Analysis
-
max time kernel
138s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe
Resource
win10v2004-20240508-en
General
-
Target
59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe
-
Size
896KB
-
MD5
0377c3a2deb37d4c6ea96ba36aa22800
-
SHA1
7cc338c4d72e188bf29f5a4e90bf6f1c8a551cff
-
SHA256
59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f
-
SHA512
feb1d240180a57cf253500e1fc58a1f8497d4554dc6bdd87ab81a47e649ef568f1f606a1e5af43a115e8a31d1b5660bfdf63b14b0265a20c28c1788d27637055
-
SSDEEP
24576:xTIBEBR6Ph2kkkkK4kXkkkkkkkkhLX3a20R0v50+5:DWbazR0vp
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Iapjlk32.exeIjaida32.exeIfopiajn.exeJdcpcf32.exeKckbqpnj.exeHfcpncdk.exeIfmcdblq.exeJidbflcj.exeKpccnefa.exeJbfpobpb.exeIpegmg32.exeJjpeepnb.exeKmlnbi32.exeHpgkkioa.exeKgdbkohf.exeKcifkp32.exeIabgaklg.exeKkihknfg.exeKmnjhioc.exeLaalifad.exeLdaeka32.exeIbmmhdhm.exeIjkljp32.exeJfffjqdf.exeLdohebqh.exeHimcoo32.exeJdhine32.exeJpjqhgol.exeKibnhjgj.exeLpocjdld.exeMcpebmkb.exeIpckgh32.exeHibljoco.exeIffmccbi.exeJplmmfmi.exeMcklgm32.exeHfofbd32.exeJmbklj32.exeKbapjafe.exeLcmofolg.exeLknjmkdo.exeIpldfi32.exeKbfiep32.exeLdmlpbbj.exeKilhgk32.exeHfachc32.exeHikfip32.exeJbocea32.exeJiikak32.exeIpqnahgf.exeJmnaakne.exeMnocof32.exeMglack32.exeHpihai32.exeLpfijcfl.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iapjlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijaida32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifopiajn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdcpcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kckbqpnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfcpncdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifmcdblq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jidbflcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpccnefa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbfpobpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipegmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjpeepnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmlnbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpgkkioa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgdbkohf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcifkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iabgaklg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkihknfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmnjhioc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laalifad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldaeka32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibmmhdhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijkljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjpeepnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfffjqdf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldohebqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Himcoo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdhine32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpccnefa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpjqhgol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kibnhjgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpocjdld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcpebmkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfffjqdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipckgh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hibljoco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iffmccbi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jplmmfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcklgm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfofbd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmbklj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcmofolg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lknjmkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipldfi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbfiep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldmlpbbj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laalifad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldaeka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfachc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kibnhjgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcpebmkb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hikfip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbocea32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jiikak32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipqnahgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmnaakne.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnocof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mglack32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfachc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpihai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipqnahgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpfijcfl.exe -
Executes dropped EXE 64 IoCs
Processes:
Hmdedo32.exeHikfip32.exeHpenfjad.exeHcqjfh32.exeHfofbd32.exeHimcoo32.exeHmioonpn.exeHpgkkioa.exeHccglh32.exeHfachc32.exeHjmoibog.exeHmklen32.exeHpihai32.exeHbhdmd32.exeHfcpncdk.exeHibljoco.exeHmmhjm32.exeIpldfi32.exeIcgqggce.exeIffmccbi.exeIjaida32.exeImpepm32.exeIakaql32.exeIcjmmg32.exeIbmmhdhm.exeIfhiib32.exeImbaemhc.exeIpqnahgf.exeIcljbg32.exeIbojncfj.exeIfjfnb32.exeIiibkn32.exeIapjlk32.exeIpckgh32.exeIdofhfmm.exeIfmcdblq.exeIjhodq32.exeIikopmkd.exeIabgaklg.exeIpegmg32.exeIbccic32.exeIfopiajn.exeIjkljp32.exeImihfl32.exeJaedgjjd.exeJdcpcf32.exeJbfpobpb.exeJjmhppqd.exeJmkdlkph.exeJpjqhgol.exeJdemhe32.exeJfdida32.exeJjpeepnb.exeJmnaakne.exeJplmmfmi.exeJdhine32.exeJfffjqdf.exeJidbflcj.exeJmpngk32.exeJpojcf32.exeJfhbppbc.exeJmbklj32.exeJpaghf32.exeJbocea32.exepid process 2520 Hmdedo32.exe 2384 Hikfip32.exe 4020 Hpenfjad.exe 4204 Hcqjfh32.exe 4456 Hfofbd32.exe 3240 Himcoo32.exe 3332 Hmioonpn.exe 1592 Hpgkkioa.exe 1172 Hccglh32.exe 1036 Hfachc32.exe 2004 Hjmoibog.exe 2792 Hmklen32.exe 4472 Hpihai32.exe 3992 Hbhdmd32.exe 4620 Hfcpncdk.exe 4576 Hibljoco.exe 4040 Hmmhjm32.exe 2032 Ipldfi32.exe 860 Icgqggce.exe 2664 Iffmccbi.exe 2160 Ijaida32.exe 452 Impepm32.exe 4404 Iakaql32.exe 2700 Icjmmg32.exe 3232 Ibmmhdhm.exe 1364 Ifhiib32.exe 2684 Imbaemhc.exe 1688 Ipqnahgf.exe 800 Icljbg32.exe 2116 Ibojncfj.exe 952 Ifjfnb32.exe 3208 Iiibkn32.exe 5112 Iapjlk32.exe 1244 Ipckgh32.exe 4944 Idofhfmm.exe 1856 Ifmcdblq.exe 4932 Ijhodq32.exe 2680 Iikopmkd.exe 4376 Iabgaklg.exe 3556 Ipegmg32.exe 5052 Ibccic32.exe 928 Ifopiajn.exe 3980 Ijkljp32.exe 3172 Imihfl32.exe 1240 Jaedgjjd.exe 1732 Jdcpcf32.exe 4868 Jbfpobpb.exe 4976 Jjmhppqd.exe 2132 Jmkdlkph.exe 1140 Jpjqhgol.exe 4760 Jdemhe32.exe 3984 Jfdida32.exe 4936 Jjpeepnb.exe 2016 Jmnaakne.exe 1060 Jplmmfmi.exe 1424 Jdhine32.exe 2236 Jfffjqdf.exe 1800 Jidbflcj.exe 3696 Jmpngk32.exe 3944 Jpojcf32.exe 3672 Jfhbppbc.exe 224 Jmbklj32.exe 3328 Jpaghf32.exe 3040 Jbocea32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kgfoan32.exeIpckgh32.exeHfofbd32.exeIffmccbi.exeLijdhiaa.exeLgikfn32.exeLdohebqh.exeMpaifalo.exeIfjfnb32.exeIjhodq32.exeJaedgjjd.exeLdmlpbbj.exeLdaeka32.exeMpmokb32.exeMcklgm32.exeMgidml32.exeHmioonpn.exeIfopiajn.exeJiikak32.exeKmlnbi32.exeIiibkn32.exeImihfl32.exeJbocea32.exeMnlfigcc.exeMjjmog32.exeIabgaklg.exeJfffjqdf.exeHmdedo32.exeHikfip32.exeIapjlk32.exeMnocof32.exeLaefdf32.exeKcifkp32.exeLmqgnhmp.exeJdemhe32.exeKgphpo32.exeKibnhjgj.exeHfcpncdk.exeIpldfi32.exeLiekmj32.exeImpepm32.exeIbojncfj.exeKgdbkohf.exeLmccchkn.exeMjeddggd.exeIcljbg32.exeJfdida32.exeIikopmkd.exeHibljoco.exeKkihknfg.exeLcgblncm.exeHccglh32.exeLnhmng32.exeJdhine32.exeHmmhjm32.exedescription ioc process File created C:\Windows\SysWOW64\Liekmj32.exe Kgfoan32.exe File created C:\Windows\SysWOW64\Idofhfmm.exe Ipckgh32.exe File opened for modification C:\Windows\SysWOW64\Himcoo32.exe Hfofbd32.exe File created C:\Windows\SysWOW64\Ijaida32.exe Iffmccbi.exe File created C:\Windows\SysWOW64\Laalifad.exe Lijdhiaa.exe File opened for modification C:\Windows\SysWOW64\Liggbi32.exe Lgikfn32.exe File created C:\Windows\SysWOW64\Hbocda32.dll Ldohebqh.exe File created C:\Windows\SysWOW64\Hhapkbgi.dll Mpaifalo.exe File opened for modification C:\Windows\SysWOW64\Iiibkn32.exe Ifjfnb32.exe File created C:\Windows\SysWOW64\Iikopmkd.exe Ijhodq32.exe File opened for modification C:\Windows\SysWOW64\Jdcpcf32.exe Jaedgjjd.exe File created C:\Windows\SysWOW64\Lgkhlnbn.exe Ldmlpbbj.exe File created C:\Windows\SysWOW64\Bbgkjl32.dll Ldaeka32.exe File created C:\Windows\SysWOW64\Mcklgm32.exe Mpmokb32.exe File created C:\Windows\SysWOW64\Mgghhlhq.exe Mcklgm32.exe File created C:\Windows\SysWOW64\Gpnkgo32.dll Mgidml32.exe File created C:\Windows\SysWOW64\Hpgkkioa.exe Hmioonpn.exe File created C:\Windows\SysWOW64\Hfkkgo32.dll Ifopiajn.exe File created C:\Windows\SysWOW64\Ichhhi32.dll Jiikak32.exe File opened for modification C:\Windows\SysWOW64\Kpjjod32.exe Kmlnbi32.exe File created C:\Windows\SysWOW64\Iapjlk32.exe Iiibkn32.exe File created C:\Windows\SysWOW64\Gbledndp.dll Imihfl32.exe File created C:\Windows\SysWOW64\Mfpoqooh.dll Jbocea32.exe File opened for modification C:\Windows\SysWOW64\Kaqcbi32.exe Jiikak32.exe File created C:\Windows\SysWOW64\Mpkbebbf.exe Mnlfigcc.exe File created C:\Windows\SysWOW64\Mpdelajl.exe Mjjmog32.exe File opened for modification C:\Windows\SysWOW64\Ipegmg32.exe Iabgaklg.exe File created C:\Windows\SysWOW64\Jidbflcj.exe Jfffjqdf.exe File created C:\Windows\SysWOW64\Klebid32.dll Hmdedo32.exe File opened for modification C:\Windows\SysWOW64\Hpenfjad.exe Hikfip32.exe File created C:\Windows\SysWOW64\Ipckgh32.exe Iapjlk32.exe File created C:\Windows\SysWOW64\Bkankc32.dll Mnocof32.exe File created C:\Windows\SysWOW64\Lddbqa32.exe Laefdf32.exe File created C:\Windows\SysWOW64\Fogjfmfe.dll Kcifkp32.exe File created C:\Windows\SysWOW64\Lpocjdld.exe Lmqgnhmp.exe File created C:\Windows\SysWOW64\Himcoo32.exe Hfofbd32.exe File created C:\Windows\SysWOW64\Jfdida32.exe Jdemhe32.exe File opened for modification C:\Windows\SysWOW64\Kinemkko.exe Kgphpo32.exe File created C:\Windows\SysWOW64\Oimhnoch.dll Kibnhjgj.exe File created C:\Windows\SysWOW64\Bgdnaigp.dll Hfcpncdk.exe File opened for modification C:\Windows\SysWOW64\Icgqggce.exe Ipldfi32.exe File created C:\Windows\SysWOW64\Ofdhdf32.dll Liekmj32.exe File created C:\Windows\SysWOW64\Iakaql32.exe Impepm32.exe File opened for modification C:\Windows\SysWOW64\Ifjfnb32.exe Ibojncfj.exe File opened for modification C:\Windows\SysWOW64\Kibnhjgj.exe Kgdbkohf.exe File created C:\Windows\SysWOW64\Ogndib32.dll Lmccchkn.exe File opened for modification C:\Windows\SysWOW64\Mnapdf32.exe Mjeddggd.exe File created C:\Windows\SysWOW64\Fojkiimn.dll Icljbg32.exe File opened for modification C:\Windows\SysWOW64\Jjpeepnb.exe Jfdida32.exe File created C:\Windows\SysWOW64\Ndclfb32.dll Ldmlpbbj.exe File created C:\Windows\SysWOW64\Hibljoco.exe Hfcpncdk.exe File opened for modification C:\Windows\SysWOW64\Iabgaklg.exe Iikopmkd.exe File created C:\Windows\SysWOW64\Hmmhjm32.exe Hibljoco.exe File created C:\Windows\SysWOW64\Qdhoohmo.dll Jfdida32.exe File created C:\Windows\SysWOW64\Kilhgk32.exe Kkihknfg.exe File created C:\Windows\SysWOW64\Jnngob32.dll Lcgblncm.exe File created C:\Windows\SysWOW64\Qchnlc32.dll Hccglh32.exe File opened for modification C:\Windows\SysWOW64\Iakaql32.exe Impepm32.exe File opened for modification C:\Windows\SysWOW64\Jfkoeppq.exe Jbocea32.exe File created C:\Windows\SysWOW64\Mbaohn32.dll Lnhmng32.exe File created C:\Windows\SysWOW64\Jfffjqdf.exe Jdhine32.exe File created C:\Windows\SysWOW64\Olmeac32.dll Jdhine32.exe File created C:\Windows\SysWOW64\Iabgaklg.exe Iikopmkd.exe File opened for modification C:\Windows\SysWOW64\Ipldfi32.exe Hmmhjm32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2248 5752 WerFault.exe Nkcmohbg.exe -
Modifies registry class 64 IoCs
Processes:
59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exeIpqnahgf.exeIcljbg32.exeIiibkn32.exeIapjlk32.exeIdofhfmm.exeLaalifad.exeMglack32.exeJbocea32.exeKkihknfg.exeKibnhjgj.exeLcgblncm.exeHpenfjad.exeIfhiib32.exeJjmhppqd.exeKmnjhioc.exeLgpagm32.exeMjjmog32.exeIpldfi32.exeIjhodq32.exeJaedgjjd.exeKckbqpnj.exeLilanioo.exeHfofbd32.exeJfkoeppq.exeKgbefoji.exeLpappc32.exeMgekbljc.exeMpmokb32.exeMgghhlhq.exeHbhdmd32.exeIfmcdblq.exeIfopiajn.exeKaqcbi32.exeLiggbi32.exeHpgkkioa.exeJfhbppbc.exeJpaghf32.exeKcifkp32.exeHmdedo32.exeHimcoo32.exeJjpeepnb.exeJfffjqdf.exeKbapjafe.exeKinemkko.exeKaemnhla.exeLmqgnhmp.exeLcmofolg.exeLgikfn32.exeIikopmkd.exeJdcpcf32.exeJbfpobpb.exeMjcgohig.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjpdme32.dll" 59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipqnahgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icljbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iiibkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iapjlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hiaohfpc.dll" Idofhfmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Laalifad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geegicjl.dll" Mglack32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbocea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkdeek32.dll" Kkihknfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kibnhjgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcgblncm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpenfjad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdcbljie.dll" Ifhiib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qnoaog32.dll" Jjmhppqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmnjhioc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgpagm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbbkdl32.dll" Mjjmog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipldfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lihoogdd.dll" Ijhodq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgiacnii.dll" Jaedgjjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dendnoah.dll" Ipqnahgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pipagf32.dll" Kckbqpnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lilanioo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hfofbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jflepa32.dll" Jfkoeppq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgbefoji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eqbmje32.dll" Lpappc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocbakl32.dll" Mgekbljc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpmokb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgghhlhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlmpolji.dll" Hbhdmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifmcdblq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifopiajn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jaedgjjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kaqcbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Liggbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjjmog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpgkkioa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpjljp32.dll" Jfhbppbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjmhppqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jpaghf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcifkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lpappc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epmjjbbj.dll" Mpmokb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmdedo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmkefnli.dll" Himcoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klebid32.dll" Hmdedo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjpeepnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfffjqdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kinemkko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kaemnhla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fogjfmfe.dll" Kcifkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jchbak32.dll" Lmqgnhmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcmofolg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgikfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpenfjad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iikopmkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdcpcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbfpobpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjcgohig.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exeHmdedo32.exeHikfip32.exeHpenfjad.exeHcqjfh32.exeHfofbd32.exeHimcoo32.exeHmioonpn.exeHpgkkioa.exeHccglh32.exeHfachc32.exeHjmoibog.exeHmklen32.exeHpihai32.exeHbhdmd32.exeHfcpncdk.exeHibljoco.exeHmmhjm32.exeIpldfi32.exeIcgqggce.exeIffmccbi.exeIjaida32.exedescription pid process target process PID 4416 wrote to memory of 2520 4416 59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe Hmdedo32.exe PID 4416 wrote to memory of 2520 4416 59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe Hmdedo32.exe PID 4416 wrote to memory of 2520 4416 59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe Hmdedo32.exe PID 2520 wrote to memory of 2384 2520 Hmdedo32.exe Hikfip32.exe PID 2520 wrote to memory of 2384 2520 Hmdedo32.exe Hikfip32.exe PID 2520 wrote to memory of 2384 2520 Hmdedo32.exe Hikfip32.exe PID 2384 wrote to memory of 4020 2384 Hikfip32.exe Hpenfjad.exe PID 2384 wrote to memory of 4020 2384 Hikfip32.exe Hpenfjad.exe PID 2384 wrote to memory of 4020 2384 Hikfip32.exe Hpenfjad.exe PID 4020 wrote to memory of 4204 4020 Hpenfjad.exe Hcqjfh32.exe PID 4020 wrote to memory of 4204 4020 Hpenfjad.exe Hcqjfh32.exe PID 4020 wrote to memory of 4204 4020 Hpenfjad.exe Hcqjfh32.exe PID 4204 wrote to memory of 4456 4204 Hcqjfh32.exe Hfofbd32.exe PID 4204 wrote to memory of 4456 4204 Hcqjfh32.exe Hfofbd32.exe PID 4204 wrote to memory of 4456 4204 Hcqjfh32.exe Hfofbd32.exe PID 4456 wrote to memory of 3240 4456 Hfofbd32.exe Himcoo32.exe PID 4456 wrote to memory of 3240 4456 Hfofbd32.exe Himcoo32.exe PID 4456 wrote to memory of 3240 4456 Hfofbd32.exe Himcoo32.exe PID 3240 wrote to memory of 3332 3240 Himcoo32.exe Hmioonpn.exe PID 3240 wrote to memory of 3332 3240 Himcoo32.exe Hmioonpn.exe PID 3240 wrote to memory of 3332 3240 Himcoo32.exe Hmioonpn.exe PID 3332 wrote to memory of 1592 3332 Hmioonpn.exe Hpgkkioa.exe PID 3332 wrote to memory of 1592 3332 Hmioonpn.exe Hpgkkioa.exe PID 3332 wrote to memory of 1592 3332 Hmioonpn.exe Hpgkkioa.exe PID 1592 wrote to memory of 1172 1592 Hpgkkioa.exe Hccglh32.exe PID 1592 wrote to memory of 1172 1592 Hpgkkioa.exe Hccglh32.exe PID 1592 wrote to memory of 1172 1592 Hpgkkioa.exe Hccglh32.exe PID 1172 wrote to memory of 1036 1172 Hccglh32.exe Hfachc32.exe PID 1172 wrote to memory of 1036 1172 Hccglh32.exe Hfachc32.exe PID 1172 wrote to memory of 1036 1172 Hccglh32.exe Hfachc32.exe PID 1036 wrote to memory of 2004 1036 Hfachc32.exe Hjmoibog.exe PID 1036 wrote to memory of 2004 1036 Hfachc32.exe Hjmoibog.exe PID 1036 wrote to memory of 2004 1036 Hfachc32.exe Hjmoibog.exe PID 2004 wrote to memory of 2792 2004 Hjmoibog.exe Hmklen32.exe PID 2004 wrote to memory of 2792 2004 Hjmoibog.exe Hmklen32.exe PID 2004 wrote to memory of 2792 2004 Hjmoibog.exe Hmklen32.exe PID 2792 wrote to memory of 4472 2792 Hmklen32.exe Hpihai32.exe PID 2792 wrote to memory of 4472 2792 Hmklen32.exe Hpihai32.exe PID 2792 wrote to memory of 4472 2792 Hmklen32.exe Hpihai32.exe PID 4472 wrote to memory of 3992 4472 Hpihai32.exe Hbhdmd32.exe PID 4472 wrote to memory of 3992 4472 Hpihai32.exe Hbhdmd32.exe PID 4472 wrote to memory of 3992 4472 Hpihai32.exe Hbhdmd32.exe PID 3992 wrote to memory of 4620 3992 Hbhdmd32.exe Hfcpncdk.exe PID 3992 wrote to memory of 4620 3992 Hbhdmd32.exe Hfcpncdk.exe PID 3992 wrote to memory of 4620 3992 Hbhdmd32.exe Hfcpncdk.exe PID 4620 wrote to memory of 4576 4620 Hfcpncdk.exe Hibljoco.exe PID 4620 wrote to memory of 4576 4620 Hfcpncdk.exe Hibljoco.exe PID 4620 wrote to memory of 4576 4620 Hfcpncdk.exe Hibljoco.exe PID 4576 wrote to memory of 4040 4576 Hibljoco.exe Hmmhjm32.exe PID 4576 wrote to memory of 4040 4576 Hibljoco.exe Hmmhjm32.exe PID 4576 wrote to memory of 4040 4576 Hibljoco.exe Hmmhjm32.exe PID 4040 wrote to memory of 2032 4040 Hmmhjm32.exe Ipldfi32.exe PID 4040 wrote to memory of 2032 4040 Hmmhjm32.exe Ipldfi32.exe PID 4040 wrote to memory of 2032 4040 Hmmhjm32.exe Ipldfi32.exe PID 2032 wrote to memory of 860 2032 Ipldfi32.exe Icgqggce.exe PID 2032 wrote to memory of 860 2032 Ipldfi32.exe Icgqggce.exe PID 2032 wrote to memory of 860 2032 Ipldfi32.exe Icgqggce.exe PID 860 wrote to memory of 2664 860 Icgqggce.exe Iffmccbi.exe PID 860 wrote to memory of 2664 860 Icgqggce.exe Iffmccbi.exe PID 860 wrote to memory of 2664 860 Icgqggce.exe Iffmccbi.exe PID 2664 wrote to memory of 2160 2664 Iffmccbi.exe Ijaida32.exe PID 2664 wrote to memory of 2160 2664 Iffmccbi.exe Ijaida32.exe PID 2664 wrote to memory of 2160 2664 Iffmccbi.exe Ijaida32.exe PID 2160 wrote to memory of 452 2160 Ijaida32.exe Impepm32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe"C:\Users\Admin\AppData\Local\Temp\59b4a97a36bda11fec1cc2eed376a5c6c5cb60490683464ccf3783d98a49ba3f.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\Hmdedo32.exeC:\Windows\system32\Hmdedo32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Hikfip32.exeC:\Windows\system32\Hikfip32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\Hpenfjad.exeC:\Windows\system32\Hpenfjad.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\Hcqjfh32.exeC:\Windows\system32\Hcqjfh32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\Hfofbd32.exeC:\Windows\system32\Hfofbd32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\Himcoo32.exeC:\Windows\system32\Himcoo32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\Hmioonpn.exeC:\Windows\system32\Hmioonpn.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\Hpgkkioa.exeC:\Windows\system32\Hpgkkioa.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\Hccglh32.exeC:\Windows\system32\Hccglh32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\Hfachc32.exeC:\Windows\system32\Hfachc32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\Hjmoibog.exeC:\Windows\system32\Hjmoibog.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\Hmklen32.exeC:\Windows\system32\Hmklen32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\Hpihai32.exeC:\Windows\system32\Hpihai32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\Hbhdmd32.exeC:\Windows\system32\Hbhdmd32.exe15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\Hfcpncdk.exeC:\Windows\system32\Hfcpncdk.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\Hibljoco.exeC:\Windows\system32\Hibljoco.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\Hmmhjm32.exeC:\Windows\system32\Hmmhjm32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\Ipldfi32.exeC:\Windows\system32\Ipldfi32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\Icgqggce.exeC:\Windows\system32\Icgqggce.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\Iffmccbi.exeC:\Windows\system32\Iffmccbi.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Ijaida32.exeC:\Windows\system32\Ijaida32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\Impepm32.exeC:\Windows\system32\Impepm32.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:452 -
C:\Windows\SysWOW64\Iakaql32.exeC:\Windows\system32\Iakaql32.exe24⤵
- Executes dropped EXE
PID:4404 -
C:\Windows\SysWOW64\Icjmmg32.exeC:\Windows\system32\Icjmmg32.exe25⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\Ibmmhdhm.exeC:\Windows\system32\Ibmmhdhm.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\Ifhiib32.exeC:\Windows\system32\Ifhiib32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1364 -
C:\Windows\SysWOW64\Imbaemhc.exeC:\Windows\system32\Imbaemhc.exe28⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\Ipqnahgf.exeC:\Windows\system32\Ipqnahgf.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Icljbg32.exeC:\Windows\system32\Icljbg32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:800 -
C:\Windows\SysWOW64\Ibojncfj.exeC:\Windows\system32\Ibojncfj.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\Ifjfnb32.exeC:\Windows\system32\Ifjfnb32.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:952 -
C:\Windows\SysWOW64\Iiibkn32.exeC:\Windows\system32\Iiibkn32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3208 -
C:\Windows\SysWOW64\Iapjlk32.exeC:\Windows\system32\Iapjlk32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5112 -
C:\Windows\SysWOW64\Ipckgh32.exeC:\Windows\system32\Ipckgh32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1244 -
C:\Windows\SysWOW64\Idofhfmm.exeC:\Windows\system32\Idofhfmm.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:4944 -
C:\Windows\SysWOW64\Ifmcdblq.exeC:\Windows\system32\Ifmcdblq.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1856 -
C:\Windows\SysWOW64\Ijhodq32.exeC:\Windows\system32\Ijhodq32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4932 -
C:\Windows\SysWOW64\Iikopmkd.exeC:\Windows\system32\Iikopmkd.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Iabgaklg.exeC:\Windows\system32\Iabgaklg.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4376 -
C:\Windows\SysWOW64\Ipegmg32.exeC:\Windows\system32\Ipegmg32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3556 -
C:\Windows\SysWOW64\Ibccic32.exeC:\Windows\system32\Ibccic32.exe42⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\Ifopiajn.exeC:\Windows\system32\Ifopiajn.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Ijkljp32.exeC:\Windows\system32\Ijkljp32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\Imihfl32.exeC:\Windows\system32\Imihfl32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3172 -
C:\Windows\SysWOW64\Jaedgjjd.exeC:\Windows\system32\Jaedgjjd.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1240 -
C:\Windows\SysWOW64\Jdcpcf32.exeC:\Windows\system32\Jdcpcf32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\Jbfpobpb.exeC:\Windows\system32\Jbfpobpb.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4868 -
C:\Windows\SysWOW64\Jjmhppqd.exeC:\Windows\system32\Jjmhppqd.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:4976 -
C:\Windows\SysWOW64\Jmkdlkph.exeC:\Windows\system32\Jmkdlkph.exe50⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\Jpjqhgol.exeC:\Windows\system32\Jpjqhgol.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\Jdemhe32.exeC:\Windows\system32\Jdemhe32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4760 -
C:\Windows\SysWOW64\Jfdida32.exeC:\Windows\system32\Jfdida32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3984 -
C:\Windows\SysWOW64\Jjpeepnb.exeC:\Windows\system32\Jjpeepnb.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4936 -
C:\Windows\SysWOW64\Jmnaakne.exeC:\Windows\system32\Jmnaakne.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\Jplmmfmi.exeC:\Windows\system32\Jplmmfmi.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\Jdhine32.exeC:\Windows\system32\Jdhine32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1424 -
C:\Windows\SysWOW64\Jfffjqdf.exeC:\Windows\system32\Jfffjqdf.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2236 -
C:\Windows\SysWOW64\Jidbflcj.exeC:\Windows\system32\Jidbflcj.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\Jmpngk32.exeC:\Windows\system32\Jmpngk32.exe60⤵
- Executes dropped EXE
PID:3696 -
C:\Windows\SysWOW64\Jpojcf32.exeC:\Windows\system32\Jpojcf32.exe61⤵
- Executes dropped EXE
PID:3944 -
C:\Windows\SysWOW64\Jbmfoa32.exeC:\Windows\system32\Jbmfoa32.exe62⤵PID:4336
-
C:\Windows\SysWOW64\Jfhbppbc.exeC:\Windows\system32\Jfhbppbc.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:3672 -
C:\Windows\SysWOW64\Jmbklj32.exeC:\Windows\system32\Jmbklj32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:224 -
C:\Windows\SysWOW64\Jpaghf32.exeC:\Windows\system32\Jpaghf32.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:3328 -
C:\Windows\SysWOW64\Jbocea32.exeC:\Windows\system32\Jbocea32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Jfkoeppq.exeC:\Windows\system32\Jfkoeppq.exe67⤵
- Modifies registry class
PID:4460 -
C:\Windows\SysWOW64\Jiikak32.exeC:\Windows\system32\Jiikak32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\Kaqcbi32.exeC:\Windows\system32\Kaqcbi32.exe69⤵
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Kpccnefa.exeC:\Windows\system32\Kpccnefa.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3808 -
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:468 -
C:\Windows\SysWOW64\Kkihknfg.exeC:\Windows\system32\Kkihknfg.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2504 -
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5152 -
C:\Windows\SysWOW64\Kacphh32.exeC:\Windows\system32\Kacphh32.exe74⤵PID:5188
-
C:\Windows\SysWOW64\Kdaldd32.exeC:\Windows\system32\Kdaldd32.exe75⤵PID:5224
-
C:\Windows\SysWOW64\Kgphpo32.exeC:\Windows\system32\Kgphpo32.exe76⤵
- Drops file in System32 directory
PID:5260 -
C:\Windows\SysWOW64\Kinemkko.exeC:\Windows\system32\Kinemkko.exe77⤵
- Modifies registry class
PID:5296 -
C:\Windows\SysWOW64\Kaemnhla.exeC:\Windows\system32\Kaemnhla.exe78⤵
- Modifies registry class
PID:5332 -
C:\Windows\SysWOW64\Kbfiep32.exeC:\Windows\system32\Kbfiep32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5368 -
C:\Windows\SysWOW64\Kgbefoji.exeC:\Windows\system32\Kgbefoji.exe80⤵
- Modifies registry class
PID:5404 -
C:\Windows\SysWOW64\Kipabjil.exeC:\Windows\system32\Kipabjil.exe81⤵PID:5444
-
C:\Windows\SysWOW64\Kmlnbi32.exeC:\Windows\system32\Kmlnbi32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5476 -
C:\Windows\SysWOW64\Kpjjod32.exeC:\Windows\system32\Kpjjod32.exe83⤵PID:5512
-
C:\Windows\SysWOW64\Kcifkp32.exeC:\Windows\system32\Kcifkp32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5548 -
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5584 -
C:\Windows\SysWOW64\Kibnhjgj.exeC:\Windows\system32\Kibnhjgj.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5620 -
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5656 -
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe88⤵PID:5692
-
C:\Windows\SysWOW64\Kckbqpnj.exeC:\Windows\system32\Kckbqpnj.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5728 -
C:\Windows\SysWOW64\Kgfoan32.exeC:\Windows\system32\Kgfoan32.exe90⤵
- Drops file in System32 directory
PID:5764 -
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe91⤵
- Drops file in System32 directory
PID:5800 -
C:\Windows\SysWOW64\Lmqgnhmp.exeC:\Windows\system32\Lmqgnhmp.exe92⤵
- Drops file in System32 directory
- Modifies registry class
PID:5836 -
C:\Windows\SysWOW64\Lpocjdld.exeC:\Windows\system32\Lpocjdld.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5876 -
C:\Windows\SysWOW64\Lcmofolg.exeC:\Windows\system32\Lcmofolg.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5908 -
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe95⤵
- Drops file in System32 directory
- Modifies registry class
PID:5944 -
C:\Windows\SysWOW64\Liggbi32.exeC:\Windows\system32\Liggbi32.exe96⤵
- Modifies registry class
PID:5980 -
C:\Windows\SysWOW64\Lmccchkn.exeC:\Windows\system32\Lmccchkn.exe97⤵
- Drops file in System32 directory
PID:6016 -
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe98⤵
- Modifies registry class
PID:6052 -
C:\Windows\SysWOW64\Ldmlpbbj.exeC:\Windows\system32\Ldmlpbbj.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6088 -
C:\Windows\SysWOW64\Lgkhlnbn.exeC:\Windows\system32\Lgkhlnbn.exe100⤵PID:6124
-
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe101⤵
- Drops file in System32 directory
PID:3544 -
C:\Windows\SysWOW64\Laalifad.exeC:\Windows\system32\Laalifad.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\Ldohebqh.exeC:\Windows\system32\Ldohebqh.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\Lgneampk.exeC:\Windows\system32\Lgneampk.exe104⤵PID:4964
-
C:\Windows\SysWOW64\Lilanioo.exeC:\Windows\system32\Lilanioo.exe105⤵
- Modifies registry class
PID:2788 -
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe106⤵
- Drops file in System32 directory
PID:4688 -
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2872 -
C:\Windows\SysWOW64\Ldaeka32.exeC:\Windows\system32\Ldaeka32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\Lgpagm32.exeC:\Windows\system32\Lgpagm32.exe109⤵
- Modifies registry class
PID:5144 -
C:\Windows\SysWOW64\Ljnnch32.exeC:\Windows\system32\Ljnnch32.exe110⤵PID:5212
-
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe111⤵
- Drops file in System32 directory
PID:3552 -
C:\Windows\SysWOW64\Lddbqa32.exeC:\Windows\system32\Lddbqa32.exe112⤵PID:5324
-
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe113⤵
- Drops file in System32 directory
- Modifies registry class
PID:5380 -
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5432 -
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe115⤵
- Drops file in System32 directory
PID:5504 -
C:\Windows\SysWOW64\Mpkbebbf.exeC:\Windows\system32\Mpkbebbf.exe116⤵PID:5572
-
C:\Windows\SysWOW64\Mgekbljc.exeC:\Windows\system32\Mgekbljc.exe117⤵
- Modifies registry class
PID:5640 -
C:\Windows\SysWOW64\Mjcgohig.exeC:\Windows\system32\Mjcgohig.exe118⤵
- Modifies registry class
PID:5704 -
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5760 -
C:\Windows\SysWOW64\Mpmokb32.exeC:\Windows\system32\Mpmokb32.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:5828 -
C:\Windows\SysWOW64\Mcklgm32.exeC:\Windows\system32\Mcklgm32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5892 -
C:\Windows\SysWOW64\Mgghhlhq.exeC:\Windows\system32\Mgghhlhq.exe122⤵
- Modifies registry class
PID:5956 -
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe123⤵
- Drops file in System32 directory
PID:6008 -
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe124⤵PID:4956
-
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe125⤵PID:6116
-
C:\Windows\SysWOW64\Mcnhmm32.exeC:\Windows\system32\Mcnhmm32.exe126⤵PID:2688
-
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe127⤵
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe128⤵PID:4024
-
C:\Windows\SysWOW64\Mncmjfmk.exeC:\Windows\system32\Mncmjfmk.exe129⤵PID:624
-
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe130⤵
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\Mcpebmkb.exeC:\Windows\system32\Mcpebmkb.exe131⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2272 -
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe132⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5292 -
C:\Windows\SysWOW64\Mjjmog32.exeC:\Windows\system32\Mjjmog32.exe133⤵
- Drops file in System32 directory
- Modifies registry class
PID:5396 -
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe134⤵PID:5812
-
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe135⤵PID:5180
-
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe136⤵PID:5752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5752 -s 400137⤵
- Program crash
PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5752 -ip 57521⤵PID:5928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5704
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD5caf33f758518e095ada731cdaa7340c3
SHA11cfaaee23519d1c1613dace3666e8b15a1a36663
SHA2565439fcf34affbcc804f78040c28e35e51e1c27fb1f1f1633d6ca88b7811bc5fa
SHA51263b3a53a458b15bb968f876e12bb0f496b2790f89228eaaf5861dd47e4f2b0645b58c8ab7bbc29516a348ae2332a1acd6e86a15367aea6c92f465657608fc4d8
-
Filesize
896KB
MD506217c81353167cbd4d032cff084a807
SHA15c2144f8dfb8a52d2ff0546d1f80bd2eb9b2711c
SHA256913eab32ec02da0f35c33eaebb93e0ac0466173b443256d997f6885beb2f3e39
SHA512c11a9d4504e13ea248fa58028a645b2b2d20945cbf28c1bfd2be894abbbf26e8df650075b2e3c6c5fd2f6e874f98738b6e43f2d52fcf33170c5c52b757c1b3d4
-
Filesize
896KB
MD541fe4319741c5f7b2108d9fad5cffcd4
SHA127d86f7da30502ed29c7cccf34cbb8762b060c95
SHA256ad7997f794def4398936218e9c1a8fa35b25a0c74ec327ddde6110886f248c1b
SHA51269615337534ae8cb211d3ab62fc7f523dd410e9287d307740e005a760ad4d97df3bfedd3233e74d3a95ff5d3cffce719171deda720bd54567c364d3dcd91cdf1
-
Filesize
896KB
MD576e8dcf447d4636c8749a57e092929a4
SHA15bf0e9ab1a91cbe8a94ec2dc060861b554d12915
SHA25690aa9f4d5b2e295950372a0e77716bbaaa21ed7159ff38062cb93620176f55dc
SHA512f316654531d5f67b64006b8e9cd89f606983b02953dec5ba1d67cea320ac50a38f390339cadf5b528bee588769db2fb0d490c8bf02d0bed80b95994a5d147b32
-
Filesize
896KB
MD5c7cf1703d44515cb9f9462f7abfd0f85
SHA10fd966dd1bf11fc6b5752d27d8e78ccbe4fbfdd0
SHA256e843b5e73218f733e0676f7168dfc80672e2634073d0fa456197a6b9e4ec1485
SHA5125de2a55801c03d636b7fb763182aa5528b0699835af944c2a3c26683f97b53e7791832e1e99a65e57da59ddbd271491d6ec11c3bdfa5e27fde5a55533944c738
-
Filesize
896KB
MD5a53c09dccfff37815cd8286f0fd966b4
SHA1a32a115bffce6fca3190ac9a16e38e74c0b7cb2c
SHA256d87de80b1d40174bf4488f387100d764cd6f96d250d25ecf41b4239313dc1ece
SHA51239a796dbb2c8c5e49b0f605f7652509729bb71e408f4b838d773efef9e407ac2f228e996f8047378a97d2e332c57f5f8fa6391c4a5929012bb84b8f6d59b2658
-
Filesize
896KB
MD53fc9ed6fa3ca810691a911dcfb19c5bd
SHA16cf93a4996e504e7375f74443ed56ed70f3d3561
SHA256f96fc981048e53d3aecdcb6c060476870330cf1282c5f880cc6966abf284b04c
SHA512bf1f8f07683c04e87dac1a47cbcb872efc669e17e26d3fb6ed1bd12dc5683cc4a23493b865f93c7be7d7eb4efbbb35fd2082a506348560a394ed57383a33e6fa
-
Filesize
896KB
MD583a5c7ca8de0db6b10446ccb0eaacf44
SHA1da9b41548f86a052532a5db3b1380109666558e8
SHA2567845ccbefe71ad8208ca82a7b262dd6793da5db9fc7cf8bcc340dbdb1780f4b1
SHA512504e16d830515a861ff47db78fa1640faa82087f36577c49b8ce332a1a7213a485a80dbd0afae45e1053255de7f07bf76e482955c6c0cd535d56d21ccb06bf61
-
Filesize
896KB
MD506908a2f7afabf6a51ed03de46bf393b
SHA17954807c6c8701b6f0371ed9b2b85c71c99b65bf
SHA256be9b417fd13dc11a41c03ee47a03f2d04cf98efc288594841c784c16a0622030
SHA51210587aa13e1b14db4fa3c173b3d422b7771a08f67b967c07d9e07361bc73f26a9434d6b175916353701e134ad23f087dc336a1080acb361bb261acf34a9f4c8e
-
Filesize
896KB
MD558b056771acb1399812a323793cb24ea
SHA1a63a1af6e795bda74f578423390671546363a4fb
SHA2563033b085044d1eea1a37eb461bc2d6b149bdff266585a2faeea025c67059b669
SHA5123f71a59e29bb458a439e13acee2a22522b4e921445654d9767683fea0b4b5264caf6d3882b3bccef8848fb005299514ab029e58819abc782329d2e1decca45d6
-
Filesize
896KB
MD50c56a8e2314e43b5a1f4fef124f6d212
SHA1baf4cefd3527de57389a0ea963c3da47d9aa2cbe
SHA2564f5db2a240c9fdbc8532a15a8f01808b493611d506bde5e36f0eb1d8c1f0cc25
SHA512d3a5e5bf4585e370eaf8fea8364fe09073179dc86475cbe2fd17e16dae49214465673813399be52438b416ef49c1613adbde69334bc0ab6fabef5f18b9c4b44e
-
Filesize
896KB
MD51602ffb0df43fa4a6a206bc04486e5ec
SHA1f259f0f4d06ac82d952e0c71f312c3439d8b1d1c
SHA25697280048ce9d84e3302eb5fa6bc2f282f2cad54c74aa2d25965c88dc94101591
SHA512f08a673249d566e742cb94710e35ceaed284aa5e77bcc04ffecbb3cd89716e9eca261968004f313c532a828e8c620f649ccd78a46ae9f037368d0203356e8aae
-
Filesize
896KB
MD506cab606b3b1c327d6dd2c6916076f61
SHA18b141412d8cb7b42f14871bd95b1dbac733aed27
SHA256620d0185b0b5e4c5d0e95cab6d6fc9acbb9d1974606f2022e17d4bf60e3e5a9f
SHA5123983718c0cbe0629baf14bc7c193bc6be05e27535f1b5b2a3f441c6afec35d06fe8a0ad0f098014ff3dfff71d2421e799a660bd569364a7b63ec261487a5f776
-
Filesize
896KB
MD5de59cce85290a6bfaa166b2eaa074d65
SHA1bcd5d572b1706a9329ae6a61ff84c3fbf594257d
SHA256ab224439c29ac24ad7dd838b656b31bfc705b2c7c2ab0aa56452f60e96185542
SHA512604455fa2265e4b65822fcd7d284d5ce0532e17997c55d6049e917e94457df3bff02d08ba736b55fed5d04003f2fbf5b4f98dce668027f91b224758480d25dc1
-
Filesize
896KB
MD5fafb8aad865154972e829b4a0f40a7e1
SHA12589506774d8a7ae8f3df329e82e37bbcdd86d97
SHA2560881efa76fc6d378f2525fbac61536c459aea522e4a268fc39ed50a9b13fc12e
SHA5128bc7cd77098381f45a123a584efd522e30b05a209a99b09db593226999b2ae95a883ac4a0fdee515be916c6adb1c46396430857211a494fe2c1233db3b97259d
-
Filesize
896KB
MD5fc151a8053e50e61d9b537b2029e031a
SHA187fef4f3d412d0417082b7a5aa699577406128b8
SHA256f76d2f7fd9bfa8cdc1908f9828df0245f92179bce6b89afdad3352f7b31d870f
SHA5125373ff691db80a55d8cb17218b85a3cbe9fbbe0e5f5ac7d7b1ab62f096aca248974921445590755dfd0db698fe1579266882335d75a4675ee7ce2e4f9fda0e7c
-
Filesize
896KB
MD5fe5a8b997dbf574149066bfea28f4dfd
SHA1df7d101c29349065ab6a7403a1956976322c9fcb
SHA25648a7b1bd2919b873ae43ad712678d323169767415ad057ac82111169a7a83199
SHA512e43ceea88499d651fe5ae466a57aca4adf46f2c9d849119d153ae3dd12a5da30a19cb587e6805d8f423aac24de7bb3e43d0e151c29afb67a5a216f009a82b24a
-
Filesize
896KB
MD5b3dd3e1ecf22318d820fa557ed8a0aa3
SHA19d8e45144c7cc7c2e30c0cecb7ad1d89780d1575
SHA2568ab39e89224fac63fcff5a1e838efd2474680577835373e0a09d70f74ea3689f
SHA512f2872961775bb0805f44e2b68a21ac17fa6b423210676c2faa1e02fa010d62821c69b5cd526709e8240e5ef16df2fca0de54b771bc5ff0f296704e03ec2d39f5
-
Filesize
896KB
MD54f74718acc6bfe32998f2ba670f52853
SHA1d5e3aa86c8482015de2ff6c57c9a4504d76fa9a5
SHA2569ca9faedde1497a6fef987693f66fc5c3788853300151aa7f3ab3b4956b5de02
SHA51246ff5451bc787f24c6a696bfb79d395f3140c755374c2300d1095a2bbea3679d21c1c18660d5e61c02407f6bb6fd8b248b083686fab7a6c2950d8ed6cf252da6
-
Filesize
896KB
MD5524d1fd7ffcd63978a577261b5ec0aae
SHA1d36d4bce89509f55cca644f9284c66fd8ee9fdc4
SHA25676fd3c238465280d2004d01a7da21e1be8f3143b332712241d9dc6cbcf488d5c
SHA51220c57eddde302265da799ddd68cc35e90be6b4186a6affe4db43d437ea2ec97a9bfc8972d0956927bd36e64dd3cb414478bfa4987d558dea6417502b0101fd64
-
Filesize
896KB
MD5207dcf56b04e05340d4594f3829974cd
SHA10c02241c3f35c805de93819b6ee8ae2014c78a8a
SHA256acfd130f7882a03818da7fbad00a261a31cbeb8330d5dd5bf3e12d74974bd9eb
SHA51215b7c5fe73658f9b58fe52fc964dd8e2bc5f2f506cf12b0f7dc2ba6598c10b60465f1f2635b6f26531463ffd64fe2270f594711ec2387f92846f1ebc48ed4369
-
Filesize
896KB
MD544fb668b0b2c1905d9c84f381d8a2884
SHA1775759816db1c7f90220b21713f833c748694f5b
SHA25662d35f29e3cfd1bda2932514eaca99ee651d3fa9764dc598eba85316a8fdd6d9
SHA5128fa72cf0dac39a038c89ea7ae9ea9a5d1740e8601c42445e9ebde46f35dff588e3b590ad2ecd01e44ac47d922ea1b6b0926d0d8f67966e9cfc291cc39342cc85
-
Filesize
896KB
MD5094075656df8c239589bfb4de45aa5e6
SHA170454722fd86921828e7b898cfbe787910cea8d0
SHA256e1323264f959e88f3e4efde0af1e71816bc56143989dc37c2149dd3217b5220c
SHA512e9fe144dc08ff7c77140e75fd992282145ecb6e7f011fbd022eb95fa5306b0f98d6a665caa99b2e0a2b4e0987a6a373046030bbfbd6205968716ab46c8897f1c
-
Filesize
896KB
MD5f658c78d958774a5aef88036cef574a5
SHA1ccdf50daa13d518e6f910596d2eba7e5e9716308
SHA256ae98c777eb474b05e04096879b92ab0852de8c2bd10101e4374a5379f52761a3
SHA51263f83f11f9dd18593f0c40d0da8694c6b65363181a550dd95d373fe0c25c89a707c25e12bcf271845aff266ab754faa518f1462022365e08b556c3379d298a6e
-
Filesize
896KB
MD5ccf7aeb2e408b14b3d1b35860ff8261f
SHA1a39f3c9b0b604ee5793c73992b24e76ee0eef1ec
SHA25646e1f2c95ae4a4880442b0133ae46a42fd54ec85dba88e46fc72fcc1231225b5
SHA5126bdc3b5934471879bd238f0ff3c496f5f9be915d0d4231db32fc54d2647beb9c64a7aaf0be75bad5f7b4515ea47d31287569a5a05c8ff74a9c5cb6be40d6f338
-
Filesize
896KB
MD5e04da137b1760f17eb539905a284f9a4
SHA1f4009e582d34535cca9182aa35006ee7716ab618
SHA2565838a75cc3366a7800db9b5384306f11104e9ad55b65c8dac459f51f7d1ac11a
SHA512b4e7a52e70badf2f93d1e85b9bba97694f7e1c2c7f319ff34dd37b78bd897b9e0ab0bb0ef195bd56ab1c5067cf00e6857838477911223b7b585fa253d813746e
-
Filesize
896KB
MD561bc15a50c7770a2402c5aee47a1a824
SHA1a99938d46764052aa0e824b98f0b9131f24be912
SHA256e3137e61c1dcc14e2bcd99587d1f98ebb6743fd148cfe5d8e5ace5d28305721b
SHA5126c2d864faf6bad9bddd5f82ab1d491f4f4203b90ed111d3a22418f0eb24e2cdf89c30712f2bf0d83b2b2b7bf646d5684daa072dd8a95e19cce2f89c4a14c6922
-
Filesize
896KB
MD5d12a1a3d0b953619c3d4d83c7c135596
SHA1268f188de579bc3bc40713794968226925f1f1c6
SHA2567ef71c05820eae73150eacd82462a8b4cab25051e240426284d19716c3455686
SHA5122d130d9e6894ec8420e78f1eb3638f3259c31c9bcf075d9488f8f558d0ad563351837de61bfed660d788eb389dde7909f4a16724cd5eb8415fa2c46208c3ba26
-
Filesize
896KB
MD5194421b550fe28636dfede217f47d8ba
SHA1eecf338cbf164f69d0de908a1c1b2fdc7c4b49f2
SHA25685821f05553340e3f149cfc1d2a2e9e255b11dde5e8d841e237404eb8d304aa6
SHA512d8c54fbd8693d8afe7e956f1d484880498261c4dc2dbbc50ad9b5ba57d1bd65d57bb1089b656a1dc2aef2ec25979003b97e68193d70f0a3b7aa30078c5cebf54
-
Filesize
896KB
MD5dd0358ffa58a798602f02c3f9001609a
SHA11e71022f3913e59debfd1a859e31521b88bde66e
SHA2565ff1e4365fa7c3b7abb3244d7903f73cbfb5163e7d5171a7c41aa9c40263c1f9
SHA5129e6b88d1447403c3c2448a60abb726e2240af1798e8034a7ad4d87b6ed3cba1efa83e3a0dcdda67a1a852d7f63247050ea90a8b311425251ef3b174b95ccd14e
-
Filesize
896KB
MD50bbd93defa5e3e5655fec78d1a316f70
SHA19b45c673d986d931e30de3f74607194f38651490
SHA256bee063525a453169372fbccc2919da9ab6e7ca5ca57af692902030499201e0ee
SHA5127234179df6fd29a56fc1264a1e32a5891306d05b0beaee114245faaf7dc06cc0c2cdf9f68ff412be77d206d192c95713341bbe203ed07228dc6a0e28caa9d9bc
-
Filesize
896KB
MD5b1f2635184bf8fdb57eac1530298e243
SHA1dafe11a9b66bae2938245d2e7e2c6517ecde24ab
SHA256aa0aa17db3a464026eb4c6b14e7b4495f8d3552201d6630f925e20c89831f00b
SHA51271be810530f5b0041d2da587df6a9f7af6d99bc72ca9285784baebc73d3a9f9bef7105f9219bc2d95fb93de92e87fa9316a23872cbcb15491582e2b9f31d1381