Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 06:18
Behavioral task
behavioral1
Sample
d2b3c3194268d72c2ea8d15d671e3b6f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d2b3c3194268d72c2ea8d15d671e3b6f.exe
Resource
win10v2004-20240412-en
General
-
Target
d2b3c3194268d72c2ea8d15d671e3b6f.exe
-
Size
362KB
-
MD5
d2b3c3194268d72c2ea8d15d671e3b6f
-
SHA1
61617c6f2100302a135737beb7174d2d7ff773fe
-
SHA256
dc555e92429d71d3bfcee291d6404889bf2ea9fe084f3903b9f87ad8768d109b
-
SHA512
71a8faf6bfaad37cb5bcc1c66d2a2997751bd68b0b9a445493f1db4c8a2b767d737f4d29b2aeb85d9e7accd6e111d41398af1abf519a31f52df44731aa669288
-
SSDEEP
6144:XaipJnqfSPttGDuMEUrQVad7nG3mbDp2o+SsmiMyhtHEyr5psPc1aj8DOvlvuZxF:XaipJqaltmuMtrQ07nGWxWSsmiMyh95V
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Poaqemao.exeFebgea32.exeBanllbdn.exeHfningai.exeHhnbpb32.exeIinlemia.exeLmiciaaj.exePomgjn32.exeLklnhlfb.exeHmfkoh32.exeMplhql32.exeDmefhako.exeDakbckbe.exeJpijnqkp.exeFehfljca.exeKbbokdlk.exeLihfcm32.exeBemcgmak.exeEqciba32.exeHmfbjnbp.exeDmpfbk32.exeFacqkg32.exeNiooqcad.exeFcmnpe32.exeNgbpidjh.exeIgcoqocb.exeIkfabm32.exeIehfdi32.exeOhghgodi.exeHihicplj.exeOcbddc32.exeCffdpghg.exePhhhhc32.exeQfbobf32.exeCcfmla32.exeJfhbppbc.exeDaaicfgd.exeGojnko32.exeAjhniccb.exeObjpoh32.exeIjfboafl.exeMahnhhod.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Poaqemao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Febgea32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Banllbdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hfningai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hhnbpb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iinlemia.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmiciaaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pomgjn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lklnhlfb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmfkoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mplhql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dakbckbe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpijnqkp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fehfljca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbbokdlk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lihfcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bemcgmak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eqciba32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmfbjnbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmpfbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Facqkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niooqcad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fcmnpe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngbpidjh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igcoqocb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikfabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iehfdi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohghgodi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hihicplj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocbddc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cffdpghg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phhhhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qfbobf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ccfmla32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfhbppbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Daaicfgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gojnko32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajhniccb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Objpoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ijfboafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mahnhhod.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Aojhdd32.exe family_berbew C:\Windows\SysWOW64\Aedpaoif.exe family_berbew C:\Windows\SysWOW64\Ahblmjhj.exe family_berbew C:\Windows\SysWOW64\Bpidngil.exe family_berbew C:\Windows\SysWOW64\Bbhqjchp.exe family_berbew C:\Windows\SysWOW64\Bakqfp32.exe family_berbew C:\Windows\SysWOW64\Bhdibj32.exe family_berbew C:\Windows\SysWOW64\Bbjmpb32.exe family_berbew C:\Windows\SysWOW64\Blbaihmn.exe family_berbew C:\Windows\SysWOW64\Boanecla.exe family_berbew C:\Windows\SysWOW64\Baojaoke.exe family_berbew C:\Windows\SysWOW64\Bhibni32.exe family_berbew C:\Windows\SysWOW64\Blennh32.exe family_berbew C:\Windows\SysWOW64\Bemcgmak.exe family_berbew C:\Windows\SysWOW64\Chnlihnl.exe family_berbew C:\Windows\SysWOW64\Cpedjf32.exe family_berbew C:\Windows\SysWOW64\Ccfmla32.exe family_berbew C:\Windows\SysWOW64\Cchiaqjm.exe family_berbew C:\Windows\SysWOW64\Ccjfgphj.exe family_berbew C:\Windows\SysWOW64\Camfbm32.exe family_berbew C:\Windows\SysWOW64\Clckpf32.exe family_berbew C:\Windows\SysWOW64\Denlnk32.exe family_berbew C:\Windows\SysWOW64\Dagiil32.exe family_berbew C:\Windows\SysWOW64\Dlojkddn.exe family_berbew C:\Windows\SysWOW64\Eoifcnid.exe family_berbew C:\Windows\SysWOW64\Fomonm32.exe family_berbew C:\Windows\SysWOW64\Fbioei32.exe family_berbew C:\Windows\SysWOW64\Fqhbmqqg.exe family_berbew C:\Windows\SysWOW64\Fmmfmbhn.exe family_berbew C:\Windows\SysWOW64\Elhmablc.exe family_berbew C:\Windows\SysWOW64\Fbqefhpm.exe family_berbew C:\Windows\SysWOW64\Fijmbb32.exe family_berbew C:\Windows\SysWOW64\Gcpapkgp.exe family_berbew C:\Windows\SysWOW64\Dpcpkc32.exe family_berbew C:\Windows\SysWOW64\Coagla32.exe family_berbew C:\Windows\SysWOW64\Cidncj32.exe family_berbew C:\Windows\SysWOW64\Cchiaqjm.exe family_berbew C:\Windows\SysWOW64\Clnadfbp.exe family_berbew C:\Windows\SysWOW64\Chphoh32.exe family_berbew C:\Windows\SysWOW64\Ceblbm32.exe family_berbew C:\Windows\SysWOW64\Cohdebfi.exe family_berbew C:\Windows\SysWOW64\Beppmmoi.exe family_berbew C:\Windows\SysWOW64\Bbofkbbh.exe family_berbew C:\Windows\SysWOW64\Bockjc32.exe family_berbew C:\Windows\SysWOW64\Bhgehi32.exe family_berbew C:\Windows\SysWOW64\Behiln32.exe family_berbew C:\Windows\SysWOW64\Bpladg32.exe family_berbew C:\Windows\SysWOW64\Hcnnaikp.exe family_berbew C:\Windows\SysWOW64\Jdmcidam.exe family_berbew C:\Windows\SysWOW64\Kpccnefa.exe family_berbew C:\Windows\SysWOW64\Mgnnhk32.exe family_berbew C:\Windows\SysWOW64\Ngcgcjnc.exe family_berbew C:\Windows\SysWOW64\Nnolfdcn.exe family_berbew C:\Windows\SysWOW64\Fcfhof32.exe family_berbew C:\Windows\SysWOW64\Hfqlnm32.exe family_berbew C:\Windows\SysWOW64\Jpijnqkp.exe family_berbew C:\Windows\SysWOW64\Lfkaag32.exe family_berbew C:\Windows\SysWOW64\Likjcbkc.exe family_berbew C:\Windows\SysWOW64\Lebkhc32.exe family_berbew C:\Windows\SysWOW64\Lmiciaaj.exe family_berbew C:\Windows\SysWOW64\Medgncoe.exe family_berbew C:\Windows\SysWOW64\Mgddhf32.exe family_berbew C:\Windows\SysWOW64\Mgfqmfde.exe family_berbew C:\Windows\SysWOW64\Mmpijp32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Aojhdd32.exeAedpaoif.exeAhblmjhj.exeBpidngil.exeBbhqjchp.exeBakqfp32.exeBhdibj32.exeBpladg32.exeBbjmpb32.exeBehiln32.exeBhgehi32.exeBlbaihmn.exeBoanecla.exeBaojaoke.exeBhibni32.exeBlennh32.exeBockjc32.exeBbofkbbh.exeBemcgmak.exeBeppmmoi.exeChnlihnl.exeCpedjf32.exeCohdebfi.exeCeblbm32.exeChphoh32.exeCcfmla32.exeClnadfbp.exeCchiaqjm.exeCcjfgphj.exeCamfbm32.exeCidncj32.exeClckpf32.exeCoagla32.exeCapchmmb.exeDhjkdg32.exeDlegeemh.exeDoccaall.exeDabpnlkp.exeDenlnk32.exeDlgdkeje.exeDpcpkc32.exeDofpgqji.exeDadlclim.exeDjlddi32.exeDhnepfpj.exeDpemacql.exeDcdimopp.exeDagiil32.exeDhqaefng.exeDphifcoi.exeDaifnk32.exeDfdbojmq.exeDhcnke32.exeDlojkddn.exeDomfgpca.exeDakbckbe.exeEjbkehcg.exeEhekqe32.exeEpmcab32.exeEoocmoao.exeEbnoikqb.exeEfikji32.exeElccfc32.exeEoapbo32.exepid process 1332 Aojhdd32.exe 2996 Aedpaoif.exe 4336 Ahblmjhj.exe 4560 Bpidngil.exe 4204 Bbhqjchp.exe 4520 Bakqfp32.exe 4608 Bhdibj32.exe 1916 Bpladg32.exe 4716 Bbjmpb32.exe 3164 Behiln32.exe 4964 Bhgehi32.exe 5024 Blbaihmn.exe 4972 Boanecla.exe 4440 Baojaoke.exe 916 Bhibni32.exe 3008 Blennh32.exe 624 Bockjc32.exe 1716 Bbofkbbh.exe 3628 Bemcgmak.exe 4292 Beppmmoi.exe 2736 Chnlihnl.exe 3488 Cpedjf32.exe 3188 Cohdebfi.exe 3456 Ceblbm32.exe 3664 Chphoh32.exe 2768 Ccfmla32.exe 3012 Clnadfbp.exe 4424 Cchiaqjm.exe 3380 Ccjfgphj.exe 4884 Camfbm32.exe 2692 Cidncj32.exe 4076 Clckpf32.exe 2356 Coagla32.exe 2612 Capchmmb.exe 1516 Dhjkdg32.exe 2704 Dlegeemh.exe 1732 Doccaall.exe 3640 Dabpnlkp.exe 1792 Denlnk32.exe 3940 Dlgdkeje.exe 4868 Dpcpkc32.exe 868 Dofpgqji.exe 4464 Dadlclim.exe 4328 Djlddi32.exe 3916 Dhnepfpj.exe 4200 Dpemacql.exe 5100 Dcdimopp.exe 2936 Dagiil32.exe 4420 Dhqaefng.exe 2176 Dphifcoi.exe 3912 Daifnk32.exe 208 Dfdbojmq.exe 884 Dhcnke32.exe 1752 Dlojkddn.exe 4396 Domfgpca.exe 3168 Dakbckbe.exe 4624 Ejbkehcg.exe 1300 Ehekqe32.exe 1648 Epmcab32.exe 2204 Eoocmoao.exe 4428 Ebnoikqb.exe 1500 Efikji32.exe 2460 Elccfc32.exe 3920 Eoapbo32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ejlmkgkl.exeJmhale32.exeDfmcfp32.exeKgopidgf.exeJjbako32.exeMbfkbhpa.exeGfcgge32.exePggbkagp.exeNognnj32.exeKeqdmihc.exeHkckeo32.exeGijekg32.exeMgekbljc.exeFdgdgnbm.exeFakdpb32.exeLbdolh32.exeNnolfdcn.exeKnflpoqf.exeBfqkddfd.exeEqciba32.exeCdainc32.exeJeekkafl.exeQeemej32.exeBlmacb32.exeNdokbi32.exeDfdbojmq.exeBpnihiio.exeLaefdf32.exeEflhoigi.exeKaemnhla.exeMpnnle32.exeLbqklb32.exeCpglnhad.exeIjhjcchb.exeMbgjbkfg.exedescription ioc process File created C:\Windows\SysWOW64\Ehonfc32.exe Ejlmkgkl.exe File created C:\Windows\SysWOW64\Bbaffgag.dll File created C:\Windows\SysWOW64\Gkjdipap.dll File created C:\Windows\SysWOW64\Ccbolagk.dll File opened for modification C:\Windows\SysWOW64\Jlkagbej.exe Jmhale32.exe File opened for modification C:\Windows\SysWOW64\Dmglcj32.exe Dfmcfp32.exe File opened for modification C:\Windows\SysWOW64\Kniieo32.exe Kgopidgf.exe File created C:\Windows\SysWOW64\Kifojnol.exe File opened for modification C:\Windows\SysWOW64\Gejhef32.exe File created C:\Windows\SysWOW64\Gpdbcaok.dll File opened for modification C:\Windows\SysWOW64\Jidbflcj.exe Jjbako32.exe File opened for modification C:\Windows\SysWOW64\Medgncoe.exe Mbfkbhpa.exe File opened for modification C:\Windows\SysWOW64\Dflfac32.exe File created C:\Windows\SysWOW64\Pfnmog32.dll File created C:\Windows\SysWOW64\Haaaaeim.exe File created C:\Windows\SysWOW64\Ojqcnhkl.exe File opened for modification C:\Windows\SysWOW64\Giacca32.exe Gfcgge32.exe File opened for modification C:\Windows\SysWOW64\Pqpgdfnp.exe Pggbkagp.exe File created C:\Windows\SysWOW64\Fagnlg32.dll Nognnj32.exe File created C:\Windows\SysWOW64\Ncabfkqo.exe File created C:\Windows\SysWOW64\Ihqiqn32.dll Keqdmihc.exe File created C:\Windows\SysWOW64\Dnonkq32.exe File opened for modification C:\Windows\SysWOW64\Hbmcbime.exe Hkckeo32.exe File opened for modification C:\Windows\SysWOW64\Gpcmga32.exe Gijekg32.exe File opened for modification C:\Windows\SysWOW64\Jjpode32.exe File created C:\Windows\SysWOW64\Qpcecb32.exe File created C:\Windows\SysWOW64\Mjcgohig.exe Mgekbljc.exe File created C:\Windows\SysWOW64\Fhcpgmjf.exe Fdgdgnbm.exe File opened for modification C:\Windows\SysWOW64\Fdialn32.exe Fakdpb32.exe File created C:\Windows\SysWOW64\Lebkhc32.exe Lbdolh32.exe File created C:\Windows\SysWOW64\Lqppgj32.dll File created C:\Windows\SysWOW64\Nqmhbpba.exe Nnolfdcn.exe File opened for modification C:\Windows\SysWOW64\Keqdmihc.exe Knflpoqf.exe File created C:\Windows\SysWOW64\Okjnnj32.exe File created C:\Windows\SysWOW64\Aepjgm32.dll File created C:\Windows\SysWOW64\Jbidda32.dll Bfqkddfd.exe File created C:\Windows\SysWOW64\Ecbenm32.exe Eqciba32.exe File opened for modification C:\Windows\SysWOW64\Ecbenm32.exe Eqciba32.exe File opened for modification C:\Windows\SysWOW64\Cliaoq32.exe Cdainc32.exe File created C:\Windows\SysWOW64\Jgdhgmep.exe Jeekkafl.exe File opened for modification C:\Windows\SysWOW64\Qloebdig.exe Qeemej32.exe File created C:\Windows\SysWOW64\Bjpaooda.exe Blmacb32.exe File created C:\Windows\SysWOW64\Pnjknp32.dll Ndokbi32.exe File created C:\Windows\SysWOW64\Eejeiocj.exe File created C:\Windows\SysWOW64\Jidinqpb.exe File created C:\Windows\SysWOW64\Dhcnke32.exe Dfdbojmq.exe File created C:\Windows\SysWOW64\Bjcmebie.exe Bpnihiio.exe File opened for modification C:\Windows\SysWOW64\Cfnqklgh.exe File created C:\Windows\SysWOW64\Lddbqa32.exe Laefdf32.exe File created C:\Windows\SysWOW64\Oacoqnci.exe File opened for modification C:\Windows\SysWOW64\Filapfbo.exe File opened for modification C:\Windows\SysWOW64\Koajmepf.exe File created C:\Windows\SysWOW64\Mokmdh32.exe File opened for modification C:\Windows\SysWOW64\Oiccje32.exe File created C:\Windows\SysWOW64\Jqqjmnii.dll Eflhoigi.exe File created C:\Windows\SysWOW64\Jcpkbc32.dll Kaemnhla.exe File created C:\Windows\SysWOW64\Mblkhq32.exe Mpnnle32.exe File created C:\Windows\SysWOW64\Khacqh32.dll File opened for modification C:\Windows\SysWOW64\Dhcnke32.exe Dfdbojmq.exe File opened for modification C:\Windows\SysWOW64\Obqanjdb.exe File created C:\Windows\SysWOW64\Lflgmqhd.exe Lbqklb32.exe File opened for modification C:\Windows\SysWOW64\Cfadkb32.exe Cpglnhad.exe File created C:\Windows\SysWOW64\Ibobdqid.exe Ijhjcchb.exe File created C:\Windows\SysWOW64\Miaboe32.exe Mbgjbkfg.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 18264 18168 -
Modifies registry class 64 IoCs
Processes:
Heapdjlp.exeCfdhkhjj.exeJcllonma.exeCmlcbbcj.exePhcomcng.exeNlkngo32.exeAbemjmgg.exeIfopiajn.exeDadlclim.exeDagiil32.exeHaggelfd.exePnfkma32.exeIjogmdqm.exeJfaedkdp.exeGgeboaob.exeAjjjocap.exeIiffen32.exeEflhoigi.exeFqkocpod.exePjkombfj.exeDojcgi32.exeBmmpfn32.exeGaopfe32.exeDenlnk32.exeMgfqmfde.exeKkpnlm32.exeNgcgcjnc.exeQnnanphk.exeBogcgj32.exeIjcahd32.exeDcdimopp.exeDadeieea.exeHoiafcic.exeHakgmjoh.exeCeqnmpfo.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Heapdjlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cfdhkhjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmeddp32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fenpmnno.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jcllonma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Phcomcng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nlkngo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Abemjmgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgiiak32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncldlbah.dll" Ifopiajn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dadlclim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dagiil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Haggelfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pnfkma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ijogmdqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fajbad32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amhmnagf.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ifopiajn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jfaedkdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ggeboaob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ajjjocap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iiffen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bqjoqdcl.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkjaaljm.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eflhoigi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fqkocpod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pjkombfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eckgieoo.dll" Dojcgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oipoad32.dll" Bmmpfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcnggo32.dll" Gaopfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgegko32.dll" Denlnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofgjophm.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebdoljdi.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mgfqmfde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iljekoej.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbhnnj32.dll" Kkpnlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljfemn32.dll" Ngcgcjnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qnnanphk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bogcgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paplcg32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcoong32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kamojc32.dll" Ijcahd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgmbbe32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dcdimopp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dadeieea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hoiafcic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nholna32.dll" Hakgmjoh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ceqnmpfo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d2b3c3194268d72c2ea8d15d671e3b6f.exeAojhdd32.exeAedpaoif.exeAhblmjhj.exeBpidngil.exeBbhqjchp.exeBakqfp32.exeBhdibj32.exeBpladg32.exeBbjmpb32.exeBehiln32.exeBhgehi32.exeBlbaihmn.exeBoanecla.exeBaojaoke.exeBhibni32.exeBlennh32.exeBockjc32.exeBbofkbbh.exeBemcgmak.exeBeppmmoi.exeChnlihnl.exedescription pid process target process PID 3436 wrote to memory of 1332 3436 d2b3c3194268d72c2ea8d15d671e3b6f.exe Aojhdd32.exe PID 3436 wrote to memory of 1332 3436 d2b3c3194268d72c2ea8d15d671e3b6f.exe Aojhdd32.exe PID 3436 wrote to memory of 1332 3436 d2b3c3194268d72c2ea8d15d671e3b6f.exe Aojhdd32.exe PID 1332 wrote to memory of 2996 1332 Aojhdd32.exe Aedpaoif.exe PID 1332 wrote to memory of 2996 1332 Aojhdd32.exe Aedpaoif.exe PID 1332 wrote to memory of 2996 1332 Aojhdd32.exe Aedpaoif.exe PID 2996 wrote to memory of 4336 2996 Aedpaoif.exe Ahblmjhj.exe PID 2996 wrote to memory of 4336 2996 Aedpaoif.exe Ahblmjhj.exe PID 2996 wrote to memory of 4336 2996 Aedpaoif.exe Ahblmjhj.exe PID 4336 wrote to memory of 4560 4336 Ahblmjhj.exe Bpidngil.exe PID 4336 wrote to memory of 4560 4336 Ahblmjhj.exe Bpidngil.exe PID 4336 wrote to memory of 4560 4336 Ahblmjhj.exe Bpidngil.exe PID 4560 wrote to memory of 4204 4560 Bpidngil.exe Bbhqjchp.exe PID 4560 wrote to memory of 4204 4560 Bpidngil.exe Bbhqjchp.exe PID 4560 wrote to memory of 4204 4560 Bpidngil.exe Bbhqjchp.exe PID 4204 wrote to memory of 4520 4204 Bbhqjchp.exe Bakqfp32.exe PID 4204 wrote to memory of 4520 4204 Bbhqjchp.exe Bakqfp32.exe PID 4204 wrote to memory of 4520 4204 Bbhqjchp.exe Bakqfp32.exe PID 4520 wrote to memory of 4608 4520 Bakqfp32.exe Bhdibj32.exe PID 4520 wrote to memory of 4608 4520 Bakqfp32.exe Bhdibj32.exe PID 4520 wrote to memory of 4608 4520 Bakqfp32.exe Bhdibj32.exe PID 4608 wrote to memory of 1916 4608 Bhdibj32.exe Bpladg32.exe PID 4608 wrote to memory of 1916 4608 Bhdibj32.exe Bpladg32.exe PID 4608 wrote to memory of 1916 4608 Bhdibj32.exe Bpladg32.exe PID 1916 wrote to memory of 4716 1916 Bpladg32.exe Bbjmpb32.exe PID 1916 wrote to memory of 4716 1916 Bpladg32.exe Bbjmpb32.exe PID 1916 wrote to memory of 4716 1916 Bpladg32.exe Bbjmpb32.exe PID 4716 wrote to memory of 3164 4716 Bbjmpb32.exe Behiln32.exe PID 4716 wrote to memory of 3164 4716 Bbjmpb32.exe Behiln32.exe PID 4716 wrote to memory of 3164 4716 Bbjmpb32.exe Behiln32.exe PID 3164 wrote to memory of 4964 3164 Behiln32.exe Bhgehi32.exe PID 3164 wrote to memory of 4964 3164 Behiln32.exe Bhgehi32.exe PID 3164 wrote to memory of 4964 3164 Behiln32.exe Bhgehi32.exe PID 4964 wrote to memory of 5024 4964 Bhgehi32.exe Blbaihmn.exe PID 4964 wrote to memory of 5024 4964 Bhgehi32.exe Blbaihmn.exe PID 4964 wrote to memory of 5024 4964 Bhgehi32.exe Blbaihmn.exe PID 5024 wrote to memory of 4972 5024 Blbaihmn.exe Boanecla.exe PID 5024 wrote to memory of 4972 5024 Blbaihmn.exe Boanecla.exe PID 5024 wrote to memory of 4972 5024 Blbaihmn.exe Boanecla.exe PID 4972 wrote to memory of 4440 4972 Boanecla.exe Baojaoke.exe PID 4972 wrote to memory of 4440 4972 Boanecla.exe Baojaoke.exe PID 4972 wrote to memory of 4440 4972 Boanecla.exe Baojaoke.exe PID 4440 wrote to memory of 916 4440 Baojaoke.exe Bhibni32.exe PID 4440 wrote to memory of 916 4440 Baojaoke.exe Bhibni32.exe PID 4440 wrote to memory of 916 4440 Baojaoke.exe Bhibni32.exe PID 916 wrote to memory of 3008 916 Bhibni32.exe Blennh32.exe PID 916 wrote to memory of 3008 916 Bhibni32.exe Blennh32.exe PID 916 wrote to memory of 3008 916 Bhibni32.exe Blennh32.exe PID 3008 wrote to memory of 624 3008 Blennh32.exe Bockjc32.exe PID 3008 wrote to memory of 624 3008 Blennh32.exe Bockjc32.exe PID 3008 wrote to memory of 624 3008 Blennh32.exe Bockjc32.exe PID 624 wrote to memory of 1716 624 Bockjc32.exe Bbofkbbh.exe PID 624 wrote to memory of 1716 624 Bockjc32.exe Bbofkbbh.exe PID 624 wrote to memory of 1716 624 Bockjc32.exe Bbofkbbh.exe PID 1716 wrote to memory of 3628 1716 Bbofkbbh.exe Bemcgmak.exe PID 1716 wrote to memory of 3628 1716 Bbofkbbh.exe Bemcgmak.exe PID 1716 wrote to memory of 3628 1716 Bbofkbbh.exe Bemcgmak.exe PID 3628 wrote to memory of 4292 3628 Bemcgmak.exe Beppmmoi.exe PID 3628 wrote to memory of 4292 3628 Bemcgmak.exe Beppmmoi.exe PID 3628 wrote to memory of 4292 3628 Bemcgmak.exe Beppmmoi.exe PID 4292 wrote to memory of 2736 4292 Beppmmoi.exe Chnlihnl.exe PID 4292 wrote to memory of 2736 4292 Beppmmoi.exe Chnlihnl.exe PID 4292 wrote to memory of 2736 4292 Beppmmoi.exe Chnlihnl.exe PID 2736 wrote to memory of 3488 2736 Chnlihnl.exe Cpedjf32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2b3c3194268d72c2ea8d15d671e3b6f.exe"C:\Users\Admin\AppData\Local\Temp\d2b3c3194268d72c2ea8d15d671e3b6f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\Aojhdd32.exeC:\Windows\system32\Aojhdd32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\Aedpaoif.exeC:\Windows\system32\Aedpaoif.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Ahblmjhj.exeC:\Windows\system32\Ahblmjhj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\Bpidngil.exeC:\Windows\system32\Bpidngil.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Bbhqjchp.exeC:\Windows\system32\Bbhqjchp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\Bakqfp32.exeC:\Windows\system32\Bakqfp32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\Bhdibj32.exeC:\Windows\system32\Bhdibj32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\Bpladg32.exeC:\Windows\system32\Bpladg32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\Bbjmpb32.exeC:\Windows\system32\Bbjmpb32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\Behiln32.exeC:\Windows\system32\Behiln32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\Bhgehi32.exeC:\Windows\system32\Bhgehi32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\Blbaihmn.exeC:\Windows\system32\Blbaihmn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\Boanecla.exeC:\Windows\system32\Boanecla.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\Baojaoke.exeC:\Windows\system32\Baojaoke.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\Bhibni32.exeC:\Windows\system32\Bhibni32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\Blennh32.exeC:\Windows\system32\Blennh32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Bockjc32.exeC:\Windows\system32\Bockjc32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\Bbofkbbh.exeC:\Windows\system32\Bbofkbbh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\Bemcgmak.exeC:\Windows\system32\Bemcgmak.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\Beppmmoi.exeC:\Windows\system32\Beppmmoi.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\Chnlihnl.exeC:\Windows\system32\Chnlihnl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\Cpedjf32.exeC:\Windows\system32\Cpedjf32.exe23⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\Cohdebfi.exeC:\Windows\system32\Cohdebfi.exe24⤵
- Executes dropped EXE
PID:3188 -
C:\Windows\SysWOW64\Ceblbm32.exeC:\Windows\system32\Ceblbm32.exe25⤵
- Executes dropped EXE
PID:3456 -
C:\Windows\SysWOW64\Chphoh32.exeC:\Windows\system32\Chphoh32.exe26⤵
- Executes dropped EXE
PID:3664 -
C:\Windows\SysWOW64\Ccfmla32.exeC:\Windows\system32\Ccfmla32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\Clnadfbp.exeC:\Windows\system32\Clnadfbp.exe28⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\Cchiaqjm.exeC:\Windows\system32\Cchiaqjm.exe29⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\Ccjfgphj.exeC:\Windows\system32\Ccjfgphj.exe30⤵
- Executes dropped EXE
PID:3380 -
C:\Windows\SysWOW64\Camfbm32.exeC:\Windows\system32\Camfbm32.exe31⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\SysWOW64\Cidncj32.exeC:\Windows\system32\Cidncj32.exe32⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\Clckpf32.exeC:\Windows\system32\Clckpf32.exe33⤵
- Executes dropped EXE
PID:4076 -
C:\Windows\SysWOW64\Coagla32.exeC:\Windows\system32\Coagla32.exe34⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\Capchmmb.exeC:\Windows\system32\Capchmmb.exe35⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\Dhjkdg32.exeC:\Windows\system32\Dhjkdg32.exe36⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\Dlegeemh.exeC:\Windows\system32\Dlegeemh.exe37⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\Doccaall.exeC:\Windows\system32\Doccaall.exe38⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Dabpnlkp.exeC:\Windows\system32\Dabpnlkp.exe39⤵
- Executes dropped EXE
PID:3640 -
C:\Windows\SysWOW64\Denlnk32.exeC:\Windows\system32\Denlnk32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:1792 -
C:\Windows\SysWOW64\Dlgdkeje.exeC:\Windows\system32\Dlgdkeje.exe41⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\SysWOW64\Dpcpkc32.exeC:\Windows\system32\Dpcpkc32.exe42⤵
- Executes dropped EXE
PID:4868 -
C:\Windows\SysWOW64\Dofpgqji.exeC:\Windows\system32\Dofpgqji.exe43⤵
- Executes dropped EXE
PID:868 -
C:\Windows\SysWOW64\Dadlclim.exeC:\Windows\system32\Dadlclim.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:4464 -
C:\Windows\SysWOW64\Djlddi32.exeC:\Windows\system32\Djlddi32.exe45⤵
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\Dhnepfpj.exeC:\Windows\system32\Dhnepfpj.exe46⤵
- Executes dropped EXE
PID:3916 -
C:\Windows\SysWOW64\Dpemacql.exeC:\Windows\system32\Dpemacql.exe47⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\SysWOW64\Dcdimopp.exeC:\Windows\system32\Dcdimopp.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:5100 -
C:\Windows\SysWOW64\Dagiil32.exeC:\Windows\system32\Dagiil32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:2936 -
C:\Windows\SysWOW64\Dhqaefng.exeC:\Windows\system32\Dhqaefng.exe50⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\Dphifcoi.exeC:\Windows\system32\Dphifcoi.exe51⤵
- Executes dropped EXE
PID:2176 -
C:\Windows\SysWOW64\Daifnk32.exeC:\Windows\system32\Daifnk32.exe52⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\Dfdbojmq.exeC:\Windows\system32\Dfdbojmq.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:208 -
C:\Windows\SysWOW64\Dhcnke32.exeC:\Windows\system32\Dhcnke32.exe54⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Dlojkddn.exeC:\Windows\system32\Dlojkddn.exe55⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\Domfgpca.exeC:\Windows\system32\Domfgpca.exe56⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\Dakbckbe.exeC:\Windows\system32\Dakbckbe.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\Ejbkehcg.exeC:\Windows\system32\Ejbkehcg.exe58⤵
- Executes dropped EXE
PID:4624 -
C:\Windows\SysWOW64\Ehekqe32.exeC:\Windows\system32\Ehekqe32.exe59⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\Epmcab32.exeC:\Windows\system32\Epmcab32.exe60⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\Eoocmoao.exeC:\Windows\system32\Eoocmoao.exe61⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Ebnoikqb.exeC:\Windows\system32\Ebnoikqb.exe62⤵
- Executes dropped EXE
PID:4428 -
C:\Windows\SysWOW64\Efikji32.exeC:\Windows\system32\Efikji32.exe63⤵
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\Elccfc32.exeC:\Windows\system32\Elccfc32.exe64⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\Eoapbo32.exeC:\Windows\system32\Eoapbo32.exe65⤵
- Executes dropped EXE
PID:3920 -
C:\Windows\SysWOW64\Ebploj32.exeC:\Windows\system32\Ebploj32.exe66⤵PID:3828
-
C:\Windows\SysWOW64\Eflhoigi.exeC:\Windows\system32\Eflhoigi.exe67⤵
- Drops file in System32 directory
- Modifies registry class
PID:2100 -
C:\Windows\SysWOW64\Ehjdldfl.exeC:\Windows\system32\Ehjdldfl.exe68⤵PID:1504
-
C:\Windows\SysWOW64\Eqalmafo.exeC:\Windows\system32\Eqalmafo.exe69⤵PID:2040
-
C:\Windows\SysWOW64\Ecphimfb.exeC:\Windows\system32\Ecphimfb.exe70⤵PID:1664
-
C:\Windows\SysWOW64\Ebbidj32.exeC:\Windows\system32\Ebbidj32.exe71⤵PID:4988
-
C:\Windows\SysWOW64\Ehlaaddj.exeC:\Windows\system32\Ehlaaddj.exe72⤵PID:3004
-
C:\Windows\SysWOW64\Elhmablc.exeC:\Windows\system32\Elhmablc.exe73⤵PID:4064
-
C:\Windows\SysWOW64\Eqciba32.exeC:\Windows\system32\Eqciba32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\Ecbenm32.exeC:\Windows\system32\Ecbenm32.exe75⤵PID:5132
-
C:\Windows\SysWOW64\Efpajh32.exeC:\Windows\system32\Efpajh32.exe76⤵PID:5176
-
C:\Windows\SysWOW64\Ejlmkgkl.exeC:\Windows\system32\Ejlmkgkl.exe77⤵
- Drops file in System32 directory
PID:5220 -
C:\Windows\SysWOW64\Ehonfc32.exeC:\Windows\system32\Ehonfc32.exe78⤵PID:5260
-
C:\Windows\SysWOW64\Eqfeha32.exeC:\Windows\system32\Eqfeha32.exe79⤵PID:5300
-
C:\Windows\SysWOW64\Eoifcnid.exeC:\Windows\system32\Eoifcnid.exe80⤵PID:5336
-
C:\Windows\SysWOW64\Fbgbpihg.exeC:\Windows\system32\Fbgbpihg.exe81⤵PID:5376
-
C:\Windows\SysWOW64\Ffbnph32.exeC:\Windows\system32\Ffbnph32.exe82⤵PID:5416
-
C:\Windows\SysWOW64\Fjnjqfij.exeC:\Windows\system32\Fjnjqfij.exe83⤵PID:5464
-
C:\Windows\SysWOW64\Fmmfmbhn.exeC:\Windows\system32\Fmmfmbhn.exe84⤵PID:5500
-
C:\Windows\SysWOW64\Fqhbmqqg.exeC:\Windows\system32\Fqhbmqqg.exe85⤵PID:5544
-
C:\Windows\SysWOW64\Fcgoilpj.exeC:\Windows\system32\Fcgoilpj.exe86⤵PID:5584
-
C:\Windows\SysWOW64\Fbioei32.exeC:\Windows\system32\Fbioei32.exe87⤵PID:5620
-
C:\Windows\SysWOW64\Fjqgff32.exeC:\Windows\system32\Fjqgff32.exe88⤵PID:5664
-
C:\Windows\SysWOW64\Fmocba32.exeC:\Windows\system32\Fmocba32.exe89⤵PID:5712
-
C:\Windows\SysWOW64\Fqkocpod.exeC:\Windows\system32\Fqkocpod.exe90⤵
- Modifies registry class
PID:5756 -
C:\Windows\SysWOW64\Fomonm32.exeC:\Windows\system32\Fomonm32.exe91⤵PID:5792
-
C:\Windows\SysWOW64\Fbllkh32.exeC:\Windows\system32\Fbllkh32.exe92⤵PID:5836
-
C:\Windows\SysWOW64\Fjcclf32.exeC:\Windows\system32\Fjcclf32.exe93⤵PID:5872
-
C:\Windows\SysWOW64\Fifdgblo.exeC:\Windows\system32\Fifdgblo.exe94⤵PID:5916
-
C:\Windows\SysWOW64\Fqmlhpla.exeC:\Windows\system32\Fqmlhpla.exe95⤵PID:5964
-
C:\Windows\SysWOW64\Fopldmcl.exeC:\Windows\system32\Fopldmcl.exe96⤵PID:6008
-
C:\Windows\SysWOW64\Fbnhphbp.exeC:\Windows\system32\Fbnhphbp.exe97⤵PID:6052
-
C:\Windows\SysWOW64\Ffjdqg32.exeC:\Windows\system32\Ffjdqg32.exe98⤵PID:6092
-
C:\Windows\SysWOW64\Fihqmb32.exeC:\Windows\system32\Fihqmb32.exe99⤵PID:6136
-
C:\Windows\SysWOW64\Fmclmabe.exeC:\Windows\system32\Fmclmabe.exe100⤵PID:5172
-
C:\Windows\SysWOW64\Fqohnp32.exeC:\Windows\system32\Fqohnp32.exe101⤵PID:5204
-
C:\Windows\SysWOW64\Fcnejk32.exeC:\Windows\system32\Fcnejk32.exe102⤵PID:5288
-
C:\Windows\SysWOW64\Fbqefhpm.exeC:\Windows\system32\Fbqefhpm.exe103⤵PID:5356
-
C:\Windows\SysWOW64\Fflaff32.exeC:\Windows\system32\Fflaff32.exe104⤵PID:5428
-
C:\Windows\SysWOW64\Fijmbb32.exeC:\Windows\system32\Fijmbb32.exe105⤵PID:5496
-
C:\Windows\SysWOW64\Fqaeco32.exeC:\Windows\system32\Fqaeco32.exe106⤵PID:5576
-
C:\Windows\SysWOW64\Gcpapkgp.exeC:\Windows\system32\Gcpapkgp.exe107⤵PID:5660
-
C:\Windows\SysWOW64\Gfnnlffc.exeC:\Windows\system32\Gfnnlffc.exe108⤵PID:5704
-
C:\Windows\SysWOW64\Gimjhafg.exeC:\Windows\system32\Gimjhafg.exe109⤵PID:5784
-
C:\Windows\SysWOW64\Gqdbiofi.exeC:\Windows\system32\Gqdbiofi.exe110⤵PID:5860
-
C:\Windows\SysWOW64\Gogbdl32.exeC:\Windows\system32\Gogbdl32.exe111⤵PID:5904
-
C:\Windows\SysWOW64\Gbenqg32.exeC:\Windows\system32\Gbenqg32.exe112⤵PID:5984
-
C:\Windows\SysWOW64\Goiojk32.exeC:\Windows\system32\Goiojk32.exe113⤵PID:6088
-
C:\Windows\SysWOW64\Gcekkjcj.exeC:\Windows\system32\Gcekkjcj.exe114⤵PID:6116
-
C:\Windows\SysWOW64\Gfcgge32.exeC:\Windows\system32\Gfcgge32.exe115⤵
- Drops file in System32 directory
PID:5160 -
C:\Windows\SysWOW64\Giacca32.exeC:\Windows\system32\Giacca32.exe116⤵PID:5280
-
C:\Windows\SysWOW64\Gcggpj32.exeC:\Windows\system32\Gcggpj32.exe117⤵PID:5444
-
C:\Windows\SysWOW64\Gbjhlfhb.exeC:\Windows\system32\Gbjhlfhb.exe118⤵PID:5540
-
C:\Windows\SysWOW64\Gjapmdid.exeC:\Windows\system32\Gjapmdid.exe119⤵PID:5700
-
C:\Windows\SysWOW64\Gbldaffp.exeC:\Windows\system32\Gbldaffp.exe120⤵PID:5812
-
C:\Windows\SysWOW64\Gifmnpnl.exeC:\Windows\system32\Gifmnpnl.exe121⤵PID:5896
-
C:\Windows\SysWOW64\Gameonno.exeC:\Windows\system32\Gameonno.exe122⤵PID:6020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-