Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:12
Static task
static1
Behavioral task
behavioral1
Sample
3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47.exe
Resource
win10v2004-20240226-en
General
-
Target
3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47.exe
-
Size
128KB
-
MD5
0afd5ec2ba6dce1681088fe0da9e7890
-
SHA1
c8dea1825ea9a808aa36c6177b03fcc5aee475ab
-
SHA256
3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47
-
SHA512
55aa542f1777c40d0b3b43a1518e813c7a82749667b83b7619f07f5f4b5934c52b0f0cb858e0d1313fa4e5ed77cb2f06b1eb3e2cc9a5bbdbcb40571a5a1430af
-
SSDEEP
3072:kla2gm0D7sDrFDHZtOgxBOXXwwfBoD6N3h8N5Gg:kla40nM5tTDUZNSN57
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Hqkjaifk.exeLoniiflo.exeAeeomegd.exeEjnbdp32.exeLepleocn.exeDnghhqdk.exeGooqfkan.exeNmedmj32.exeCgiohbfi.exeLelajb32.exeOmjnhiiq.exeIeccbbkn.exeKjmjgk32.exeCpmifkgd.exeEpbkhhel.exeKcehejic.exeMpedgghj.exeCinpdl32.exeHklglk32.exeOhncdobq.exeLeqkeajd.exeFpeaeedg.exeIjmhkchl.exeBbefln32.exeNjmejp32.exePddokabk.exeGeabbfoc.exeGhojbq32.exeMfkcibdl.exeHgkimn32.exeJohggfha.exeMcaipa32.exeCbhbbn32.exeJakchf32.exeJjknakhq.exeNieoal32.exeNkdlkope.exeDggbcf32.exeDalkek32.exeGaoihfoo.exeNandhi32.exeApngjd32.exeLpjelibg.exeBiigildg.exeEnlcahgh.exeDimcppgm.exePkhhbbck.exeQggebl32.exeEngaon32.exeJldkeeig.exePoidhg32.exeIcefib32.exeClffalkf.exeGlqkefff.exeKggjghkd.exeEgohdegl.exeDbcbnlcl.exeFkehdnee.exeBbaclegm.exeCkggnp32.exeEllpmolj.exeLlcghg32.exeIolhkh32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqkjaifk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Loniiflo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeeomegd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejnbdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lepleocn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnghhqdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gooqfkan.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmedmj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgiohbfi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lelajb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omjnhiiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ieccbbkn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjmjgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpmifkgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epbkhhel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcehejic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpedgghj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cinpdl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hklglk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohncdobq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leqkeajd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpeaeedg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijmhkchl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbefln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njmejp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pddokabk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Geabbfoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghojbq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfkcibdl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgkimn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Johggfha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcaipa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbhbbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jakchf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjknakhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nieoal32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkdlkope.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dggbcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dalkek32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaoihfoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nandhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apngjd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpjelibg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Biigildg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enlcahgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dimcppgm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkhhbbck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qggebl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Engaon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jldkeeig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Poidhg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icefib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clffalkf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glqkefff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kggjghkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egohdegl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbcbnlcl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkehdnee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbaclegm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckggnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ellpmolj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jakchf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llcghg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iolhkh32.exe -
Executes dropped EXE 64 IoCs
Processes:
Fbelcblk.exeFnnjmbpm.exeGnqfcbnj.exeGbnoiqdq.exeGflhoo32.exeGoglcahb.exeGbeejp32.exeHolfoqcm.exeHffken32.exeHekgfj32.exeHemdlj32.exeIebngial.exeKckqbj32.exeKjlopc32.exeLnjgfb32.exeLlodgnja.exeLjceqb32.exeLckiihok.exeMmfkhmdi.exeMmhgmmbf.exeMfqlfb32.exeMcelpggq.exeMqimikfj.exeMnmmboed.exeMfhbga32.exeNfjola32.exeNgjkfd32.exeNnfpinmi.exeNceefd32.exeOnmfimga.exeOfkgcobj.exeOfmdio32.exePfoann32.exePhonha32.exePpjbmc32.exePaiogf32.exePpolhcnm.exePpahmb32.exeQpcecb32.exeQpeahb32.exeAogbfi32.exeAfbgkl32.exeAgdcpkll.exeAonhghjl.exeAopemh32.exeBdmmeo32.exeBobabg32.exeBpfkpp32.exeBmjkic32.exeBoihcf32.exeBgelgi32.exeCdimqm32.exeCponen32.exeCncnob32.exeCkgohf32.exeCpdgqmnb.exeCpfcfmlp.exeCnjdpaki.exeDojqjdbl.exeDolmodpi.exeDggbcf32.exeDdkbmj32.exeDbocfo32.exeDkhgod32.exepid process 3640 Fbelcblk.exe 820 Fnnjmbpm.exe 3808 Gnqfcbnj.exe 5108 Gbnoiqdq.exe 1964 Gflhoo32.exe 2108 Goglcahb.exe 220 Gbeejp32.exe 3472 Holfoqcm.exe 4912 Hffken32.exe 3784 Hekgfj32.exe 1996 Hemdlj32.exe 1856 Iebngial.exe 4088 Kckqbj32.exe 3528 Kjlopc32.exe 3396 Lnjgfb32.exe 3096 Llodgnja.exe 2304 Ljceqb32.exe 2092 Lckiihok.exe 1992 Mmfkhmdi.exe 2276 Mmhgmmbf.exe 4676 Mfqlfb32.exe 3940 Mcelpggq.exe 3960 Mqimikfj.exe 2056 Mnmmboed.exe 3988 Mfhbga32.exe 400 Nfjola32.exe 4548 Ngjkfd32.exe 724 Nnfpinmi.exe 64 Nceefd32.exe 1160 Onmfimga.exe 5084 Ofkgcobj.exe 1220 Ofmdio32.exe 3132 Pfoann32.exe 4288 Phonha32.exe 3080 Ppjbmc32.exe 1040 Paiogf32.exe 4956 Ppolhcnm.exe 1968 Ppahmb32.exe 4040 Qpcecb32.exe 1552 Qpeahb32.exe 1044 Aogbfi32.exe 688 Afbgkl32.exe 4332 Agdcpkll.exe 1948 Aonhghjl.exe 4456 Aopemh32.exe 4184 Bdmmeo32.exe 904 Bobabg32.exe 3212 Bpfkpp32.exe 2440 Bmjkic32.exe 1460 Boihcf32.exe 1216 Bgelgi32.exe 1280 Cdimqm32.exe 2476 Cponen32.exe 4180 Cncnob32.exe 2828 Ckgohf32.exe 4276 Cpdgqmnb.exe 1860 Cpfcfmlp.exe 4624 Cnjdpaki.exe 2444 Dojqjdbl.exe 5056 Dolmodpi.exe 4384 Dggbcf32.exe 4360 Ddkbmj32.exe 4760 Dbocfo32.exe 4496 Dkhgod32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Mfkcibdl.exeGnqfcbnj.exePpjbmc32.exeHbenoi32.exeMdghhb32.exeKejloi32.exeHcembe32.exeBbpeghpe.exeJldbpl32.exeNhlfoodc.exeEeailhme.exeHiinoc32.exeFeljgd32.exeEohhie32.exeMmhgmmbf.exeDkhgod32.exeEpaemojk.exeGikbneio.exePpahmb32.exeCpfcfmlp.exeLojmcdgl.exeIbnjkbog.exeLancko32.exeMjggal32.exeCiqmjkno.exePoidhg32.exeEpcbbohh.exeJikjmbmb.exeKcehejic.exeQggebl32.exeJikoopij.exeEllpmolj.exeLmfhjhdm.exeKplmliko.exeFcneeo32.exeNkebee32.exeKmhccpci.exeIcpecm32.exeCapkim32.exeHhleefhe.exeLchfib32.exeHjlhipbc.exeHnokjm32.exeNdinck32.exeNglcjfie.exeCbglgg32.exeGflhoo32.exeGbeejp32.exeDolmodpi.exeApngjd32.exeAkjnnpcf.exeCjomldfp.exeCnjdpaki.exeMekdffee.exeKmmmnp32.exeJakchf32.exeJcgldl32.exePfojdh32.exeEajlhg32.exeKmobii32.exeCgiohbfi.exePbljoafi.exedescription ioc process File created C:\Windows\SysWOW64\Dkclkqdm.dll Mfkcibdl.exe File created C:\Windows\SysWOW64\Gbnoiqdq.exe Gnqfcbnj.exe File created C:\Windows\SysWOW64\Paiogf32.exe Ppjbmc32.exe File created C:\Windows\SysWOW64\Blnfhilh.dll Hbenoi32.exe File opened for modification C:\Windows\SysWOW64\Nlcidopb.exe Mdghhb32.exe File created C:\Windows\SysWOW64\Bkjbah32.dll Kejloi32.exe File created C:\Windows\SysWOW64\Aghaqkii.dll Hcembe32.exe File created C:\Windows\SysWOW64\Lmhhbnla.dll Bbpeghpe.exe File created C:\Windows\SysWOW64\Ohlemeao.dll Jldbpl32.exe File opened for modification C:\Windows\SysWOW64\Ohncdobq.exe Nhlfoodc.exe File created C:\Windows\SysWOW64\Bhcbdkfh.dll Eeailhme.exe File created C:\Windows\SysWOW64\Mbiiah32.dll Hiinoc32.exe File created C:\Windows\SysWOW64\Odmqgd32.dll Feljgd32.exe File created C:\Windows\SysWOW64\Amfemoei.dll Eohhie32.exe File created C:\Windows\SysWOW64\Ojnkocdc.dll Mmhgmmbf.exe File created C:\Windows\SysWOW64\Jhkilook.dll Dkhgod32.exe File opened for modification C:\Windows\SysWOW64\Epcbbohh.exe Epaemojk.exe File created C:\Windows\SysWOW64\Gklnem32.exe Gikbneio.exe File opened for modification C:\Windows\SysWOW64\Qpcecb32.exe Ppahmb32.exe File created C:\Windows\SysWOW64\Cnjdpaki.exe Cpfcfmlp.exe File created C:\Windows\SysWOW64\Lchfib32.exe Lojmcdgl.exe File created C:\Windows\SysWOW64\Jopaaj32.dll Ibnjkbog.exe File opened for modification C:\Windows\SysWOW64\Llcghg32.exe Lancko32.exe File opened for modification C:\Windows\SysWOW64\Mablfnne.exe Mjggal32.exe File created C:\Windows\SysWOW64\Jmjkhghe.dll Ciqmjkno.exe File created C:\Windows\SysWOW64\Pfbmdabh.exe Poidhg32.exe File opened for modification C:\Windows\SysWOW64\Eljchpnl.exe Epcbbohh.exe File created C:\Windows\SysWOW64\Jglkkiea.exe Jikjmbmb.exe File created C:\Windows\SysWOW64\Iehkefih.dll Kcehejic.exe File opened for modification C:\Windows\SysWOW64\Aqpika32.exe Qggebl32.exe File created C:\Windows\SysWOW64\Mjjkejin.dll Jikoopij.exe File created C:\Windows\SysWOW64\Kocphojh.exe Kejloi32.exe File opened for modification C:\Windows\SysWOW64\Eippgckc.exe Ellpmolj.exe File opened for modification C:\Windows\SysWOW64\Lmheph32.exe Lmfhjhdm.exe File opened for modification C:\Windows\SysWOW64\Klbnajqc.exe Kplmliko.exe File created C:\Windows\SysWOW64\Cnidqf32.dll Fcneeo32.exe File created C:\Windows\SysWOW64\Ppbjhj32.dll Epaemojk.exe File created C:\Windows\SysWOW64\Nglcjfie.exe Nkebee32.exe File created C:\Windows\SysWOW64\Kiodha32.exe Kmhccpci.exe File opened for modification C:\Windows\SysWOW64\Ihmnldib.exe Icpecm32.exe File created C:\Windows\SysWOW64\Bfjebllk.dll Capkim32.exe File opened for modification C:\Windows\SysWOW64\Hhobjf32.exe Hhleefhe.exe File created C:\Windows\SysWOW64\Cgogbi32.dll Lchfib32.exe File created C:\Windows\SysWOW64\Hcembe32.exe Hjlhipbc.exe File opened for modification C:\Windows\SysWOW64\Iggocbke.exe Hnokjm32.exe File created C:\Windows\SysWOW64\Mejfbf32.dll Ndinck32.exe File created C:\Windows\SysWOW64\Ecgjjo32.dll Nglcjfie.exe File created C:\Windows\SysWOW64\Phiong32.dll Cbglgg32.exe File created C:\Windows\SysWOW64\Goglcahb.exe Gflhoo32.exe File opened for modification C:\Windows\SysWOW64\Holfoqcm.exe Gbeejp32.exe File created C:\Windows\SysWOW64\Dggbcf32.exe Dolmodpi.exe File created C:\Windows\SysWOW64\Bppcpc32.exe Apngjd32.exe File created C:\Windows\SysWOW64\Afhgoj32.dll Akjnnpcf.exe File created C:\Windows\SysWOW64\Ciqmjkno.exe Cjomldfp.exe File created C:\Windows\SysWOW64\Dojqjdbl.exe Cnjdpaki.exe File opened for modification C:\Windows\SysWOW64\Maaekg32.exe Mekdffee.exe File created C:\Windows\SysWOW64\Phmknd32.dll Kmmmnp32.exe File created C:\Windows\SysWOW64\Jfhlpnfp.exe Jakchf32.exe File created C:\Windows\SysWOW64\Delhpnop.dll Jcgldl32.exe File created C:\Windows\SysWOW64\Nhoped32.dll Pfojdh32.exe File created C:\Windows\SysWOW64\Eclbio32.dll Eajlhg32.exe File opened for modification C:\Windows\SysWOW64\Kifcnjpi.exe Kmobii32.exe File opened for modification C:\Windows\SysWOW64\Cpacqg32.exe Cgiohbfi.exe File created C:\Windows\SysWOW64\Aealll32.exe Pbljoafi.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 7660 7704 WerFault.exe Mbldhn32.exe -
Modifies registry class 64 IoCs
Processes:
Mhckcgpj.exeBmimdg32.exeAbbiej32.exeMnmmboed.exeFcaqka32.exeIhmnldib.exeNandhi32.exeIggocbke.exeBichcc32.exeJjemle32.exeMcelpggq.exeJaonbc32.exeLcclncbh.exeKdhbpf32.exeGcngafol.exePjlnhi32.exeBgeadjai.exeLobhqdec.exeAealll32.exeLacbpccn.exeAinnhdbp.exeJobfdl32.exeNapameoi.exeGlbapoqh.exeCgiohbfi.exeDalofi32.exeEahjqicj.exeKejloi32.exeGklnem32.exeMjggal32.exeEnhifi32.exeIjmhkchl.exeHcipcnac.exePgihanii.exePpolhcnm.exeJohggfha.exeMoefdljc.exeAfkipi32.exeBkefphem.exeGqmnpk32.exeFpnkdfko.exeIhdldn32.exeKfidgk32.exeMhnjna32.exeOeffnl32.exeDefajqko.exeObnnnc32.exeBnbmqjjo.exeCinpdl32.exeKlbgfc32.exeGeklckkd.exeFkehdnee.exeEnbhdojn.exeNceefd32.exeHbgkei32.exeOikjkc32.exeLelajb32.exePdmikb32.exeHnpaec32.exeGegchl32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghcfpl32.dll" Mhckcgpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmimdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpqellmb.dll" Abbiej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hilpobpd.dll" Mnmmboed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjfbiobf.dll" Fcaqka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihmnldib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfhlfj32.dll" Nandhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iggocbke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bichcc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjemle32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcelpggq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jaonbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgnpek32.dll" Lcclncbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdhbpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gcngafol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcaqka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llpqoe32.dll" Pjlnhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgeadjai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lobhqdec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lanhkb32.dll" Aealll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lacbpccn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igadaq32.dll" Ainnhdbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jobfdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mejcig32.dll" Napameoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkfnoi32.dll" Glbapoqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgiohbfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dalofi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eahjqicj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kejloi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmqljn32.dll" Gklnem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjggal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjeejn32.dll" Enhifi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijmhkchl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfebnlgm.dll" Hcipcnac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpiinc32.dll" Pgihanii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppolhcnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Johggfha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Moefdljc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afkipi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pecpko32.dll" Bkefphem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Napameoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gqmnpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ceiemclg.dll" Fpnkdfko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pboglh32.dll" Ihdldn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kfidgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhnjna32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oeffnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Defajqko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Obnnnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fflnkhef.dll" Obnnnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plogne32.dll" Bnbmqjjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cinpdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Klbgfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abbiej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Geklckkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fkehdnee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omecabkc.dll" Enbhdojn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nceefd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbgkei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oikjkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lelajb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdmikb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdelednc.dll" Hnpaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gegchl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47.exeFbelcblk.exeFnnjmbpm.exeGnqfcbnj.exeGbnoiqdq.exeGflhoo32.exeGoglcahb.exeGbeejp32.exeHolfoqcm.exeHffken32.exeHekgfj32.exeHemdlj32.exeIebngial.exeKckqbj32.exeKjlopc32.exeLnjgfb32.exeLlodgnja.exeLjceqb32.exeLckiihok.exeMmfkhmdi.exeMmhgmmbf.exeMfqlfb32.exedescription pid process target process PID 1712 wrote to memory of 3640 1712 3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47.exe Fbelcblk.exe PID 1712 wrote to memory of 3640 1712 3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47.exe Fbelcblk.exe PID 1712 wrote to memory of 3640 1712 3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47.exe Fbelcblk.exe PID 3640 wrote to memory of 820 3640 Fbelcblk.exe Fnnjmbpm.exe PID 3640 wrote to memory of 820 3640 Fbelcblk.exe Fnnjmbpm.exe PID 3640 wrote to memory of 820 3640 Fbelcblk.exe Fnnjmbpm.exe PID 820 wrote to memory of 3808 820 Fnnjmbpm.exe Gnqfcbnj.exe PID 820 wrote to memory of 3808 820 Fnnjmbpm.exe Gnqfcbnj.exe PID 820 wrote to memory of 3808 820 Fnnjmbpm.exe Gnqfcbnj.exe PID 3808 wrote to memory of 5108 3808 Gnqfcbnj.exe Gbnoiqdq.exe PID 3808 wrote to memory of 5108 3808 Gnqfcbnj.exe Gbnoiqdq.exe PID 3808 wrote to memory of 5108 3808 Gnqfcbnj.exe Gbnoiqdq.exe PID 5108 wrote to memory of 1964 5108 Gbnoiqdq.exe Gflhoo32.exe PID 5108 wrote to memory of 1964 5108 Gbnoiqdq.exe Gflhoo32.exe PID 5108 wrote to memory of 1964 5108 Gbnoiqdq.exe Gflhoo32.exe PID 1964 wrote to memory of 2108 1964 Gflhoo32.exe Goglcahb.exe PID 1964 wrote to memory of 2108 1964 Gflhoo32.exe Goglcahb.exe PID 1964 wrote to memory of 2108 1964 Gflhoo32.exe Goglcahb.exe PID 2108 wrote to memory of 220 2108 Goglcahb.exe Gbeejp32.exe PID 2108 wrote to memory of 220 2108 Goglcahb.exe Gbeejp32.exe PID 2108 wrote to memory of 220 2108 Goglcahb.exe Gbeejp32.exe PID 220 wrote to memory of 3472 220 Gbeejp32.exe Holfoqcm.exe PID 220 wrote to memory of 3472 220 Gbeejp32.exe Holfoqcm.exe PID 220 wrote to memory of 3472 220 Gbeejp32.exe Holfoqcm.exe PID 3472 wrote to memory of 4912 3472 Holfoqcm.exe Hffken32.exe PID 3472 wrote to memory of 4912 3472 Holfoqcm.exe Hffken32.exe PID 3472 wrote to memory of 4912 3472 Holfoqcm.exe Hffken32.exe PID 4912 wrote to memory of 3784 4912 Hffken32.exe Hekgfj32.exe PID 4912 wrote to memory of 3784 4912 Hffken32.exe Hekgfj32.exe PID 4912 wrote to memory of 3784 4912 Hffken32.exe Hekgfj32.exe PID 3784 wrote to memory of 1996 3784 Hekgfj32.exe Hemdlj32.exe PID 3784 wrote to memory of 1996 3784 Hekgfj32.exe Hemdlj32.exe PID 3784 wrote to memory of 1996 3784 Hekgfj32.exe Hemdlj32.exe PID 1996 wrote to memory of 1856 1996 Hemdlj32.exe Iebngial.exe PID 1996 wrote to memory of 1856 1996 Hemdlj32.exe Iebngial.exe PID 1996 wrote to memory of 1856 1996 Hemdlj32.exe Iebngial.exe PID 1856 wrote to memory of 4088 1856 Iebngial.exe Kckqbj32.exe PID 1856 wrote to memory of 4088 1856 Iebngial.exe Kckqbj32.exe PID 1856 wrote to memory of 4088 1856 Iebngial.exe Kckqbj32.exe PID 4088 wrote to memory of 3528 4088 Kckqbj32.exe Kjlopc32.exe PID 4088 wrote to memory of 3528 4088 Kckqbj32.exe Kjlopc32.exe PID 4088 wrote to memory of 3528 4088 Kckqbj32.exe Kjlopc32.exe PID 3528 wrote to memory of 3396 3528 Kjlopc32.exe Lnjgfb32.exe PID 3528 wrote to memory of 3396 3528 Kjlopc32.exe Lnjgfb32.exe PID 3528 wrote to memory of 3396 3528 Kjlopc32.exe Lnjgfb32.exe PID 3396 wrote to memory of 3096 3396 Lnjgfb32.exe Llodgnja.exe PID 3396 wrote to memory of 3096 3396 Lnjgfb32.exe Llodgnja.exe PID 3396 wrote to memory of 3096 3396 Lnjgfb32.exe Llodgnja.exe PID 3096 wrote to memory of 2304 3096 Llodgnja.exe Ljceqb32.exe PID 3096 wrote to memory of 2304 3096 Llodgnja.exe Ljceqb32.exe PID 3096 wrote to memory of 2304 3096 Llodgnja.exe Ljceqb32.exe PID 2304 wrote to memory of 2092 2304 Ljceqb32.exe Lckiihok.exe PID 2304 wrote to memory of 2092 2304 Ljceqb32.exe Lckiihok.exe PID 2304 wrote to memory of 2092 2304 Ljceqb32.exe Lckiihok.exe PID 2092 wrote to memory of 1992 2092 Lckiihok.exe Mmfkhmdi.exe PID 2092 wrote to memory of 1992 2092 Lckiihok.exe Mmfkhmdi.exe PID 2092 wrote to memory of 1992 2092 Lckiihok.exe Mmfkhmdi.exe PID 1992 wrote to memory of 2276 1992 Mmfkhmdi.exe Mmhgmmbf.exe PID 1992 wrote to memory of 2276 1992 Mmfkhmdi.exe Mmhgmmbf.exe PID 1992 wrote to memory of 2276 1992 Mmfkhmdi.exe Mmhgmmbf.exe PID 2276 wrote to memory of 4676 2276 Mmhgmmbf.exe Mfqlfb32.exe PID 2276 wrote to memory of 4676 2276 Mmhgmmbf.exe Mfqlfb32.exe PID 2276 wrote to memory of 4676 2276 Mmhgmmbf.exe Mfqlfb32.exe PID 4676 wrote to memory of 3940 4676 Mfqlfb32.exe Mcelpggq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47.exe"C:\Users\Admin\AppData\Local\Temp\3390fd11cbb9d0f74ee031faeba011104188170edc5fa2fc18b49278ae39ed47.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\Fbelcblk.exeC:\Windows\system32\Fbelcblk.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\Fnnjmbpm.exeC:\Windows\system32\Fnnjmbpm.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\Gnqfcbnj.exeC:\Windows\system32\Gnqfcbnj.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\Gbnoiqdq.exeC:\Windows\system32\Gbnoiqdq.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\Gflhoo32.exeC:\Windows\system32\Gflhoo32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\Goglcahb.exeC:\Windows\system32\Goglcahb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\Gbeejp32.exeC:\Windows\system32\Gbeejp32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Holfoqcm.exeC:\Windows\system32\Holfoqcm.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\Hffken32.exeC:\Windows\system32\Hffken32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\Hekgfj32.exeC:\Windows\system32\Hekgfj32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\Hemdlj32.exeC:\Windows\system32\Hemdlj32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\Iebngial.exeC:\Windows\system32\Iebngial.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\Kckqbj32.exeC:\Windows\system32\Kckqbj32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\Kjlopc32.exeC:\Windows\system32\Kjlopc32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\Lnjgfb32.exeC:\Windows\system32\Lnjgfb32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\Llodgnja.exeC:\Windows\system32\Llodgnja.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\Ljceqb32.exeC:\Windows\system32\Ljceqb32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Lckiihok.exeC:\Windows\system32\Lckiihok.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Mmfkhmdi.exeC:\Windows\system32\Mmfkhmdi.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\Mmhgmmbf.exeC:\Windows\system32\Mmhgmmbf.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\Mfqlfb32.exeC:\Windows\system32\Mfqlfb32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\Mcelpggq.exeC:\Windows\system32\Mcelpggq.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:3940 -
C:\Windows\SysWOW64\Mqimikfj.exeC:\Windows\system32\Mqimikfj.exe24⤵
- Executes dropped EXE
PID:3960 -
C:\Windows\SysWOW64\Mnmmboed.exeC:\Windows\system32\Mnmmboed.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:2056 -
C:\Windows\SysWOW64\Mfhbga32.exeC:\Windows\system32\Mfhbga32.exe26⤵
- Executes dropped EXE
PID:3988 -
C:\Windows\SysWOW64\Nfjola32.exeC:\Windows\system32\Nfjola32.exe27⤵
- Executes dropped EXE
PID:400 -
C:\Windows\SysWOW64\Ngjkfd32.exeC:\Windows\system32\Ngjkfd32.exe28⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\SysWOW64\Nnfpinmi.exeC:\Windows\system32\Nnfpinmi.exe29⤵
- Executes dropped EXE
PID:724 -
C:\Windows\SysWOW64\Nceefd32.exeC:\Windows\system32\Nceefd32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:64 -
C:\Windows\SysWOW64\Onmfimga.exeC:\Windows\system32\Onmfimga.exe31⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\Ofkgcobj.exeC:\Windows\system32\Ofkgcobj.exe32⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\Ofmdio32.exeC:\Windows\system32\Ofmdio32.exe33⤵
- Executes dropped EXE
PID:1220 -
C:\Windows\SysWOW64\Pfoann32.exeC:\Windows\system32\Pfoann32.exe34⤵
- Executes dropped EXE
PID:3132 -
C:\Windows\SysWOW64\Phonha32.exeC:\Windows\system32\Phonha32.exe35⤵
- Executes dropped EXE
PID:4288 -
C:\Windows\SysWOW64\Ppjbmc32.exeC:\Windows\system32\Ppjbmc32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3080 -
C:\Windows\SysWOW64\Paiogf32.exeC:\Windows\system32\Paiogf32.exe37⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\Ppolhcnm.exeC:\Windows\system32\Ppolhcnm.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:4956 -
C:\Windows\SysWOW64\Ppahmb32.exeC:\Windows\system32\Ppahmb32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\Qpcecb32.exeC:\Windows\system32\Qpcecb32.exe40⤵
- Executes dropped EXE
PID:4040 -
C:\Windows\SysWOW64\Qpeahb32.exeC:\Windows\system32\Qpeahb32.exe41⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\Aogbfi32.exeC:\Windows\system32\Aogbfi32.exe42⤵
- Executes dropped EXE
PID:1044 -
C:\Windows\SysWOW64\Afbgkl32.exeC:\Windows\system32\Afbgkl32.exe43⤵
- Executes dropped EXE
PID:688 -
C:\Windows\SysWOW64\Agdcpkll.exeC:\Windows\system32\Agdcpkll.exe44⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\Aonhghjl.exeC:\Windows\system32\Aonhghjl.exe45⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\SysWOW64\Aopemh32.exeC:\Windows\system32\Aopemh32.exe46⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\Bdmmeo32.exeC:\Windows\system32\Bdmmeo32.exe47⤵
- Executes dropped EXE
PID:4184 -
C:\Windows\SysWOW64\Bobabg32.exeC:\Windows\system32\Bobabg32.exe48⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Bpfkpp32.exeC:\Windows\system32\Bpfkpp32.exe49⤵
- Executes dropped EXE
PID:3212 -
C:\Windows\SysWOW64\Bmjkic32.exeC:\Windows\system32\Bmjkic32.exe50⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\Boihcf32.exeC:\Windows\system32\Boihcf32.exe51⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\Bgelgi32.exeC:\Windows\system32\Bgelgi32.exe52⤵
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\Cdimqm32.exeC:\Windows\system32\Cdimqm32.exe53⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\Cponen32.exeC:\Windows\system32\Cponen32.exe54⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\Cncnob32.exeC:\Windows\system32\Cncnob32.exe55⤵
- Executes dropped EXE
PID:4180 -
C:\Windows\SysWOW64\Ckgohf32.exeC:\Windows\system32\Ckgohf32.exe56⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Cpdgqmnb.exeC:\Windows\system32\Cpdgqmnb.exe57⤵
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\Cpfcfmlp.exeC:\Windows\system32\Cpfcfmlp.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1860 -
C:\Windows\SysWOW64\Cnjdpaki.exeC:\Windows\system32\Cnjdpaki.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4624 -
C:\Windows\SysWOW64\Dojqjdbl.exeC:\Windows\system32\Dojqjdbl.exe60⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\Dolmodpi.exeC:\Windows\system32\Dolmodpi.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5056 -
C:\Windows\SysWOW64\Dggbcf32.exeC:\Windows\system32\Dggbcf32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Ddkbmj32.exeC:\Windows\system32\Ddkbmj32.exe63⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\Dbocfo32.exeC:\Windows\system32\Dbocfo32.exe64⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\SysWOW64\Dkhgod32.exeC:\Windows\system32\Dkhgod32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4496 -
C:\Windows\SysWOW64\Egohdegl.exeC:\Windows\system32\Egohdegl.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2968 -
C:\Windows\SysWOW64\Ebfign32.exeC:\Windows\system32\Ebfign32.exe67⤵PID:2780
-
C:\Windows\SysWOW64\Ekonpckp.exeC:\Windows\system32\Ekonpckp.exe68⤵PID:1572
-
C:\Windows\SysWOW64\Eomffaag.exeC:\Windows\system32\Eomffaag.exe69⤵PID:4444
-
C:\Windows\SysWOW64\Eghkjdoa.exeC:\Windows\system32\Eghkjdoa.exe70⤵PID:3004
-
C:\Windows\SysWOW64\Fqppci32.exeC:\Windows\system32\Fqppci32.exe71⤵PID:3636
-
C:\Windows\SysWOW64\Foapaa32.exeC:\Windows\system32\Foapaa32.exe72⤵PID:3400
-
C:\Windows\SysWOW64\Fdnhih32.exeC:\Windows\system32\Fdnhih32.exe73⤵PID:380
-
C:\Windows\SysWOW64\Fqeioiam.exeC:\Windows\system32\Fqeioiam.exe74⤵PID:4556
-
C:\Windows\SysWOW64\Fecadghc.exeC:\Windows\system32\Fecadghc.exe75⤵PID:3996
-
C:\Windows\SysWOW64\Feenjgfq.exeC:\Windows\system32\Feenjgfq.exe76⤵PID:4048
-
C:\Windows\SysWOW64\Gpmomo32.exeC:\Windows\system32\Gpmomo32.exe77⤵PID:2508
-
C:\Windows\SysWOW64\Ganldgib.exeC:\Windows\system32\Ganldgib.exe78⤵PID:1264
-
C:\Windows\SysWOW64\Gndick32.exeC:\Windows\system32\Gndick32.exe79⤵PID:3028
-
C:\Windows\SysWOW64\Glhimp32.exeC:\Windows\system32\Glhimp32.exe80⤵PID:5160
-
C:\Windows\SysWOW64\Ghojbq32.exeC:\Windows\system32\Ghojbq32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5200 -
C:\Windows\SysWOW64\Hbenoi32.exeC:\Windows\system32\Hbenoi32.exe82⤵
- Drops file in System32 directory
PID:5240 -
C:\Windows\SysWOW64\Hbgkei32.exeC:\Windows\system32\Hbgkei32.exe83⤵
- Modifies registry class
PID:5308 -
C:\Windows\SysWOW64\Ieagmcmq.exeC:\Windows\system32\Ieagmcmq.exe84⤵PID:5372
-
C:\Windows\SysWOW64\Ieccbbkn.exeC:\Windows\system32\Ieccbbkn.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5448 -
C:\Windows\SysWOW64\Iolhkh32.exeC:\Windows\system32\Iolhkh32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5492 -
C:\Windows\SysWOW64\Ihdldn32.exeC:\Windows\system32\Ihdldn32.exe87⤵
- Modifies registry class
PID:5560 -
C:\Windows\SysWOW64\Ibjqaf32.exeC:\Windows\system32\Ibjqaf32.exe88⤵PID:5616
-
C:\Windows\SysWOW64\Jpnakk32.exeC:\Windows\system32\Jpnakk32.exe89⤵PID:5684
-
C:\Windows\SysWOW64\Jaonbc32.exeC:\Windows\system32\Jaonbc32.exe90⤵
- Modifies registry class
PID:5732 -
C:\Windows\SysWOW64\Jldbpl32.exeC:\Windows\system32\Jldbpl32.exe91⤵
- Drops file in System32 directory
PID:5776 -
C:\Windows\SysWOW64\Jhkbdmbg.exeC:\Windows\system32\Jhkbdmbg.exe92⤵PID:5820
-
C:\Windows\SysWOW64\Jikoopij.exeC:\Windows\system32\Jikoopij.exe93⤵
- Drops file in System32 directory
PID:5860 -
C:\Windows\SysWOW64\Johggfha.exeC:\Windows\system32\Johggfha.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5924 -
C:\Windows\SysWOW64\Kplmliko.exeC:\Windows\system32\Kplmliko.exe95⤵
- Drops file in System32 directory
PID:5968 -
C:\Windows\SysWOW64\Klbnajqc.exeC:\Windows\system32\Klbnajqc.exe96⤵PID:6012
-
C:\Windows\SysWOW64\Kpqggh32.exeC:\Windows\system32\Kpqggh32.exe97⤵PID:6056
-
C:\Windows\SysWOW64\Kemooo32.exeC:\Windows\system32\Kemooo32.exe98⤵PID:6104
-
C:\Windows\SysWOW64\Lepleocn.exeC:\Windows\system32\Lepleocn.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5140 -
C:\Windows\SysWOW64\Lcclncbh.exeC:\Windows\system32\Lcclncbh.exe100⤵
- Modifies registry class
PID:5192 -
C:\Windows\SysWOW64\Lojmcdgl.exeC:\Windows\system32\Lojmcdgl.exe101⤵
- Drops file in System32 directory
PID:5296 -
C:\Windows\SysWOW64\Lchfib32.exeC:\Windows\system32\Lchfib32.exe102⤵
- Drops file in System32 directory
PID:5344 -
C:\Windows\SysWOW64\Lancko32.exeC:\Windows\system32\Lancko32.exe103⤵
- Drops file in System32 directory
PID:5500 -
C:\Windows\SysWOW64\Llcghg32.exeC:\Windows\system32\Llcghg32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5608 -
C:\Windows\SysWOW64\Mjggal32.exeC:\Windows\system32\Mjggal32.exe105⤵
- Drops file in System32 directory
- Modifies registry class
PID:5740 -
C:\Windows\SysWOW64\Mablfnne.exeC:\Windows\system32\Mablfnne.exe106⤵PID:5808
-
C:\Windows\SysWOW64\Mcaipa32.exeC:\Windows\system32\Mcaipa32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5888 -
C:\Windows\SysWOW64\Mpeiie32.exeC:\Windows\system32\Mpeiie32.exe108⤵PID:5980
-
C:\Windows\SysWOW64\Mhanngbl.exeC:\Windows\system32\Mhanngbl.exe109⤵PID:6076
-
C:\Windows\SysWOW64\Mhckcgpj.exeC:\Windows\system32\Mhckcgpj.exe110⤵
- Modifies registry class
PID:6140 -
C:\Windows\SysWOW64\Nhegig32.exeC:\Windows\system32\Nhegig32.exe111⤵PID:5228
-
C:\Windows\SysWOW64\Ncmhko32.exeC:\Windows\system32\Ncmhko32.exe112⤵PID:5328
-
C:\Windows\SysWOW64\Nqaiecjd.exeC:\Windows\system32\Nqaiecjd.exe113⤵PID:5568
-
C:\Windows\SysWOW64\Nimmifgo.exeC:\Windows\system32\Nimmifgo.exe114⤵PID:5812
-
C:\Windows\SysWOW64\Nofefp32.exeC:\Windows\system32\Nofefp32.exe115⤵PID:5956
-
C:\Windows\SysWOW64\Njljch32.exeC:\Windows\system32\Njljch32.exe116⤵PID:6040
-
C:\Windows\SysWOW64\Ommceclc.exeC:\Windows\system32\Ommceclc.exe117⤵PID:5148
-
C:\Windows\SysWOW64\Objkmkjj.exeC:\Windows\system32\Objkmkjj.exe118⤵PID:5400
-
C:\Windows\SysWOW64\Ojcpdg32.exeC:\Windows\system32\Ojcpdg32.exe119⤵PID:5544
-
C:\Windows\SysWOW64\Obnehj32.exeC:\Windows\system32\Obnehj32.exe120⤵PID:5844
-
C:\Windows\SysWOW64\Oikjkc32.exeC:\Windows\system32\Oikjkc32.exe121⤵
- Modifies registry class
PID:6020 -
C:\Windows\SysWOW64\Pfojdh32.exeC:\Windows\system32\Pfojdh32.exe122⤵
- Drops file in System32 directory
PID:5208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-