Overview
overview
10Static
static
10[DemonArch...f3.exe
windows7-x64
10[DemonArch...5e.exe
windows7-x64
10[DemonArch...a8.exe
windows7-x64
10[DemonArch...55.exe
windows7-x64
[DemonArch...9c.exe
windows7-x64
8[DemonArch...ac.exe
windows7-x64
10[DemonArch...0f.exe
windows7-x64
10[DemonArch...94.exe
windows7-x64
10[DemonArch...7e.exe
windows7-x64
8[DemonArch...5a.exe
windows7-x64
1[DemonArch...c4.exe
windows7-x64
[DemonArch...f3.exe
windows7-x64
10[DemonArch...8f.exe
windows7-x64
10[DemonArch...85.exe
windows7-x64
10[DemonArch...92.exe
windows7-x64
9[DemonArch...5b.exe
windows7-x64
10[DemonArch...59.exe
windows7-x64
7[DemonArch...0f.exe
windows7-x64
10[DemonArch...61.exe
windows7-x64
10[DemonArch...16.exe
windows7-x64
10[DemonArch...23.exe
windows7-x64
[DemonArch...6d.exe
windows7-x64
10[DemonArch...af.exe
windows7-x64
10[DemonArch...5c.exe
windows7-x64
10[DemonArch...52.exe
windows7-x64
10[DemonArch...af.exe
windows7-x64
10[DemonArch...fa.exe
windows7-x64
10[DemonArch...f1.exe
windows7-x64
7[DemonArch...7b.exe
windows7-x64
10[DemonArch...02.exe
windows7-x64
10[DemonArch...80.exe
windows7-x64
[DemonArch...c8.exe
windows7-x64
8Analysis
-
max time kernel
293s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 17:22
Behavioral task
behavioral1
Sample
[DemonArchives]01be7be288126004a6b6013cfa9630f3.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
[DemonArchives]02352cbf001e9c8176a5b7d381ef9b5e.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
[DemonArchives]02fa60c2391dc09e9a0b748a9d89c6a8.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
[DemonArchives]04a8e202d70a574213680cdb7c82fb55.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
[DemonArchives]05e82b287218043df6c8560cd0e2719c.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
[DemonArchives]07fe5f7c673e5faa200611f9cb716aac.exe
Resource
win7-20240508-en
Behavioral task
behavioral7
Sample
[DemonArchives]086b605fada00eaa39fca0581712f10f.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
[DemonArchives]09f326448c37d99a61bb064e68ac6b94.exe
Resource
win7-20240611-en
Behavioral task
behavioral9
Sample
[DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
[DemonArchives]0d061414e840b27ea6109e573bd2165a.exe
Resource
win7-20240419-en
Behavioral task
behavioral11
Sample
[DemonArchives]1192a915b81f1f7878472391f42cb6c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
[DemonArchives]14049d0a3afad0faa21ab1fff2e417f3.exe
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
[DemonArchives]149dd5469233f52aa4287362ce85b88f.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
[DemonArchives]1df7772347bfd34ecb1685a1ba69c285.exe
Resource
win7-20240611-en
Behavioral task
behavioral15
Sample
[DemonArchives]1e0dc068677f96c9da7f43cf4d4acd92.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
[DemonArchives]1ee7f65b0c08c4ff7e1047c14851575b.exe
Resource
win7-20240508-en
Behavioral task
behavioral17
Sample
[DemonArchives]1fa9dbcc19fb2ae5cd344f559e95b759.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
[DemonArchives]227f3ff19943a0e8c1b26a563246280f.exe
Resource
win7-20240419-en
Behavioral task
behavioral19
Sample
[DemonArchives]2353c3f467be78e36e934caf5f3c3b61.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
[DemonArchives]26add802e0e75416385317658b116216.exe
Resource
win7-20231129-en
Behavioral task
behavioral21
Sample
[DemonArchives]2bf9e607accd325cfb734cd594b00723.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
[DemonArchives]3825817f6028f26ff0b5cd748559286d.exe
Resource
win7-20240611-en
Behavioral task
behavioral23
Sample
[DemonArchives]3e70eabf850c2134ac1acd815a2a90af.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
[DemonArchives]41637d74a16e50cafe6cb72974a1cf5c.exe
Resource
win7-20240611-en
Behavioral task
behavioral25
Sample
[DemonArchives]42971155e95ad8ace7b6fc53d70fb952.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
[DemonArchives]47522f57257b441811cf5f87c9118faf.exe
Resource
win7-20240611-en
Behavioral task
behavioral27
Sample
[DemonArchives]4782545d269557614be88caef0383cfa.exe
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
[DemonArchives]4bed82d2182d95951a4dd3b090868cf1.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
[DemonArchives]4c1ca9436c971190f7082f5c108a007b.exe
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
[DemonArchives]4fd60e9aed5ab9ed5326da37806b2502.exe
Resource
win7-20240508-en
Behavioral task
behavioral31
Sample
[DemonArchives]550ad0e50316dfca7c0bfd14f9060880.exe
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
[DemonArchives]55a0c8c7e6c8b2be4ebd164d43e746c8.exe
Resource
win7-20240221-en
General
-
Target
[DemonArchives]086b605fada00eaa39fca0581712f10f.exe
-
Size
1.9MB
-
MD5
086b605fada00eaa39fca0581712f10f
-
SHA1
d328e557965072baf7586a9d8aaad36f84666398
-
SHA256
4a52d88f2072ec553b00dd8def3089c4df2c320b502907b7c4e6fffed30e9786
-
SHA512
1217e2fcce016667af561e9b753d96df41e007de1c22994887d81827dc801a4521f3fbb1d6198deb5ed4b39b7e9a104e239dcf36e4e76e9c2728447e79deb948
-
SSDEEP
24576:vsxNIVyeNIVy2jU3NIVyeNIVy2jUQNIVyeNIVy2jU3NIVyeNIVy2jUO:vs0yjByjUyjByjH
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmcoja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ieqeidnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dqlafm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmcoja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlcgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpocfncj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpknlk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djefobmk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnbkddem.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad [DemonArchives]086b605fada00eaa39fca0581712f10f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqlafm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpkjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpkjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlfdkoin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" [DemonArchives]086b605fada00eaa39fca0581712f10f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebpkce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcmgfkeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnbkddem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghmiam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcknbh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eihfjo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlfdkoin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgdmmgpj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcknbh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpocfncj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieqeidnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekholjqg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gogangdc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebpkce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejbfhfaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gogangdc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghmiam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djefobmk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feeiob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idceea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgdmmgpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekholjqg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlcgeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiaeoang.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjhhocjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjhhocjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcmgfkeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feeiob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eihfjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fiaeoang.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcnpbi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejbfhfaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpknlk32.exe -
Executes dropped EXE 26 IoCs
pid Process 2492 Dgdmmgpj.exe 2672 Dqlafm32.exe 2404 Dcknbh32.exe 2536 Djefobmk.exe 2428 Eihfjo32.exe 2920 Ebpkce32.exe 2884 Ekholjqg.exe 272 Ejbfhfaj.exe 2384 Fmcoja32.exe 1196 Fcmgfkeg.exe 1184 Fnbkddem.exe 2060 Feeiob32.exe 1844 Fiaeoang.exe 1944 Gpknlk32.exe 588 Ghmiam32.exe 2960 Gogangdc.exe 2068 Hpkjko32.exe 1172 Hkpnhgge.exe 1480 Hlcgeo32.exe 1888 Hpocfncj.exe 240 Hcnpbi32.exe 956 Hjhhocjj.exe 2184 Hlfdkoin.exe 1004 Ieqeidnl.exe 884 Idceea32.exe 964 Iagfoe32.exe -
Loads dropped DLL 56 IoCs
pid Process 2316 [DemonArchives]086b605fada00eaa39fca0581712f10f.exe 2316 [DemonArchives]086b605fada00eaa39fca0581712f10f.exe 2492 Dgdmmgpj.exe 2492 Dgdmmgpj.exe 2672 Dqlafm32.exe 2672 Dqlafm32.exe 2404 Dcknbh32.exe 2404 Dcknbh32.exe 2536 Djefobmk.exe 2536 Djefobmk.exe 2428 Eihfjo32.exe 2428 Eihfjo32.exe 2920 Ebpkce32.exe 2920 Ebpkce32.exe 2884 Ekholjqg.exe 2884 Ekholjqg.exe 272 Ejbfhfaj.exe 272 Ejbfhfaj.exe 2384 Fmcoja32.exe 2384 Fmcoja32.exe 1196 Fcmgfkeg.exe 1196 Fcmgfkeg.exe 1184 Fnbkddem.exe 1184 Fnbkddem.exe 2060 Feeiob32.exe 2060 Feeiob32.exe 1844 Fiaeoang.exe 1844 Fiaeoang.exe 1944 Gpknlk32.exe 1944 Gpknlk32.exe 588 Ghmiam32.exe 588 Ghmiam32.exe 2960 Gogangdc.exe 2960 Gogangdc.exe 2068 Hpkjko32.exe 2068 Hpkjko32.exe 1172 Hkpnhgge.exe 1172 Hkpnhgge.exe 1480 Hlcgeo32.exe 1480 Hlcgeo32.exe 1888 Hpocfncj.exe 1888 Hpocfncj.exe 240 Hcnpbi32.exe 240 Hcnpbi32.exe 956 Hjhhocjj.exe 956 Hjhhocjj.exe 2184 Hlfdkoin.exe 2184 Hlfdkoin.exe 1004 Ieqeidnl.exe 1004 Ieqeidnl.exe 884 Idceea32.exe 884 Idceea32.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Djefobmk.exe Dcknbh32.exe File created C:\Windows\SysWOW64\Eihfjo32.exe Djefobmk.exe File opened for modification C:\Windows\SysWOW64\Eihfjo32.exe Djefobmk.exe File opened for modification C:\Windows\SysWOW64\Fmcoja32.exe Ejbfhfaj.exe File opened for modification C:\Windows\SysWOW64\Iagfoe32.exe Idceea32.exe File opened for modification C:\Windows\SysWOW64\Dqlafm32.exe Dgdmmgpj.exe File created C:\Windows\SysWOW64\Iaeldika.dll Fcmgfkeg.exe File opened for modification C:\Windows\SysWOW64\Idceea32.exe Ieqeidnl.exe File opened for modification C:\Windows\SysWOW64\Gpknlk32.exe Fiaeoang.exe File created C:\Windows\SysWOW64\Hnempl32.dll Gpknlk32.exe File created C:\Windows\SysWOW64\Hlfdkoin.exe Hjhhocjj.exe File opened for modification C:\Windows\SysWOW64\Hpkjko32.exe Gogangdc.exe File created C:\Windows\SysWOW64\Pafagk32.dll Dqlafm32.exe File opened for modification C:\Windows\SysWOW64\Djefobmk.exe Dcknbh32.exe File opened for modification C:\Windows\SysWOW64\Ekholjqg.exe Ebpkce32.exe File created C:\Windows\SysWOW64\Facklcaq.dll Fmcoja32.exe File created C:\Windows\SysWOW64\Gpknlk32.exe Fiaeoang.exe File created C:\Windows\SysWOW64\Ghmiam32.exe Gpknlk32.exe File created C:\Windows\SysWOW64\Hpkjko32.exe Gogangdc.exe File created C:\Windows\SysWOW64\Hpocfncj.exe Hlcgeo32.exe File created C:\Windows\SysWOW64\Fenhecef.dll Hcnpbi32.exe File opened for modification C:\Windows\SysWOW64\Hlfdkoin.exe Hjhhocjj.exe File opened for modification C:\Windows\SysWOW64\Dcknbh32.exe Dqlafm32.exe File created C:\Windows\SysWOW64\Ambcae32.dll Ekholjqg.exe File created C:\Windows\SysWOW64\Fmcoja32.exe Ejbfhfaj.exe File created C:\Windows\SysWOW64\Fiaeoang.exe Feeiob32.exe File created C:\Windows\SysWOW64\Dcknbh32.exe Dqlafm32.exe File created C:\Windows\SysWOW64\Ebpkce32.exe Eihfjo32.exe File created C:\Windows\SysWOW64\Hkpnhgge.exe Hpkjko32.exe File created C:\Windows\SysWOW64\Hjhhocjj.exe Hcnpbi32.exe File created C:\Windows\SysWOW64\Ieqeidnl.exe Hlfdkoin.exe File opened for modification C:\Windows\SysWOW64\Ebpkce32.exe Eihfjo32.exe File created C:\Windows\SysWOW64\Ekholjqg.exe Ebpkce32.exe File created C:\Windows\SysWOW64\Fcmgfkeg.exe Fmcoja32.exe File opened for modification C:\Windows\SysWOW64\Dgdmmgpj.exe [DemonArchives]086b605fada00eaa39fca0581712f10f.exe File created C:\Windows\SysWOW64\Kcfdakpf.dll Ebpkce32.exe File opened for modification C:\Windows\SysWOW64\Ejbfhfaj.exe Ekholjqg.exe File created C:\Windows\SysWOW64\Pffgja32.dll Hpkjko32.exe File created C:\Windows\SysWOW64\Hciofb32.dll Hlcgeo32.exe File opened for modification C:\Windows\SysWOW64\Hjhhocjj.exe Hcnpbi32.exe File created C:\Windows\SysWOW64\Gjenmobn.dll Idceea32.exe File created C:\Windows\SysWOW64\Jfpjfeia.dll Dgdmmgpj.exe File created C:\Windows\SysWOW64\Fclomp32.dll Djefobmk.exe File created C:\Windows\SysWOW64\Fnbkddem.exe Fcmgfkeg.exe File created C:\Windows\SysWOW64\Gfoihbdp.dll Fiaeoang.exe File created C:\Windows\SysWOW64\Hlcgeo32.exe Hkpnhgge.exe File created C:\Windows\SysWOW64\Dqlafm32.exe Dgdmmgpj.exe File created C:\Windows\SysWOW64\Hcnpbi32.exe Hpocfncj.exe File created C:\Windows\SysWOW64\Pqiqnfej.dll Ieqeidnl.exe File created C:\Windows\SysWOW64\Iagfoe32.exe Idceea32.exe File created C:\Windows\SysWOW64\Dhflmk32.dll [DemonArchives]086b605fada00eaa39fca0581712f10f.exe File opened for modification C:\Windows\SysWOW64\Hpocfncj.exe Hlcgeo32.exe File opened for modification C:\Windows\SysWOW64\Fiaeoang.exe Feeiob32.exe File opened for modification C:\Windows\SysWOW64\Ghmiam32.exe Gpknlk32.exe File opened for modification C:\Windows\SysWOW64\Hkpnhgge.exe Hpkjko32.exe File opened for modification C:\Windows\SysWOW64\Hlcgeo32.exe Hkpnhgge.exe File created C:\Windows\SysWOW64\Kjnifgah.dll Hkpnhgge.exe File opened for modification C:\Windows\SysWOW64\Ieqeidnl.exe Hlfdkoin.exe File created C:\Windows\SysWOW64\Cmbmkg32.dll Feeiob32.exe File created C:\Windows\SysWOW64\Kifjcn32.dll Fnbkddem.exe File opened for modification C:\Windows\SysWOW64\Gogangdc.exe Ghmiam32.exe File created C:\Windows\SysWOW64\Hllopfgo.dll Ghmiam32.exe File opened for modification C:\Windows\SysWOW64\Fcmgfkeg.exe Fmcoja32.exe File opened for modification C:\Windows\SysWOW64\Feeiob32.exe Fnbkddem.exe -
Program crash 1 IoCs
pid pid_target Process 1528 964 WerFault.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfoihbdp.dll" Fiaeoang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pafagk32.dll" Dqlafm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcmgfkeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kifjcn32.dll" Fnbkddem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpocfncj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjhhocjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idceea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} [DemonArchives]086b605fada00eaa39fca0581712f10f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcmgfkeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghmiam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hllopfgo.dll" Ghmiam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fenhecef.dll" Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ieqeidnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node [DemonArchives]086b605fada00eaa39fca0581712f10f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ekholjqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnempl32.dll" Gpknlk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnbkddem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nfmjcmjd.dll" Hlfdkoin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID [DemonArchives]086b605fada00eaa39fca0581712f10f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" [DemonArchives]086b605fada00eaa39fca0581712f10f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejbfhfaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gpknlk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpkjko32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgdmmgpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dqlafm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejbfhfaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjhhocjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjenmobn.dll" Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebpkce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fiaeoang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hciofb32.dll" Hlcgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gogangdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ieqeidnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Facklcaq.dll" Fmcoja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmcoja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmbmkg32.dll" Feeiob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcfdakpf.dll" Ebpkce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fiaeoang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlfdkoin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqiqnfej.dll" Ieqeidnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhflmk32.dll" [DemonArchives]086b605fada00eaa39fca0581712f10f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dqlafm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcknbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 [DemonArchives]086b605fada00eaa39fca0581712f10f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djefobmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lghegkoc.dll" Ejbfhfaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oiogaqdb.dll" Hjhhocjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebpkce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpknlk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gogangdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fclomp32.dll" Djefobmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjnifgah.dll" Hkpnhgge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlcgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpkjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khejeajg.dll" Hpocfncj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlfdkoin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djefobmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghmiam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Codpklfq.dll" Gogangdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmdoik32.dll" Eihfjo32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2492 2316 [DemonArchives]086b605fada00eaa39fca0581712f10f.exe 28 PID 2316 wrote to memory of 2492 2316 [DemonArchives]086b605fada00eaa39fca0581712f10f.exe 28 PID 2316 wrote to memory of 2492 2316 [DemonArchives]086b605fada00eaa39fca0581712f10f.exe 28 PID 2316 wrote to memory of 2492 2316 [DemonArchives]086b605fada00eaa39fca0581712f10f.exe 28 PID 2492 wrote to memory of 2672 2492 Dgdmmgpj.exe 29 PID 2492 wrote to memory of 2672 2492 Dgdmmgpj.exe 29 PID 2492 wrote to memory of 2672 2492 Dgdmmgpj.exe 29 PID 2492 wrote to memory of 2672 2492 Dgdmmgpj.exe 29 PID 2672 wrote to memory of 2404 2672 Dqlafm32.exe 30 PID 2672 wrote to memory of 2404 2672 Dqlafm32.exe 30 PID 2672 wrote to memory of 2404 2672 Dqlafm32.exe 30 PID 2672 wrote to memory of 2404 2672 Dqlafm32.exe 30 PID 2404 wrote to memory of 2536 2404 Dcknbh32.exe 31 PID 2404 wrote to memory of 2536 2404 Dcknbh32.exe 31 PID 2404 wrote to memory of 2536 2404 Dcknbh32.exe 31 PID 2404 wrote to memory of 2536 2404 Dcknbh32.exe 31 PID 2536 wrote to memory of 2428 2536 Djefobmk.exe 32 PID 2536 wrote to memory of 2428 2536 Djefobmk.exe 32 PID 2536 wrote to memory of 2428 2536 Djefobmk.exe 32 PID 2536 wrote to memory of 2428 2536 Djefobmk.exe 32 PID 2428 wrote to memory of 2920 2428 Eihfjo32.exe 33 PID 2428 wrote to memory of 2920 2428 Eihfjo32.exe 33 PID 2428 wrote to memory of 2920 2428 Eihfjo32.exe 33 PID 2428 wrote to memory of 2920 2428 Eihfjo32.exe 33 PID 2920 wrote to memory of 2884 2920 Ebpkce32.exe 34 PID 2920 wrote to memory of 2884 2920 Ebpkce32.exe 34 PID 2920 wrote to memory of 2884 2920 Ebpkce32.exe 34 PID 2920 wrote to memory of 2884 2920 Ebpkce32.exe 34 PID 2884 wrote to memory of 272 2884 Ekholjqg.exe 35 PID 2884 wrote to memory of 272 2884 Ekholjqg.exe 35 PID 2884 wrote to memory of 272 2884 Ekholjqg.exe 35 PID 2884 wrote to memory of 272 2884 Ekholjqg.exe 35 PID 272 wrote to memory of 2384 272 Ejbfhfaj.exe 36 PID 272 wrote to memory of 2384 272 Ejbfhfaj.exe 36 PID 272 wrote to memory of 2384 272 Ejbfhfaj.exe 36 PID 272 wrote to memory of 2384 272 Ejbfhfaj.exe 36 PID 2384 wrote to memory of 1196 2384 Fmcoja32.exe 37 PID 2384 wrote to memory of 1196 2384 Fmcoja32.exe 37 PID 2384 wrote to memory of 1196 2384 Fmcoja32.exe 37 PID 2384 wrote to memory of 1196 2384 Fmcoja32.exe 37 PID 1196 wrote to memory of 1184 1196 Fcmgfkeg.exe 38 PID 1196 wrote to memory of 1184 1196 Fcmgfkeg.exe 38 PID 1196 wrote to memory of 1184 1196 Fcmgfkeg.exe 38 PID 1196 wrote to memory of 1184 1196 Fcmgfkeg.exe 38 PID 1184 wrote to memory of 2060 1184 Fnbkddem.exe 39 PID 1184 wrote to memory of 2060 1184 Fnbkddem.exe 39 PID 1184 wrote to memory of 2060 1184 Fnbkddem.exe 39 PID 1184 wrote to memory of 2060 1184 Fnbkddem.exe 39 PID 2060 wrote to memory of 1844 2060 Feeiob32.exe 40 PID 2060 wrote to memory of 1844 2060 Feeiob32.exe 40 PID 2060 wrote to memory of 1844 2060 Feeiob32.exe 40 PID 2060 wrote to memory of 1844 2060 Feeiob32.exe 40 PID 1844 wrote to memory of 1944 1844 Fiaeoang.exe 41 PID 1844 wrote to memory of 1944 1844 Fiaeoang.exe 41 PID 1844 wrote to memory of 1944 1844 Fiaeoang.exe 41 PID 1844 wrote to memory of 1944 1844 Fiaeoang.exe 41 PID 1944 wrote to memory of 588 1944 Gpknlk32.exe 42 PID 1944 wrote to memory of 588 1944 Gpknlk32.exe 42 PID 1944 wrote to memory of 588 1944 Gpknlk32.exe 42 PID 1944 wrote to memory of 588 1944 Gpknlk32.exe 42 PID 588 wrote to memory of 2960 588 Ghmiam32.exe 43 PID 588 wrote to memory of 2960 588 Ghmiam32.exe 43 PID 588 wrote to memory of 2960 588 Ghmiam32.exe 43 PID 588 wrote to memory of 2960 588 Ghmiam32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\[DemonArchives]086b605fada00eaa39fca0581712f10f.exe"C:\Users\Admin\AppData\Local\Temp\[DemonArchives]086b605fada00eaa39fca0581712f10f.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\Dgdmmgpj.exeC:\Windows\system32\Dgdmmgpj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\Dqlafm32.exeC:\Windows\system32\Dqlafm32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Dcknbh32.exeC:\Windows\system32\Dcknbh32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Djefobmk.exeC:\Windows\system32\Djefobmk.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Eihfjo32.exeC:\Windows\system32\Eihfjo32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\Ebpkce32.exeC:\Windows\system32\Ebpkce32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\Ekholjqg.exeC:\Windows\system32\Ekholjqg.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Ejbfhfaj.exeC:\Windows\system32\Ejbfhfaj.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\Fmcoja32.exeC:\Windows\system32\Fmcoja32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\Fcmgfkeg.exeC:\Windows\system32\Fcmgfkeg.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Fnbkddem.exeC:\Windows\system32\Fnbkddem.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\Feeiob32.exeC:\Windows\system32\Feeiob32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\Gpknlk32.exeC:\Windows\system32\Gpknlk32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Ghmiam32.exeC:\Windows\system32\Ghmiam32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\Gogangdc.exeC:\Windows\system32\Gogangdc.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2068 -
C:\Windows\SysWOW64\Hkpnhgge.exeC:\Windows\system32\Hkpnhgge.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1172 -
C:\Windows\SysWOW64\Hlcgeo32.exeC:\Windows\system32\Hlcgeo32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1480 -
C:\Windows\SysWOW64\Hpocfncj.exeC:\Windows\system32\Hpocfncj.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\Hcnpbi32.exeC:\Windows\system32\Hcnpbi32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:240 -
C:\Windows\SysWOW64\Hjhhocjj.exeC:\Windows\system32\Hjhhocjj.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:956 -
C:\Windows\SysWOW64\Hlfdkoin.exeC:\Windows\system32\Hlfdkoin.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2184 -
C:\Windows\SysWOW64\Ieqeidnl.exeC:\Windows\system32\Ieqeidnl.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:884 -
C:\Windows\SysWOW64\Iagfoe32.exeC:\Windows\system32\Iagfoe32.exe27⤵
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 14028⤵
- Loads dropped DLL
- Program crash
PID:1528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD58867ab372b1eb3e1ecef1123f3155c4e
SHA1d89ad76677f7550b765748cb890fafcd8567c41e
SHA256b885f22c6e3a1628931700ada9c5f74f3000bc34ccceb500201b439fd9fee5ab
SHA512ac0cc7b201e4656ccb597b108c4e37fff32be2b6035597543227d65196d426d500037bee830f843e96a751079741aa20e5bf917b3e91673b70d58570f37383a2
-
Filesize
1.9MB
MD5c66f41b3fb7e503eae9246dc142f7793
SHA1a1cf03bfc4fc05807a204a9ebe895e002de9ff49
SHA256caf303f5961aa0fbd5db3228381ab03f0a018a15b8fc35f4933d1a2ca07864bc
SHA512b2c63f3dca4b94850f40831a831f8c3e67c2243574faeaa3e300630373596ef5d619047a6b755f905444ca24d20b38b051f98e5f55daaf128489d7f0de62c39c
-
Filesize
1.9MB
MD5ce4deace32c015e5a3a11082308018a6
SHA197b56f91d9ad762339b1b2a3b080f9450b2f9d4c
SHA2569169d207e1750b59f368abbbe9775081c635e015665561927267708b955a8bad
SHA512c50648f768fa3372e61fc930a805e5463857b022a3a12108348cca297072b51c99345f271d482ef1e364c94e55a0058826ebebdce0d859f8b4c3eee3126c7969
-
Filesize
1.9MB
MD58e0a9657e55403aed063dcb4f6451faf
SHA19773efc95f9a8bd671ddcca4010fa5c87a4dd2bc
SHA25698c1084ae8d944e38d17e6877ef5afee53788c5b4aa9841ff1a5798b0b793812
SHA512651efa2c3835e617c11a378e68713b73d93852d2a8a94b66e01f278573b0db2df3ff7c08372a6d819b54ade9c8b3b40c579fb15a0eadf3a903bd9fba8f14c5ff
-
Filesize
1.9MB
MD5b98bc94a0bf78fb2a13c19405bef594c
SHA159c3a38c8ac1181e4b2a36316e7e80ab3637889d
SHA256276a8d689eec7c278d80ff328fa3c90c7a14ea50baff3be1661646486fa74d18
SHA5127e18b2132812f4290f769da5412a9ed3bb23546f8d86a79772afd696315a5cb771a43522edcacbdc6d0556103eb98128e9e841aab5a1d8e6aec9dc12d9093e89
-
Filesize
1.9MB
MD56d59a1bc14f22f508c6975f2ebfb5db0
SHA1f912d44c34e0cbe6b8187143edd98f04268b7253
SHA2565680784334ebc4b3772dd3db814542319489d329f71bc570a85aa214b0db7111
SHA512520783d4c87f8c9b4b530faed8af7f76689c4f6f5b05b484e38c70cecc22d0c40d35c785d0cc0c5861afec4fb6bc86a0701505a20e98622dc5048ddbca8a6d06
-
Filesize
1.9MB
MD5da8770c158455e621cf01047a1721cf9
SHA18a02c037ab6f1d11fc0ba44fd1522c7242d20be5
SHA2563f743c0c9c2c956e4e469c40000f2f3fe61090deb677e856e1860726122740c9
SHA51217ebd3e3ddbeb3fc237a8e24603b2bd5c9df1fe3b5a99874c082a036cc460009e4f6f87fab65647536533224b58290bcc370eeaf9662af399af9d8ffc4f1e55d
-
Filesize
1.9MB
MD55e549e0aea0b1ed4cd3eae480e29c3af
SHA12a689df8cbb10828f2e19440a62ecb32be506874
SHA256c812222bb374940ad7eb0d3b5bdbe66d48fd7c125ebb70d264861a1a0a05076f
SHA5122d0014b45205577d1152dbb996bb79072c332f43246b83fd981fc31d7f916833e67f7620aa1431334ccd6dcd4bf42a05f5e3fed7f607bcec8370d1aedb104926
-
Filesize
1.9MB
MD5b92d22686c5762cfcd55d2e27e90549a
SHA1e065df3c9d01a341527c8cbc1652ff9b77a94da2
SHA25658c40a1a140df61c5baf7239ed905be10af7a1a1b4c40483accffe382079a605
SHA512769796cdbdd6de9510a9930cf0a5ce11898523b937b8e131e0029b5bd0bcd9bdd31f2105bc929e698c62ec69926bab801be7bf39e0e1c2290225c227f8272abe
-
Filesize
1.9MB
MD52abd062573da93707f2aa08f90d902b2
SHA12ea144f0023f20c7ed232320f9fc3d4db9fc1491
SHA256fe18736cdddb4cbfe0f48a2c0f09dbf77897189c2a59c27dfa78ce5139ff7481
SHA51275887d4b2ce9388020a38f8425f75cff52e2b99511198c297dab91e284fed52cbc8e4843e5486ced03ffa8a8e9ec253e3c5d42ffba5ff4657793e38b01a007ee
-
Filesize
1.9MB
MD5ec8f8d489d182b10cafc0db6ffac5cfa
SHA121940f4bd7f8f62947e1b3c719cfe8c07be7cbe4
SHA256cdf4f68afa1bf41d9ef4ccd1c4c460d0490c367a5a0f9119f3ebe6de23ffef53
SHA512efbfe83f4a750a5339140bebe715bed2b52a09b3d8c607ada05a2fd7f11853df3bad5d9bfd4e4e3b4c600a9fe581ecc6feb6565c65dd38f4bbd798810798254e
-
Filesize
1.9MB
MD5301889d7528e27d92e42be1407eb1802
SHA12ef5e637d566f714b0bccfbd7a5c43ff2369b44e
SHA256514176088f7d47e66492fc5c315685bc2ac1d46e332c371ba7e4497fdb97a8ef
SHA5122178654831e07225df3612bc3689edb7c86c5f5bef0f10cbb4bbc6c0e671b754990efe6272bac558bdffaefd1cbf4d8e386b62b828147e13ff503872195014f1
-
Filesize
1.9MB
MD5cc484d1914109f1d3986abf9c57ad05a
SHA15e1c2a7289409ec1b6fde7d400e107c571481fef
SHA256f9022c8e75d5d01daa871b57227079b1dd8967f0de0d240483de43f8010545ba
SHA5125ba184516427c49528e83031af3e16a66417e90af2c67efdc5f7e345ab6d4b3dc34acc423a55011930a0aa68d4e5641b34a8da9b8515dd775b62f29d63c9f687
-
Filesize
1.9MB
MD5a6e85b8e0d62884a950b62a3c85abfd3
SHA1d55f2a5c98eba1b3dd7dc1274fa2873ce314e2af
SHA25650b77b8438f857ce98326ec7e2ed8820a33ef76cbbfcfbda3f8170ae052ffff5
SHA512b6679b3ab5c38b2edb362d82d78d5f696e0729b0cb55ff3811034547a87981e5d90b5276b0f1a40b44f6978b5d325bb53e480bdc4e52001d648d0750cf8268fb
-
Filesize
1.9MB
MD5c88fb5a01131179b69374643297bec0c
SHA1a3a95e852a787264cbb15148431723b34c0a7289
SHA256a06b74f071deee9eda87685eea1928994435bf29e55ecfcbafe72db812240193
SHA512c3e05761682939964878899e76bbe465a491b9c6ace1c9f8dbe9631acafda0690647dbb432f715e5ebcaddbef505b4416ea06ff0d3814515bbed2cf21cf3bddd
-
Filesize
1.9MB
MD524b8fb15142b3470f484051eab32b03a
SHA1443f8837dba66654807497dcfc088733ca875a22
SHA256820d9d1f80dcd281ca627ecaded24dc694925f93131f96b2cd418bee6fb9b970
SHA5128e9d5502feb66f764e57b607d29043a5d1b86d177aeb2f1140bfd075880660a6ed33d796c1fa69795257b9ae5aae9f4d7449cf2b87f723e22439451c289fbcfe
-
Filesize
1.9MB
MD50ebf14a5167df8f5e92e6b1ea3afa570
SHA1d66793f7081070b487b7ac614a6c5df59eeeb835
SHA25692155fe93104f91084dd7faf27d9b7de906dda6c3a583b98847de6622ad6028f
SHA512238d9b80336e639d0bf8605c4d8407ecac2c1a51c0df26c0b182818eb55917d0b6ae38e45a9b0bb072cded66356364f31d99ed24bb75bdcd3c910c5da4efbda1
-
Filesize
1.9MB
MD58bf60bf30f42921453ed9e2b67368663
SHA1d821e0a4bd57456eae872e56742355b331664d35
SHA2569e9d1852f0032efe1fba209ef16dbb0709b9561153dd8563a222db4bbf7fd6be
SHA512f76bb400255598ad2050486fcbdf966f320513b19f7b08f3fc096b8941628f3d82fd9822665d16d99751da2d2a22ee60ce7d4cba5df877c3863f7f1f788cef6f
-
Filesize
1.9MB
MD5343cec278c310c4b74f74338b59cc509
SHA1a26ebfbf7638976be91cb3e588546ff9dacbc153
SHA256a89868098ea0bc97a38b660872964713e97a1766d4238f978e762e2ab31fcfe4
SHA512ff725261d4965a1d2778a2c7889bcdea919adede8c0d523e400323edb7e98c11403c404302cc8a3ac61782c1803b9f934d6adaacbce94723168137ca3f994d5b
-
Filesize
1.9MB
MD587efa7822794f8eb7aa271a82ef84675
SHA18d36d3b921ac2ede77a3ed552fff6c85c099a435
SHA2569352591bee88898615e8de318a8824677f0fe9756b840d00f6d53393467143c4
SHA51256016bdf6d2001fe6d82bd11d8605adfb2547c314c40fe458421357adbb8bb94dee5b72080676eb7a432ee7c4bbcbc4c6325c9f1d4e9207a84658ea9efa68ce6
-
Filesize
1.9MB
MD54afb00b1190b0c96a8ae8afd5898934a
SHA14915475f6cd12a39280399b00aff94f1e07b92ed
SHA256874861ee99cfb16bf28ecf50aa72c7716f17fe666c6cc459e4227772b7b3b52a
SHA5123c6b16079498e4549ab480d8c07651042b92da69e26cbcb0ead545d5f5b5a7f98e90a0f261fe6df0269add4eced320ce1b6ed7c4949666203129fb968ea8f21c
-
Filesize
1.9MB
MD5c387e64c7f8974edd6bbe0a6df128683
SHA141a1474872e2658738795975ce6c38bcd571f353
SHA256219268fd782bfcb7e6d8b58909c0e76665a18e696b29f12312b4c1c1bc35e6f3
SHA51298d6d26e7bd074483b897c422193b8f921e6d6f38c0631a3468ded7ac2a6e48ba14ee9b72c5f8d1fd82ffdb474326e56f0c6dcf84dc01955400d4953879f23f8
-
Filesize
1.9MB
MD52e09db57555efa70f2be78c8359c3ec0
SHA13fa4bf61e76827f38eab51cd32e33fb1598480f3
SHA256e94debf30c9bd01bc81e74b09517d5eceff4645def5705305dd219de377d6957
SHA512ed7aee269bd5d1baa95471d4fa07c5a8af87879bf5913d3c3cf9c7982b685d61b5a7f562e8923192fe1d94c1a440e5656e30d913a2cbef59c9c6a6bfe32c5ad2
-
Filesize
1.9MB
MD5372a9f171d847c16d61b2aa94876f56c
SHA17f1a01bbfae4473cb7216e929a10f950e96a8c7e
SHA2561688e91b3ad6f6c019532e3b9ed02b5397a5a5ff186c97d695ae675bf2b3e9e6
SHA5129b8988e04d35511e02b8dab51d2cc1a25b3f37d7cda8205638219f9d288e5f44e98edad322e7af17d497352251440ee1f046ddd700a4a655f4ed281aa3582e3a
-
Filesize
1.9MB
MD5c960fd8ef1ef879d756bd76ee7b08762
SHA158647ce8b37286350d3c8a945d6a725f58b534c5
SHA256c5823f0948b623fc132ea197735922f1f729d2faa851355f39aab051d5f9dc79
SHA512b24f29af35634fc834e945f50f1a900eb30fb15e8ce90cddc3ce7392cc214d5d2d14b7ca3dab828981c91521ddbeb621cbca255d2c141c395228470e2e172368
-
Filesize
1.9MB
MD5940fe8d37c69a0aa4ee8c96faedd23f6
SHA1adb22cb3ab77f452720392542e099782c75281fa
SHA256b7a8b5a17f79c4872d00ca6a377679b54d91598dc54b9e66277c939c1729d95c
SHA512a43b27cb707c4b123ab6fd07f0caeeb4e11aa60e5626b24aca2296c9bd80b30362acb62a40ae9688c36f6c4379bd640d11d448349b0687f0d658dcc7ac82f2bb