Analysis
-
max time kernel
141s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8.exe
Resource
win10v2004-20240508-en
General
-
Target
975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8.exe
-
Size
80KB
-
MD5
956326d013acbd2ceed5ac98c5079209
-
SHA1
aa5531cb181588996baa2450fea7e8fee4c17643
-
SHA256
975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8
-
SHA512
a191ee4b888f5b118df558b99261688cd1d8e6f51164a2e7ad3435454efd2f8fa038e404b1d27aa1b822f8f0a5593e86d56bbb942a62c4584b049f64cabb7c25
-
SSDEEP
1536:D6pGhyCIxkSi9GSeS22RoTy/pNzm2LtOwfi+TjRC/6y:DGGhyCIxViQS7RoTy/pN3Ewf1TjYD
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kdaldd32.exeNqklmpdd.exeIapjlk32.exeKipabjil.exeKagichjo.exeLpfijcfl.exeNddkgonp.exeIpqnahgf.exeKpjjod32.exeLmccchkn.exeMgghhlhq.exeIikopmkd.exeMdpalp32.exeKkkdan32.exeJbhmdbnp.exeKbapjafe.exeLgikfn32.exeIfjfnb32.exeKpmfddnf.exeNkncdifl.exeImihfl32.exeLmqgnhmp.exeLcdegnep.exeMnapdf32.exeNdidbn32.exeKilhgk32.exeMgnnhk32.exeIiffen32.exeNcihikcg.exeNqmhbpba.exeMdfofakp.exeLpappc32.exeLnepih32.exeMpaifalo.exeJfaloa32.exeMnocof32.exeMdiklqhm.exeNbhkac32.exeNggqoj32.exeIfopiajn.exeKaemnhla.exeMglack32.exeKgmlkp32.exeNjcpee32.exeJidbflcj.exeNacbfdao.exeKmjqmi32.exeMkpgck32.exeJaedgjjd.exeLpocjdld.exeNcgkcl32.exeIbccic32.exeKmnjhioc.exeLcpllo32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdaldd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqklmpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iapjlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kipabjil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kagichjo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpfijcfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipqnahgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpjjod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmccchkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgghhlhq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iikopmkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdpalp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nddkgonp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkkdan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbhmdbnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgikfn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifjfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpmfddnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkncdifl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imihfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmqgnhmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpfijcfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcdegnep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnapdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndidbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kilhgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdaldd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkkdan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgnnhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiffen32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqklmpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdfofakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpappc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnepih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpaifalo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfaloa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnocof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdiklqhm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgghhlhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbhmdbnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbhkac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nggqoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifopiajn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaemnhla.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgnnhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgmlkp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jidbflcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nacbfdao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmjqmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkpgck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jaedgjjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kagichjo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpocjdld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncgkcl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibccic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmnjhioc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcpllo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcpllo32.exe -
Executes dropped EXE 64 IoCs
Processes:
Iiffen32.exeIpqnahgf.exeIfjfnb32.exeIjfboafl.exeIapjlk32.exeIfmcdblq.exeIikopmkd.exeIabgaklg.exeIbccic32.exeIfopiajn.exeImihfl32.exeJaedgjjd.exeJdcpcf32.exeJfaloa32.exeJiphkm32.exeJpjqhgol.exeJbhmdbnp.exeJfdida32.exeJmnaakne.exeJplmmfmi.exeJdhine32.exeJidbflcj.exeJaljgidl.exeJbmfoa32.exeJigollag.exeJangmibi.exeJdmcidam.exeJkfkfohj.exeKmegbjgn.exeKpccnefa.exeKbapjafe.exeKgmlkp32.exeKilhgk32.exeKdaldd32.exeKbdmpqcb.exeKkkdan32.exeKmjqmi32.exeKaemnhla.exeKbfiep32.exeKknafn32.exeKipabjil.exeKagichjo.exeKpjjod32.exeKgdbkohf.exeKkpnlm32.exeKmnjhioc.exeKpmfddnf.exeKckbqpnj.exeKkbkamnl.exeLmqgnhmp.exeLpocjdld.exeLdkojb32.exeLgikfn32.exeLkdggmlj.exeLmccchkn.exeLpappc32.exeLcpllo32.exeLgkhlnbn.exeLnepih32.exeLkiqbl32.exeLnhmng32.exeLpfijcfl.exeLcdegnep.exeLnjjdgee.exepid process 3784 Iiffen32.exe 692 Ipqnahgf.exe 3052 Ifjfnb32.exe 3452 Ijfboafl.exe 1636 Iapjlk32.exe 1900 Ifmcdblq.exe 3056 Iikopmkd.exe 748 Iabgaklg.exe 4792 Ibccic32.exe 2540 Ifopiajn.exe 2856 Imihfl32.exe 4760 Jaedgjjd.exe 4024 Jdcpcf32.exe 3312 Jfaloa32.exe 1260 Jiphkm32.exe 3524 Jpjqhgol.exe 5104 Jbhmdbnp.exe 4692 Jfdida32.exe 4440 Jmnaakne.exe 1664 Jplmmfmi.exe 4632 Jdhine32.exe 4100 Jidbflcj.exe 920 Jaljgidl.exe 3612 Jbmfoa32.exe 2900 Jigollag.exe 1068 Jangmibi.exe 1992 Jdmcidam.exe 1040 Jkfkfohj.exe 2612 Kmegbjgn.exe 2928 Kpccnefa.exe 4360 Kbapjafe.exe 1552 Kgmlkp32.exe 928 Kilhgk32.exe 2356 Kdaldd32.exe 3424 Kbdmpqcb.exe 1432 Kkkdan32.exe 3932 Kmjqmi32.exe 3808 Kaemnhla.exe 2084 Kbfiep32.exe 4480 Kknafn32.exe 2760 Kipabjil.exe 1912 Kagichjo.exe 3584 Kpjjod32.exe 4992 Kgdbkohf.exe 2932 Kkpnlm32.exe 1036 Kmnjhioc.exe 4628 Kpmfddnf.exe 4904 Kckbqpnj.exe 3116 Kkbkamnl.exe 2148 Lmqgnhmp.exe 544 Lpocjdld.exe 3500 Ldkojb32.exe 4788 Lgikfn32.exe 4292 Lkdggmlj.exe 2552 Lmccchkn.exe 1280 Lpappc32.exe 4484 Lcpllo32.exe 2344 Lgkhlnbn.exe 4444 Lnepih32.exe 8 Lkiqbl32.exe 700 Lnhmng32.exe 1404 Lpfijcfl.exe 404 Lcdegnep.exe 4860 Lnjjdgee.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ipqnahgf.exeKaemnhla.exeKpjjod32.exeKgdbkohf.exeLphfpbdi.exeLgbnmm32.exeNcihikcg.exeKkbkamnl.exeNddkgonp.exeNbhkac32.exeNbkhfc32.exeJpjqhgol.exeJangmibi.exeJdmcidam.exeKipabjil.exeLgkhlnbn.exeLpfijcfl.exeNafokcol.exeKdaldd32.exeKkpnlm32.exeMnocof32.exeIfmcdblq.exeJiphkm32.exeNcgkcl32.exeNdidbn32.exeJplmmfmi.exeKkkdan32.exeKmnjhioc.exeMahbje32.exeIfjfnb32.exeIabgaklg.exeKckbqpnj.exeLnepih32.exeLnhmng32.exeJdhine32.exeKilhgk32.exeMncmjfmk.exeKbapjafe.exeMglack32.exeNdbnboqb.exeJdcpcf32.exeJidbflcj.exeJkfkfohj.exeKbdmpqcb.exeKmjqmi32.exeLmqgnhmp.exeJaedgjjd.exeIapjlk32.exeKgmlkp32.exeKbfiep32.exeMaaepd32.exeNjogjfoj.exeKknafn32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ifjfnb32.exe Ipqnahgf.exe File created C:\Windows\SysWOW64\Kbfiep32.exe Kaemnhla.exe File created C:\Windows\SysWOW64\Fogjfmfe.dll Kpjjod32.exe File opened for modification C:\Windows\SysWOW64\Kkpnlm32.exe Kgdbkohf.exe File created C:\Windows\SysWOW64\Lgbnmm32.exe Lphfpbdi.exe File created C:\Windows\SysWOW64\Mahbje32.exe Lgbnmm32.exe File created C:\Windows\SysWOW64\Ngedij32.exe Ncihikcg.exe File opened for modification C:\Windows\SysWOW64\Lmqgnhmp.exe Kkbkamnl.exe File opened for modification C:\Windows\SysWOW64\Ncgkcl32.exe Nddkgonp.exe File created C:\Windows\SysWOW64\Nqklmpdd.exe Nbhkac32.exe File created C:\Windows\SysWOW64\Bghhihab.dll Nbkhfc32.exe File created C:\Windows\SysWOW64\Jbhmdbnp.exe Jpjqhgol.exe File opened for modification C:\Windows\SysWOW64\Jdmcidam.exe Jangmibi.exe File opened for modification C:\Windows\SysWOW64\Jkfkfohj.exe Jdmcidam.exe File opened for modification C:\Windows\SysWOW64\Kagichjo.exe Kipabjil.exe File created C:\Windows\SysWOW64\Lnepih32.exe Lgkhlnbn.exe File created C:\Windows\SysWOW64\Eeandl32.dll Lpfijcfl.exe File opened for modification C:\Windows\SysWOW64\Nddkgonp.exe Nafokcol.exe File created C:\Windows\SysWOW64\Ojmmkpmf.dll Kdaldd32.exe File created C:\Windows\SysWOW64\Oimhnoch.dll Kkpnlm32.exe File opened for modification C:\Windows\SysWOW64\Mdiklqhm.exe Mnocof32.exe File created C:\Windows\SysWOW64\Iikopmkd.exe Ifmcdblq.exe File created C:\Windows\SysWOW64\Jpjqhgol.exe Jiphkm32.exe File created C:\Windows\SysWOW64\Nkncdifl.exe Ncgkcl32.exe File opened for modification C:\Windows\SysWOW64\Nggqoj32.exe Ndidbn32.exe File opened for modification C:\Windows\SysWOW64\Jdhine32.exe Jplmmfmi.exe File created C:\Windows\SysWOW64\Ajgblndm.dll Kkkdan32.exe File created C:\Windows\SysWOW64\Bnjdmn32.dll Kmnjhioc.exe File opened for modification C:\Windows\SysWOW64\Mdfofakp.exe Mahbje32.exe File created C:\Windows\SysWOW64\Ijfboafl.exe Ifjfnb32.exe File opened for modification C:\Windows\SysWOW64\Ibccic32.exe Iabgaklg.exe File created C:\Windows\SysWOW64\Kkbkamnl.exe Kckbqpnj.exe File created C:\Windows\SysWOW64\Lkiqbl32.exe Lnepih32.exe File opened for modification C:\Windows\SysWOW64\Lpfijcfl.exe Lnhmng32.exe File created C:\Windows\SysWOW64\Honcnp32.dll Jdhine32.exe File created C:\Windows\SysWOW64\Kdaldd32.exe Kilhgk32.exe File opened for modification C:\Windows\SysWOW64\Kbfiep32.exe Kaemnhla.exe File opened for modification C:\Windows\SysWOW64\Mpaifalo.exe Mncmjfmk.exe File opened for modification C:\Windows\SysWOW64\Ngedij32.exe Ncihikcg.exe File opened for modification C:\Windows\SysWOW64\Kgmlkp32.exe Kbapjafe.exe File opened for modification C:\Windows\SysWOW64\Kgdbkohf.exe Kpjjod32.exe File created C:\Windows\SysWOW64\Mdfofakp.exe Mahbje32.exe File created C:\Windows\SysWOW64\Flfmin32.dll Mahbje32.exe File created C:\Windows\SysWOW64\Geegicjl.dll Mglack32.exe File opened for modification C:\Windows\SysWOW64\Nceonl32.exe Ndbnboqb.exe File created C:\Windows\SysWOW64\Pipfna32.dll Nddkgonp.exe File opened for modification C:\Windows\SysWOW64\Jfaloa32.exe Jdcpcf32.exe File opened for modification C:\Windows\SysWOW64\Jidbflcj.exe Jdhine32.exe File created C:\Windows\SysWOW64\Jaljgidl.exe Jidbflcj.exe File created C:\Windows\SysWOW64\Iljnde32.dll Jkfkfohj.exe File created C:\Windows\SysWOW64\Mghpbg32.dll Kbdmpqcb.exe File opened for modification C:\Windows\SysWOW64\Kaemnhla.exe Kmjqmi32.exe File opened for modification C:\Windows\SysWOW64\Lpocjdld.exe Lmqgnhmp.exe File created C:\Windows\SysWOW64\Jdcpcf32.exe Jaedgjjd.exe File created C:\Windows\SysWOW64\Hiaohfpc.dll Iapjlk32.exe File opened for modification C:\Windows\SysWOW64\Iikopmkd.exe Ifmcdblq.exe File created C:\Windows\SysWOW64\Ghmfdf32.dll Jplmmfmi.exe File opened for modification C:\Windows\SysWOW64\Kilhgk32.exe Kgmlkp32.exe File created C:\Windows\SysWOW64\Kknafn32.exe Kbfiep32.exe File opened for modification C:\Windows\SysWOW64\Mdpalp32.exe Maaepd32.exe File created C:\Windows\SysWOW64\Jcoegc32.dll Njogjfoj.exe File created C:\Windows\SysWOW64\Kbmfdgkm.dll Kknafn32.exe File created C:\Windows\SysWOW64\Kagichjo.exe Kipabjil.exe File created C:\Windows\SysWOW64\Mecaoggc.dll Lphfpbdi.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5920 5824 WerFault.exe Nkcmohbg.exe -
Modifies registry class 64 IoCs
Processes:
Jfdida32.exeKbfiep32.exeLdkojb32.exeLgikfn32.exeNbhkac32.exeIfjfnb32.exeIfmcdblq.exeJiphkm32.exeMaaepd32.exeNceonl32.exeNddkgonp.exeJpjqhgol.exeKagichjo.exeKpmfddnf.exeLpfijcfl.exeLnjjdgee.exeMpolqa32.exeKgdbkohf.exeKckbqpnj.exeLgkhlnbn.exeMahbje32.exeNjogjfoj.exeLgbnmm32.exeMglack32.exeNcihikcg.exeIikopmkd.exeJbhmdbnp.exeJdmcidam.exeNacbfdao.exeKilhgk32.exeLnepih32.exeJdcpcf32.exeIpqnahgf.exeIbccic32.exeImihfl32.exeKbdmpqcb.exeMdfofakp.exeMnapdf32.exeMgnnhk32.exeNjcpee32.exeMncmjfmk.exeMpaifalo.exeNkqpjidj.exeIabgaklg.exeKpccnefa.exeMdiklqhm.exeMdpalp32.exeNdidbn32.exeJbmfoa32.exeKgmlkp32.exeLnhmng32.exeMjjmog32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfdida32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihaoimoh.dll" Kbfiep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldkojb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgikfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifjfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lihoogdd.dll" Ifmcdblq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndninjfg.dll" Jiphkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhpdhp32.dll" Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nceonl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jpjqhgol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kagichjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpmfddnf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lpfijcfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnjjdgee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpolqa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgdbkohf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kckbqpnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldkojb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nngcpm32.dll" Lgkhlnbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flfmin32.dll" Mahbje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njogjfoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibhblqpo.dll" Lgbnmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mglack32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljfemn32.dll" Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iikopmkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbhmdbnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdmcidam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dihcoe32.dll" Nacbfdao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncihikcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kilhgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnepih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdcpcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aajjaf32.dll" Jdcpcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipqnahgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibccic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbledndp.dll" Imihfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnckcnhb.dll" Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbdmpqcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfbhfihj.dll" Mdfofakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odegmceb.dll" Mnapdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Legdcg32.dll" Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkfbjdpq.dll" Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnacjn32.dll" Mpolqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mncmjfmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpaifalo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkqpjidj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jiphogop.dll" Iabgaklg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmmcfa32.dll" Kpccnefa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdiklqhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdpalp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nacbfdao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Addjcmqn.dll" Ndidbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgllgqcp.dll" Jpjqhgol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkdeek32.dll" Kgmlkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipmack32.dll" Ibccic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbaohn32.dll" Lnhmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjjmog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Imihfl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8.exeIiffen32.exeIpqnahgf.exeIfjfnb32.exeIjfboafl.exeIapjlk32.exeIfmcdblq.exeIikopmkd.exeIabgaklg.exeIbccic32.exeIfopiajn.exeImihfl32.exeJaedgjjd.exeJdcpcf32.exeJfaloa32.exeJiphkm32.exeJpjqhgol.exeJbhmdbnp.exeJfdida32.exeJmnaakne.exeJplmmfmi.exeJdhine32.exedescription pid process target process PID 5116 wrote to memory of 3784 5116 975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8.exe Iiffen32.exe PID 5116 wrote to memory of 3784 5116 975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8.exe Iiffen32.exe PID 5116 wrote to memory of 3784 5116 975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8.exe Iiffen32.exe PID 3784 wrote to memory of 692 3784 Iiffen32.exe Ipqnahgf.exe PID 3784 wrote to memory of 692 3784 Iiffen32.exe Ipqnahgf.exe PID 3784 wrote to memory of 692 3784 Iiffen32.exe Ipqnahgf.exe PID 692 wrote to memory of 3052 692 Ipqnahgf.exe Ifjfnb32.exe PID 692 wrote to memory of 3052 692 Ipqnahgf.exe Ifjfnb32.exe PID 692 wrote to memory of 3052 692 Ipqnahgf.exe Ifjfnb32.exe PID 3052 wrote to memory of 3452 3052 Ifjfnb32.exe Ijfboafl.exe PID 3052 wrote to memory of 3452 3052 Ifjfnb32.exe Ijfboafl.exe PID 3052 wrote to memory of 3452 3052 Ifjfnb32.exe Ijfboafl.exe PID 3452 wrote to memory of 1636 3452 Ijfboafl.exe Iapjlk32.exe PID 3452 wrote to memory of 1636 3452 Ijfboafl.exe Iapjlk32.exe PID 3452 wrote to memory of 1636 3452 Ijfboafl.exe Iapjlk32.exe PID 1636 wrote to memory of 1900 1636 Iapjlk32.exe Ifmcdblq.exe PID 1636 wrote to memory of 1900 1636 Iapjlk32.exe Ifmcdblq.exe PID 1636 wrote to memory of 1900 1636 Iapjlk32.exe Ifmcdblq.exe PID 1900 wrote to memory of 3056 1900 Ifmcdblq.exe Iikopmkd.exe PID 1900 wrote to memory of 3056 1900 Ifmcdblq.exe Iikopmkd.exe PID 1900 wrote to memory of 3056 1900 Ifmcdblq.exe Iikopmkd.exe PID 3056 wrote to memory of 748 3056 Iikopmkd.exe Iabgaklg.exe PID 3056 wrote to memory of 748 3056 Iikopmkd.exe Iabgaklg.exe PID 3056 wrote to memory of 748 3056 Iikopmkd.exe Iabgaklg.exe PID 748 wrote to memory of 4792 748 Iabgaklg.exe Ibccic32.exe PID 748 wrote to memory of 4792 748 Iabgaklg.exe Ibccic32.exe PID 748 wrote to memory of 4792 748 Iabgaklg.exe Ibccic32.exe PID 4792 wrote to memory of 2540 4792 Ibccic32.exe Ifopiajn.exe PID 4792 wrote to memory of 2540 4792 Ibccic32.exe Ifopiajn.exe PID 4792 wrote to memory of 2540 4792 Ibccic32.exe Ifopiajn.exe PID 2540 wrote to memory of 2856 2540 Ifopiajn.exe Imihfl32.exe PID 2540 wrote to memory of 2856 2540 Ifopiajn.exe Imihfl32.exe PID 2540 wrote to memory of 2856 2540 Ifopiajn.exe Imihfl32.exe PID 2856 wrote to memory of 4760 2856 Imihfl32.exe Jaedgjjd.exe PID 2856 wrote to memory of 4760 2856 Imihfl32.exe Jaedgjjd.exe PID 2856 wrote to memory of 4760 2856 Imihfl32.exe Jaedgjjd.exe PID 4760 wrote to memory of 4024 4760 Jaedgjjd.exe Jdcpcf32.exe PID 4760 wrote to memory of 4024 4760 Jaedgjjd.exe Jdcpcf32.exe PID 4760 wrote to memory of 4024 4760 Jaedgjjd.exe Jdcpcf32.exe PID 4024 wrote to memory of 3312 4024 Jdcpcf32.exe Jfaloa32.exe PID 4024 wrote to memory of 3312 4024 Jdcpcf32.exe Jfaloa32.exe PID 4024 wrote to memory of 3312 4024 Jdcpcf32.exe Jfaloa32.exe PID 3312 wrote to memory of 1260 3312 Jfaloa32.exe Jiphkm32.exe PID 3312 wrote to memory of 1260 3312 Jfaloa32.exe Jiphkm32.exe PID 3312 wrote to memory of 1260 3312 Jfaloa32.exe Jiphkm32.exe PID 1260 wrote to memory of 3524 1260 Jiphkm32.exe Jpjqhgol.exe PID 1260 wrote to memory of 3524 1260 Jiphkm32.exe Jpjqhgol.exe PID 1260 wrote to memory of 3524 1260 Jiphkm32.exe Jpjqhgol.exe PID 3524 wrote to memory of 5104 3524 Jpjqhgol.exe Jbhmdbnp.exe PID 3524 wrote to memory of 5104 3524 Jpjqhgol.exe Jbhmdbnp.exe PID 3524 wrote to memory of 5104 3524 Jpjqhgol.exe Jbhmdbnp.exe PID 5104 wrote to memory of 4692 5104 Jbhmdbnp.exe Jfdida32.exe PID 5104 wrote to memory of 4692 5104 Jbhmdbnp.exe Jfdida32.exe PID 5104 wrote to memory of 4692 5104 Jbhmdbnp.exe Jfdida32.exe PID 4692 wrote to memory of 4440 4692 Jfdida32.exe Jmnaakne.exe PID 4692 wrote to memory of 4440 4692 Jfdida32.exe Jmnaakne.exe PID 4692 wrote to memory of 4440 4692 Jfdida32.exe Jmnaakne.exe PID 4440 wrote to memory of 1664 4440 Jmnaakne.exe Jplmmfmi.exe PID 4440 wrote to memory of 1664 4440 Jmnaakne.exe Jplmmfmi.exe PID 4440 wrote to memory of 1664 4440 Jmnaakne.exe Jplmmfmi.exe PID 1664 wrote to memory of 4632 1664 Jplmmfmi.exe Jdhine32.exe PID 1664 wrote to memory of 4632 1664 Jplmmfmi.exe Jdhine32.exe PID 1664 wrote to memory of 4632 1664 Jplmmfmi.exe Jdhine32.exe PID 4632 wrote to memory of 4100 4632 Jdhine32.exe Jidbflcj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8.exe"C:\Users\Admin\AppData\Local\Temp\975d4c4337599fa40b83f891518a6508f9b2e805367e42dcf4d10bdb5290cfe8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\Iiffen32.exeC:\Windows\system32\Iiffen32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\Ipqnahgf.exeC:\Windows\system32\Ipqnahgf.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\Ifjfnb32.exeC:\Windows\system32\Ifjfnb32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\Ijfboafl.exeC:\Windows\system32\Ijfboafl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\Iapjlk32.exeC:\Windows\system32\Iapjlk32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\Ifmcdblq.exeC:\Windows\system32\Ifmcdblq.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\Iikopmkd.exeC:\Windows\system32\Iikopmkd.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\Iabgaklg.exeC:\Windows\system32\Iabgaklg.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\Ibccic32.exeC:\Windows\system32\Ibccic32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\Ifopiajn.exeC:\Windows\system32\Ifopiajn.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Imihfl32.exeC:\Windows\system32\Imihfl32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\Jaedgjjd.exeC:\Windows\system32\Jaedgjjd.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\Jdcpcf32.exeC:\Windows\system32\Jdcpcf32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\Jfaloa32.exeC:\Windows\system32\Jfaloa32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\Jiphkm32.exeC:\Windows\system32\Jiphkm32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\Jpjqhgol.exeC:\Windows\system32\Jpjqhgol.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\Jbhmdbnp.exeC:\Windows\system32\Jbhmdbnp.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\Jfdida32.exeC:\Windows\system32\Jfdida32.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\Jmnaakne.exeC:\Windows\system32\Jmnaakne.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\Jplmmfmi.exeC:\Windows\system32\Jplmmfmi.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Jdhine32.exeC:\Windows\system32\Jdhine32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\Jidbflcj.exeC:\Windows\system32\Jidbflcj.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4100 -
C:\Windows\SysWOW64\Jaljgidl.exeC:\Windows\system32\Jaljgidl.exe24⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\Jbmfoa32.exeC:\Windows\system32\Jbmfoa32.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\Jigollag.exeC:\Windows\system32\Jigollag.exe26⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\Jangmibi.exeC:\Windows\system32\Jangmibi.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\Jdmcidam.exeC:\Windows\system32\Jdmcidam.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1992 -
C:\Windows\SysWOW64\Jkfkfohj.exeC:\Windows\system32\Jkfkfohj.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\Kmegbjgn.exeC:\Windows\system32\Kmegbjgn.exe30⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\Kpccnefa.exeC:\Windows\system32\Kpccnefa.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:2928 -
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4360 -
C:\Windows\SysWOW64\Kgmlkp32.exeC:\Windows\system32\Kgmlkp32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1552 -
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Kdaldd32.exeC:\Windows\system32\Kdaldd32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\Kbdmpqcb.exeC:\Windows\system32\Kbdmpqcb.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3424 -
C:\Windows\SysWOW64\Kkkdan32.exeC:\Windows\system32\Kkkdan32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1432 -
C:\Windows\SysWOW64\Kmjqmi32.exeC:\Windows\system32\Kmjqmi32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3932 -
C:\Windows\SysWOW64\Kaemnhla.exeC:\Windows\system32\Kaemnhla.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3808 -
C:\Windows\SysWOW64\Kbfiep32.exeC:\Windows\system32\Kbfiep32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2084 -
C:\Windows\SysWOW64\Kknafn32.exeC:\Windows\system32\Kknafn32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4480 -
C:\Windows\SysWOW64\Kipabjil.exeC:\Windows\system32\Kipabjil.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2760 -
C:\Windows\SysWOW64\Kagichjo.exeC:\Windows\system32\Kagichjo.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\Kpjjod32.exeC:\Windows\system32\Kpjjod32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3584 -
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4992 -
C:\Windows\SysWOW64\Kkpnlm32.exeC:\Windows\system32\Kkpnlm32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1036 -
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4628 -
C:\Windows\SysWOW64\Kckbqpnj.exeC:\Windows\system32\Kckbqpnj.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4904 -
C:\Windows\SysWOW64\Kkbkamnl.exeC:\Windows\system32\Kkbkamnl.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3116 -
C:\Windows\SysWOW64\Lmqgnhmp.exeC:\Windows\system32\Lmqgnhmp.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2148 -
C:\Windows\SysWOW64\Lpocjdld.exeC:\Windows\system32\Lpocjdld.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\Ldkojb32.exeC:\Windows\system32\Ldkojb32.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:3500 -
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4788 -
C:\Windows\SysWOW64\Lkdggmlj.exeC:\Windows\system32\Lkdggmlj.exe55⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\Lmccchkn.exeC:\Windows\system32\Lmccchkn.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\Lcpllo32.exeC:\Windows\system32\Lcpllo32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4484 -
C:\Windows\SysWOW64\Lgkhlnbn.exeC:\Windows\system32\Lgkhlnbn.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Lnepih32.exeC:\Windows\system32\Lnepih32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4444 -
C:\Windows\SysWOW64\Lkiqbl32.exeC:\Windows\system32\Lkiqbl32.exe61⤵
- Executes dropped EXE
PID:8 -
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:700 -
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1404 -
C:\Windows\SysWOW64\Lcdegnep.exeC:\Windows\system32\Lcdegnep.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:404 -
C:\Windows\SysWOW64\Lnjjdgee.exeC:\Windows\system32\Lnjjdgee.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:4860 -
C:\Windows\SysWOW64\Lphfpbdi.exeC:\Windows\system32\Lphfpbdi.exe66⤵
- Drops file in System32 directory
PID:4312 -
C:\Windows\SysWOW64\Lgbnmm32.exeC:\Windows\system32\Lgbnmm32.exe67⤵
- Drops file in System32 directory
- Modifies registry class
PID:1388 -
C:\Windows\SysWOW64\Mahbje32.exeC:\Windows\system32\Mahbje32.exe68⤵
- Drops file in System32 directory
- Modifies registry class
PID:4108 -
C:\Windows\SysWOW64\Mdfofakp.exeC:\Windows\system32\Mdfofakp.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5112 -
C:\Windows\SysWOW64\Mkpgck32.exeC:\Windows\system32\Mkpgck32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:456 -
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3828 -
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3688 -
C:\Windows\SysWOW64\Mgghhlhq.exeC:\Windows\system32\Mgghhlhq.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1584 -
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe75⤵
- Modifies registry class
PID:2464 -
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe76⤵PID:3040
-
C:\Windows\SysWOW64\Mncmjfmk.exeC:\Windows\system32\Mncmjfmk.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:4888 -
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3852 -
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe79⤵PID:3412
-
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Mjjmog32.exeC:\Windows\system32\Mjjmog32.exe81⤵
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe82⤵
- Drops file in System32 directory
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4416 -
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3428 -
C:\Windows\SysWOW64\Nacbfdao.exeC:\Windows\system32\Nacbfdao.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4004 -
C:\Windows\SysWOW64\Ndbnboqb.exeC:\Windows\system32\Ndbnboqb.exe86⤵
- Drops file in System32 directory
PID:1356 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe87⤵
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe88⤵
- Drops file in System32 directory
- Modifies registry class
PID:2352 -
C:\Windows\SysWOW64\Nafokcol.exeC:\Windows\system32\Nafokcol.exe89⤵
- Drops file in System32 directory
PID:3448 -
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5164 -
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5224 -
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5280 -
C:\Windows\SysWOW64\Njacpf32.exeC:\Windows\system32\Njacpf32.exe93⤵PID:5332
-
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5380 -
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5428 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5472 -
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe97⤵PID:5520
-
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe98⤵
- Modifies registry class
PID:5564 -
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5608 -
C:\Windows\SysWOW64\Nbkhfc32.exeC:\Windows\system32\Nbkhfc32.exe100⤵
- Drops file in System32 directory
PID:5648 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5696 -
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5736 -
C:\Windows\SysWOW64\Nggqoj32.exeC:\Windows\system32\Nggqoj32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5776 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe104⤵PID:5824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5824 -s 400105⤵
- Program crash
PID:5920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5824 -ip 58241⤵PID:5884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ce9fb70ab2d771f2d0719854a4084f11
SHA10514eb3dfee16de4db082a24638ed2225a36145f
SHA256168c7625fe67775fc1633477aa83521265140dbea6e7813da452994e99666a90
SHA5121b8459169014584c5db098bf0cc344e7746d6d222a3b97730f46636cefe88a29d268bbc09fd0a236623855099dae2471cd5ec6f2e27321e83f9d2620c58cd047
-
Filesize
80KB
MD5fbf3a3097866f1e1b847466b94e5d3c3
SHA1d0a3350361397100490b0398f3dcc883cd459a14
SHA2565ff7551b8c9f29c4818fdd65bc5d6be077cf34866d1d8357ca73cf760b348ddc
SHA5121e2d70a799509fd9fddb65593832961431d645f0a8d0338c6480b594c40858a231a90b9c60da6530a76652948bcaef8e705fbad50b369befc3f58fac244b77c6
-
Filesize
80KB
MD51a7cd3ff41e63eabc192e960329dcd29
SHA104c324f2b8789beea8a215bbc50193c10f15b754
SHA256ad416e3390695e804b9fe8fd73f025d6f76fead43c381a4d6b1a2d02f64c5736
SHA5123204fce3b20e6b3550b0ca924021f234ab5f3285045562ceab2e34d0c2d370a2fa2cdd086b0310a0b931624b89c60a38c69611631c85d812d95366ac9ac2ef07
-
Filesize
80KB
MD5135d259e73e8439ea6a891b5b48c5dcf
SHA1a3275378cf241d9d551ea4f3da50bd49d02e48c9
SHA25694140f7139259becf1d74f347151725acd6bc602b4670161fb2dd3ecf57d4eed
SHA512fbe361c63afe5e2eb9c8c8da20f5b1744407841e4095016d0871a5856d310d50099f366a8ddd2c071ca5431fc720cd6077a4c7ac027188d113cf5e47efe2d32e
-
Filesize
80KB
MD561094c0589eeb23907de44cf8c4f463c
SHA133942391d6ffc3296efac376996328109f1e3500
SHA2565f3bd666788b5a9140239278f5f100795116b19bc14dac635e2d60f90002ca2d
SHA51204661e3f7c68f972c70f28e431cd3d7e1e91d898b8f3e415f0da6977cf757f04bd3842f02480be889d088d248a362da219583e4534a2ea644455df0d98446b77
-
Filesize
80KB
MD56391f414538a861ad0b4a8fe3c776751
SHA1ddd1853936b456d92499776db7283206ae58aa4a
SHA2564338b171732e926e6345b398d0ab1e4ec7f591f2ae67cbc820acccf708f6ecd4
SHA51231e272913708141da9d8591185b83877441d33ba97abde635e5c087e99a9624ebab28c76922b5b375aae51ece7db2bbf98e80338cc850fe3590b7e88fae80f1d
-
Filesize
80KB
MD54f5d68221fcaedb7d87f0f961f50a415
SHA19f933674738aaf35ff763c921c7746df5b5746de
SHA2567bf24a638a7aa6cb5e6bf92addf9bb483b8ff08ed1ba609eeb53a985ec14194b
SHA512748ce8e68fc2b02d70079c9ba1f6adbfa639d7162fc4b3ec1a9e72db1402755601401a8fe0e1cd9a87a816ef7e31f15e6358e799ff5c90a0c64d87f5df53b363
-
Filesize
80KB
MD56b6a2c61e6190e0369c9a6d8a2cfacdb
SHA11f926beb916a8635f9ae4556c022ae616658a5a6
SHA25658cf66432496955904fdc5088ec649dd87380a541b3afb4249e275f3f223ceac
SHA51295b06ea5c01d1ead024e1f3fc153bc92d7b728c858b5c18896f4933be43f22d79c6850107286a330a8be04378a1f23756ba5d7df6364eca054386ce49e302e43
-
Filesize
80KB
MD518b30abed69f7283a23c3bd6e19b01f1
SHA1da92c191fc447e4f812349922b34d11e3d9ef452
SHA256457fc69fe6a52a7e85c2ab1af460ff1aa04c3089dce56a30aa669419e6b94bd6
SHA51213df81778518ae8aa916848070340d0e835e0ce432da659fffcfc32fce82a58e7d8b505b1375d34ca35a2dc2f43f161fa9d8b5bbeefbebf76a2e487aa5f93425
-
Filesize
80KB
MD5d6abdd50e7ed2b4b456a4e1276fc58e7
SHA15d67f415891d5e578131ad1074afc02f523b281a
SHA256f0fbaf1a5514a85cda746cc29b0e947c0fe2cc8a92203199eca36ac2c9d9f5ec
SHA51272b4fdcfb50ff93ea528604259f20b9880b7699904e6266430cfb36c27ac8b9adb730ff4f5ae52edfaea0448eabaebbd3ed50f49457a403d8d461d406d8e2fed
-
Filesize
80KB
MD5501f7b12b0976edd3cd5c744a0145600
SHA16761a5a10338aee4c2296d3b009b18316b06e405
SHA256237c4f915eace9be7d1fa39505a477b33b59fbb753dce80221c81ea447761f96
SHA51242bc732601bf9780e716819db56f283a72359890efae4feca5e09f7f3f986ac55fb2da135ac46a23b6da4a2fd7001ff4643e9df703d7c030bb91f27058de2076
-
Filesize
80KB
MD5a7638be6e9bc5c2ac266fddd1423af14
SHA1aec4a039ab0c1105ac2b03d65a8bab09a984ef72
SHA256d9ccd9137eec764184a2aac0c0e1e2c7d5a701a478d45101b989b9f4a715fa63
SHA5120ceff20022ed55665128b92aff6fa0502eefc7fa4360389fc9362993b1df85c75abd08ffcfea253b23b82bb0d90a8dded316f6a7bb599c0b516bab2d58db3456
-
Filesize
80KB
MD5c1ba91a4d72f7b885a713c05880e7950
SHA13c4f9433d9ef315630c7a98c8966d9aed2a6c861
SHA256077be13949b39574c120a8722fe6e458646db7971252036fe41719a1b2f4f567
SHA512d3251dc3c2a6c7cb013f44eaed42aed2ded2d98c93e00959d8418e621525b30b0054aa8e6d4bdbe87849d302028d488a2110c295804b38f8ae0376172a3ceba0
-
Filesize
80KB
MD542d8d73e99175c7524282be0274b3d8c
SHA1fccf22008442436718b558f8af1bb166c198dc2f
SHA256a1ab9be8b03ed1d7a2f32c36fd520c48b563f41854e50e392e669f08cde753b0
SHA512e5f478df7c22fb9979a25a1b61c59f65b346f093fc70d413f06c759bb7cc7300a83763f489a788c262ef4521a0303b0d9fb2b66188a07aad78fbd0da15971c40
-
Filesize
80KB
MD5ed36ef78686bb7f7de19e06646aa521b
SHA14eb9b42c75e7df7d2245a2a2f57e43f583553f1f
SHA256284ccb3f61a9ae7cb160f40c3ab88cdbbd2a6b9bfae2d7a9b330981906556d24
SHA51231c3a5eaef54fa7e71c5873b06ed3b6d35ba50b283dc482e161fd1d8127e9d8abcc05599ac4be2a82e8586ea1177a67f2935cd8009c406f8fa6cb5f2a8244a02
-
Filesize
80KB
MD52ad4e06adc8554ae6a5214fb8b1c6193
SHA1e99913c6140c3d45f515227e6075335f96b341fc
SHA256b02447cfa8294bc7fa1d90e125b2bd92fa71becc9a02c5e14ad06dc3b128becc
SHA51219d3ff06ba6b52f0ed392bb1fa6f32b0afa76e3311179d175b7390a6a8afb4551433a53eb3820c916d26d396bd60643aa6b4e6371c8ff1cdf69a21160a65c34d
-
Filesize
80KB
MD5f254a14f5f37b108095f782156e8a103
SHA166b76969e6b0d9dffe08eb424b7094bf049d1b83
SHA256d85f50bb80f0908257f6994b5a1bec7aad114d4512ed072fd5d7dc7d17bbe6e4
SHA5124ce355be08385938e496935ac90ba01ca53ba38a13f46532875e7ad4f1435b03a8dd5c8f8c834968ac91e90a282747bc9c40fceb645040125518f84205087ee0
-
Filesize
80KB
MD56dc77cd9f5b6a51efa54278d21b52205
SHA134d2f4478483c8aa71b109e1bf816b5d949ff90c
SHA2567816367b1ecddc0c95139eab0a313b7facb5f5c716f00fb5de474bfc235128dc
SHA5121e465ec3d672a1ca5b5a6d005998e995c218bc429a5f150c152237adaf39230a1fa9e12c14083202901961934e2acf68268ae646850578b10ae185345718d5f3
-
Filesize
80KB
MD5dcf4bda5fd3a374c10964021cb2d4f44
SHA171d73376d5a816c0ffe1bf015fda83ffd21702df
SHA2566f7c7888f2773c01d4711f93a0dcdefe80d16132fd843ff05b190ad829403887
SHA512c1cd237a2dcbe65fc55dd1acc8137c895638d53db6e64afefd8b909a02de2177ab275432aadda7dbdcb2dfd0e4ab39bd874078bed1d1fa471cae3e0055a95d35
-
Filesize
80KB
MD5aa116604184bbeeb327a1d17c8fb8ba6
SHA173021e79c5c7120da67247ea795c042fa9de6abb
SHA2562503b297bf34c03eb9ada157ba5405fabe09e6557d4ad87fe4a35a7d03e94df6
SHA512cd09de304505d61e33f6003897134499fa865e44d937c9d2e79eea3ab6a78a4e4d8a2a9b0cbea0bd8ab8cf6748dd4dc2d37b9f99eb33f2fe883f784653cff31b
-
Filesize
80KB
MD50fe5a29848ccdd32ac167970b38e94e0
SHA1651fe2fe0886ee14e6c536d34cd51b29e8de43ed
SHA25683829b8b85aed1a111326fea39c0d5ae657a162a4e288178c67239440b503863
SHA512d11daca210540a8022cf299ed0b4214f93c93fa0e2ab4bd471bb3aba60ea7665df2d5bd38911cb94930747fe3e0ffae7f618ed7358db476ccfe31692e215f6eb
-
Filesize
80KB
MD56ab805a67091a6473111ff0573495e32
SHA19a43ea740b97b63abd9efd6802316bae488156ac
SHA2568f57f1fcc0be8bb5ab781d0f1b6c39a7e9442d0d100c41e12a9ba74a7008e9e4
SHA512b44d5a7bf496a38ba8bd68841459c559c1eba3e4b38727948e837e4e3932454c225d78f740ea2719f633d683598438451ff56bd46d17440ce2d6b4c53cb5a965
-
Filesize
80KB
MD5766f4df7896b255d1145037e5458f410
SHA1a540b6b8923f16a80817cb546a94c53dbfd10b3e
SHA25668ee91617f1b93ee09f822141df3b95cee865a13c00e28fa4460ae7462e6623d
SHA5123fac75ba0dbd325319089397ae7c1fbcb8298117068a03357ebfb4f08d6ce919118525a6a2f6e3425ccf7021a50f7e476765ca08de620a34111386570724a9b0
-
Filesize
80KB
MD5ca8d2ec6d7be3b3c874af1811d5b4402
SHA1e5b9c1fb4a7b66e42b38dfd3881b86c31cfe8d99
SHA256c269221e95da0c9a9877d91a6d7dff23b2d1cb468ea1dbbcfa233df7bd98fb63
SHA51233ecdee0712b857f2b3e892d774cbab5719a091c410a1c35798b0134ddf713dd2e3a74374cd15c62e0d1911eb8040cd678fde76b6c7ae3b64e5c3572a19d63dd
-
Filesize
80KB
MD5dc880744d1cd68f970244c11f634b612
SHA1060f8c137d1bc39ed16981d61162a926e6bc90ca
SHA2560c82beed9fa250b9e9d7b3931134f11e59e684a61e1d35b7b3e8d451d2022f1d
SHA5128dabd9cffabc164ab08c1a1757a7da46b70a686af41a3933445ddc6c92bad987fc16e066b4303878d847faf1fbe2a813bc15f79e17c82e286eec0c5bdcacf54a
-
Filesize
80KB
MD5bf3622cbb3a5c3851749ab904338dc73
SHA1cad2508268157262730be91c3db5c4350fc007d3
SHA256d3eb5debd56d1ad7993418bda467acce67345e7ba8a627f283ccffdfc5149413
SHA512f628fbed0dca1cb13db4d93ec9048c648d8becc58c433ccd2318a0a5abc73942211a7bd59e2b37b75b0e5866d3ae031ab4e2f369f283ac4d31ceb11ad57c2d96
-
Filesize
80KB
MD50076b4e85ceb735805dcddf9ea1ff644
SHA1f7f81156db7a4c36744f308476a7827b905513c0
SHA2562b23e7d099e5c9457beff345becbe4e440e63ce73b88779456416e2a38fae8b9
SHA5123850beb6b1d987e12d218c02172db683c42f28702d0d40acbc55ea03e21d37b24bc14f87e6db926204f7504478c0c0ef394efe8a76f600fb1e1e253bbf20c96c
-
Filesize
80KB
MD5d25cd359672f4a81bdd439c7828d7317
SHA1ccd004c39e7a5c4aecd75c4e0b8a02277f109c1c
SHA25678cf6b7ad78da88856c40d2f6cebd4fcacfcd9185e5f90d194e729c9d850eadd
SHA5125ab3aa92218830c6cfc337a68e8df19ea83bc0a7697aac9f242de0029ad42e63a97f22e51d680dfcefd008151aac342b66d094dc587a89102ddbb23a8766ef2b
-
Filesize
80KB
MD5c450b9c627d8969adc6732ed7d091e5b
SHA1544ec26d948de91ee95878428f3d52c4af09beef
SHA256e29ba59c133c4879cc431329f5793e077d9100c3c7a8ea7240437efa4dce80fa
SHA512f4c3bced4b558d1d338a6c8330d6b8fc40e0128c6e3c8646ec530cfb606ce4858f08ba4ce4d61a41dfaa669fa59898caae6d8bb580dc831d2429ee55a80e4bed
-
Filesize
80KB
MD5c6ba4aefae25c54bcd750e86da56cda1
SHA1f3d887484952f4c0f0420405429734a9f392e88f
SHA25673c52501e430be2e3f292cb2fdd4237982b06e1461534e9abc7beb4d997fc882
SHA512fde22133b7ba502180137dbd5d79d54e20d8d6c1db197fa84e63341d43d609c8d51bdd56856bffba1bc956829f78d09d8ca6c1687ff6a7934877a0079a271819
-
Filesize
80KB
MD571bc66b55445361783fddacde3872c70
SHA166e0b37b0946fa2189adc2d1042dc7e8ce7cd087
SHA256128796453be54c292232bf6d01d21a1099a76236f75b22bec17f1b27ec75f9f1
SHA51234b6b16e8ca0e21effee3ecee7bf1bd9af293fb7547dae9975060c10903472ee9c03e09a7f14d56d7764fcc61f0fd8cc41360b3bd9ef9cd84332654ade49a39f
-
Filesize
80KB
MD5a2aeff3c56b081e3f8dc71281aaefd00
SHA1a242228487cc91632cb91b5fc0acdba25e32345b
SHA2564fe2475afaedc002de0e7ae37caca1b567fb119529afdd5002e409c9901e8d80
SHA512b2476a605b3a3068d2a3ef4bed4b654c0483e2cd932d44d823654c3c0d809e169850a8d129fde735c0704645b329d9b1473b6f1ba4cba093a9e32d9d0e23e29f
-
Filesize
80KB
MD52deb01f49fe434f70944b6302d61306a
SHA154dc6e60eb8c56e41d4ce1ae97178da90d0ddbb6
SHA256186433795cdf079daa51c44b1d7b88b5611867e917f850ed873ccd302d20d4a9
SHA5121aa004b2738024e352a6b1acbbd6d1081b67fe89cd06c11a06e3a3e5c2358ba20b53e1c1a4e2ca4c3eb132d19d76ab251bc21048303c94480c128845bcc54531
-
Filesize
80KB
MD5827d7283cfc314f51aa7b515b104377e
SHA11b8a06eb50da107acf8fa0b267d58096d76124f5
SHA25651397f667b5766a714572869e130b12400a0549d3cec4c2c8c47e0bb2104f845
SHA51201512e96f3fcee31b0519c7785e13da87c0b418943975487db2f19d082c820ec488b22de3b69f0a13a00cc5153ed467400164f1896ce55fc04f6462d6bd5a58a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
80KB
MD5de68040e97e54aaca5221220f6446563
SHA128b0f6684a3a3dd7abeb62ea9e7506af3c64ab17
SHA25607e30c3f9202d6d44b71ca7e587fdb19e5f72535a8fbc65334357d50d34c89fd
SHA512c966ab6f0001f1f663e264d28e80d1fc8f325dc424d6a4bb4292559f1e07ccd9640ee88b3d6b5da78c95c42ed138841c817547009b24d948dc8147653e0c0c7d