Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe
Resource
win10v2004-20240426-en
General
-
Target
73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe
-
Size
264KB
-
MD5
9e9cd29b8e6bdecbc3f1be18059016cd
-
SHA1
8120f5d21c706dbbedd81506f253049224f0ddf7
-
SHA256
73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e
-
SHA512
b12af4692df983c439f884b6815beff1486a6ede2a8252974a5fd758b84241ad1b40589e140f82c908e61d4268b498d7878e1fe383155346cfb9fb54047cfb61
-
SSDEEP
6144:ZglI0soaAGj2QE2+g24h5wbOA7xtJQeaj2QE2+g24R:ZMxhPGjj+0w51tJQjjj+M
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kilhgk32.exeKagichjo.exeKcifkp32.exeGjocgdkg.exeJpaghf32.exeLkiqbl32.exeJplmmfmi.exeMkepnjng.exeFqmlhpla.exeGmmocpjk.exeGppekj32.exeIidipnal.exeMdfofakp.exeMahbje32.exeJfkoeppq.exeKgmlkp32.exeLaefdf32.exeMcnhmm32.exeMkgmcjld.exeGogbdl32.exeHcedaheh.exeIbccic32.exeLcgblncm.exeNqmhbpba.exeGbldaffp.exeLiggbi32.exeMkbchk32.exeGmhfhp32.exeHmfbjnbp.exeNqiogp32.exeKgphpo32.exeMnfipekh.exeHjfihc32.exeHmioonpn.exeIbagcc32.exeMcbahlip.exeIfhiib32.exeJaedgjjd.exeLaalifad.exeNkncdifl.exeImdnklfp.exeJmnaakne.exeLgikfn32.exeMkpgck32.exeNkjjij32.exeKdaldd32.exeLdaeka32.exeLjnnch32.exeNcldnkae.exeKmegbjgn.exeLmqgnhmp.exeLnhmng32.exeMamleegg.exeGqkhjn32.exeGcekkjcj.exeGjjjle32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kilhgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kagichjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kcifkp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjocgdkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jpaghf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkiqbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jplmmfmi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fqmlhpla.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmmocpjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gppekj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iidipnal.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdfofakp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mahbje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jplmmfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jfkoeppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kgmlkp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laefdf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcnhmm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkgmcjld.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gogbdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hcedaheh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibccic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcgblncm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gbldaffp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liggbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lcgblncm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkbchk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmhfhp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmfbjnbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nqiogp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgphpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mcnhmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mnfipekh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjfihc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmioonpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hmioonpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ibagcc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcbahlip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ifhiib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaedgjjd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgmlkp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laalifad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Imdnklfp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmnaakne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lgikfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mkpgck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nkjjij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdaldd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldaeka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ljnnch32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkpgck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kmegbjgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmqgnhmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnhmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mamleegg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gqkhjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mdfofakp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcekkjcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gjjjle32.exe -
Executes dropped EXE 64 IoCs
Processes:
Ficgacna.exeFomonm32.exeFbllkh32.exeFjcclf32.exeFqmlhpla.exeFckhdk32.exeFihqmb32.exeFflaff32.exeFmficqpc.exeGcpapkgp.exeGjjjle32.exeGmhfhp32.exeGogbdl32.exeGjlfbd32.exeGqfooodg.exeGcekkjcj.exeGjocgdkg.exeGmmocpjk.exeGjapmdid.exeGqkhjn32.exeGbldaffp.exeGifmnpnl.exeGppekj32.exeHboagf32.exeHjfihc32.exeHmdedo32.exeHpbaqj32.exeHbanme32.exeHfljmdjc.exeHikfip32.exeHmfbjnbp.exeHpenfjad.exeHbckbepg.exeHfofbd32.exeHimcoo32.exeHmioonpn.exeHpgkkioa.exeHcedaheh.exeIpldfi32.exeIbjqcd32.exeIidipnal.exeIakaql32.exeIfhiib32.exeIiffen32.exeIcljbg32.exeIfjfnb32.exeImdnklfp.exeIbagcc32.exeIbccic32.exeJaedgjjd.exeJfaloa32.exeJagqlj32.exeJfdida32.exeJmnaakne.exeJplmmfmi.exeJfffjqdf.exeJidbflcj.exeJbmfoa32.exeJigollag.exeJpaghf32.exeJfkoeppq.exeKmegbjgn.exeKgmlkp32.exeKilhgk32.exepid process 4384 Ficgacna.exe 1188 Fomonm32.exe 4652 Fbllkh32.exe 5056 Fjcclf32.exe 1388 Fqmlhpla.exe 2756 Fckhdk32.exe 4000 Fihqmb32.exe 4988 Fflaff32.exe 4912 Fmficqpc.exe 4648 Gcpapkgp.exe 4704 Gjjjle32.exe 5108 Gmhfhp32.exe 3308 Gogbdl32.exe 4080 Gjlfbd32.exe 2392 Gqfooodg.exe 2720 Gcekkjcj.exe 5116 Gjocgdkg.exe 208 Gmmocpjk.exe 1612 Gjapmdid.exe 3764 Gqkhjn32.exe 1436 Gbldaffp.exe 744 Gifmnpnl.exe 3916 Gppekj32.exe 3632 Hboagf32.exe 668 Hjfihc32.exe 3532 Hmdedo32.exe 4952 Hpbaqj32.exe 3584 Hbanme32.exe 2276 Hfljmdjc.exe 1384 Hikfip32.exe 1176 Hmfbjnbp.exe 4568 Hpenfjad.exe 3032 Hbckbepg.exe 2532 Hfofbd32.exe 3048 Himcoo32.exe 1916 Hmioonpn.exe 1532 Hpgkkioa.exe 3004 Hcedaheh.exe 3928 Ipldfi32.exe 1116 Ibjqcd32.exe 2484 Iidipnal.exe 3500 Iakaql32.exe 5088 Ifhiib32.exe 1304 Iiffen32.exe 3372 Icljbg32.exe 5016 Ifjfnb32.exe 1608 Imdnklfp.exe 1216 Ibagcc32.exe 3788 Ibccic32.exe 2844 Jaedgjjd.exe 4064 Jfaloa32.exe 2660 Jagqlj32.exe 2476 Jfdida32.exe 1492 Jmnaakne.exe 4460 Jplmmfmi.exe 1660 Jfffjqdf.exe 3008 Jidbflcj.exe 1076 Jbmfoa32.exe 2072 Jigollag.exe 5004 Jpaghf32.exe 1248 Jfkoeppq.exe 5112 Kmegbjgn.exe 1196 Kgmlkp32.exe 1928 Kilhgk32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Gmhfhp32.exeHmioonpn.exeKdcijcke.exeLpocjdld.exeMahbje32.exeNkncdifl.exeFicgacna.exeIpldfi32.exeKgphpo32.exeLcgblncm.exeNqiogp32.exeNcldnkae.exeHpgkkioa.exeNqklmpdd.exeMcnhmm32.exeJfkoeppq.exeKpmfddnf.exeLkiqbl32.exeJigollag.exeMdiklqhm.exeNafokcol.exeKdaldd32.exeGcekkjcj.exeJfffjqdf.exeGjlfbd32.exeMcbahlip.exeNkjjij32.exeFckhdk32.exeGbldaffp.exeHfofbd32.exeMnocof32.exeFjcclf32.exeFqmlhpla.exeGjocgdkg.exeHbckbepg.exeHcedaheh.exeLgikfn32.exeLijdhiaa.exe73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exeMcpebmkb.exeMjqjih32.exeHbanme32.exeIfjfnb32.exeLaefdf32.exeFflaff32.exeMkpgck32.exeFihqmb32.exeJmnaakne.exeKcifkp32.exeKgfoan32.exeLdaeka32.exeFomonm32.exeFmficqpc.exedescription ioc process File created C:\Windows\SysWOW64\Mepgghma.dll Gmhfhp32.exe File created C:\Windows\SysWOW64\Hpgkkioa.exe Hmioonpn.exe File created C:\Windows\SysWOW64\Kagichjo.exe Kdcijcke.exe File created C:\Windows\SysWOW64\Dnkdikig.dll Lpocjdld.exe File created C:\Windows\SysWOW64\Mdfofakp.exe Mahbje32.exe File opened for modification C:\Windows\SysWOW64\Nbhkac32.exe Nkncdifl.exe File opened for modification C:\Windows\SysWOW64\Fomonm32.exe Ficgacna.exe File created C:\Windows\SysWOW64\Hdgpjm32.dll Ipldfi32.exe File created C:\Windows\SysWOW64\Kdcijcke.exe Kgphpo32.exe File opened for modification C:\Windows\SysWOW64\Mjqjih32.exe Lcgblncm.exe File created C:\Windows\SysWOW64\Pipfna32.dll Nqiogp32.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File created C:\Windows\SysWOW64\Hcedaheh.exe Hpgkkioa.exe File created C:\Windows\SysWOW64\Pkckjila.dll Nqklmpdd.exe File created C:\Windows\SysWOW64\Qcldhk32.dll Mcnhmm32.exe File created C:\Windows\SysWOW64\Iljnde32.dll Jfkoeppq.exe File created C:\Windows\SysWOW64\Pipagf32.dll Kpmfddnf.exe File opened for modification C:\Windows\SysWOW64\Lnhmng32.exe Lkiqbl32.exe File created C:\Windows\SysWOW64\Nilhco32.dll Jigollag.exe File created C:\Windows\SysWOW64\Mkbchk32.exe Mdiklqhm.exe File opened for modification C:\Windows\SysWOW64\Nqiogp32.exe Nafokcol.exe File created C:\Windows\SysWOW64\Kgphpo32.exe Kdaldd32.exe File opened for modification C:\Windows\SysWOW64\Gjocgdkg.exe Gcekkjcj.exe File created C:\Windows\SysWOW64\Honcnp32.dll Jfffjqdf.exe File created C:\Windows\SysWOW64\Gogbdl32.exe Gmhfhp32.exe File created C:\Windows\SysWOW64\Oddfqf32.dll Gjlfbd32.exe File created C:\Windows\SysWOW64\Mbgaem32.dll Hmioonpn.exe File opened for modification C:\Windows\SysWOW64\Nkjjij32.exe Mcbahlip.exe File created C:\Windows\SysWOW64\Hlmobp32.dll Nkjjij32.exe File created C:\Windows\SysWOW64\Lbdfmi32.dll Fckhdk32.exe File created C:\Windows\SysWOW64\Gifmnpnl.exe Gbldaffp.exe File created C:\Windows\SysWOW64\Ibooqjdb.dll Hfofbd32.exe File opened for modification C:\Windows\SysWOW64\Kgphpo32.exe Kdaldd32.exe File created C:\Windows\SysWOW64\Mdiklqhm.exe Mnocof32.exe File created C:\Windows\SysWOW64\Ncgkcl32.exe Nqiogp32.exe File created C:\Windows\SysWOW64\Jfhlfk32.dll Fjcclf32.exe File opened for modification C:\Windows\SysWOW64\Fckhdk32.exe Fqmlhpla.exe File created C:\Windows\SysWOW64\Odhibo32.dll Gjocgdkg.exe File created C:\Windows\SysWOW64\Hfofbd32.exe Hbckbepg.exe File created C:\Windows\SysWOW64\Ipldfi32.exe Hcedaheh.exe File opened for modification C:\Windows\SysWOW64\Kgfoan32.exe Kpmfddnf.exe File created C:\Windows\SysWOW64\Liggbi32.exe Lgikfn32.exe File opened for modification C:\Windows\SysWOW64\Laalifad.exe Lijdhiaa.exe File opened for modification C:\Windows\SysWOW64\Ficgacna.exe 73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe File opened for modification C:\Windows\SysWOW64\Mkgmcjld.exe Mcpebmkb.exe File created C:\Windows\SysWOW64\Ibhblqpo.dll Mjqjih32.exe File opened for modification C:\Windows\SysWOW64\Hfljmdjc.exe Hbanme32.exe File created C:\Windows\SysWOW64\Ekmihm32.dll Ifjfnb32.exe File created C:\Windows\SysWOW64\Lphfpbdi.exe Laefdf32.exe File created C:\Windows\SysWOW64\Pponmema.dll Nafokcol.exe File created C:\Windows\SysWOW64\Ahgndd32.dll Fflaff32.exe File created C:\Windows\SysWOW64\Mnocof32.exe Mkpgck32.exe File created C:\Windows\SysWOW64\Ibjqcd32.exe Ipldfi32.exe File created C:\Windows\SysWOW64\Fflaff32.exe Fihqmb32.exe File created C:\Windows\SysWOW64\Hionfema.dll Hpgkkioa.exe File created C:\Windows\SysWOW64\Imdnklfp.exe Ifjfnb32.exe File created C:\Windows\SysWOW64\Bbbjnidp.dll Jmnaakne.exe File opened for modification C:\Windows\SysWOW64\Kibnhjgj.exe Kcifkp32.exe File created C:\Windows\SysWOW64\Lmqgnhmp.exe Kgfoan32.exe File opened for modification C:\Windows\SysWOW64\Ljnnch32.exe Ldaeka32.exe File created C:\Windows\SysWOW64\Fbllkh32.exe Fomonm32.exe File created C:\Windows\SysWOW64\Mjqjih32.exe Lcgblncm.exe File created C:\Windows\SysWOW64\Kjeebd32.dll Fmficqpc.exe File created C:\Windows\SysWOW64\Gqfooodg.exe Gjlfbd32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5200 5984 WerFault.exe Nkcmohbg.exe -
Modifies registry class 64 IoCs
Processes:
Fbllkh32.exeKilhgk32.exeGmhfhp32.exeKpmfddnf.exeMkepnjng.exeNqmhbpba.exeHpgkkioa.exeLmqgnhmp.exeLijdhiaa.exeLaalifad.exeGbldaffp.exeIidipnal.exeJpaghf32.exeKmegbjgn.exeFomonm32.exeFckhdk32.exeFihqmb32.exeLdmlpbbj.exeLdohebqh.exeMcbahlip.exe73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exeGjlfbd32.exeGqfooodg.exeJplmmfmi.exeNjcpee32.exeFflaff32.exeGifmnpnl.exeGppekj32.exeLphfpbdi.exeMcnhmm32.exeNnhfee32.exeNkncdifl.exeFqmlhpla.exeHmdedo32.exeLjnnch32.exeMcpebmkb.exeLgikfn32.exeLdaeka32.exeNqfbaq32.exeNnolfdcn.exeHfofbd32.exeIfjfnb32.exeJagqlj32.exeKagichjo.exeMdfofakp.exeMnfipekh.exeHmioonpn.exeKgfoan32.exeNafokcol.exeNcgkcl32.exeImdnklfp.exeLpocjdld.exeLkiqbl32.exeFmficqpc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fbllkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mepgghma.dll" Gmhfhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pipagf32.dll" Kpmfddnf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mkepnjng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hionfema.dll" Hpgkkioa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jchbak32.dll" Lmqgnhmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lijdhiaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Laalifad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gbldaffp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iidipnal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jpaghf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kmegbjgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fomonm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fckhdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpbjkl32.dll" Fihqmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gbldaffp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ldmlpbbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekiidlll.dll" Ldohebqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mkepnjng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mcbahlip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddhbep32.dll" 73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gjlfbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chbijmok.dll" Gqfooodg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jplmmfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fflaff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gmhfhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mngoghpn.dll" Gifmnpnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gppekj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lphfpbdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mcnhmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipkobd32.dll" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fqmlhpla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hmdedo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebaqkk32.dll" Ljnnch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mcpebmkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lgikfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ldaeka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfcbokki.dll" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bghhihab.dll" Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibooqjdb.dll" Hfofbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ifjfnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jagqlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghiqbiae.dll" Kagichjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogijli32.dll" Ldmlpbbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ldaeka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mdfofakp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mnfipekh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hmioonpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hpgkkioa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anjekdho.dll" Jagqlj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kgfoan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pponmema.dll" Nafokcol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkeang32.dll" Ncgkcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ncgkcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpfihl32.dll" Imdnklfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lmqgnhmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lpocjdld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnapla32.dll" Lkiqbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fihqmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fmficqpc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exeFicgacna.exeFomonm32.exeFbllkh32.exeFjcclf32.exeFqmlhpla.exeFckhdk32.exeFihqmb32.exeFflaff32.exeFmficqpc.exeGcpapkgp.exeGjjjle32.exeGmhfhp32.exeGogbdl32.exeGjlfbd32.exeGqfooodg.exeGcekkjcj.exeGjocgdkg.exeGmmocpjk.exeGjapmdid.exeGqkhjn32.exeGbldaffp.exedescription pid process target process PID 1136 wrote to memory of 4384 1136 73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe Ficgacna.exe PID 1136 wrote to memory of 4384 1136 73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe Ficgacna.exe PID 1136 wrote to memory of 4384 1136 73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe Ficgacna.exe PID 4384 wrote to memory of 1188 4384 Ficgacna.exe Fomonm32.exe PID 4384 wrote to memory of 1188 4384 Ficgacna.exe Fomonm32.exe PID 4384 wrote to memory of 1188 4384 Ficgacna.exe Fomonm32.exe PID 1188 wrote to memory of 4652 1188 Fomonm32.exe Fbllkh32.exe PID 1188 wrote to memory of 4652 1188 Fomonm32.exe Fbllkh32.exe PID 1188 wrote to memory of 4652 1188 Fomonm32.exe Fbllkh32.exe PID 4652 wrote to memory of 5056 4652 Fbllkh32.exe Fjcclf32.exe PID 4652 wrote to memory of 5056 4652 Fbllkh32.exe Fjcclf32.exe PID 4652 wrote to memory of 5056 4652 Fbllkh32.exe Fjcclf32.exe PID 5056 wrote to memory of 1388 5056 Fjcclf32.exe Fqmlhpla.exe PID 5056 wrote to memory of 1388 5056 Fjcclf32.exe Fqmlhpla.exe PID 5056 wrote to memory of 1388 5056 Fjcclf32.exe Fqmlhpla.exe PID 1388 wrote to memory of 2756 1388 Fqmlhpla.exe Fckhdk32.exe PID 1388 wrote to memory of 2756 1388 Fqmlhpla.exe Fckhdk32.exe PID 1388 wrote to memory of 2756 1388 Fqmlhpla.exe Fckhdk32.exe PID 2756 wrote to memory of 4000 2756 Fckhdk32.exe Fihqmb32.exe PID 2756 wrote to memory of 4000 2756 Fckhdk32.exe Fihqmb32.exe PID 2756 wrote to memory of 4000 2756 Fckhdk32.exe Fihqmb32.exe PID 4000 wrote to memory of 4988 4000 Fihqmb32.exe Fflaff32.exe PID 4000 wrote to memory of 4988 4000 Fihqmb32.exe Fflaff32.exe PID 4000 wrote to memory of 4988 4000 Fihqmb32.exe Fflaff32.exe PID 4988 wrote to memory of 4912 4988 Fflaff32.exe Fmficqpc.exe PID 4988 wrote to memory of 4912 4988 Fflaff32.exe Fmficqpc.exe PID 4988 wrote to memory of 4912 4988 Fflaff32.exe Fmficqpc.exe PID 4912 wrote to memory of 4648 4912 Fmficqpc.exe Gcpapkgp.exe PID 4912 wrote to memory of 4648 4912 Fmficqpc.exe Gcpapkgp.exe PID 4912 wrote to memory of 4648 4912 Fmficqpc.exe Gcpapkgp.exe PID 4648 wrote to memory of 4704 4648 Gcpapkgp.exe Gjjjle32.exe PID 4648 wrote to memory of 4704 4648 Gcpapkgp.exe Gjjjle32.exe PID 4648 wrote to memory of 4704 4648 Gcpapkgp.exe Gjjjle32.exe PID 4704 wrote to memory of 5108 4704 Gjjjle32.exe Gmhfhp32.exe PID 4704 wrote to memory of 5108 4704 Gjjjle32.exe Gmhfhp32.exe PID 4704 wrote to memory of 5108 4704 Gjjjle32.exe Gmhfhp32.exe PID 5108 wrote to memory of 3308 5108 Gmhfhp32.exe Gogbdl32.exe PID 5108 wrote to memory of 3308 5108 Gmhfhp32.exe Gogbdl32.exe PID 5108 wrote to memory of 3308 5108 Gmhfhp32.exe Gogbdl32.exe PID 3308 wrote to memory of 4080 3308 Gogbdl32.exe Gjlfbd32.exe PID 3308 wrote to memory of 4080 3308 Gogbdl32.exe Gjlfbd32.exe PID 3308 wrote to memory of 4080 3308 Gogbdl32.exe Gjlfbd32.exe PID 4080 wrote to memory of 2392 4080 Gjlfbd32.exe Gqfooodg.exe PID 4080 wrote to memory of 2392 4080 Gjlfbd32.exe Gqfooodg.exe PID 4080 wrote to memory of 2392 4080 Gjlfbd32.exe Gqfooodg.exe PID 2392 wrote to memory of 2720 2392 Gqfooodg.exe Gcekkjcj.exe PID 2392 wrote to memory of 2720 2392 Gqfooodg.exe Gcekkjcj.exe PID 2392 wrote to memory of 2720 2392 Gqfooodg.exe Gcekkjcj.exe PID 2720 wrote to memory of 5116 2720 Gcekkjcj.exe Gjocgdkg.exe PID 2720 wrote to memory of 5116 2720 Gcekkjcj.exe Gjocgdkg.exe PID 2720 wrote to memory of 5116 2720 Gcekkjcj.exe Gjocgdkg.exe PID 5116 wrote to memory of 208 5116 Gjocgdkg.exe Gmmocpjk.exe PID 5116 wrote to memory of 208 5116 Gjocgdkg.exe Gmmocpjk.exe PID 5116 wrote to memory of 208 5116 Gjocgdkg.exe Gmmocpjk.exe PID 208 wrote to memory of 1612 208 Gmmocpjk.exe Gjapmdid.exe PID 208 wrote to memory of 1612 208 Gmmocpjk.exe Gjapmdid.exe PID 208 wrote to memory of 1612 208 Gmmocpjk.exe Gjapmdid.exe PID 1612 wrote to memory of 3764 1612 Gjapmdid.exe Gqkhjn32.exe PID 1612 wrote to memory of 3764 1612 Gjapmdid.exe Gqkhjn32.exe PID 1612 wrote to memory of 3764 1612 Gjapmdid.exe Gqkhjn32.exe PID 3764 wrote to memory of 1436 3764 Gqkhjn32.exe Gbldaffp.exe PID 3764 wrote to memory of 1436 3764 Gqkhjn32.exe Gbldaffp.exe PID 3764 wrote to memory of 1436 3764 Gqkhjn32.exe Gbldaffp.exe PID 1436 wrote to memory of 744 1436 Gbldaffp.exe Gifmnpnl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe"C:\Users\Admin\AppData\Local\Temp\73dfb580e791a6de4687c800100b616ebbefa38edf26f46c5303ebe32fd4f53e.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\Ficgacna.exeC:\Windows\system32\Ficgacna.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\Fomonm32.exeC:\Windows\system32\Fomonm32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\Fbllkh32.exeC:\Windows\system32\Fbllkh32.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\Fjcclf32.exeC:\Windows\system32\Fjcclf32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\Fqmlhpla.exeC:\Windows\system32\Fqmlhpla.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\Fckhdk32.exeC:\Windows\system32\Fckhdk32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Fihqmb32.exeC:\Windows\system32\Fihqmb32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\Fflaff32.exeC:\Windows\system32\Fflaff32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\Fmficqpc.exeC:\Windows\system32\Fmficqpc.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\Gcpapkgp.exeC:\Windows\system32\Gcpapkgp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\Gjjjle32.exeC:\Windows\system32\Gjjjle32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\Gmhfhp32.exeC:\Windows\system32\Gmhfhp32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\Gogbdl32.exeC:\Windows\system32\Gogbdl32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\Gjlfbd32.exeC:\Windows\system32\Gjlfbd32.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\Gqfooodg.exeC:\Windows\system32\Gqfooodg.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Gcekkjcj.exeC:\Windows\system32\Gcekkjcj.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Gjocgdkg.exeC:\Windows\system32\Gjocgdkg.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\Gmmocpjk.exeC:\Windows\system32\Gmmocpjk.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\Gjapmdid.exeC:\Windows\system32\Gjapmdid.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Gqkhjn32.exeC:\Windows\system32\Gqkhjn32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\Gbldaffp.exeC:\Windows\system32\Gbldaffp.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\Gifmnpnl.exeC:\Windows\system32\Gifmnpnl.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:744 -
C:\Windows\SysWOW64\Gppekj32.exeC:\Windows\system32\Gppekj32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3916 -
C:\Windows\SysWOW64\Hboagf32.exeC:\Windows\system32\Hboagf32.exe25⤵
- Executes dropped EXE
PID:3632 -
C:\Windows\SysWOW64\Hjfihc32.exeC:\Windows\system32\Hjfihc32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:668 -
C:\Windows\SysWOW64\Hmdedo32.exeC:\Windows\system32\Hmdedo32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:3532 -
C:\Windows\SysWOW64\Hpbaqj32.exeC:\Windows\system32\Hpbaqj32.exe28⤵
- Executes dropped EXE
PID:4952 -
C:\Windows\SysWOW64\Hbanme32.exeC:\Windows\system32\Hbanme32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3584 -
C:\Windows\SysWOW64\Hfljmdjc.exeC:\Windows\system32\Hfljmdjc.exe30⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\Hikfip32.exeC:\Windows\system32\Hikfip32.exe31⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\SysWOW64\Hmfbjnbp.exeC:\Windows\system32\Hmfbjnbp.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1176 -
C:\Windows\SysWOW64\Hpenfjad.exeC:\Windows\system32\Hpenfjad.exe33⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\Hbckbepg.exeC:\Windows\system32\Hbckbepg.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\Hfofbd32.exeC:\Windows\system32\Hfofbd32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Himcoo32.exeC:\Windows\system32\Himcoo32.exe36⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\Hmioonpn.exeC:\Windows\system32\Hmioonpn.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1916 -
C:\Windows\SysWOW64\Hpgkkioa.exeC:\Windows\system32\Hpgkkioa.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1532 -
C:\Windows\SysWOW64\Hcedaheh.exeC:\Windows\system32\Hcedaheh.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\Ipldfi32.exeC:\Windows\system32\Ipldfi32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3928 -
C:\Windows\SysWOW64\Ibjqcd32.exeC:\Windows\system32\Ibjqcd32.exe41⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\Iidipnal.exeC:\Windows\system32\Iidipnal.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\Iakaql32.exeC:\Windows\system32\Iakaql32.exe43⤵
- Executes dropped EXE
PID:3500 -
C:\Windows\SysWOW64\Ifhiib32.exeC:\Windows\system32\Ifhiib32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\Iiffen32.exeC:\Windows\system32\Iiffen32.exe45⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\Icljbg32.exeC:\Windows\system32\Icljbg32.exe46⤵
- Executes dropped EXE
PID:3372 -
C:\Windows\SysWOW64\Ifjfnb32.exeC:\Windows\system32\Ifjfnb32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5016 -
C:\Windows\SysWOW64\Imdnklfp.exeC:\Windows\system32\Imdnklfp.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Ibagcc32.exeC:\Windows\system32\Ibagcc32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\Ibccic32.exeC:\Windows\system32\Ibccic32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3788 -
C:\Windows\SysWOW64\Jaedgjjd.exeC:\Windows\system32\Jaedgjjd.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\Jfaloa32.exeC:\Windows\system32\Jfaloa32.exe52⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\Jagqlj32.exeC:\Windows\system32\Jagqlj32.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Jfdida32.exeC:\Windows\system32\Jfdida32.exe54⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\Jmnaakne.exeC:\Windows\system32\Jmnaakne.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1492 -
C:\Windows\SysWOW64\Jplmmfmi.exeC:\Windows\system32\Jplmmfmi.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4460 -
C:\Windows\SysWOW64\Jfffjqdf.exeC:\Windows\system32\Jfffjqdf.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1660 -
C:\Windows\SysWOW64\Jidbflcj.exeC:\Windows\system32\Jidbflcj.exe58⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\Jbmfoa32.exeC:\Windows\system32\Jbmfoa32.exe59⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\Jigollag.exeC:\Windows\system32\Jigollag.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2072 -
C:\Windows\SysWOW64\Jpaghf32.exeC:\Windows\system32\Jpaghf32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5004 -
C:\Windows\SysWOW64\Jfkoeppq.exeC:\Windows\system32\Jfkoeppq.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1248 -
C:\Windows\SysWOW64\Kmegbjgn.exeC:\Windows\system32\Kmegbjgn.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5112 -
C:\Windows\SysWOW64\Kgmlkp32.exeC:\Windows\system32\Kgmlkp32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1196 -
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1928 -
C:\Windows\SysWOW64\Kdaldd32.exeC:\Windows\system32\Kdaldd32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3080 -
C:\Windows\SysWOW64\Kgphpo32.exeC:\Windows\system32\Kgphpo32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3276 -
C:\Windows\SysWOW64\Kdcijcke.exeC:\Windows\system32\Kdcijcke.exe68⤵
- Drops file in System32 directory
PID:4576 -
C:\Windows\SysWOW64\Kagichjo.exeC:\Windows\system32\Kagichjo.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3608 -
C:\Windows\SysWOW64\Kcifkp32.exeC:\Windows\system32\Kcifkp32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3504 -
C:\Windows\SysWOW64\Kibnhjgj.exeC:\Windows\system32\Kibnhjgj.exe71⤵PID:3028
-
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Kgfoan32.exeC:\Windows\system32\Kgfoan32.exe73⤵
- Drops file in System32 directory
- Modifies registry class
PID:3312 -
C:\Windows\SysWOW64\Lmqgnhmp.exeC:\Windows\system32\Lmqgnhmp.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4088 -
C:\Windows\SysWOW64\Lpocjdld.exeC:\Windows\system32\Lpocjdld.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:4832 -
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1524 -
C:\Windows\SysWOW64\Liggbi32.exeC:\Windows\system32\Liggbi32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:516 -
C:\Windows\SysWOW64\Ldmlpbbj.exeC:\Windows\system32\Ldmlpbbj.exe78⤵
- Modifies registry class
PID:4672 -
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe79⤵
- Drops file in System32 directory
- Modifies registry class
PID:440 -
C:\Windows\SysWOW64\Laalifad.exeC:\Windows\system32\Laalifad.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1252 -
C:\Windows\SysWOW64\Ldohebqh.exeC:\Windows\system32\Ldohebqh.exe81⤵
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Lkiqbl32.exeC:\Windows\system32\Lkiqbl32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4344 -
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3516 -
C:\Windows\SysWOW64\Ldaeka32.exeC:\Windows\system32\Ldaeka32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:60 -
C:\Windows\SysWOW64\Ljnnch32.exeC:\Windows\system32\Ljnnch32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3988 -
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1844 -
C:\Windows\SysWOW64\Lphfpbdi.exeC:\Windows\system32\Lphfpbdi.exe87⤵
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4452 -
C:\Windows\SysWOW64\Mjqjih32.exeC:\Windows\system32\Mjqjih32.exe89⤵
- Drops file in System32 directory
PID:5036 -
C:\Windows\SysWOW64\Mahbje32.exeC:\Windows\system32\Mahbje32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\Mdfofakp.exeC:\Windows\system32\Mdfofakp.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4524 -
C:\Windows\SysWOW64\Mkpgck32.exeC:\Windows\system32\Mkpgck32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5128 -
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe93⤵
- Drops file in System32 directory
PID:5172 -
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe94⤵
- Drops file in System32 directory
PID:5212 -
C:\Windows\SysWOW64\Mkbchk32.exeC:\Windows\system32\Mkbchk32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5260 -
C:\Windows\SysWOW64\Mamleegg.exeC:\Windows\system32\Mamleegg.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5304 -
C:\Windows\SysWOW64\Mdkhapfj.exeC:\Windows\system32\Mdkhapfj.exe97⤵PID:5348
-
C:\Windows\SysWOW64\Mcnhmm32.exeC:\Windows\system32\Mcnhmm32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5388 -
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5436 -
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe100⤵PID:5484
-
C:\Windows\SysWOW64\Mcpebmkb.exeC:\Windows\system32\Mcpebmkb.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:5532 -
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5576 -
C:\Windows\SysWOW64\Mnfipekh.exeC:\Windows\system32\Mnfipekh.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5612 -
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe104⤵PID:5660
-
C:\Windows\SysWOW64\Mcbahlip.exeC:\Windows\system32\Mcbahlip.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5716 -
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5768 -
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe107⤵
- Modifies registry class
PID:5808 -
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe108⤵
- Modifies registry class
PID:5920 -
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe109⤵PID:6012
-
C:\Windows\SysWOW64\Nafokcol.exeC:\Windows\system32\Nafokcol.exe110⤵
- Drops file in System32 directory
- Modifies registry class
PID:6072 -
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6132 -
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe112⤵
- Modifies registry class
PID:5168 -
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5220 -
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe114⤵PID:5332
-
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe115⤵
- Drops file in System32 directory
PID:5396 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe116⤵PID:5552
-
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe117⤵
- Modifies registry class
PID:5608 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe118⤵
- Modifies registry class
PID:5704 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5756 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5868 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe121⤵PID:5984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5984 -s 424122⤵
- Program crash
PID:5200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5984 -ip 59841⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5718cddc1a38388c2329c6866f15a5709
SHA16151b643af8fc4f5108a41ca8a9b53347c676006
SHA256fe60dd0c15a33eda60f391528640776649322cbcd54b0c0ba6e976e387906847
SHA512c28f2b4f2f4b6d881ce7c7e77d05926833d2d76a1c90d9841827eab0e91bec8822da42cdaf45913275fb5ddb1507457bacf4b93c5f40fa644207b0efbeefc31f
-
Filesize
264KB
MD57504294c9f782f85d438b77276c08073
SHA1db2576bafaa22803f223287b0063e9cbfa46dd7d
SHA2569f02f8465c7d38b25e7f287354cc43025bc511f0d542830e3b9e921c78079469
SHA512fae6a1aa46dbb066eb66b8122bff6c1a025bd42a43846e89f1333c198be16887b636c916142cb30e4a3849568af0bdc16ea2f8905d0ac709f6ad19b6666aabbb
-
Filesize
264KB
MD5b1abce5f03f752a68466315f75d85c9b
SHA17864f91fc65abf74c7f0c2fe8c228c8cd395e92e
SHA256050e09bdf2981770f0268df1b87d3c73706066c607599be90d5a7cc1058cbab3
SHA512755d393677fc6718396f9ec1a92d828c1e130eb2b95d51269d4f7bd4af3db687a219e364c08bfd9d2c65909efb4424666c24a9ac3614f9a943617aaa6ecd1222
-
Filesize
264KB
MD53badbc45b83085b6512640130a559bea
SHA1a0c3de4d53c30474f0adb63deaecb8fad17ca8a9
SHA256fafbe20e89bbcd0f24040241b4f15fb35b3ffa169e729e517fec9b683594f86b
SHA512c6cffb2ff15d42552655bcd4a11b06d2b1d7d8788c7e6335260b061fe41738d379c30eb2b2367c2f522cb4586ada09e0de8fc62b8b008d2b5cc51abe42e64d6e
-
Filesize
264KB
MD54019158e907bcab251b61f809c365a32
SHA18b17b2fa0a45b7628d8533bddb7dfb575582d040
SHA2560b57cbc65bf89df1b609edd004e1ca4625fa93716f5662f8b7166dce16159496
SHA512404d1b8b14ef7cc71a74738e2fec6cc14df0294586a8d2eaf65a015b78295061232fae10f28d3fd32e0474346608f56ad70f388e6dadc6b15a9f864482f2654f
-
Filesize
264KB
MD52986c0ba901d9fe4804a12dc00fdf24f
SHA1f9628cff2dc99cb2e71c1040fdff71f6df2f8d52
SHA256013724eb3651caec67c8291e63636c53ecd2ba7ebef46f15c15a6c0190eab995
SHA512d8ccfed6347f6452f2742da6c083f27978bf51c938624bfb754beb9640b3fb8e892f2d9a3e699a70b9cdc480b952f68175542a6ffb7ba5343aff6af7a5d76eb3
-
Filesize
264KB
MD5b85b90ab072c63404526940b33cdf955
SHA158236d1c25a4dad982695001dc378bcd99658261
SHA256628dbdcd5115d5ee618ae053a64533f459573a56c7366fe8d2645ed5e41831b9
SHA512b946e917dc4485b05f6b5510e6fe52df508aea63674f3a4bc938c6d2b782814bbe35b0f98a8cd29fe34b655c7e1e3c6062105bd04ebbbcf8b83ebab6f50fbbc7
-
Filesize
264KB
MD5d16296966f0d3eed1268072028c8df73
SHA1e4f79079648144bc0935cbdef59d10f8060f34e8
SHA256289a64305b0272746e517a508ce50ddbda6b4ce278ce5d622f7d925a40a19f09
SHA512eab07c777fdf7b832a042354a4dd51ff469f9e203ead3e84d7ea0be02c40936710c12a5e4204bd52f7fb891b8f6e8df171850d229cbe9d4334e70d46f2121125
-
Filesize
264KB
MD5f012c3f8e9d8ccdf5a958e1d3a38fa90
SHA1ddd7dbb4c5066d26cbdb1c1d75e35a6c8cf11f1b
SHA256743a56eb2dae4bdf55abb69c9d562d1a6422ca62ceca3984d0984ccbfb70d7c4
SHA512b695ba42b35e5699724e176e0984f2faf74530cb1e0d4aec1e1759d6b05ec488067bdcba4b4a02723327983ecfc364e93cdf767b8ea7a5e464de732b315eab51
-
Filesize
264KB
MD5dcfdf16069c9ccdb68a43ed6c79d238b
SHA16ed5721dc0112b844e07caa59a37f8ce763b6bc5
SHA256daaeebbb58d7729d7612a7f00b537a5cf1a49a0d6915d62804cd3f1f2db621e4
SHA512c182a78d14d6db59051832d44670851e9464bb994df89c15a9ea81b85e640be4abffb8f45c72d1129488332a82a946ab9ce4ee65271e679634e0666d95fd03da
-
Filesize
264KB
MD5c9c662afd04c22d01b2fb31495342fe1
SHA16f35e9691851a0722c640664c03c40483c451035
SHA256981ea009f883015c3e790699c5eeccc31f281fce8d735f435054e59145587ef3
SHA512b60cc57feb7c3c41cae5c85457a3feec8166bec92b8aa42e54cebb3293a42044352e5ddee42c01b3f9fbf50a5c9df01f232a203ec4fe862cfb14aca0a507f557
-
Filesize
264KB
MD50a5d79c176b147af581c32a6a0b7755c
SHA1dd3476d909f877dd10342780650ca160c45a999d
SHA256fe9f57c2462e18a10836eebb822a35d148a23acb92d09473f91e7bc30c328916
SHA512af9fdb9f3fe01844723059c5cbecdcfbb4aaa08b9c20d65e94c3c333f25b4503b092c9beddc7e9c98ec7058b956f079d49556a94a0bcd3a8f9c791ca9243a150
-
Filesize
264KB
MD58b26e39040396d9d551e16b9610aa4c9
SHA1d6b2140d6ef4b37fbfe4cff04f7c8186395b213b
SHA256ac3871ec7ebd111fdb2f978e32a70261a51a3f621dc9126c62db6534b9857c15
SHA51204e26bfa9db6dd3b8f1c4b1e006c0f9bc32e36f783cb2608e0df5526509342f294c5c41d210e49a548251606e05102b3c3cdac6d473f487ba5a7c31ad175c8e7
-
Filesize
264KB
MD544ffce013b073be6893295ca4b998d42
SHA19e366047568b4aa7e12a995fa3d4ef5e808af25c
SHA25630d52a7b2c31a8b23c8aaa4b59844d4a717afd5a811139392538a37ca1d2a9cb
SHA512792842d34a42547f4ce55881558c3396c0081dc5532c247dcb8cedbda91992408bd1b08646bdc23ece89c2fcc73d66a57ae21f33f6d13bcb8983f88cdd940746
-
Filesize
264KB
MD504e932606920c37c03c647f2c8c2034a
SHA1e4aa9bc6a314431cdbab217329142738c937fec5
SHA2564009d68adb4c66f22931b940c06b494f151842c74bcd7dd18af87c265f95db62
SHA51214d7656cc1d55a433e99e033e94f4028944edfd8a20ca0368a1015528d7ff43f5fb1229cab73b6d79d2650da3cb7ae9d46c0d857d62470af944a3fe7786e3d9a
-
Filesize
264KB
MD5ef369a40f48342778132f68fb7ea8ef6
SHA1eddfa76deb124bdcd1e2e64538e4658adee5c9bf
SHA256be95eb24a1e486c4765910c1718135e8eb21ed9dca22699ebbeb01c2a1701cd2
SHA512b0395da97637c339dafbbe4191c313eb1a254973b73bf85409a1748408c2ff77153e565069740f43ff2ca20e849fb9a314026fd3ce0f544fe2b46095be8daedb
-
Filesize
264KB
MD52fcc8cd1a62c599ea2393e3b3b6c3115
SHA14b11b221e93d1f068dfb8a1c70f41510d3ca3541
SHA256e2f976c535fae4b954ea56abb790cc83a5193a3bebffe7ea0559727adfdd54ea
SHA5120d0ecfcc8b76a1805872269c8eceaf28bcb0dbc6841afafb3d7f6ca57addfca5655b47e92c3d39dbebd0f28026d23b880d5fecf84ec88783a4dc11bd3a7c157c
-
Filesize
264KB
MD5326026c0fac231ead50f748913f8ba57
SHA171635ecc7c8df5b7a772818fb023e06e28ea18ab
SHA256239aab5b610094cc8872ff9abfcc5f03cae0c839daa9a36105e4b70a0fcdb69c
SHA512cecd78e688e8b8c8283edb609446cacf6902899cf3e584387c44a807c8ed9f2d7c22279459fb7f976383c884f0ddc26312e9629a860bdb33b86814ed5b67eb66
-
Filesize
264KB
MD538b827261062b7658fea97360cdb4c7a
SHA15aaa18b3fe84a1f361ee2cd4efa171e949bbfbcf
SHA256896e78b512f22d8221e3377c3c044ec7b43ff6884047dbc7a758bb77465e7757
SHA5127d56d51cc91e6b3426c761d364f889ae86fba2a977b5c0cfb33ffaba136a07dddb0d7e320e9a2650c6842e626654823b27b0b3187b2a54ebeff09e4823760415
-
Filesize
264KB
MD582f45d3fc9233b4ee20a587d56891828
SHA12d666a30c00f778fc6fb2ee82654e72aefae0b17
SHA25674416b5289cab2828fb721359485f40e6150f56d86b274f25f9a833dbf86fd13
SHA512c93265392b4f49887bf06481dcf59010e97a66863799fecb131cc4527b1c386ff9dab771dcf1906e23824379dd1224f5e06cc2517f75519d235dc20fe4be7d10
-
Filesize
264KB
MD5c4f0463407acc867c40c48699a496aaf
SHA15358c8752a90111cf7362c7797ef6c897307b821
SHA2566c483dc793bbc71a3aa9015bc3879a411964cf03b1fe8531f5a177bffe52f6f9
SHA51273c25584e7e0a548639fd99268cb32fd24207ec6a305c51e591b9d25ecdd73fa1e6b2a81790b1ab8643d41140516a652154cb3aaef734d4719c0bfb12bca5386
-
Filesize
264KB
MD57418eab5bc29248e6f6c29beca8cedcc
SHA1177d4c329c499c11ec09ea4b8958a5dc4d543df4
SHA2567a1b74fbdb722aedc87fa40a6d3390cb0f08adba364c3e197c4b06c44006a46b
SHA512950a945ba65fec40022b5776c52878213b99ee95666cf0c7a0652f346dbf394053019c35f699d567fe60116f62bce623162aebe5b2704864c532a7cb9f37403e
-
Filesize
264KB
MD5025ad883ab5fe838a76cd197ae85f07b
SHA169b8f06d24bd74bb13c97e5846db1779c445d12c
SHA25643db82e15a766923f8e8d05b9e9233affdabf7275bda1ad77047f5a53ea4a635
SHA512d15d3fe35ffc781495608c755c1960fb82ac97e160e11808710180f53c3d2a90e99b198024ddd39701b30d72af16e7690acd6d1074087f4f0e5a0f8ce59ece3e
-
Filesize
264KB
MD574eb85042ed7fdc76e0c28f784c02934
SHA16ed16730a705821cd4c59cd8faa607aa8956aa13
SHA256b3e67df2b7cc38a570d893105e2a6ce6b9640cada6619ea56ec561a217b7945f
SHA51237da710084334d9c90bcd6c677c6d31b1b56509f9c9b31582ade2bdab8071088a55d44c8da685cf52690d4131b97296185c8f3df9adfaace948e1986d61de244
-
Filesize
264KB
MD5d64bb86fa8f3302c063ffa3f4cdf80b4
SHA1d01a6bfc0709fe0dd782563020c44f50d9fc21f4
SHA2560dc3e981ee9f61c661c75a27ccb4c7f39b31ee8e7f2115300432f16e5f289e89
SHA512415803c03839064c8ee463ebb56cd880ba41334d8401fcf2412aaa558168dcc15ab7f2101aaa6c57ca3a5ef19424d0677250e86beaa86fe1871473ccda1afa58
-
Filesize
264KB
MD536ca6f0f69d2330e0d85e03434d56461
SHA1a4dcfa12688919203de637915e4321e11410824d
SHA256b26694faa938fe8f69c41ea5e834700ce43fbda5b84793bcfbe1323439c7be16
SHA512ee4ae089e2e857f0d753e7454fa4fd6faa0f76b246f73839398dce8ef2d99d468b283d680329de8a4e59d2bb609f8dad48ce4a046dcc066a4786cb11efababe9
-
Filesize
264KB
MD56abe2038aca2aa19b8fd9aca8374357d
SHA1c2f8229cfd269e29a2a457db891d1445907e528b
SHA256388db6945ec64f38ee0b28854b3bd29a5ae8b29c9fb19861660205df0232bcae
SHA512db82f5fa2da000232ec284d9d7be39d936d42b768d110437df7649d5f352501dcee0240ae91c4b24116fa197901f46fa4286b5471c40c1d36a38defcba6e46b8
-
Filesize
264KB
MD5d0253b9a27eff7d03426ce490cc7123f
SHA123fed3948d09f8a9213ce64471d9506eb92f58b2
SHA256ae7a7a7aa15e861369ff3c82e198956f5c80b0e8d8ddf3092bbbfaae56e7a1f6
SHA512a73ffc585be1f368e3e58c77a15a6aec42ff4427866a08b73d949b181c4166ee695ddd833917b89d2be6717a0c1a2b61789609ee5e48d8b02bf0fdff9411193e
-
Filesize
264KB
MD56286736283c023f46a04d8b8d7efbf2b
SHA1f8160153fb2c9ef30d2d93a916bb953e5df08631
SHA256e8b2760d9e4f03f55b78a9179615407c53e8870640aa7853b495c4fb219574c5
SHA5126fa5d56b4e5687db9da28c34219f989074280799986279794e412d54ab639973ac4a8776a5afd9dceee285768b084ee54deca891bf419b30a15fae18fed8237e
-
Filesize
264KB
MD5337be63b062c19dc5d6537124351b429
SHA19dc5c94e46986fb4bd2aab849bd77c87d0a2a4ba
SHA256e95e1b2ccf3b58b03318ba3cff5aa7e4c6d19da6badb214e8e64961241d0fc48
SHA5121d5268378c41a25fb057b5f1d8ef716b31cff2f3ef533f71622c9619160efbbab07e270ae005b94a59f419d9a4164db39b608987cf9676841c151f0cd7dd6586
-
Filesize
264KB
MD53df8405ad6deb41076e44a77c3a0c5f1
SHA1cd1c4d827986154e9c411c8467200b56d6286e09
SHA25633635d8907a13b5859c55bbc9892b839c52c4a0fb0cd02dc37b8bda4dfeb8f71
SHA5128e0def9ac64ce80ff5827f3da86dc1da5b966a7c752d4ef7ec03099f645261bf0df64e1986409db6888f74229100dc07e8517740337ac625c82d936dfbd8e0b4
-
Filesize
264KB
MD5f6faf089cdc014b60dc99dd82147dd93
SHA1045fb9d59de79d4d37baed021e87940039bba53d
SHA2560bf7b48489926976463cec2bc5abb6696abc05e054188fc835e496077a572d17
SHA5126bf11ee33490edf6176fefe2e7799819ae9a7a8c8a3be370468925d882dc2cf22cba695aad253a4cbffae1e5e6ec0cea230de54528815f03e10fa6a4248b8335
-
Filesize
264KB
MD59dbbec538a00fb52cd253bf694084e3e
SHA157e450cfc42edd12f3a6e499151821c5c9887d1a
SHA2567655e85b36994e171534c3d48795c4d7ef1f8b23073b957ea4ff9c4e17356fa8
SHA512f9eb2cdf16d633776730867de2870ff5359069b9b2fccf10c7a9c12d6c62f38479543ccd7e28077afbf4ae096fb4f161aba5d8ae0944d7c80f6858c70aa5aa17
-
Filesize
264KB
MD55bf3ea8e21b37701e93d0cd820b12bb6
SHA1e32b5199404638a2903463f4574237961428417e
SHA25665471937949f6527460497c9654b4a35693f70aa8f259be68ae9d7f662bc14e3
SHA512ee164850ead761eecde7f9e17c5dab0f057d50988a3c24958bfee966c7eea1c152e2241b32163b6763275a72756dc06e780b3e4defcac3f5be4f6ddc5fc69630
-
Filesize
264KB
MD54497d80b24c844f4745de6fe0de23792
SHA19aeb86d53b74c2ced8d97710e436e2c3c01416ce
SHA25696f36a46b6917619b1ea05e6fbb4e9b163ffcbf69bbae82551a27da10d873eda
SHA51283eaff37b0f4b026f207000ef9edb2b3699989f8a528dd370b510caa6214a49440ef53e16bf63668749654225fd841e4bf0e4a5e2aa063f10bc13589cbe795b6
-
Filesize
7KB
MD5dc640ca150fc80f186aec2a44707809e
SHA129cccf9872d7eb4bca12680a7691d5ee76701446
SHA2564786fbc15eb85fb82d5dab142e4207b5a9042d36950cfacf107fdc825d317c8e
SHA51214dd8fdd9a121919f201ece20bd12a25e23fff15b6c8a01722f8da630716bf057a2faa6adb29c08e3aaafda5a16769879d2a0356f10253ca8ce9330284503d73
-
Filesize
264KB
MD5a8ed41c9d90426fb635bfd7832c7aa56
SHA12e90cb11ed0752b44a74326377c3f7e948444e36
SHA25667818a185b47afaa515fbf9cb656749626f18e20f08b16f01e139f7bdd2efce3
SHA512adc0e1b3a48bff8b1b1a144a4d752c7099865244c5467d1f70fe1c6fea42d6d0e70c44907c3994abbd07d8da106b477805054b8ee846c36e6a906b921f71718a
-
Filesize
264KB
MD5345d1e78e13903109520631f2c811443
SHA1b537887ab80e26c42559e772e3a974e3ee85e157
SHA256cc10fdc99e96d4fb954103e9169b2986de0edca91231f7ff7f914ee950736767
SHA512dd39496513823bec53a55a05846c8e2bcd0e78d362e70191a335775027147ee1da39ae8db9ed28c6243c7dad4f1b6d075f2a3997bfb050ccbe176089c9d21854
-
Filesize
264KB
MD58233f55fdef6a83a798a70990bad5942
SHA114a96cd341e1d2bc886188b3297895a3668d0a88
SHA256c25995448e5d12621725cf4e65fcf650e3c0327335d77e2575541fae5d3ca9ec
SHA512a7d4697d65c9fb0c6942a16f137254dab0b541047f90429d8bdadbdf57b150dfef9924e5589c182d86613bece448d449f33c0dae4805a9431f8cac6f9452c488
-
Filesize
264KB
MD54395ce2897bd1d94a72e2a835a140d46
SHA198a967328ae95b8a6882115e235b604955f4ebc0
SHA25696bdf00278d09d4b43f8b17a161bc60064ed50608102776eda834ea8c38ced26
SHA512e2dd937a384d71ae444c1b359f3070f105f3c83cba5c20e513e59f3c5ef18b53380ca1777fb1a60b017db36fba4cea8f7d182cc1626f693fc7aee0c9bca4ed7b