Analysis
-
max time kernel
141s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:54
Static task
static1
Behavioral task
behavioral1
Sample
667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe
Resource
win10v2004-20240226-en
General
-
Target
667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe
-
Size
80KB
-
MD5
094f13de7c15a9f3db15ae688c54cc10
-
SHA1
3055c8ca6d9284b00cbee7c45ae8b9351fc28106
-
SHA256
667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0
-
SHA512
97168aa44be756cc9543996d045f63cbe0aa41462545092a76d7fbeef848789508aaa2ed8361e77f4661ffaede800d190af871fea5f8f0e5bea602ca1b9af10b
-
SSDEEP
1536:aGfQUClZjvsVtuf5aLo/WAwMB75xA2L+2S5DUHRbPa9b6i+sIk:52ZDKtS54o/XrBfxXS5DSCopsIk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Afkipi32.exeGkcdfl32.exePnfdnnbo.exeJkomhhae.exeCefoni32.exeKhhaanop.exeLennpb32.exeLijlii32.exeFidbgm32.exePjlnhi32.exe667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exeLkppchfi.exeMmebpbod.exeJkfcigkm.exeBhgjcmfi.exeGkhbbi32.exeHcgjhega.exeHjlaoioh.exeEimelg32.exeKbedaand.exeNbjpjl32.exeIholohii.exeJaljbmkd.exeAioebj32.exeHcifmdeo.exeQjeaog32.exePfbfjk32.exeDgdgijhp.exeIqfcbahb.exeGmfkjl32.exeKmkpipaf.exeMaeaajpl.exeLhpnlclc.exeGaffbg32.exeJkhpogij.exeDhbqalle.exeEblgon32.exeBelemd32.exeFhiinbdo.exeFkbkoo32.exeBbeobhlp.exePiaiqlak.exeLckglc32.exeJfdafa32.exeKilphk32.exeOmcbkl32.exeKdjhkp32.exeGgdbmoho.exeOgbbqo32.exeIhgnfnjl.exeFdbkja32.exeJokpcmmj.exeEhhpge32.exeCpcila32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afkipi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkcdfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnfdnnbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkomhhae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cefoni32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khhaanop.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lennpb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lijlii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fidbgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjlnhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkppchfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmebpbod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkfcigkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhgjcmfi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkhbbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcgjhega.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lennpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjlaoioh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eimelg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbedaand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lijlii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbjpjl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iholohii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jaljbmkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aioebj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcifmdeo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjeaog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfbfjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgdgijhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iqfcbahb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmfkjl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmkpipaf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maeaajpl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhpnlclc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcgjhega.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkfcigkm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaffbg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkhpogij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhbqalle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eblgon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkppchfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Belemd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhiinbdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbjpjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkbkoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aioebj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbeobhlp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Piaiqlak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lckglc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfdafa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kilphk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omcbkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdjhkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggdbmoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogbbqo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihgnfnjl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdbkja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjlaoioh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jokpcmmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehhpge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpcila32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcifmdeo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Belemd32.exe -
Executes dropped EXE 64 IoCs
Processes:
Fdbkja32.exeGkhbbi32.exeHeepfn32.exeIholohii.exeJaljbmkd.exeJeaiij32.exeKlddlckd.exeLhpnlclc.exeNefdbekh.exeOmcbkl32.exePiaiqlak.exeAioebj32.exeAidomjaf.exeBlknpdho.exeCefoni32.exeCdlhgpag.exeCpcila32.exeDgdgijhp.exeEpaemojk.exeEcanojgl.exeEcdkdj32.exeFdhail32.exeFgncff32.exeGcimfg32.exeGmfkjl32.exeHcgjhega.exeHcifmdeo.exeKmlgcf32.exeKjbdbjbi.exeKdjhkp32.exeKhhaanop.exeLennpb32.exeLkppchfi.exeMaoakaip.exeMmebpbod.exeOnakco32.exePoagma32.exePnfdnnbo.exePfbfjk32.exeQbmpjkqk.exeAfkipi32.exeBelemd32.exeBbeobhlp.exeCblebgfh.exeDhbqalle.exeEpbkhhel.exeEfampahd.exeFidbgm32.exeGebimmco.exeGgdbmoho.exeHcommoin.exeHjlaoioh.exeImcqacfq.exeIqfcbahb.exeJokpcmmj.exeJikjmbmb.exeKmkpipaf.exeLcealh32.exeMaeaajpl.exeOgbbqo32.exeOnqdhh32.exePjlnhi32.exeQjeaog32.exeAgiahlkf.exepid process 2248 Fdbkja32.exe 4348 Gkhbbi32.exe 1468 Heepfn32.exe 4268 Iholohii.exe 3440 Jaljbmkd.exe 3576 Jeaiij32.exe 4572 Klddlckd.exe 1172 Lhpnlclc.exe 1400 Nefdbekh.exe 2516 Omcbkl32.exe 4616 Piaiqlak.exe 1376 Aioebj32.exe 644 Aidomjaf.exe 812 Blknpdho.exe 4416 Cefoni32.exe 4988 Cdlhgpag.exe 3320 Cpcila32.exe 4940 Dgdgijhp.exe 864 Epaemojk.exe 4152 Ecanojgl.exe 3732 Ecdkdj32.exe 4012 Fdhail32.exe 1972 Fgncff32.exe 4600 Gcimfg32.exe 4408 Gmfkjl32.exe 940 Hcgjhega.exe 2136 Hcifmdeo.exe 2672 Kmlgcf32.exe 832 Kjbdbjbi.exe 748 Kdjhkp32.exe 216 Khhaanop.exe 4476 Lennpb32.exe 4496 Lkppchfi.exe 1416 Maoakaip.exe 436 Mmebpbod.exe 836 Onakco32.exe 5080 Poagma32.exe 4360 Pnfdnnbo.exe 672 Pfbfjk32.exe 3396 Qbmpjkqk.exe 4732 Afkipi32.exe 4396 Belemd32.exe 2252 Bbeobhlp.exe 640 Cblebgfh.exe 960 Dhbqalle.exe 2592 Epbkhhel.exe 1548 Efampahd.exe 2908 Fidbgm32.exe 4956 Gebimmco.exe 1340 Ggdbmoho.exe 452 Hcommoin.exe 1424 Hjlaoioh.exe 4468 Imcqacfq.exe 376 Iqfcbahb.exe 1576 Jokpcmmj.exe 3080 Jikjmbmb.exe 2540 Kmkpipaf.exe 3912 Lcealh32.exe 2816 Maeaajpl.exe 1116 Ogbbqo32.exe 1708 Onqdhh32.exe 3532 Pjlnhi32.exe 4352 Qjeaog32.exe 624 Agiahlkf.exe -
Drops file in System32 directory 64 IoCs
Processes:
Iholohii.exeCefoni32.exeFgncff32.exePfbfjk32.exeKoiejemn.exe667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exeEcdkdj32.exeKdjhkp32.exeOnakco32.exeKkofofbb.exeOgbbqo32.exeEblgon32.exeEelpqi32.exeCdlhgpag.exeEcanojgl.exeCblebgfh.exeDhbqalle.exeKmkpipaf.exeGikbneio.exeMpenmadn.exeEfampahd.exeGgdbmoho.exeCbknhqbl.exeGkcdfl32.exeKlddlckd.exeCpcila32.exeHcommoin.exeJkhpogij.exeNpgjbabk.exeEpaemojk.exeIhgnfnjl.exeJfdafa32.exeIkmpcicg.exeKmlgcf32.exeKjbdbjbi.exeKhhaanop.exeHkjjfkcm.exeBbeobhlp.exeFidbgm32.exeMaeaajpl.exeGkhbbi32.exeGebimmco.exeOnqdhh32.exeEimelg32.exeFhiinbdo.exeFdbkja32.exeNefdbekh.exeAioebj32.exedescription ioc process File created C:\Windows\SysWOW64\Pakfglam.dll Iholohii.exe File opened for modification C:\Windows\SysWOW64\Cdlhgpag.exe Cefoni32.exe File created C:\Windows\SysWOW64\Gcimfg32.exe Fgncff32.exe File created C:\Windows\SysWOW64\Qbmpjkqk.exe Pfbfjk32.exe File opened for modification C:\Windows\SysWOW64\Kkofofbb.exe Koiejemn.exe File opened for modification C:\Windows\SysWOW64\Fdbkja32.exe 667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe File opened for modification C:\Windows\SysWOW64\Fdhail32.exe Ecdkdj32.exe File created C:\Windows\SysWOW64\Pelkha32.dll Kdjhkp32.exe File created C:\Windows\SysWOW64\Eipbcl32.dll Onakco32.exe File opened for modification C:\Windows\SysWOW64\Lckglc32.exe Kkofofbb.exe File opened for modification C:\Windows\SysWOW64\Onqdhh32.exe Ogbbqo32.exe File created C:\Windows\SysWOW64\Ehhpge32.exe Eblgon32.exe File created C:\Windows\SysWOW64\Eimelg32.exe Eelpqi32.exe File created C:\Windows\SysWOW64\Cpcila32.exe Cdlhgpag.exe File created C:\Windows\SysWOW64\Nnomjn32.dll Ecanojgl.exe File opened for modification C:\Windows\SysWOW64\Dhbqalle.exe Cblebgfh.exe File created C:\Windows\SysWOW64\Epbkhhel.exe Dhbqalle.exe File created C:\Windows\SysWOW64\Kofhqmba.dll Kmkpipaf.exe File opened for modification C:\Windows\SysWOW64\Gaffbg32.exe Gikbneio.exe File created C:\Windows\SysWOW64\Npgjbabk.exe Mpenmadn.exe File created C:\Windows\SysWOW64\Pdkpjeba.dll Cdlhgpag.exe File created C:\Windows\SysWOW64\Fidbgm32.exe Efampahd.exe File opened for modification C:\Windows\SysWOW64\Hcommoin.exe Ggdbmoho.exe File opened for modification C:\Windows\SysWOW64\Eblgon32.exe Cbknhqbl.exe File created C:\Windows\SysWOW64\Hkjjfkcm.exe Gkcdfl32.exe File opened for modification C:\Windows\SysWOW64\Lhpnlclc.exe Klddlckd.exe File created C:\Windows\SysWOW64\Dgdgijhp.exe Cpcila32.exe File created C:\Windows\SysWOW64\Hgnlgdfg.dll Hcommoin.exe File opened for modification C:\Windows\SysWOW64\Ehhpge32.exe Eblgon32.exe File created C:\Windows\SysWOW64\Bdnhjgbo.dll Jkhpogij.exe File created C:\Windows\SysWOW64\Nbjpjl32.exe Npgjbabk.exe File created C:\Windows\SysWOW64\Johmahhb.dll Epaemojk.exe File created C:\Windows\SysWOW64\Dhbqalle.exe Cblebgfh.exe File opened for modification C:\Windows\SysWOW64\Fidbgm32.exe Efampahd.exe File opened for modification C:\Windows\SysWOW64\Ikmpcicg.exe Ihgnfnjl.exe File created C:\Windows\SysWOW64\Pfffnphj.dll Jfdafa32.exe File opened for modification C:\Windows\SysWOW64\Jkomhhae.exe Ikmpcicg.exe File created C:\Windows\SysWOW64\Qlhomk32.dll Kkofofbb.exe File created C:\Windows\SysWOW64\Kjbdbjbi.exe Kmlgcf32.exe File created C:\Windows\SysWOW64\Ippephla.dll Kjbdbjbi.exe File opened for modification C:\Windows\SysWOW64\Lennpb32.exe Khhaanop.exe File created C:\Windows\SysWOW64\Gdffjckl.dll Gikbneio.exe File opened for modification C:\Windows\SysWOW64\Ihgnfnjl.exe Hkjjfkcm.exe File created C:\Windows\SysWOW64\Cblebgfh.exe Bbeobhlp.exe File created C:\Windows\SysWOW64\Ffdcne32.dll Fidbgm32.exe File opened for modification C:\Windows\SysWOW64\Ogbbqo32.exe Maeaajpl.exe File created C:\Windows\SysWOW64\Gaffbg32.exe Gikbneio.exe File opened for modification C:\Windows\SysWOW64\Heepfn32.exe Gkhbbi32.exe File opened for modification C:\Windows\SysWOW64\Ggdbmoho.exe Gebimmco.exe File opened for modification C:\Windows\SysWOW64\Pjlnhi32.exe Onqdhh32.exe File opened for modification C:\Windows\SysWOW64\Fkbkoo32.exe Eimelg32.exe File created C:\Windows\SysWOW64\Akcnekdp.dll Mpenmadn.exe File created C:\Windows\SysWOW64\Cdlhgpag.exe Cefoni32.exe File created C:\Windows\SysWOW64\Emjfif32.dll Bbeobhlp.exe File opened for modification C:\Windows\SysWOW64\Femigg32.exe Fhiinbdo.exe File opened for modification C:\Windows\SysWOW64\Gkhbbi32.exe Fdbkja32.exe File created C:\Windows\SysWOW64\Omcbkl32.exe Nefdbekh.exe File created C:\Windows\SysWOW64\Kfhfap32.dll Aioebj32.exe File opened for modification C:\Windows\SysWOW64\Kdjhkp32.exe Kjbdbjbi.exe File opened for modification C:\Windows\SysWOW64\Lcealh32.exe Kmkpipaf.exe File created C:\Windows\SysWOW64\Hmcipf32.dll 667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe File opened for modification C:\Windows\SysWOW64\Cpcila32.exe Cdlhgpag.exe File opened for modification C:\Windows\SysWOW64\Poagma32.exe Onakco32.exe File created C:\Windows\SysWOW64\Jkomhhae.exe Ikmpcicg.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5880 5632 WerFault.exe Nleaha32.exe -
Modifies registry class 64 IoCs
Processes:
Omcbkl32.exeFgncff32.exeMaoakaip.exeIhgnfnjl.exeEcanojgl.exeEblgon32.exeFkbkoo32.exeNbjpjl32.exeEpaemojk.exeEcdkdj32.exeLkppchfi.exeOnakco32.exeEfampahd.exeAidomjaf.exeCefoni32.exeFhiinbdo.exeJeaiij32.exePfbfjk32.exeBbeobhlp.exeIqfcbahb.exeLcealh32.exeFiclmf32.exeKkofofbb.exeHcifmdeo.exeOnqdhh32.exeMpbaga32.exeMmebpbod.exeGebimmco.exeMaeaajpl.exeGaffbg32.exeGhbkdald.exeQbmpjkqk.exeHcommoin.exePjlnhi32.exeFdbkja32.exeGkhbbi32.exeQjeaog32.exeIkmpcicg.exeKilphk32.exeDgdgijhp.exeFdhail32.exeImcqacfq.exeJokpcmmj.exeBlknpdho.exeJikjmbmb.exeKdjhkp32.exeEhhpge32.exeGkcdfl32.exeHkjjfkcm.exeJaljbmkd.exeHcgjhega.exeBelemd32.exeEpbkhhel.exeKhhaanop.exeCblebgfh.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knojng32.dll" Omcbkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fgncff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Maoakaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihgnfnjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecanojgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjnlnaiq.dll" Eblgon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fkbkoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Niaekl32.dll" Nbjpjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Epaemojk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecanojgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecdkdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkppchfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onakco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajbfppjh.dll" Efampahd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aidomjaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ladlqj32.dll" Cefoni32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhiinbdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jeaiij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cefoni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maghkogk.dll" Pfbfjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbeobhlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iqfcbahb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcealh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ficlmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkofofbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnomjn32.dll" Ecanojgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcifmdeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onqdhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpbaga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmebpbod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhbkgiif.dll" Gebimmco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Maeaajpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggehilne.dll" Gaffbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghbkdald.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbjpjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecnnqk32.dll" Qbmpjkqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcommoin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjeodp32.dll" Pjlnhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ficlmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdbkja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oedlic32.dll" Gkhbbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qjeaog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikmpcicg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kilphk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgdgijhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afoaho32.dll" Fdhail32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Imcqacfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jokpcmmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkbkoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgkkbg32.dll" Blknpdho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cefoni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Epaemojk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kehmcnda.dll" Jikjmbmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdjhkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehhpge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gkcdfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfoamm32.dll" Hkjjfkcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pceijm32.dll" Jaljbmkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcgjhega.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Belemd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Epbkhhel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khhaanop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfnafolo.dll" Maoakaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cblebgfh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exeFdbkja32.exeGkhbbi32.exeHeepfn32.exeIholohii.exeJaljbmkd.exeJeaiij32.exeKlddlckd.exeLhpnlclc.exeNefdbekh.exeOmcbkl32.exePiaiqlak.exeAioebj32.exeAidomjaf.exeBlknpdho.exeCefoni32.exeCdlhgpag.exeCpcila32.exeDgdgijhp.exeEpaemojk.exeEcanojgl.exeEcdkdj32.exedescription pid process target process PID 5064 wrote to memory of 2248 5064 667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe Fdbkja32.exe PID 5064 wrote to memory of 2248 5064 667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe Fdbkja32.exe PID 5064 wrote to memory of 2248 5064 667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe Fdbkja32.exe PID 2248 wrote to memory of 4348 2248 Fdbkja32.exe Gkhbbi32.exe PID 2248 wrote to memory of 4348 2248 Fdbkja32.exe Gkhbbi32.exe PID 2248 wrote to memory of 4348 2248 Fdbkja32.exe Gkhbbi32.exe PID 4348 wrote to memory of 1468 4348 Gkhbbi32.exe Heepfn32.exe PID 4348 wrote to memory of 1468 4348 Gkhbbi32.exe Heepfn32.exe PID 4348 wrote to memory of 1468 4348 Gkhbbi32.exe Heepfn32.exe PID 1468 wrote to memory of 4268 1468 Heepfn32.exe Iholohii.exe PID 1468 wrote to memory of 4268 1468 Heepfn32.exe Iholohii.exe PID 1468 wrote to memory of 4268 1468 Heepfn32.exe Iholohii.exe PID 4268 wrote to memory of 3440 4268 Iholohii.exe Jaljbmkd.exe PID 4268 wrote to memory of 3440 4268 Iholohii.exe Jaljbmkd.exe PID 4268 wrote to memory of 3440 4268 Iholohii.exe Jaljbmkd.exe PID 3440 wrote to memory of 3576 3440 Jaljbmkd.exe Jeaiij32.exe PID 3440 wrote to memory of 3576 3440 Jaljbmkd.exe Jeaiij32.exe PID 3440 wrote to memory of 3576 3440 Jaljbmkd.exe Jeaiij32.exe PID 3576 wrote to memory of 4572 3576 Jeaiij32.exe Klddlckd.exe PID 3576 wrote to memory of 4572 3576 Jeaiij32.exe Klddlckd.exe PID 3576 wrote to memory of 4572 3576 Jeaiij32.exe Klddlckd.exe PID 4572 wrote to memory of 1172 4572 Klddlckd.exe Lhpnlclc.exe PID 4572 wrote to memory of 1172 4572 Klddlckd.exe Lhpnlclc.exe PID 4572 wrote to memory of 1172 4572 Klddlckd.exe Lhpnlclc.exe PID 1172 wrote to memory of 1400 1172 Lhpnlclc.exe Nefdbekh.exe PID 1172 wrote to memory of 1400 1172 Lhpnlclc.exe Nefdbekh.exe PID 1172 wrote to memory of 1400 1172 Lhpnlclc.exe Nefdbekh.exe PID 1400 wrote to memory of 2516 1400 Nefdbekh.exe Omcbkl32.exe PID 1400 wrote to memory of 2516 1400 Nefdbekh.exe Omcbkl32.exe PID 1400 wrote to memory of 2516 1400 Nefdbekh.exe Omcbkl32.exe PID 2516 wrote to memory of 4616 2516 Omcbkl32.exe Piaiqlak.exe PID 2516 wrote to memory of 4616 2516 Omcbkl32.exe Piaiqlak.exe PID 2516 wrote to memory of 4616 2516 Omcbkl32.exe Piaiqlak.exe PID 4616 wrote to memory of 1376 4616 Piaiqlak.exe Aioebj32.exe PID 4616 wrote to memory of 1376 4616 Piaiqlak.exe Aioebj32.exe PID 4616 wrote to memory of 1376 4616 Piaiqlak.exe Aioebj32.exe PID 1376 wrote to memory of 644 1376 Aioebj32.exe Aidomjaf.exe PID 1376 wrote to memory of 644 1376 Aioebj32.exe Aidomjaf.exe PID 1376 wrote to memory of 644 1376 Aioebj32.exe Aidomjaf.exe PID 644 wrote to memory of 812 644 Aidomjaf.exe Blknpdho.exe PID 644 wrote to memory of 812 644 Aidomjaf.exe Blknpdho.exe PID 644 wrote to memory of 812 644 Aidomjaf.exe Blknpdho.exe PID 812 wrote to memory of 4416 812 Blknpdho.exe Cefoni32.exe PID 812 wrote to memory of 4416 812 Blknpdho.exe Cefoni32.exe PID 812 wrote to memory of 4416 812 Blknpdho.exe Cefoni32.exe PID 4416 wrote to memory of 4988 4416 Cefoni32.exe Cdlhgpag.exe PID 4416 wrote to memory of 4988 4416 Cefoni32.exe Cdlhgpag.exe PID 4416 wrote to memory of 4988 4416 Cefoni32.exe Cdlhgpag.exe PID 4988 wrote to memory of 3320 4988 Cdlhgpag.exe Cpcila32.exe PID 4988 wrote to memory of 3320 4988 Cdlhgpag.exe Cpcila32.exe PID 4988 wrote to memory of 3320 4988 Cdlhgpag.exe Cpcila32.exe PID 3320 wrote to memory of 4940 3320 Cpcila32.exe Dgdgijhp.exe PID 3320 wrote to memory of 4940 3320 Cpcila32.exe Dgdgijhp.exe PID 3320 wrote to memory of 4940 3320 Cpcila32.exe Dgdgijhp.exe PID 4940 wrote to memory of 864 4940 Dgdgijhp.exe Epaemojk.exe PID 4940 wrote to memory of 864 4940 Dgdgijhp.exe Epaemojk.exe PID 4940 wrote to memory of 864 4940 Dgdgijhp.exe Epaemojk.exe PID 864 wrote to memory of 4152 864 Epaemojk.exe Ecanojgl.exe PID 864 wrote to memory of 4152 864 Epaemojk.exe Ecanojgl.exe PID 864 wrote to memory of 4152 864 Epaemojk.exe Ecanojgl.exe PID 4152 wrote to memory of 3732 4152 Ecanojgl.exe Ecdkdj32.exe PID 4152 wrote to memory of 3732 4152 Ecanojgl.exe Ecdkdj32.exe PID 4152 wrote to memory of 3732 4152 Ecanojgl.exe Ecdkdj32.exe PID 3732 wrote to memory of 4012 3732 Ecdkdj32.exe Fdhail32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe"C:\Users\Admin\AppData\Local\Temp\667f34e754fe5533c8145fdf9010c9d1b8db691b394f1d3d1a8fe10b67da2da0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\Fdbkja32.exeC:\Windows\system32\Fdbkja32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\Gkhbbi32.exeC:\Windows\system32\Gkhbbi32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\Heepfn32.exeC:\Windows\system32\Heepfn32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\Iholohii.exeC:\Windows\system32\Iholohii.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\Jaljbmkd.exeC:\Windows\system32\Jaljbmkd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\Jeaiij32.exeC:\Windows\system32\Jeaiij32.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\Klddlckd.exeC:\Windows\system32\Klddlckd.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\Lhpnlclc.exeC:\Windows\system32\Lhpnlclc.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\Nefdbekh.exeC:\Windows\system32\Nefdbekh.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\Omcbkl32.exeC:\Windows\system32\Omcbkl32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\Piaiqlak.exeC:\Windows\system32\Piaiqlak.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\Aioebj32.exeC:\Windows\system32\Aioebj32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\Aidomjaf.exeC:\Windows\system32\Aidomjaf.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\Blknpdho.exeC:\Windows\system32\Blknpdho.exe15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\Cefoni32.exeC:\Windows\system32\Cefoni32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\Cdlhgpag.exeC:\Windows\system32\Cdlhgpag.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\Cpcila32.exeC:\Windows\system32\Cpcila32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\Dgdgijhp.exeC:\Windows\system32\Dgdgijhp.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\Epaemojk.exeC:\Windows\system32\Epaemojk.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\Ecanojgl.exeC:\Windows\system32\Ecanojgl.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\Ecdkdj32.exeC:\Windows\system32\Ecdkdj32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\Fdhail32.exeC:\Windows\system32\Fdhail32.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:4012 -
C:\Windows\SysWOW64\Fgncff32.exeC:\Windows\system32\Fgncff32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1972 -
C:\Windows\SysWOW64\Gcimfg32.exeC:\Windows\system32\Gcimfg32.exe25⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\Gmfkjl32.exeC:\Windows\system32\Gmfkjl32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\Hcgjhega.exeC:\Windows\system32\Hcgjhega.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Hcifmdeo.exeC:\Windows\system32\Hcifmdeo.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2136 -
C:\Windows\SysWOW64\Kmlgcf32.exeC:\Windows\system32\Kmlgcf32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\Kjbdbjbi.exeC:\Windows\system32\Kjbdbjbi.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:832 -
C:\Windows\SysWOW64\Kdjhkp32.exeC:\Windows\system32\Kdjhkp32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:748 -
C:\Windows\SysWOW64\Khhaanop.exeC:\Windows\system32\Khhaanop.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:216 -
C:\Windows\SysWOW64\Lennpb32.exeC:\Windows\system32\Lennpb32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\Lkppchfi.exeC:\Windows\system32\Lkppchfi.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4496 -
C:\Windows\SysWOW64\Maoakaip.exeC:\Windows\system32\Maoakaip.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:1416 -
C:\Windows\SysWOW64\Mmebpbod.exeC:\Windows\system32\Mmebpbod.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:436 -
C:\Windows\SysWOW64\Onakco32.exeC:\Windows\system32\Onakco32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:836 -
C:\Windows\SysWOW64\Poagma32.exeC:\Windows\system32\Poagma32.exe38⤵
- Executes dropped EXE
PID:5080 -
C:\Windows\SysWOW64\Pnfdnnbo.exeC:\Windows\system32\Pnfdnnbo.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\Pfbfjk32.exeC:\Windows\system32\Pfbfjk32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:672 -
C:\Windows\SysWOW64\Qbmpjkqk.exeC:\Windows\system32\Qbmpjkqk.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:3396 -
C:\Windows\SysWOW64\Afkipi32.exeC:\Windows\system32\Afkipi32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4732 -
C:\Windows\SysWOW64\Belemd32.exeC:\Windows\system32\Belemd32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\Bbeobhlp.exeC:\Windows\system32\Bbeobhlp.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Cblebgfh.exeC:\Windows\system32\Cblebgfh.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:640 -
C:\Windows\SysWOW64\Dhbqalle.exeC:\Windows\system32\Dhbqalle.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:960 -
C:\Windows\SysWOW64\Epbkhhel.exeC:\Windows\system32\Epbkhhel.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\Efampahd.exeC:\Windows\system32\Efampahd.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1548 -
C:\Windows\SysWOW64\Fidbgm32.exeC:\Windows\system32\Fidbgm32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2908 -
C:\Windows\SysWOW64\Gebimmco.exeC:\Windows\system32\Gebimmco.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4956 -
C:\Windows\SysWOW64\Ggdbmoho.exeC:\Windows\system32\Ggdbmoho.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1340 -
C:\Windows\SysWOW64\Hcommoin.exeC:\Windows\system32\Hcommoin.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:452 -
C:\Windows\SysWOW64\Hjlaoioh.exeC:\Windows\system32\Hjlaoioh.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1424 -
C:\Windows\SysWOW64\Imcqacfq.exeC:\Windows\system32\Imcqacfq.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:4468 -
C:\Windows\SysWOW64\Iqfcbahb.exeC:\Windows\system32\Iqfcbahb.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:376 -
C:\Windows\SysWOW64\Jokpcmmj.exeC:\Windows\system32\Jokpcmmj.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1576 -
C:\Windows\SysWOW64\Jikjmbmb.exeC:\Windows\system32\Jikjmbmb.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:3080 -
C:\Windows\SysWOW64\Kmkpipaf.exeC:\Windows\system32\Kmkpipaf.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\Lcealh32.exeC:\Windows\system32\Lcealh32.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:3912 -
C:\Windows\SysWOW64\Maeaajpl.exeC:\Windows\system32\Maeaajpl.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2816 -
C:\Windows\SysWOW64\Ogbbqo32.exeC:\Windows\system32\Ogbbqo32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\Onqdhh32.exeC:\Windows\system32\Onqdhh32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Pjlnhi32.exeC:\Windows\system32\Pjlnhi32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3532 -
C:\Windows\SysWOW64\Qjeaog32.exeC:\Windows\system32\Qjeaog32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4352 -
C:\Windows\SysWOW64\Agiahlkf.exeC:\Windows\system32\Agiahlkf.exe65⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Bhgjcmfi.exeC:\Windows\system32\Bhgjcmfi.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3484 -
C:\Windows\SysWOW64\Bbbkbbkg.exeC:\Windows\system32\Bbbkbbkg.exe67⤵PID:2232
-
C:\Windows\SysWOW64\Cbknhqbl.exeC:\Windows\system32\Cbknhqbl.exe68⤵
- Drops file in System32 directory
PID:4456 -
C:\Windows\SysWOW64\Eblgon32.exeC:\Windows\system32\Eblgon32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3344 -
C:\Windows\SysWOW64\Ehhpge32.exeC:\Windows\system32\Ehhpge32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1112 -
C:\Windows\SysWOW64\Eelpqi32.exeC:\Windows\system32\Eelpqi32.exe71⤵
- Drops file in System32 directory
PID:4536 -
C:\Windows\SysWOW64\Eimelg32.exeC:\Windows\system32\Eimelg32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2632 -
C:\Windows\SysWOW64\Fkbkoo32.exeC:\Windows\system32\Fkbkoo32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\Ficlmf32.exeC:\Windows\system32\Ficlmf32.exe74⤵
- Modifies registry class
PID:3736 -
C:\Windows\SysWOW64\Fhiinbdo.exeC:\Windows\system32\Fhiinbdo.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3104 -
C:\Windows\SysWOW64\Femigg32.exeC:\Windows\system32\Femigg32.exe76⤵PID:3916
-
C:\Windows\SysWOW64\Gikbneio.exeC:\Windows\system32\Gikbneio.exe77⤵
- Drops file in System32 directory
PID:1844 -
C:\Windows\SysWOW64\Gaffbg32.exeC:\Windows\system32\Gaffbg32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4712 -
C:\Windows\SysWOW64\Ghbkdald.exeC:\Windows\system32\Ghbkdald.exe79⤵
- Modifies registry class
PID:1948 -
C:\Windows\SysWOW64\Gkcdfl32.exeC:\Windows\system32\Gkcdfl32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4912 -
C:\Windows\SysWOW64\Hkjjfkcm.exeC:\Windows\system32\Hkjjfkcm.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:3048 -
C:\Windows\SysWOW64\Ihgnfnjl.exeC:\Windows\system32\Ihgnfnjl.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\Ikmpcicg.exeC:\Windows\system32\Ikmpcicg.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:1616 -
C:\Windows\SysWOW64\Jkomhhae.exeC:\Windows\system32\Jkomhhae.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1028 -
C:\Windows\SysWOW64\Jfdafa32.exeC:\Windows\system32\Jfdafa32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\Jkfcigkm.exeC:\Windows\system32\Jkfcigkm.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3604 -
C:\Windows\SysWOW64\Jkhpogij.exeC:\Windows\system32\Jkhpogij.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\Kilphk32.exeC:\Windows\system32\Kilphk32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5136 -
C:\Windows\SysWOW64\Kbedaand.exeC:\Windows\system32\Kbedaand.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5184 -
C:\Windows\SysWOW64\Kiomnk32.exeC:\Windows\system32\Kiomnk32.exe90⤵PID:5228
-
C:\Windows\SysWOW64\Koiejemn.exeC:\Windows\system32\Koiejemn.exe91⤵
- Drops file in System32 directory
PID:5272 -
C:\Windows\SysWOW64\Kkofofbb.exeC:\Windows\system32\Kkofofbb.exe92⤵
- Drops file in System32 directory
- Modifies registry class
PID:5316 -
C:\Windows\SysWOW64\Lckglc32.exeC:\Windows\system32\Lckglc32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5360 -
C:\Windows\SysWOW64\Lijlii32.exeC:\Windows\system32\Lijlii32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5408 -
C:\Windows\SysWOW64\Mpbaga32.exeC:\Windows\system32\Mpbaga32.exe95⤵
- Modifies registry class
PID:5452 -
C:\Windows\SysWOW64\Mpenmadn.exeC:\Windows\system32\Mpenmadn.exe96⤵
- Drops file in System32 directory
PID:5496 -
C:\Windows\SysWOW64\Npgjbabk.exeC:\Windows\system32\Npgjbabk.exe97⤵
- Drops file in System32 directory
PID:5540 -
C:\Windows\SysWOW64\Nbjpjl32.exeC:\Windows\system32\Nbjpjl32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5584 -
C:\Windows\SysWOW64\Nleaha32.exeC:\Windows\system32\Nleaha32.exe99⤵PID:5632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 400100⤵
- Program crash
PID:5880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4292 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5632 -ip 56321⤵PID:5732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5aeabfdd0e6b0b2296d49b145310eadf7
SHA19c0c1c45b25223573c3dcc22bf83b9ca75fd54e8
SHA256d432b43b76121b43b0f08a6109c1f55a2416be47094c19812202c8e95d334c3b
SHA5123d8ca453851e352ba1240e5a523d2a073dcd5b95f5de31dcc1d965166cbd3ee050ea984c0e34bc80c748e0b6129de79867f39b7518ec57c454215b457ef736c4
-
Filesize
80KB
MD5277728b85839d5a328eb18060114b646
SHA1e13d7e38f628160aa97760ffc491fed2b5fddb08
SHA2560814eaa2dcfc651d78a48ae39c269a8bb6e31c14fba5d705f52d01c560815924
SHA512e9442817490e984b2a09830206a4b259ddc481988268b4bac57fce156ee612e5d209f2010e014049e3d682926b9978db0912864ae0144b8c5ca93b638d057997
-
Filesize
80KB
MD57a570ad39a35e8c9eea71fc39de0d525
SHA188d6e19302b69f7a3cf800bdb64169809f638e34
SHA256fe9b5b8e75ac3de86ad946d86b57b419a868012eedb01a53c49596623ca7134c
SHA5122063f06ef9d80c17e02d4395e9802eff6f9f8a037c78e0e913c16a29f6d627e7ab761e770cbb722e3b45c83c5227bd085f3b02d5b7791c8f20543ac1932aec95
-
Filesize
80KB
MD5f4a7fa54b1a581e2fd77d6b5f7442e93
SHA11949b3a5e1fdf0c54911d0a3b695e4710d2b0d9f
SHA2566fe5fbfad83eb9edd98656426a618d03654058e22cb4f0b444e47456226fa90e
SHA5123affbe79c5dd62710cb4bedc564058fb054c7812cbdd87621aca06b51823e4702e9edc25670c51d0d5f2f11bce8afd4b0bc9bc422267c5939e01939ced1452ca
-
Filesize
80KB
MD598d6e915e131a552f3eed473f931efec
SHA10b933e125fa22479e6b43b6c9acdc8f887956ce2
SHA25656695bb62287bb9ed4b91361abfb208b1d7009384ab5da158adbeeec0636fa21
SHA512613875cd2b1b5bb9176720f3325ec2aba774eae0a679031afda074295b24183975e0e7c1f5184b17cbf913f2fffdcc7f9c07fd24c73ec7ab884ad6ae19a66985
-
Filesize
80KB
MD5226f68d6f1e802a5b3bc9bce2590fe41
SHA19f5c961993a9bb73ddbb0de9294aef459d8a9b27
SHA2560172064f3de8a96c1c38b5412f29da43e9f73ea0f4574d309951aa86af1ca3e6
SHA512a953976c5b07d7b2c115892d176b13e67ea352560a502f86c865ff97b859dba059c3ff88c5a1ff86fc33b96ff3aa84a2d6394af7485f1b2c9899d822cf9ad5a5
-
Filesize
80KB
MD56dc7abd2b43e408cebe0e203bb40c541
SHA10d8f0d5b805cdd64509a7a4838e43b54f33ffad0
SHA256956ea77f36c29e4506546d5965cd48b0744242e7189e772ce8d8bc0b9c5cbc08
SHA5129acef9cccf63bacb91ae9becce9fc309f641ab2a7113d2c717eb82e7b867c93d12fe45ee8f5410fabc7fd9a877af9432042a099b557356fe34223caf02438c97
-
Filesize
80KB
MD533996a148d11bd25bf9a07d36919692e
SHA14bddd7bd17d6f85e579809d05ff781e1972b8a81
SHA2567baffc87062f48097f64569a5001122a2a592cce6bed121b8d3b94ade8e9d453
SHA512f64da1ecd7358e2add3be24ebbce10e8e8bd94f9d0401edcf573db3196ac1dcbee99611a6ee118bbd7313f037455f4f0be50fa97368ac23aa623604d376bda08
-
Filesize
80KB
MD58c25d886a944b1b5f5d314813e38cd5d
SHA1c68805549e07682aea46086c1ca3df7c430fb16a
SHA256d12543691b63e7688596d062eb9d97103ce690d85fa4b0691f8a97d5f6a4af32
SHA5123c1df18195205ef75eb9ba610907af46eb753ceaa21942c8eaa76dc4926d78b1ed7f5acb00a46364e31a1464ae0ce8c9fc1cb039d3501dd86b72bee319ccd88d
-
Filesize
80KB
MD5f722c080290edbfea259186eacbe0a85
SHA18d297b4277e480ca7e442c402caa6eb7ae999113
SHA2566ee9e8081e3cbdb5735fe2865dc99c8a2298b760a3e1412962166ef4efaa50d7
SHA512484e88fbf31b5bab6dd60329407dc42e3b81d2dce1fb05b0b2ed86bdbce00413af33266b7f9c58aaedd63b72787709d8bd44ac76766998d03501932659982529
-
Filesize
80KB
MD54eb25087cb1fc8f903e4ff868dfdc46e
SHA15c14d254e6111c96d877b0e94fdd0a845a697340
SHA256c29a574aa7ddd41f350c6ee6816c0b3dd37f691a36348cda9ace035e682742e2
SHA512cd5ab8fe4a0d725f2f20e35de32941fed48efa2b93fc8b86665b899d7f919a8934236a709cc33dfdca7c0d8b1b08fa6ed6b3e37df5678725d2e3da912a0c4ea4
-
Filesize
80KB
MD5858766c09e13e1b75eb6b95963b6cf65
SHA1c401746c46982643bb179725e3405619c4e24373
SHA2567ff1f83766b040b3947763a7423360dfd6340d688d5f5ef2e4e1d098d683161c
SHA5121262c463229d778680a871fe187e0759a12eb1e6e70a349e0ff4085c0aa7a3333f00e0acdfc28c23c19a2b7ff112ae66967eda3918b64ef9cdf2197afb07a06d
-
Filesize
80KB
MD537d8a36649836f19759abda556fcab42
SHA1d43780490a915e32f38fbb8a14dc26c7fd3ca246
SHA256fbc5a4866f01aff4a7f37f42634126d25fa8f27d1d75c7dddbc5a1dc2ef351c5
SHA51260750836d9c3758c9b7164f6958fc215c4d07d8d59b4d5e4d1541b0f77a732f948a76c9fa512f983ca2ccb67c4eff27075210888e52594eec941e57db2f2153e
-
Filesize
80KB
MD50d304c4d077c1a5222d05838fcc5d470
SHA14af28d3190a0d9501e0a6cd3d453193a776c764c
SHA25606bb3d23948194d0fb6d92bf0cd51c96e923b28c24b67d9e5329afec779ae284
SHA5128dc609f9be8da3432510a35924afac4fd41419379d050306625f3f62f75f52280174298f3a0876dbd63606646ecc37f409bfeeb653cae16acaf4a9672c22e93b
-
Filesize
80KB
MD5c524ecd80def1a0304d68832abc4f3dc
SHA14dbd299b8e583500736224aeb834714d1a0b9510
SHA2567792824e5a988db945633bca88fe3d542a0fb44b1836c1922573af0cf4f8f1ce
SHA512f2207e2df0bca86488ff2892830c491a6058f17263805ddf018d1f381c87b436d65bde974ab22ee238559f5ec22673e29ef1f249093ec568b0623e6620c106af
-
Filesize
80KB
MD5f8d7cf93ef3ef069c3e0a07952e8bcfd
SHA18f50ecf54daf1cd778e5cdf9bf9fc8e020f75265
SHA2568f11cd50be0be3dea7dcc968790193a7e970cf0e7e734a3a3b6da6e32e7caf2a
SHA51217444538aeafa4fae56309b290498d0d2749e1cb4ad51ae79ba7534b5e29348ab4897f3e4edc2fa8c2c0351ed2f470d76655af9633ebe21e13a4226940206fd2
-
Filesize
80KB
MD5549af8f31284be4a950658845de205b5
SHA17d7acd5d7616238c80e09f56364582360f7abd44
SHA2564ad154de3ce7f374110d2c555876623f0759932085357d7a86ef440dcea45c7f
SHA512dda4553cfe95af02c165d56fa4a70a159c836e149fa5cce26449c3830fa0eeb158051f65817e0032d2da10e52338ea537b53cca53dd3893476306fadf1b59b81
-
Filesize
80KB
MD5c99fa8cd96ac9130a72cf0b91c693102
SHA1b5575e5c2f079fd829e901115892bae69cb579f3
SHA256c7d50a8f4fc472405310c51b193cae8f65217c7059cc5a5b483b025f4e2692ef
SHA5129dcf435e9f05d2edee0db00971ec9099727348c58987e4b16c579d3396f962ef1da11b2f89a7c735302f61d019c7b2ba3d1d46704cf7916abef5bdec71451a7f
-
Filesize
80KB
MD53f54eb3dc76a94db9b2d7ab730022653
SHA12455ed83db831d0acfe277d3abb4dfca32fdc29f
SHA25611363e11d29d5e21a69e0b37a6d006d84352019eeff373d39e02f2e09c077656
SHA512dcf7cb2cc41906092810d67bd7ef6241f853be745545d98d69f1a41b64642e993733934017f264e59d1c4c99c09b6346d77a11498603f8ffde99e2084257ad70
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
80KB
MD5151ce1da0e37602f434375cd6b4546b6
SHA173b6c5310ee26da475a16988903cb38358b11665
SHA25627308c37e9e2c57efc9577c5087a0c67823a6ad9c2543c48c75dd933fb544c72
SHA512bf2fc97e77258e0a6c331ad4fe1bd46ebc7e0819f5199bb5d95ed51a3625e8881c13744da5c20217371473a90ba6aa040c2766124a1d28a4c4aa685cd9a0a7f5
-
Filesize
80KB
MD59905348d5db3921c2520dfdbae7c9921
SHA1c87b96ed5a1aeb6524afdd0c4bd8f5a66029617b
SHA256608f54d65c6ce2588147b0e6488c4f8f0cc059ba8fdc794528ea58d02d2ab54d
SHA512af4a026dde189a82fdd4d85a2391b045e0f7c14ed54d4e99fe673118fa9621ac3b27eebe39524f689b3b396d12249df2b40b4151cb9cc24e26b9d2526885a7c3
-
Filesize
80KB
MD50ba1f24915c8318380d8ec44a5142838
SHA10c95c704da4f911c4a4943ec53cc035bc155319e
SHA256d8fa4d78f8e4e4aee8d994026c53c419038fe3add0151403e3e7cdae5d685978
SHA512b1977f6bf52c952744a7ab23c3193cf8be03bb885a5edc4af06f0d4afdd8f59b563d8e63f6650590a8ca47e811f46d8af1ae05b4256d9792541641bca74e773c
-
Filesize
80KB
MD5156d3c51229d171349d5d67bfed04c11
SHA19038e64a322b6a79ae178c941b415111059aa9eb
SHA25677b0feaaed113e401d818df227e4d868217b66e9261deda4983943e798d1178f
SHA51224608b26b3fe490e3636fba5478c8fe49cb8300de8abeee1ac2d4f453f32f1d9c2e495b98f5a7ad459f64f3db467f661ecfedecf7cd2fd42d42c4db7ce85f90b
-
Filesize
80KB
MD5be2d89eda90af92e9289ab69dee3107c
SHA120a8d05c63d510e5ff9ffd4c4086f9d8716c32a5
SHA2569940308727fc9b92550997f55b686623075006913b0f30e6939c2a033b038098
SHA51283fd5bff4177ea451a20c72c2a8e032f851d98a7437b5953b7144186c008c4a05a7c16d54cae4defcdd3a03692733c74914ffed297cd295e8cef9d94e4b66beb
-
Filesize
80KB
MD57aadc7712c1a64451c1549b6af6a903a
SHA194e8657240bcbe59c8d1790374ae6b1bcdd03c96
SHA256df668b977b27b92e37b0e60382cda34e070ce38203caeb4c8152b495fd43ac85
SHA512fec91bfa0593821965bb1e0c238b0e34729f57eb314804e7a0038377a87ca2fa351394db769a90683a63fcf903941a264f316fd88cc9b7c1d5e89850fd700a3e
-
Filesize
80KB
MD5866c7f592e3e091b03466572dd25961d
SHA17d024ec84b5dabcc5314d10e7929403e174043cf
SHA2568f3ec7ff539ec5155574ff65806afe2df51851567a433ca2480fde1d5bf7cdc0
SHA512789236ba58fc49fdd6bc331bbee35def971bad1918f20cf7fe58087a8856925a59a7f8c432e62ba8559bbe1ad830509ba9957152375a8de7bc5adf33dd1eae7a
-
Filesize
80KB
MD5d71e3b41a211b825e62c2898a97b2d80
SHA15a3b3be7838bb88818d2c1fa3dd00fda0457cddf
SHA25696c58792219af62d9d7155769c71970b78624e0dd44385c3799335ca5b44ebfa
SHA512b5fa3409378be57b98c8628af325908a88646935a432665cfa32d32840a91d0329fde357ccadd8da2eb18de8922cfd015c0ebabe292aef59151b9e825cba5080
-
Filesize
80KB
MD5361e875481df5025ee431fcc905b0758
SHA10724ce70f82b84c975de03094006f38d2d016a41
SHA256eb9e13a87871f11957028127c852190921f2e4f796f149fda3e69da3ec428bac
SHA5125054b81c233328ebd7e0d2215f58204da8653be572f1d05d097d619dea04045b9c4e043b051d91e39332db603120189cdd95ebc25648a5961f8432df1733125f
-
Filesize
80KB
MD5fa8e9354365931e471ac64ef64df1ce9
SHA1121612146c64776da93b5dc9dcbffec0fae5efbc
SHA256eaf85c37a742c64c19dfb03986b0ac2553e51f4ad358803fba9999db158a3b3b
SHA512d7895abf0c6a1799503f7b72521b88c8621a860a5290386ca230a0254b19e7fc740c16cdf8e9c264646142854634493645aa1caf32fdf55a1adebbaaa05a0e7a
-
Filesize
80KB
MD5a1115d4f341a1f9c31dc186c3df469c1
SHA15f43a7c0ac0252ef0ba76f0affda78427a23f472
SHA256990cb99b79632b889c6b6c51283baf231c64e162fa725b9ca76b8ec71df4f58d
SHA512c23d44cb8fe0d2e1eabadb3fd7eb39002787a44e09d1d0199ad35018bb92d1154fb5bce6409e37d14e7cb8af0d889d6a39940d4dded8f4e3c8565d61f53c9e30
-
Filesize
80KB
MD5fe85ccb01e7772feb583bc0e60deedb5
SHA104cf9b8cce6813321a7ef9b24ec7d6ed39950a07
SHA256906d9a77d5245684fe6b7af147b508c4cbb72d4fbe264021b268c48855906703
SHA5126aab5e089dafe32ee50e8e5daad648f23d6621f6185a6180ff5b38b359b765c4b77569ac8e28bd7063bb866800f02c677a6da6ca0dfdf067cabb3ecaf7935311
-
Filesize
80KB
MD5951c265090f2e12837367b023b43d611
SHA17cc6e695577d641343bf9021c18855d6ee55647c
SHA256e4e50f4f34a6a3ffcf83633b732e1945a5683b7ad30abc98554429776404d30f
SHA5124a5442e5b513ded929bdd21fff6c47644b612488d57aa2e2c7476087a3babdfca304ea855d8223a5e26d65cf109147de578ad84142554c4f22b0131bd0fbcb00
-
Filesize
64KB
MD58703d6e984ff6c251653d75953694c09
SHA1a58fdbc7765a6eb18dd6f96537b77b640444ae26
SHA2564b96a6bdf5798eabc4e9f54eeeada6f3ad3d7ae988385c833eb7b64be418c6c9
SHA51242f86ef17dea81669d7ca98442339248e9a3496fd2766d7e94b846aa6adf9df056427bc8cd36dac5e1089affa30b5f9abd991e752784e52be99878c0072e5d56
-
Filesize
80KB
MD5bfb6772a3a6291c7735a2aa6af60598f
SHA1370f9f02391717822eeb1809a56276a1afa89ae8
SHA256ff2607d5ef9b3a5fc5821483c1d02cded4ccef496476f6f563fb88b63b424237
SHA512dc6a471ba300146aa4a4c3bc1de3fec8911505e00d04d0df0876e8e050737432361c66b17128602cc2d104a754681fd02d1f2ba8b5bb8e1e1226374780a91822
-
Filesize
80KB
MD544830e294a02405f33e9963c8eeeb71e
SHA109d2000ff2f0e9c5ed8b8f65bf131397a38ccce9
SHA256f09f79ac422e519b10c0e9e89bd0f3b5eab9f1e08c7763597899870a381ab06b
SHA512447666150e2db0cc81a043d60564bce7fbd0e2f1482d6b1647e6f416770cc77917e1fef428b43e9c04ba9fd8669ab1e9f06a0bb7acc8e89be77949621dfdc53d
-
Filesize
80KB
MD5e7c318e1078dc939f0be4f9b6c01769e
SHA1fe84cb5d36a2c4952563041880c3b1c2ba8244ed
SHA25690675b6430c60ce7b0e590a29440163946276a36daa56eb2a3c70b14758c3306
SHA51227bc37521d456648e57fe295f59fc8b9641037ae2c50b094c9fe198e17545b3289b7e4c8111615a9aaceb91a32b4c468fe1f29fa30f60823f53ac04a41d3805e
-
Filesize
80KB
MD529436a456423bda337715aecefc544e1
SHA1b63edbf71d76b2071b0a9d913728ffa18381ba66
SHA25614f8c0bf10d0da5eacba5bee9e2c4695e1197559ee09d020f78291815c06fea9
SHA5121e224e2f0b8c14ae5ab0b2d6d17f95f0f36d7e750fd24273660f687cd68e48b696f7a53c459d8f8311d2aefdfb471c7ad6198b282dddb9742b90d1669f445152
-
Filesize
80KB
MD562928f1123c352d29f63434598191bfc
SHA165e83a65cae88ce6763b31279bbe16bd36d184fb
SHA2563970baed6dd49156a10b6e52773c82a036d59e78ce55fbbcdc758626555998f0
SHA5129b7be5748d347b6795e886cda077e84d2782cb8be10d36bb05c5ebd518432f59bc9977616cd8d754eb193e8df29b3a8387f5f834a7c017cea84639f70b4048fe
-
Filesize
80KB
MD5af5d5fbc9e8298b3f276f127e73e55e6
SHA1bd16ba255770d1c8068d1d86fddbdf18fcdc0985
SHA2565cc913316c29b1793441878361a0f7e75ea164d40a7308f4adf09a766d333cde
SHA512ce8c5f95013bae8858f7a6d77a05fcb3b575794f8d25a675f0df174665f54adbcff762123b1838f0e06b489e5e220ebdcb05c02c2dc39cf6d224eb9467bf6b3e
-
Filesize
80KB
MD574303c46c045b94a077982b3ed637de4
SHA1afbc6a0a68f9dea9a4ff06c221f2f36ed5c4fbda
SHA2569fd11e819d67e020840fe09f4cdc21b34821a1b335eec7036fc85ca8f89385e3
SHA5123378a2beadf257ec10b2c73dda9bb9b613ef04d6977c70e2b31328bc7128eb0016ef4e0404c4c018c31e193c6c2a5d44156beec2f47915c858ae693ab083389a
-
Filesize
80KB
MD5933025d8087cde46c418948a48d4b525
SHA18debadf0ff7e95688cc5f0bd8a09e3eeab807d35
SHA2561e405263f38221d0ff625c7056d8c6aad688f9e43b50e70444b0e450f6315ace
SHA5121d4b17f6edbd6ab9ca6970644a6962563aada38a8750154d65447663d5ea3447dd5a3a8819318333c54aa127542b8234c93d0d2969bc371f7442ae97b638d9fd
-
Filesize
80KB
MD575a4859c092b300018e00754668ff4c4
SHA15dd928175380972be382a0b3664738559f84279f
SHA25612c331a3341ca7046dccbcfecef9ec2dd0214b1f794902b103b0cf273f3b66a0
SHA51221ab6cc488c7f56027181bd7fe939f14d62f8f05a33f2bd33313702021a4f6cb496e5fbc3375121e3c7b551b5b4c768303192a1d5b637d71bcffd97e03277a7f
-
Filesize
80KB
MD5f0ed1768c92a3d4c226b7b7444d5544d
SHA1567ae687a1ecb56af736609d290e97260f8aa6ad
SHA2566974d737784702406808a5c2d1dee07ec7a0654fadbbccd0f73ebe6b19e52c0a
SHA5120367565c17f31a2b02729b36d579be88dabd6b3801593429f75dbd0f68ea401a9c80320defb35b5263bb491b41a0aea929649facd0e3068da5f720fe0bbbdd40
-
Filesize
80KB
MD5517f89aac9381c2b3d55e4394106f701
SHA1837979776be1fd7b6b54af99e3e8a7a75282c586
SHA256aa13389c9f2b5296bc8742a116a1fd1c35882129bb62faddf562e4bd204f68c3
SHA5124a2555bfb27a68a09cec25bbd809fc5193c0835468ca3556ee67bcc31bc3b2f14abedf96ae96c72a864aac32707c74133cfd55c72df418258bdb6499021de5a9