWOW64\Dfnbbg32.exeC:\Windows\system32\Dfnbbg32.exe30⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\Eqbcqnph.exeC:\Windows\system32\Eqbcqnph.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4044 -
C:\Windows\SysWOW64\Fgqehgco.exeC:\Windows\system32\Fgqehgco.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1204 -
C:\Windows\SysWOW64\Hmginjki.exeC:\Windows\system32\Hmginjki.exe33⤵
- Executes dropped EXE
PID:3528 -
C:\Windows\SysWOW64\Ipjoee32.exeC:\Windows\system32\Ipjoee32.exe34⤵
- Executes dropped EXE
PID:3688 -
C:\Windows\SysWOW64\Imeeohoi.exeC:\Windows\system32\Imeeohoi.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\Mnojcb32.exeC:\Windows\system32\Mnojcb32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Oghgbe32.exeC:\Windows\system32\Oghgbe32.exe37⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\SysWOW64\Alioloje.exeC:\Windows\system32\Alioloje.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4692 -
C:\Windows\SysWOW64\Bhblfpng.exeC:\Windows\system32\Bhblfpng.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3316 -
C:\Windows\SysWOW64\Chlomnfl.exeC:\Windows\system32\Chlomnfl.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Cefega32.exeC:\Windows\system32\Cefega32.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:5108 -
C:\Windows\SysWOW64\Dcalae32.exeC:\Windows\system32\Dcalae32.exe42⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\SysWOW64\Dljqjjnp.exeC:\Windows\system32\Dljqjjnp.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3188 -
C:\Windows\SysWOW64\Ejegdngb.exeC:\Windows\system32\Ejegdngb.exe44⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\Fjqgpl32.exeC:\Windows\system32\Fjqgpl32.exe45⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\Fomohc32.exeC:\Windows\system32\Fomohc32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5036 -
C:\Windows\SysWOW64\Ffjdjmpf.exeC:\Windows\system32\Ffjdjmpf.exe47⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\Gcggjp32.exeC:\Windows\system32\Gcggjp32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1404 -
C:\Windows\SysWOW64\Hakhcd32.exeC:\Windows\system32\Hakhcd32.exe49⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\Hjhfgi32.exeC:\Windows\system32\Hjhfgi32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\Ijaimg32.exeC:\Windows\system32\Ijaimg32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3992 -
C:\Windows\SysWOW64\Ibmmbj32.exeC:\Windows\system32\Ibmmbj32.exe52⤵
- Executes dropped EXE
PID:4624 -
C:\Windows\SysWOW64\Jmihpa32.exeC:\Windows\system32\Jmihpa32.exe53⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\SysWOW64\Kkdnjd32.exeC:\Windows\system32\Kkdnjd32.exe54⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Kmiqfoie.exeC:\Windows\system32\Kmiqfoie.exe55⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Njjmil32.exeC:\Windows\system32\Njjmil32.exe56⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\Ojopki32.exeC:\Windows\system32\Ojopki32.exe57⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\SysWOW64\Pengna32.exeC:\Windows\system32\Pengna32.exe58⤵
- Executes dropped EXE
PID:696 -
C:\Windows\SysWOW64\Qbbggeli.exeC:\Windows\system32\Qbbggeli.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\Ajfobfaj.exeC:\Windows\system32\Ajfobfaj.exe60⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\SysWOW64\Becipn32.exeC:\Windows\system32\Becipn32.exe61⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\Cobciblp.exeC:\Windows\system32\Cobciblp.exe62⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Cdolbijg.exeC:\Windows\system32\Cdolbijg.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\Cbcieqpd.exeC:\Windows\system32\Cbcieqpd.exe64⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\Elkfed32.exeC:\Windows\system32\Elkfed32.exe65⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\Eaoenjqa.exeC:\Windows\system32\Eaoenjqa.exe66⤵PID:3524
-
C:\Windows\SysWOW64\Fckacknf.exeC:\Windows\system32\Fckacknf.exe67⤵
- Modifies registry class
PID:4952 -
C:\Windows\SysWOW64\Ghjfaa32.exeC:\Windows\system32\Ghjfaa32.exe68⤵PID:4776
-
C:\Windows\SysWOW64\Hbiakf32.exeC:\Windows\system32\Hbiakf32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3784 -
C:\Windows\SysWOW64\Hijohoki.exeC:\Windows\system32\Hijohoki.exe70⤵
- Drops file in System32 directory
PID:2088 -
C:\Windows\SysWOW64\Jlnnfghd.exeC:\Windows\system32\Jlnnfghd.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4436 -
C:\Windows\SysWOW64\Kfhkop32.exeC:\Windows\system32\Kfhkop32.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:4440 -
C:\Windows\SysWOW64\Kihdqkaf.exeC:\Windows\system32\Kihdqkaf.exe73⤵PID:1660
-
C:\Windows\SysWOW64\Lfckjnjh.exeC:\Windows\system32\Lfckjnjh.exe74⤵
- Modifies registry class
PID:2500 -
C:\Windows\SysWOW64\Lifqbi32.exeC:\Windows\system32\Lifqbi32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3936 -
C:\Windows\SysWOW64\Mmiccf32.exeC:\Windows\system32\Mmiccf32.exe76⤵PID:936
-
C:\Windows\SysWOW64\Mcfkkmeo.exeC:\Windows\system32\Mcfkkmeo.exe77⤵PID:3452
-
C:\Windows\SysWOW64\Ndokko32.exeC:\Windows\system32\Ndokko32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1312 -
C:\Windows\SysWOW64\Nngoddkg.exeC:\Windows\system32\Nngoddkg.exe79⤵PID:432
-
C:\Windows\SysWOW64\Ndcdfnpa.exeC:\Windows\system32\Ndcdfnpa.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4248 -
C:\Windows\SysWOW64\Oflfoepg.exeC:\Windows\system32\Oflfoepg.exe81⤵PID:1500
-
C:\Windows\SysWOW64\Pjnipc32.exeC:\Windows\system32\Pjnipc32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1972 -
C:\Windows\SysWOW64\Pddmml32.exeC:\Windows\system32\Pddmml32.exe83⤵PID:2636
-
C:\Windows\SysWOW64\Pjaefc32.exeC:\Windows\system32\Pjaefc32.exe84⤵
- Drops file in System32 directory
PID:3776 -
C:\Windows\SysWOW64\Ammnclcj.exeC:\Windows\system32\Ammnclcj.exe85⤵PID:3088
-
C:\Windows\SysWOW64\Agcbqecp.exeC:\Windows\system32\Agcbqecp.exe86⤵PID:1868
-
C:\Windows\SysWOW64\Ampkil32.exeC:\Windows\system32\Ampkil32.exe87⤵
- Modifies registry class
PID:3656 -
C:\Windows\SysWOW64\Cenaaf32.exeC:\Windows\system32\Cenaaf32.exe88⤵
- Drops file in System32 directory
PID:4312 -
C:\Windows\SysWOW64\Ghiogkfp.exeC:\Windows\system32\Ghiogkfp.exe89⤵PID:1504
-
C:\Windows\SysWOW64\Hoogpcco.exeC:\Windows\system32\Hoogpcco.exe90⤵PID:1084
-
C:\Windows\SysWOW64\Ihnbih32.exeC:\Windows\system32\Ihnbih32.exe91⤵PID:3308
-
C:\Windows\SysWOW64\Inkjao32.exeC:\Windows\system32\Inkjao32.exe92⤵PID:4428
-
C:\Windows\SysWOW64\Ioopfa32.exeC:\Windows\system32\Ioopfa32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2280 -
C:\Windows\SysWOW64\Jphcmp32.exeC:\Windows\system32\Jphcmp32.exe94⤵
- Drops file in System32 directory
PID:396 -
C:\Windows\SysWOW64\Kihnfdmj.exeC:\Windows\system32\Kihnfdmj.exe95⤵PID:4852
-
C:\Windows\SysWOW64\Lldfcn32.exeC:\Windows\system32\Lldfcn32.exe96⤵
- Drops file in System32 directory
PID:4196 -
C:\Windows\SysWOW64\Mlkldmjf.exeC:\Windows\system32\Mlkldmjf.exe97⤵PID:3732
-
C:\Windows\SysWOW64\Mpiejkql.exeC:\Windows\system32\Mpiejkql.exe98⤵PID:3096
-
C:\Windows\SysWOW64\Oeicopoo.exeC:\Windows\system32\Oeicopoo.exe99⤵
- Modifies registry class
PID:4044 -
C:\Windows\SysWOW64\Oenljoji.exeC:\Windows\system32\Oenljoji.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Opcqgh32.exeC:\Windows\system32\Opcqgh32.exe101⤵PID:3404
-
C:\Windows\SysWOW64\Pplcnf32.exeC:\Windows\system32\Pplcnf32.exe102⤵PID:2516
-
C:\Windows\SysWOW64\Qgmbkp32.exeC:\Windows\system32\Qgmbkp32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2272 -
C:\Windows\SysWOW64\Aflabj32.exeC:\Windows\system32\Aflabj32.exe104⤵
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\Cfhani32.exeC:\Windows\system32\Cfhani32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:400 -
C:\Windows\SysWOW64\Cgijnk32.exeC:\Windows\system32\Cgijnk32.exe106⤵
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Dpehikja.exeC:\Windows\system32\Dpehikja.exe107⤵PID:2040
-
C:\Windows\SysWOW64\Emnbmoef.exeC:\Windows\system32\Emnbmoef.exe108⤵PID:2472
-
C:\Windows\SysWOW64\Ehcfkhel.exeC:\Windows\system32\Ehcfkhel.exe109⤵PID:3316
-
C:\Windows\SysWOW64\Fiilmofe.exeC:\Windows\system32\Fiilmofe.exe110⤵PID:1348
-
C:\Windows\SysWOW64\Filicodb.exeC:\Windows\system32\Filicodb.exe111⤵PID:216
-
C:\Windows\SysWOW64\Gielinlg.exeC:\Windows\system32\Gielinlg.exe112⤵
- Modifies registry class
PID:1976 -
C:\Windows\SysWOW64\Gngnjk32.exeC:\Windows\system32\Gngnjk32.exe113⤵PID:4288
-
C:\Windows\SysWOW64\Ggpbcaei.exeC:\Windows\system32\Ggpbcaei.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3188 -
C:\Windows\SysWOW64\Hjhaeklb.exeC:\Windows\system32\Hjhaeklb.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:336 -
C:\Windows\SysWOW64\Jhijjp32.exeC:\Windows\system32\Jhijjp32.exe116⤵PID:1512
-
C:\Windows\SysWOW64\Jbaocfmo.exeC:\Windows\system32\Jbaocfmo.exe117⤵PID:1652
-
C:\Windows\SysWOW64\Jhlgpp32.exeC:\Windows\system32\Jhlgpp32.exe118⤵
- Modifies registry class
PID:3996 -
C:\Windows\SysWOW64\Kengqo32.exeC:\Windows\system32\Kengqo32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3696 -
C:\Windows\SysWOW64\Lnmbjd32.exeC:\Windows\system32\Lnmbjd32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3940 -
C:\Windows\SysWOW64\Llabchoe.exeC:\Windows\system32\Llabchoe.exe121⤵PID:3424
-
C:\Windows\SysWOW64\Lankloml.exeC:\Windows\system32\Lankloml.exe122⤵PID:5112
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-