Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe
Resource
win10v2004-20240704-en
General
-
Target
c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe
-
Size
80KB
-
MD5
a450054e1852d845b8026b6425383777
-
SHA1
145da9bb8d1edbeeb0ed5b566e5359cbce75b716
-
SHA256
c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019
-
SHA512
3bd9b8a6fd3b6a83886f1557bf5cae54d2f56bd6a4921fab1eca340b7e7e597b8bd3421a8952a50006f820ea3434b421671b2c800a7ebf39a63c16c8a4b91231
-
SSDEEP
1536:cHp9Z6u/YbEwon2kHYb/NjU2LlIaIZTJ+7LhkiB0:mp9Z6AM8HYb/NjtlIaMU7ui
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Midqiaih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcekkkmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcekkkmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mibdcakk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mipgnbnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mibdcakk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpllpl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnfbmgcj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mipgnbnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpllpl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niijdq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncbkenba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmifiahi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmifiahi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Midqiaih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgnkfjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgnkfjho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbmebgpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbmebgpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Niijdq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncbkenba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlejkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlejkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnfbmgcj.exe -
Executes dropped EXE 13 IoCs
pid Process 2376 Mmifiahi.exe 1640 Mgnkfjho.exe 2988 Mipgnbnn.exe 2100 Mcekkkmc.exe 1144 Mibdcakk.exe 2660 Mpllpl32.exe 2384 Midqiaih.exe 732 Mbmebgpi.exe 2256 Mlejkl32.exe 2924 Niijdq32.exe 2688 Nnfbmgcj.exe 3052 Ncbkenba.exe 880 Nafknbqk.exe -
Loads dropped DLL 26 IoCs
pid Process 2520 c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe 2520 c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe 2376 Mmifiahi.exe 2376 Mmifiahi.exe 1640 Mgnkfjho.exe 1640 Mgnkfjho.exe 2988 Mipgnbnn.exe 2988 Mipgnbnn.exe 2100 Mcekkkmc.exe 2100 Mcekkkmc.exe 1144 Mibdcakk.exe 1144 Mibdcakk.exe 2660 Mpllpl32.exe 2660 Mpllpl32.exe 2384 Midqiaih.exe 2384 Midqiaih.exe 732 Mbmebgpi.exe 732 Mbmebgpi.exe 2256 Mlejkl32.exe 2256 Mlejkl32.exe 2924 Niijdq32.exe 2924 Niijdq32.exe 2688 Nnfbmgcj.exe 2688 Nnfbmgcj.exe 3052 Ncbkenba.exe 3052 Ncbkenba.exe -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ncbkenba.exe Nnfbmgcj.exe File created C:\Windows\SysWOW64\Fhnfnajf.dll Nnfbmgcj.exe File created C:\Windows\SysWOW64\Dlejhf32.dll Mibdcakk.exe File opened for modification C:\Windows\SysWOW64\Midqiaih.exe Mpllpl32.exe File created C:\Windows\SysWOW64\Lgocca32.dll Mbmebgpi.exe File opened for modification C:\Windows\SysWOW64\Mmifiahi.exe c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe File created C:\Windows\SysWOW64\Mibdcakk.exe Mcekkkmc.exe File opened for modification C:\Windows\SysWOW64\Nnfbmgcj.exe Niijdq32.exe File created C:\Windows\SysWOW64\Fbocnbmi.dll c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe File opened for modification C:\Windows\SysWOW64\Mipgnbnn.exe Mgnkfjho.exe File opened for modification C:\Windows\SysWOW64\Mpllpl32.exe Mibdcakk.exe File opened for modification C:\Windows\SysWOW64\Mlejkl32.exe Mbmebgpi.exe File created C:\Windows\SysWOW64\Nafknbqk.exe Ncbkenba.exe File created C:\Windows\SysWOW64\Mgnkfjho.exe Mmifiahi.exe File created C:\Windows\SysWOW64\Ojnmbglh.dll Mcekkkmc.exe File created C:\Windows\SysWOW64\Cnnelfmp.dll Midqiaih.exe File created C:\Windows\SysWOW64\Niijdq32.exe Mlejkl32.exe File created C:\Windows\SysWOW64\Dqffpm32.dll Mlejkl32.exe File created C:\Windows\SysWOW64\Ncbkenba.exe Nnfbmgcj.exe File opened for modification C:\Windows\SysWOW64\Nafknbqk.exe Ncbkenba.exe File created C:\Windows\SysWOW64\Mmifiahi.exe c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe File created C:\Windows\SysWOW64\Mcekkkmc.exe Mipgnbnn.exe File created C:\Windows\SysWOW64\Midqiaih.exe Mpllpl32.exe File opened for modification C:\Windows\SysWOW64\Niijdq32.exe Mlejkl32.exe File created C:\Windows\SysWOW64\Mlejkl32.exe Mbmebgpi.exe File opened for modification C:\Windows\SysWOW64\Mgnkfjho.exe Mmifiahi.exe File created C:\Windows\SysWOW64\Mipgnbnn.exe Mgnkfjho.exe File created C:\Windows\SysWOW64\Naipph32.dll Mipgnbnn.exe File created C:\Windows\SysWOW64\Mbmebgpi.exe Midqiaih.exe File created C:\Windows\SysWOW64\Mpllpl32.exe Mibdcakk.exe File created C:\Windows\SysWOW64\Ffckpq32.dll Mpllpl32.exe File opened for modification C:\Windows\SysWOW64\Mbmebgpi.exe Midqiaih.exe File created C:\Windows\SysWOW64\Nnfbmgcj.exe Niijdq32.exe File created C:\Windows\SysWOW64\Ijegmepm.dll Mmifiahi.exe File created C:\Windows\SysWOW64\Blcikifh.dll Mgnkfjho.exe File opened for modification C:\Windows\SysWOW64\Mcekkkmc.exe Mipgnbnn.exe File opened for modification C:\Windows\SysWOW64\Mibdcakk.exe Mcekkkmc.exe File created C:\Windows\SysWOW64\Mfmpqk32.dll Niijdq32.exe File created C:\Windows\SysWOW64\Dhqpmc32.dll Ncbkenba.exe -
Program crash 1 IoCs
pid pid_target Process 3972 3172 WerFault.exe -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Midqiaih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhqpmc32.dll" Ncbkenba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmifiahi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijegmepm.dll" Mmifiahi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcekkkmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Midqiaih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlejkl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgnkfjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naipph32.dll" Mipgnbnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffckpq32.dll" Mpllpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncbkenba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncbkenba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlejhf32.dll" Mibdcakk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mbmebgpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dqffpm32.dll" Mlejkl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Niijdq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgnkfjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhnfnajf.dll" Nnfbmgcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mibdcakk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpllpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpllpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojnmbglh.dll" Mcekkkmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mibdcakk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbmebgpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Niijdq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbocnbmi.dll" c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blcikifh.dll" Mgnkfjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mipgnbnn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcekkkmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnfbmgcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlejkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmifiahi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mipgnbnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnnelfmp.dll" Midqiaih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgocca32.dll" Mbmebgpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfmpqk32.dll" Niijdq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnfbmgcj.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2376 2520 c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe 30 PID 2520 wrote to memory of 2376 2520 c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe 30 PID 2520 wrote to memory of 2376 2520 c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe 30 PID 2520 wrote to memory of 2376 2520 c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe 30 PID 2376 wrote to memory of 1640 2376 Mmifiahi.exe 31 PID 2376 wrote to memory of 1640 2376 Mmifiahi.exe 31 PID 2376 wrote to memory of 1640 2376 Mmifiahi.exe 31 PID 2376 wrote to memory of 1640 2376 Mmifiahi.exe 31 PID 1640 wrote to memory of 2988 1640 Mgnkfjho.exe 32 PID 1640 wrote to memory of 2988 1640 Mgnkfjho.exe 32 PID 1640 wrote to memory of 2988 1640 Mgnkfjho.exe 32 PID 1640 wrote to memory of 2988 1640 Mgnkfjho.exe 32 PID 2988 wrote to memory of 2100 2988 Mipgnbnn.exe 33 PID 2988 wrote to memory of 2100 2988 Mipgnbnn.exe 33 PID 2988 wrote to memory of 2100 2988 Mipgnbnn.exe 33 PID 2988 wrote to memory of 2100 2988 Mipgnbnn.exe 33 PID 2100 wrote to memory of 1144 2100 Mcekkkmc.exe 34 PID 2100 wrote to memory of 1144 2100 Mcekkkmc.exe 34 PID 2100 wrote to memory of 1144 2100 Mcekkkmc.exe 34 PID 2100 wrote to memory of 1144 2100 Mcekkkmc.exe 34 PID 1144 wrote to memory of 2660 1144 Mibdcakk.exe 35 PID 1144 wrote to memory of 2660 1144 Mibdcakk.exe 35 PID 1144 wrote to memory of 2660 1144 Mibdcakk.exe 35 PID 1144 wrote to memory of 2660 1144 Mibdcakk.exe 35 PID 2660 wrote to memory of 2384 2660 Mpllpl32.exe 36 PID 2660 wrote to memory of 2384 2660 Mpllpl32.exe 36 PID 2660 wrote to memory of 2384 2660 Mpllpl32.exe 36 PID 2660 wrote to memory of 2384 2660 Mpllpl32.exe 36 PID 2384 wrote to memory of 732 2384 Midqiaih.exe 37 PID 2384 wrote to memory of 732 2384 Midqiaih.exe 37 PID 2384 wrote to memory of 732 2384 Midqiaih.exe 37 PID 2384 wrote to memory of 732 2384 Midqiaih.exe 37 PID 732 wrote to memory of 2256 732 Mbmebgpi.exe 38 PID 732 wrote to memory of 2256 732 Mbmebgpi.exe 38 PID 732 wrote to memory of 2256 732 Mbmebgpi.exe 38 PID 732 wrote to memory of 2256 732 Mbmebgpi.exe 38 PID 2256 wrote to memory of 2924 2256 Mlejkl32.exe 39 PID 2256 wrote to memory of 2924 2256 Mlejkl32.exe 39 PID 2256 wrote to memory of 2924 2256 Mlejkl32.exe 39 PID 2256 wrote to memory of 2924 2256 Mlejkl32.exe 39 PID 2924 wrote to memory of 2688 2924 Niijdq32.exe 40 PID 2924 wrote to memory of 2688 2924 Niijdq32.exe 40 PID 2924 wrote to memory of 2688 2924 Niijdq32.exe 40 PID 2924 wrote to memory of 2688 2924 Niijdq32.exe 40 PID 2688 wrote to memory of 3052 2688 Nnfbmgcj.exe 41 PID 2688 wrote to memory of 3052 2688 Nnfbmgcj.exe 41 PID 2688 wrote to memory of 3052 2688 Nnfbmgcj.exe 41 PID 2688 wrote to memory of 3052 2688 Nnfbmgcj.exe 41 PID 3052 wrote to memory of 880 3052 Ncbkenba.exe 42 PID 3052 wrote to memory of 880 3052 Ncbkenba.exe 42 PID 3052 wrote to memory of 880 3052 Ncbkenba.exe 42 PID 3052 wrote to memory of 880 3052 Ncbkenba.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe"C:\Users\Admin\AppData\Local\Temp\c012dfc8c0d87d11e771ea18b942574deacfdcc6ea7b6e30791730ad1ff0d019.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Mmifiahi.exeC:\Windows\system32\Mmifiahi.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Mgnkfjho.exeC:\Windows\system32\Mgnkfjho.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Mipgnbnn.exeC:\Windows\system32\Mipgnbnn.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\Mcekkkmc.exeC:\Windows\system32\Mcekkkmc.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\Mibdcakk.exeC:\Windows\system32\Mibdcakk.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\Mpllpl32.exeC:\Windows\system32\Mpllpl32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Midqiaih.exeC:\Windows\system32\Midqiaih.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\Mbmebgpi.exeC:\Windows\system32\Mbmebgpi.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\Mlejkl32.exeC:\Windows\system32\Mlejkl32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\Niijdq32.exeC:\Windows\system32\Niijdq32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\Nnfbmgcj.exeC:\Windows\system32\Nnfbmgcj.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Ncbkenba.exeC:\Windows\system32\Ncbkenba.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\Nafknbqk.exeC:\Windows\system32\Nafknbqk.exe14⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\Nfcdfiob.exeC:\Windows\system32\Nfcdfiob.exe15⤵PID:1488
-
C:\Windows\SysWOW64\Nhbqqlfe.exeC:\Windows\system32\Nhbqqlfe.exe16⤵PID:640
-
C:\Windows\SysWOW64\Npneeocq.exeC:\Windows\system32\Npneeocq.exe17⤵PID:996
-
C:\Windows\SysWOW64\Pnfkheap.exeC:\Windows\system32\Pnfkheap.exe18⤵PID:2972
-
C:\Windows\SysWOW64\Pdpcep32.exeC:\Windows\system32\Pdpcep32.exe19⤵PID:1484
-
C:\Windows\SysWOW64\Pllhib32.exeC:\Windows\system32\Pllhib32.exe20⤵PID:2504
-
C:\Windows\SysWOW64\Qjbehfbo.exeC:\Windows\system32\Qjbehfbo.exe21⤵PID:2524
-
C:\Windows\SysWOW64\Qhgbibgg.exeC:\Windows\system32\Qhgbibgg.exe22⤵PID:2552
-
C:\Windows\SysWOW64\Aaogbh32.exeC:\Windows\system32\Aaogbh32.exe23⤵PID:3012
-
C:\Windows\SysWOW64\Ahllda32.exeC:\Windows\system32\Ahllda32.exe24⤵PID:2268
-
C:\Windows\SysWOW64\Ajmhljip.exeC:\Windows\system32\Ajmhljip.exe25⤵PID:2812
-
C:\Windows\SysWOW64\Ajoebigm.exeC:\Windows\system32\Ajoebigm.exe26⤵PID:2760
-
C:\Windows\SysWOW64\Adeiobgc.exeC:\Windows\system32\Adeiobgc.exe27⤵PID:520
-
C:\Windows\SysWOW64\Agebam32.exeC:\Windows\system32\Agebam32.exe28⤵PID:2772
-
C:\Windows\SysWOW64\Bbocak32.exeC:\Windows\system32\Bbocak32.exe29⤵PID:960
-
C:\Windows\SysWOW64\Bmegodpi.exeC:\Windows\system32\Bmegodpi.exe30⤵PID:940
-
C:\Windows\SysWOW64\Bbapgknp.exeC:\Windows\system32\Bbapgknp.exe31⤵PID:2768
-
C:\Windows\SysWOW64\Bebiifka.exeC:\Windows\system32\Bebiifka.exe32⤵PID:2584
-
C:\Windows\SysWOW64\Bgqeea32.exeC:\Windows\system32\Bgqeea32.exe33⤵PID:2880
-
C:\Windows\SysWOW64\Bphmfo32.exeC:\Windows\system32\Bphmfo32.exe34⤵PID:2628
-
C:\Windows\SysWOW64\Bnmjgkpo.exeC:\Windows\system32\Bnmjgkpo.exe35⤵PID:2764
-
C:\Windows\SysWOW64\Ccjbobnf.exeC:\Windows\system32\Ccjbobnf.exe36⤵PID:2480
-
C:\Windows\SysWOW64\Cmbghgdg.exeC:\Windows\system32\Cmbghgdg.exe37⤵PID:560
-
C:\Windows\SysWOW64\Cghkepdm.exeC:\Windows\system32\Cghkepdm.exe38⤵PID:2912
-
C:\Windows\SysWOW64\Cjfgalcq.exeC:\Windows\system32\Cjfgalcq.exe39⤵PID:760
-
C:\Windows\SysWOW64\Ccolja32.exeC:\Windows\system32\Ccolja32.exe40⤵PID:2500
-
C:\Windows\SysWOW64\Cjhdgk32.exeC:\Windows\system32\Cjhdgk32.exe41⤵PID:512
-
C:\Windows\SysWOW64\Cpemob32.exeC:\Windows\system32\Cpemob32.exe42⤵PID:3020
-
C:\Windows\SysWOW64\Ccaipaho.exeC:\Windows\system32\Ccaipaho.exe43⤵PID:1800
-
C:\Windows\SysWOW64\Cjkamk32.exeC:\Windows\system32\Cjkamk32.exe44⤵PID:2388
-
C:\Windows\SysWOW64\Ccceeqfl.exeC:\Windows\system32\Ccceeqfl.exe45⤵PID:2136
-
C:\Windows\SysWOW64\Dmljnfll.exeC:\Windows\system32\Dmljnfll.exe46⤵PID:920
-
C:\Windows\SysWOW64\Dendcg32.exeC:\Windows\system32\Dendcg32.exe47⤵PID:3044
-
C:\Windows\SysWOW64\Eagbnh32.exeC:\Windows\system32\Eagbnh32.exe48⤵PID:1648
-
C:\Windows\SysWOW64\Fofekp32.exeC:\Windows\system32\Fofekp32.exe49⤵PID:1588
-
C:\Windows\SysWOW64\Fgcgebhd.exeC:\Windows\system32\Fgcgebhd.exe50⤵PID:2716
-
C:\Windows\SysWOW64\Faikbkhj.exeC:\Windows\system32\Faikbkhj.exe51⤵PID:1220
-
C:\Windows\SysWOW64\Fkapkq32.exeC:\Windows\system32\Fkapkq32.exe52⤵PID:2748
-
C:\Windows\SysWOW64\Fakhhk32.exeC:\Windows\system32\Fakhhk32.exe53⤵PID:2116
-
C:\Windows\SysWOW64\Fcmdpcle.exeC:\Windows\system32\Fcmdpcle.exe54⤵PID:3056
-
C:\Windows\SysWOW64\Fnbhmlkk.exeC:\Windows\system32\Fnbhmlkk.exe55⤵PID:1012
-
C:\Windows\SysWOW64\Fcoaebjc.exeC:\Windows\system32\Fcoaebjc.exe56⤵PID:2832
-
C:\Windows\SysWOW64\Gqcaoghl.exeC:\Windows\system32\Gqcaoghl.exe57⤵PID:2956
-
C:\Windows\SysWOW64\Gfpjgn32.exeC:\Windows\system32\Gfpjgn32.exe58⤵PID:1272
-
C:\Windows\SysWOW64\Gmjbchnq.exeC:\Windows\system32\Gmjbchnq.exe59⤵PID:2836
-
C:\Windows\SysWOW64\Gohnpcmd.exeC:\Windows\system32\Gohnpcmd.exe60⤵PID:2420
-
C:\Windows\SysWOW64\Gfbfln32.exeC:\Windows\system32\Gfbfln32.exe61⤵PID:856
-
C:\Windows\SysWOW64\Gmloigln.exeC:\Windows\system32\Gmloigln.exe62⤵PID:588
-
C:\Windows\SysWOW64\Gbigao32.exeC:\Windows\system32\Gbigao32.exe63⤵PID:2404
-
C:\Windows\SysWOW64\Gmnlog32.exeC:\Windows\system32\Gmnlog32.exe64⤵PID:2076
-
C:\Windows\SysWOW64\Gnphfppi.exeC:\Windows\system32\Gnphfppi.exe65⤵PID:2396
-
C:\Windows\SysWOW64\Gfgpgmql.exeC:\Windows\system32\Gfgpgmql.exe66⤵PID:2332
-
C:\Windows\SysWOW64\Gkchpcoc.exeC:\Windows\system32\Gkchpcoc.exe67⤵PID:2176
-
C:\Windows\SysWOW64\Hbnqln32.exeC:\Windows\system32\Hbnqln32.exe68⤵PID:872
-
C:\Windows\SysWOW64\Helmiiec.exeC:\Windows\system32\Helmiiec.exe69⤵PID:1780
-
C:\Windows\SysWOW64\Hkfeec32.exeC:\Windows\system32\Hkfeec32.exe70⤵PID:2732
-
C:\Windows\SysWOW64\Hqbnnj32.exeC:\Windows\system32\Hqbnnj32.exe71⤵PID:2692
-
C:\Windows\SysWOW64\Hgmfjdbe.exeC:\Windows\system32\Hgmfjdbe.exe72⤵PID:2656
-
C:\Windows\SysWOW64\Hjkbfpah.exeC:\Windows\system32\Hjkbfpah.exe73⤵PID:2600
-
C:\Windows\SysWOW64\Haejcj32.exeC:\Windows\system32\Haejcj32.exe74⤵PID:2616
-
C:\Windows\SysWOW64\Hccfoehi.exeC:\Windows\system32\Hccfoehi.exe75⤵PID:2884
-
C:\Windows\SysWOW64\Hjmolp32.exeC:\Windows\system32\Hjmolp32.exe76⤵PID:1712
-
C:\Windows\SysWOW64\Haggijgb.exeC:\Windows\system32\Haggijgb.exe77⤵PID:1704
-
C:\Windows\SysWOW64\Hjplao32.exeC:\Windows\system32\Hjplao32.exe78⤵PID:2512
-
C:\Windows\SysWOW64\Hajdniep.exeC:\Windows\system32\Hajdniep.exe79⤵PID:2232
-
C:\Windows\SysWOW64\Hfflfp32.exeC:\Windows\system32\Hfflfp32.exe80⤵PID:1772
-
C:\Windows\SysWOW64\Imqdcjkd.exeC:\Windows\system32\Imqdcjkd.exe81⤵PID:1336
-
C:\Windows\SysWOW64\Icjmpd32.exeC:\Windows\system32\Icjmpd32.exe82⤵PID:896
-
C:\Windows\SysWOW64\Ifiilp32.exeC:\Windows\system32\Ifiilp32.exe83⤵PID:1124
-
C:\Windows\SysWOW64\Ipameehe.exeC:\Windows\system32\Ipameehe.exe84⤵PID:2148
-
C:\Windows\SysWOW64\Ibpjaagi.exeC:\Windows\system32\Ibpjaagi.exe85⤵PID:1924
-
C:\Windows\SysWOW64\Iijbnkne.exeC:\Windows\system32\Iijbnkne.exe86⤵PID:1068
-
C:\Windows\SysWOW64\Ilhnjfmi.exeC:\Windows\system32\Ilhnjfmi.exe87⤵PID:2156
-
C:\Windows\SysWOW64\Ibbffq32.exeC:\Windows\system32\Ibbffq32.exe88⤵PID:2680
-
C:\Windows\SysWOW64\Ieqbbl32.exeC:\Windows\system32\Ieqbbl32.exe89⤵PID:2932
-
C:\Windows\SysWOW64\Ijmkkc32.exeC:\Windows\system32\Ijmkkc32.exe90⤵PID:2940
-
C:\Windows\SysWOW64\Ibdclp32.exeC:\Windows\system32\Ibdclp32.exe91⤵PID:2860
-
C:\Windows\SysWOW64\Imndmnob.exeC:\Windows\system32\Imndmnob.exe92⤵PID:1048
-
C:\Windows\SysWOW64\Jdhlih32.exeC:\Windows\system32\Jdhlih32.exe93⤵PID:2840
-
C:\Windows\SysWOW64\Jjbdfbnl.exeC:\Windows\system32\Jjbdfbnl.exe94⤵PID:2360
-
C:\Windows\SysWOW64\Jmpqbnmp.exeC:\Windows\system32\Jmpqbnmp.exe95⤵PID:1184
-
C:\Windows\SysWOW64\Jmbnhm32.exeC:\Windows\system32\Jmbnhm32.exe96⤵PID:1688
-
C:\Windows\SysWOW64\Jpajdi32.exeC:\Windows\system32\Jpajdi32.exe97⤵PID:2240
-
C:\Windows\SysWOW64\Jkfnaa32.exeC:\Windows\system32\Jkfnaa32.exe98⤵PID:2236
-
C:\Windows\SysWOW64\Jpcfih32.exeC:\Windows\system32\Jpcfih32.exe99⤵PID:1644
-
C:\Windows\SysWOW64\Jgmofbpk.exeC:\Windows\system32\Jgmofbpk.exe100⤵PID:1040
-
C:\Windows\SysWOW64\Jmggcmgg.exeC:\Windows\system32\Jmggcmgg.exe101⤵PID:2320
-
C:\Windows\SysWOW64\Jhahcjcf.exeC:\Windows\system32\Jhahcjcf.exe102⤵PID:2608
-
C:\Windows\SysWOW64\Kphpdhdh.exeC:\Windows\system32\Kphpdhdh.exe103⤵PID:2900
-
C:\Windows\SysWOW64\Kbflqccl.exeC:\Windows\system32\Kbflqccl.exe104⤵PID:1000
-
C:\Windows\SysWOW64\Kloqiijm.exeC:\Windows\system32\Kloqiijm.exe105⤵PID:2920
-
C:\Windows\SysWOW64\Kommediq.exeC:\Windows\system32\Kommediq.exe106⤵PID:1008
-
C:\Windows\SysWOW64\Kegebn32.exeC:\Windows\system32\Kegebn32.exe107⤵PID:3004
-
C:\Windows\SysWOW64\Knbjgq32.exeC:\Windows\system32\Knbjgq32.exe108⤵PID:2916
-
C:\Windows\SysWOW64\Kejahn32.exeC:\Windows\system32\Kejahn32.exe109⤵PID:2784
-
C:\Windows\SysWOW64\Kgknpfdi.exeC:\Windows\system32\Kgknpfdi.exe110⤵PID:2492
-
C:\Windows\SysWOW64\Kneflplf.exeC:\Windows\system32\Kneflplf.exe111⤵PID:2588
-
C:\Windows\SysWOW64\Kdooij32.exeC:\Windows\system32\Kdooij32.exe112⤵PID:2252
-
C:\Windows\SysWOW64\Kgmkef32.exeC:\Windows\system32\Kgmkef32.exe113⤵PID:2352
-
C:\Windows\SysWOW64\Kabobo32.exeC:\Windows\system32\Kabobo32.exe114⤵PID:2804
-
C:\Windows\SysWOW64\Kdakoj32.exeC:\Windows\system32\Kdakoj32.exe115⤵PID:2060
-
C:\Windows\SysWOW64\Lkkckdhm.exeC:\Windows\system32\Lkkckdhm.exe116⤵PID:1348
-
C:\Windows\SysWOW64\Lllpclnk.exeC:\Windows\system32\Lllpclnk.exe117⤵PID:1808
-
C:\Windows\SysWOW64\Lcfhpf32.exeC:\Windows\system32\Lcfhpf32.exe118⤵PID:2012
-
C:\Windows\SysWOW64\Ljpqlqmd.exeC:\Windows\system32\Ljpqlqmd.exe119⤵PID:2104
-
C:\Windows\SysWOW64\Llomhllh.exeC:\Windows\system32\Llomhllh.exe120⤵PID:2756
-
C:\Windows\SysWOW64\Lgdafeln.exeC:\Windows\system32\Lgdafeln.exe121⤵PID:2452
-
C:\Windows\SysWOW64\Lhenmm32.exeC:\Windows\system32\Lhenmm32.exe122⤵PID:608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-