Analysis
-
max time kernel
99s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 01:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3804bb5b3377dbcb1e80e130058d4750N.exe
Resource
win7-20240708-en
7 signatures
120 seconds
Behavioral task
behavioral2
Sample
3804bb5b3377dbcb1e80e130058d4750N.exe
Resource
win10v2004-20240709-en
6 signatures
120 seconds
General
-
Target
3804bb5b3377dbcb1e80e130058d4750N.exe
-
Size
96KB
-
MD5
3804bb5b3377dbcb1e80e130058d4750
-
SHA1
f02a76f983214f5cbcdcbea6f24e93961219d7a3
-
SHA256
16f59b7b904ab25355402eb328fefc716b4cd3d666109b651eb3df2c84a8a5ed
-
SHA512
5c4395c404e42cca28b236e3f1a3bb3c3b7883a807f29139de6bcc777251615791e2dfcabd17ac7d2599f33c20d1c64185a2824c0da3b69c0ad607019ddcd50b
-
SSDEEP
1536:bKIJQhFsIp1UJK1POp0nyQEgLfBYUKh+tkRraMUJN1AerDtZar3vhD:Pl6UJK1kcLfBYUOGkRGMM1AerDtsr3vV
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Inbkgejf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkdkgdfm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Majlgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Obfdifli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pgeigm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfjjoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hfjjoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Impagbef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpogjkfg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Konciabf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Idapdk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmlacq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgpegdgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 3804bb5b3377dbcb1e80e130058d4750N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnoejgjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kpmckijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lgihncoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mnffgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfeqcjll.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpfmkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgihncoa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgbkdbgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idlgiljp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmlacq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jonjbcph.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jopghc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lalpelai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjjojh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jdhfejpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mdmaneph.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noebqnnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hpekmold.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngjjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gpnelp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifkcegjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jkpale32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhfokifi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmediocn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggpcbngc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcgdgomh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcnjhn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnamlkjn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnabpg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfcmeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Idlgiljp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkidbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mhddcdlf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ipqkim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hnkeff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ipnncndi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iabdhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jpacpkdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgiada32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ngjjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oglgan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hndoeg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjjojh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaeiemga.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mamhlj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhemjb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joknmcbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmgaoo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pomahj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmpipd32.exe -
Executes dropped EXE 64 IoCs
pid Process 4456 Ggpcbngc.exe 3168 Gjopoifg.exe 3048 Gmmlke32.exe 732 Gcgdgomh.exe 2120 Gfeqcjll.exe 5064 Gmpipd32.exe 6120 Gpnelp32.exe 1408 Gfhmijji.exe 1988 Gnoejgjk.exe 4664 Gamafc32.exe 3148 Gclnbn32.exe 3452 Hfjjoj32.exe 3680 Hnabpg32.exe 664 Hapnlb32.exe 4880 Hcnjhn32.exe 5784 Hfmgdi32.exe 5636 Hndoeg32.exe 2648 Hpekmold.exe 6076 Hhlcnl32.exe 5428 Hjjojh32.exe 2412 Hadggbcg.exe 5564 Hfapoian.exe 2688 Hmkhlc32.exe 2936 Hdeqimqh.exe 5760 Hfcmeh32.exe 692 Hnkeff32.exe 4572 Hplannfl.exe 5556 Iffijh32.exe 5052 Impagbef.exe 1700 Ipnncndi.exe 4636 Ihefdk32.exe 2860 Ijdbqf32.exe 1876 Ipqkim32.exe 4552 Idlgiljp.exe 5036 Ifkcegjc.exe 5104 Inbkgejf.exe 5140 Iapgcpii.exe 2008 Idocolhm.exe 3404 Imghhaon.exe 3832 Iabdhp32.exe 3748 Idapdk32.exe 516 Ifolqg32.exe 4416 Iofdad32.exe 1780 Iaeqnp32.exe 5112 Jhoikjma.exe 5224 Jfaiff32.exe 5520 Jmlacq32.exe 2788 Jpjnol32.exe 2460 Jhaepi32.exe 3288 Jkpale32.exe 448 Joknmcbk.exe 3016 Jaijioao.exe 4836 Jdhfejpb.exe 2792 Jgfbafof.exe 4816 Jonjbcph.exe 3472 Jmpknpgc.exe 5496 Jpogjkfg.exe 3544 Jhfokifi.exe 2408 Jkdkgdfm.exe 4556 Jopghc32.exe 1064 Jpacpkdd.exe 1624 Jhhlahdf.exe 2264 Jkfhmdcj.exe 5624 Jmediocn.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mkpcjp32.exe Mgehiaec.exe File opened for modification C:\Windows\SysWOW64\Ifolqg32.exe Idapdk32.exe File created C:\Windows\SysWOW64\Kpcpek32.exe Jmediocn.exe File created C:\Windows\SysWOW64\Lalpelai.exe Konciabf.exe File created C:\Windows\SysWOW64\Logfppjk.exe Lgihncoa.exe File created C:\Windows\SysWOW64\Dlcbdmho.dll Onmengbn.exe File created C:\Windows\SysWOW64\Pgeigm32.exe Oegmka32.exe File opened for modification C:\Windows\SysWOW64\Gnoejgjk.exe Gfhmijji.exe File created C:\Windows\SysWOW64\Aeiamppq.dll Jmlacq32.exe File created C:\Windows\SysWOW64\Hhlcnl32.exe Hpekmold.exe File created C:\Windows\SysWOW64\Oglgan32.exe Oiifeajn.exe File created C:\Windows\SysWOW64\Oojecj32.exe Ogcmamka.exe File opened for modification C:\Windows\SysWOW64\Oalajbaa.exe Onmengbn.exe File created C:\Windows\SysWOW64\Cododlpi.dll Pgeigm32.exe File created C:\Windows\SysWOW64\Jmcagdha.dll Jkfhmdcj.exe File opened for modification C:\Windows\SysWOW64\Ooabml32.exe Ngjjko32.exe File opened for modification C:\Windows\SysWOW64\Hhlcnl32.exe Hpekmold.exe File created C:\Windows\SysWOW64\Ccijncff.dll Joknmcbk.exe File created C:\Windows\SysWOW64\Maligfmc.dll Iapgcpii.exe File created C:\Windows\SysWOW64\Cqniga32.dll Jpacpkdd.exe File opened for modification C:\Windows\SysWOW64\Kpmckijg.exe Kolgca32.exe File created C:\Windows\SysWOW64\Nohofm32.exe Nhngjcdl.exe File created C:\Windows\SysWOW64\Jaijioao.exe Joknmcbk.exe File created C:\Windows\SysWOW64\Lgbkdbgf.exe Lddohfhb.exe File created C:\Windows\SysWOW64\Jpjnol32.exe Jmlacq32.exe File opened for modification C:\Windows\SysWOW64\Jpogjkfg.exe Jmpknpgc.exe File created C:\Windows\SysWOW64\Pncnea32.dll Ipnncndi.exe File opened for modification C:\Windows\SysWOW64\Idocolhm.exe Iapgcpii.exe File opened for modification C:\Windows\SysWOW64\Kgdobd32.exe Kpjffjli.exe File opened for modification C:\Windows\SysWOW64\Mnffgk32.exe Mhinod32.exe File created C:\Windows\SysWOW64\Fbdpibaj.dll Jmpknpgc.exe File created C:\Windows\SysWOW64\Gjopoifg.exe Ggpcbngc.exe File created C:\Windows\SysWOW64\Jpogjkfg.exe Jmpknpgc.exe File created C:\Windows\SysWOW64\Iapgcpii.exe Inbkgejf.exe File opened for modification C:\Windows\SysWOW64\Ogcmamka.exe Oeeqeakm.exe File created C:\Windows\SysWOW64\Ndbagfkd.dll Konciabf.exe File created C:\Windows\SysWOW64\Dkgbng32.dll Ngeqpoga.exe File opened for modification C:\Windows\SysWOW64\Pnpbdgpk.exe Pomahj32.exe File opened for modification C:\Windows\SysWOW64\Hfcmeh32.exe Hdeqimqh.exe File created C:\Windows\SysWOW64\Mhkjdc32.exe Mbabgioa.exe File opened for modification C:\Windows\SysWOW64\Oglgan32.exe Oiifeajn.exe File opened for modification C:\Windows\SysWOW64\Gcgdgomh.exe Gmmlke32.exe File created C:\Windows\SysWOW64\Jonjbcph.exe Jgfbafof.exe File created C:\Windows\SysWOW64\Hhqelf32.dll Mkbpppkj.exe File opened for modification C:\Windows\SysWOW64\Nhemjb32.exe Nnoimi32.exe File created C:\Windows\SysWOW64\Nnjobjbc.exe Nohofm32.exe File created C:\Windows\SysWOW64\Omnqaeag.dll Ldklahpm.exe File opened for modification C:\Windows\SysWOW64\Logfppjk.exe Lgihncoa.exe File opened for modification C:\Windows\SysWOW64\Mbabgioa.exe Mnffgk32.exe File created C:\Windows\SysWOW64\Bgflbdic.dll Ndbkid32.exe File opened for modification C:\Windows\SysWOW64\Hfmgdi32.exe Hcnjhn32.exe File opened for modification C:\Windows\SysWOW64\Hpekmold.exe Hndoeg32.exe File opened for modification C:\Windows\SysWOW64\Jhaepi32.exe Jpjnol32.exe File created C:\Windows\SysWOW64\Nnoimi32.exe Ngeqpoga.exe File opened for modification C:\Windows\SysWOW64\Nnjobjbc.exe Nohofm32.exe File created C:\Windows\SysWOW64\Hmkhlc32.exe Hfapoian.exe File created C:\Windows\SysWOW64\Kmgaoo32.exe Kkidbc32.exe File created C:\Windows\SysWOW64\Jjonhn32.dll Lalpelai.exe File created C:\Windows\SysWOW64\Hplannfl.exe Hnkeff32.exe File created C:\Windows\SysWOW64\Dhhccg32.dll Kmgaoo32.exe File opened for modification C:\Windows\SysWOW64\Jmediocn.exe Jkfhmdcj.exe File created C:\Windows\SysWOW64\Mhddcdlf.exe Majlgj32.exe File created C:\Windows\SysWOW64\Eopcpj32.dll Jpogjkfg.exe File opened for modification C:\Windows\SysWOW64\Inbkgejf.exe Ifkcegjc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5688 2248 WerFault.exe 221 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jmlacq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anologeb.dll" Logfppjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oebdpbnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hfmgdi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iffijh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ipnncndi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hdeqimqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kgpegdgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aomaebqn.dll" Lgihncoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oklcdf32.dll" Mamhlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oegmka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ijdbqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpnbed32.dll" Mpkomg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mnamlkjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oeeqeakm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oojecj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gcgdgomh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Macohqgj.dll" Jpjnol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjnpjhhg.dll" Majlgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iofdad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ldklahpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jpogjkfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gfeqcjll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djmcalai.dll" Jhoikjma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcpfee32.dll" Jgfbafof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cemjag32.dll" Kpfmkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mgiada32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oeeqeakm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hldgjo32.dll" Pomahj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbifeoee.dll" Hpekmold.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jfaiff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jhaepi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jopghc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Khkhfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Coieap32.dll" 3804bb5b3377dbcb1e80e130058d4750N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ipnncndi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mdkehe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mhkjdc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Noebqnnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pomahj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gcgdgomh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hhlcnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jaijioao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kkidbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mamhlj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iabdhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jopghc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndbagfkd.dll" Konciabf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehbhmp32.dll" Gfhmijji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nnjobjbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nnaebi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iihqid32.dll" Hmkhlc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kmgaoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nnoimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mbabgioa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnficf32.dll" Hadggbcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ifolqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhhccg32.dll" Kmgaoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mkjfpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pgeigm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jmpknpgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Logfppjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mdmaneph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gmpipd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6132 wrote to memory of 4456 6132 3804bb5b3377dbcb1e80e130058d4750N.exe 87 PID 6132 wrote to memory of 4456 6132 3804bb5b3377dbcb1e80e130058d4750N.exe 87 PID 6132 wrote to memory of 4456 6132 3804bb5b3377dbcb1e80e130058d4750N.exe 87 PID 4456 wrote to memory of 3168 4456 Ggpcbngc.exe 88 PID 4456 wrote to memory of 3168 4456 Ggpcbngc.exe 88 PID 4456 wrote to memory of 3168 4456 Ggpcbngc.exe 88 PID 3168 wrote to memory of 3048 3168 Gjopoifg.exe 89 PID 3168 wrote to memory of 3048 3168 Gjopoifg.exe 89 PID 3168 wrote to memory of 3048 3168 Gjopoifg.exe 89 PID 3048 wrote to memory of 732 3048 Gmmlke32.exe 90 PID 3048 wrote to memory of 732 3048 Gmmlke32.exe 90 PID 3048 wrote to memory of 732 3048 Gmmlke32.exe 90 PID 732 wrote to memory of 2120 732 Gcgdgomh.exe 91 PID 732 wrote to memory of 2120 732 Gcgdgomh.exe 91 PID 732 wrote to memory of 2120 732 Gcgdgomh.exe 91 PID 2120 wrote to memory of 5064 2120 Gfeqcjll.exe 92 PID 2120 wrote to memory of 5064 2120 Gfeqcjll.exe 92 PID 2120 wrote to memory of 5064 2120 Gfeqcjll.exe 92 PID 5064 wrote to memory of 6120 5064 Gmpipd32.exe 93 PID 5064 wrote to memory of 6120 5064 Gmpipd32.exe 93 PID 5064 wrote to memory of 6120 5064 Gmpipd32.exe 93 PID 6120 wrote to memory of 1408 6120 Gpnelp32.exe 94 PID 6120 wrote to memory of 1408 6120 Gpnelp32.exe 94 PID 6120 wrote to memory of 1408 6120 Gpnelp32.exe 94 PID 1408 wrote to memory of 1988 1408 Gfhmijji.exe 95 PID 1408 wrote to memory of 1988 1408 Gfhmijji.exe 95 PID 1408 wrote to memory of 1988 1408 Gfhmijji.exe 95 PID 1988 wrote to memory of 4664 1988 Gnoejgjk.exe 96 PID 1988 wrote to memory of 4664 1988 Gnoejgjk.exe 96 PID 1988 wrote to memory of 4664 1988 Gnoejgjk.exe 96 PID 4664 wrote to memory of 3148 4664 Gamafc32.exe 97 PID 4664 wrote to memory of 3148 4664 Gamafc32.exe 97 PID 4664 wrote to memory of 3148 4664 Gamafc32.exe 97 PID 3148 wrote to memory of 3452 3148 Gclnbn32.exe 98 PID 3148 wrote to memory of 3452 3148 Gclnbn32.exe 98 PID 3148 wrote to memory of 3452 3148 Gclnbn32.exe 98 PID 3452 wrote to memory of 3680 3452 Hfjjoj32.exe 99 PID 3452 wrote to memory of 3680 3452 Hfjjoj32.exe 99 PID 3452 wrote to memory of 3680 3452 Hfjjoj32.exe 99 PID 3680 wrote to memory of 664 3680 Hnabpg32.exe 100 PID 3680 wrote to memory of 664 3680 Hnabpg32.exe 100 PID 3680 wrote to memory of 664 3680 Hnabpg32.exe 100 PID 664 wrote to memory of 4880 664 Hapnlb32.exe 101 PID 664 wrote to memory of 4880 664 Hapnlb32.exe 101 PID 664 wrote to memory of 4880 664 Hapnlb32.exe 101 PID 4880 wrote to memory of 5784 4880 Hcnjhn32.exe 102 PID 4880 wrote to memory of 5784 4880 Hcnjhn32.exe 102 PID 4880 wrote to memory of 5784 4880 Hcnjhn32.exe 102 PID 5784 wrote to memory of 5636 5784 Hfmgdi32.exe 103 PID 5784 wrote to memory of 5636 5784 Hfmgdi32.exe 103 PID 5784 wrote to memory of 5636 5784 Hfmgdi32.exe 103 PID 5636 wrote to memory of 2648 5636 Hndoeg32.exe 104 PID 5636 wrote to memory of 2648 5636 Hndoeg32.exe 104 PID 5636 wrote to memory of 2648 5636 Hndoeg32.exe 104 PID 2648 wrote to memory of 6076 2648 Hpekmold.exe 105 PID 2648 wrote to memory of 6076 2648 Hpekmold.exe 105 PID 2648 wrote to memory of 6076 2648 Hpekmold.exe 105 PID 6076 wrote to memory of 5428 6076 Hhlcnl32.exe 107 PID 6076 wrote to memory of 5428 6076 Hhlcnl32.exe 107 PID 6076 wrote to memory of 5428 6076 Hhlcnl32.exe 107 PID 5428 wrote to memory of 2412 5428 Hjjojh32.exe 108 PID 5428 wrote to memory of 2412 5428 Hjjojh32.exe 108 PID 5428 wrote to memory of 2412 5428 Hjjojh32.exe 108 PID 2412 wrote to memory of 5564 2412 Hadggbcg.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\3804bb5b3377dbcb1e80e130058d4750N.exe"C:\Users\Admin\AppData\Local\Temp\3804bb5b3377dbcb1e80e130058d4750N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:6132 -
C:\Windows\SysWOW64\Ggpcbngc.exeC:\Windows\system32\Ggpcbngc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\Gjopoifg.exeC:\Windows\system32\Gjopoifg.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\Gmmlke32.exeC:\Windows\system32\Gmmlke32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Gcgdgomh.exeC:\Windows\system32\Gcgdgomh.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\Gfeqcjll.exeC:\Windows\system32\Gfeqcjll.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Gmpipd32.exeC:\Windows\system32\Gmpipd32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\Gpnelp32.exeC:\Windows\system32\Gpnelp32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6120 -
C:\Windows\SysWOW64\Gfhmijji.exeC:\Windows\system32\Gfhmijji.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\Gnoejgjk.exeC:\Windows\system32\Gnoejgjk.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\Gamafc32.exeC:\Windows\system32\Gamafc32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\Gclnbn32.exeC:\Windows\system32\Gclnbn32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\Hfjjoj32.exeC:\Windows\system32\Hfjjoj32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\Hnabpg32.exeC:\Windows\system32\Hnabpg32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\Hapnlb32.exeC:\Windows\system32\Hapnlb32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\Hcnjhn32.exeC:\Windows\system32\Hcnjhn32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\Hfmgdi32.exeC:\Windows\system32\Hfmgdi32.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5784 -
C:\Windows\SysWOW64\Hndoeg32.exeC:\Windows\system32\Hndoeg32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5636 -
C:\Windows\SysWOW64\Hpekmold.exeC:\Windows\system32\Hpekmold.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\Hhlcnl32.exeC:\Windows\system32\Hhlcnl32.exe20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:6076 -
C:\Windows\SysWOW64\Hjjojh32.exeC:\Windows\system32\Hjjojh32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5428 -
C:\Windows\SysWOW64\Hadggbcg.exeC:\Windows\system32\Hadggbcg.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\Hfapoian.exeC:\Windows\system32\Hfapoian.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5564 -
C:\Windows\SysWOW64\Hmkhlc32.exeC:\Windows\system32\Hmkhlc32.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Hdeqimqh.exeC:\Windows\system32\Hdeqimqh.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2936 -
C:\Windows\SysWOW64\Hfcmeh32.exeC:\Windows\system32\Hfcmeh32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5760 -
C:\Windows\SysWOW64\Hnkeff32.exeC:\Windows\system32\Hnkeff32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:692 -
C:\Windows\SysWOW64\Hplannfl.exeC:\Windows\system32\Hplannfl.exe28⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\Iffijh32.exeC:\Windows\system32\Iffijh32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:5556 -
C:\Windows\SysWOW64\Impagbef.exeC:\Windows\system32\Impagbef.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\Ipnncndi.exeC:\Windows\system32\Ipnncndi.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\Ihefdk32.exeC:\Windows\system32\Ihefdk32.exe32⤵
- Executes dropped EXE
PID:4636 -
C:\Windows\SysWOW64\Ijdbqf32.exeC:\Windows\system32\Ijdbqf32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2860 -
C:\Windows\SysWOW64\Ipqkim32.exeC:\Windows\system32\Ipqkim32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\Idlgiljp.exeC:\Windows\system32\Idlgiljp.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\Ifkcegjc.exeC:\Windows\system32\Ifkcegjc.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5036 -
C:\Windows\SysWOW64\Inbkgejf.exeC:\Windows\system32\Inbkgejf.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5104 -
C:\Windows\SysWOW64\Iapgcpii.exeC:\Windows\system32\Iapgcpii.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5140 -
C:\Windows\SysWOW64\Idocolhm.exeC:\Windows\system32\Idocolhm.exe39⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\Imghhaon.exeC:\Windows\system32\Imghhaon.exe40⤵
- Executes dropped EXE
PID:3404 -
C:\Windows\SysWOW64\Iabdhp32.exeC:\Windows\system32\Iabdhp32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3832 -
C:\Windows\SysWOW64\Idapdk32.exeC:\Windows\system32\Idapdk32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3748 -
C:\Windows\SysWOW64\Ifolqg32.exeC:\Windows\system32\Ifolqg32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:516 -
C:\Windows\SysWOW64\Iofdad32.exeC:\Windows\system32\Iofdad32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:4416 -
C:\Windows\SysWOW64\Iaeqnp32.exeC:\Windows\system32\Iaeqnp32.exe45⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\Jhoikjma.exeC:\Windows\system32\Jhoikjma.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:5112 -
C:\Windows\SysWOW64\Jfaiff32.exeC:\Windows\system32\Jfaiff32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:5224 -
C:\Windows\SysWOW64\Jmlacq32.exeC:\Windows\system32\Jmlacq32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5520 -
C:\Windows\SysWOW64\Jpjnol32.exeC:\Windows\system32\Jpjnol32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2788 -
C:\Windows\SysWOW64\Jhaepi32.exeC:\Windows\system32\Jhaepi32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:2460 -
C:\Windows\SysWOW64\Jkpale32.exeC:\Windows\system32\Jkpale32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3288 -
C:\Windows\SysWOW64\Joknmcbk.exeC:\Windows\system32\Joknmcbk.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:448 -
C:\Windows\SysWOW64\Jaijioao.exeC:\Windows\system32\Jaijioao.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:3016 -
C:\Windows\SysWOW64\Jdhfejpb.exeC:\Windows\system32\Jdhfejpb.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4836 -
C:\Windows\SysWOW64\Jgfbafof.exeC:\Windows\system32\Jgfbafof.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\Jonjbcph.exeC:\Windows\system32\Jonjbcph.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4816 -
C:\Windows\SysWOW64\Jmpknpgc.exeC:\Windows\system32\Jmpknpgc.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3472 -
C:\Windows\SysWOW64\Jpogjkfg.exeC:\Windows\system32\Jpogjkfg.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5496 -
C:\Windows\SysWOW64\Jhfokifi.exeC:\Windows\system32\Jhfokifi.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3544 -
C:\Windows\SysWOW64\Jkdkgdfm.exeC:\Windows\system32\Jkdkgdfm.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\Jopghc32.exeC:\Windows\system32\Jopghc32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4556 -
C:\Windows\SysWOW64\Jpacpkdd.exeC:\Windows\system32\Jpacpkdd.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\Jhhlahdf.exeC:\Windows\system32\Jhhlahdf.exe63⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Jkfhmdcj.exeC:\Windows\system32\Jkfhmdcj.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\Jmediocn.exeC:\Windows\system32\Jmediocn.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5624 -
C:\Windows\SysWOW64\Kpcpek32.exeC:\Windows\system32\Kpcpek32.exe66⤵PID:5752
-
C:\Windows\SysWOW64\Khkhfh32.exeC:\Windows\system32\Khkhfh32.exe67⤵
- Modifies registry class
PID:6068 -
C:\Windows\SysWOW64\Kkidbc32.exeC:\Windows\system32\Kkidbc32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3368 -
C:\Windows\SysWOW64\Kmgaoo32.exeC:\Windows\system32\Kmgaoo32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5768 -
C:\Windows\SysWOW64\Kpfmkj32.exeC:\Windows\system32\Kpfmkj32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3220 -
C:\Windows\SysWOW64\Kgpegdgl.exeC:\Windows\system32\Kgpegdgl.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6124 -
C:\Windows\SysWOW64\Kaeiemga.exeC:\Windows\system32\Kaeiemga.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3592 -
C:\Windows\SysWOW64\Kdcfai32.exeC:\Windows\system32\Kdcfai32.exe73⤵PID:5424
-
C:\Windows\SysWOW64\Kpjffjli.exeC:\Windows\system32\Kpjffjli.exe74⤵
- Drops file in System32 directory
PID:544 -
C:\Windows\SysWOW64\Kgdobd32.exeC:\Windows\system32\Kgdobd32.exe75⤵PID:4472
-
C:\Windows\SysWOW64\Kolgca32.exeC:\Windows\system32\Kolgca32.exe76⤵
- Drops file in System32 directory
PID:3692 -
C:\Windows\SysWOW64\Kpmckijg.exeC:\Windows\system32\Kpmckijg.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1304 -
C:\Windows\SysWOW64\Konciabf.exeC:\Windows\system32\Konciabf.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Lalpelai.exeC:\Windows\system32\Lalpelai.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5232 -
C:\Windows\SysWOW64\Ldklahpm.exeC:\Windows\system32\Ldklahpm.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:5188 -
C:\Windows\SysWOW64\Lgihncoa.exeC:\Windows\system32\Lgihncoa.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4568 -
C:\Windows\SysWOW64\Logfppjk.exeC:\Windows\system32\Logfppjk.exe82⤵
- Modifies registry class
PID:4300 -
C:\Windows\SysWOW64\Lddohfhb.exeC:\Windows\system32\Lddohfhb.exe83⤵
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Lgbkdbgf.exeC:\Windows\system32\Lgbkdbgf.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5296 -
C:\Windows\SysWOW64\Mpkomg32.exeC:\Windows\system32\Mpkomg32.exe85⤵
- Modifies registry class
PID:6000 -
C:\Windows\SysWOW64\Mgehiaec.exeC:\Windows\system32\Mgehiaec.exe86⤵
- Drops file in System32 directory
PID:1600 -
C:\Windows\SysWOW64\Mkpcjp32.exeC:\Windows\system32\Mkpcjp32.exe87⤵PID:6080
-
C:\Windows\SysWOW64\Majlgj32.exeC:\Windows\system32\Majlgj32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4740 -
C:\Windows\SysWOW64\Mhddcdlf.exeC:\Windows\system32\Mhddcdlf.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4436 -
C:\Windows\SysWOW64\Mkbpppkj.exeC:\Windows\system32\Mkbpppkj.exe90⤵
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\Mnamlkjn.exeC:\Windows\system32\Mnamlkjn.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4988 -
C:\Windows\SysWOW64\Mamhlj32.exeC:\Windows\system32\Mamhlj32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2608 -
C:\Windows\SysWOW64\Mdkehe32.exeC:\Windows\system32\Mdkehe32.exe93⤵
- Modifies registry class
PID:3704 -
C:\Windows\SysWOW64\Mgiada32.exeC:\Windows\system32\Mgiada32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2216 -
C:\Windows\SysWOW64\Moqifn32.exeC:\Windows\system32\Moqifn32.exe95⤵PID:3864
-
C:\Windows\SysWOW64\Mdmaneph.exeC:\Windows\system32\Mdmaneph.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4388 -
C:\Windows\SysWOW64\Mhinod32.exeC:\Windows\system32\Mhinod32.exe97⤵
- Drops file in System32 directory
PID:4100 -
C:\Windows\SysWOW64\Mnffgk32.exeC:\Windows\system32\Mnffgk32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\Mbabgioa.exeC:\Windows\system32\Mbabgioa.exe99⤵
- Drops file in System32 directory
- Modifies registry class
PID:5720 -
C:\Windows\SysWOW64\Mhkjdc32.exeC:\Windows\system32\Mhkjdc32.exe100⤵
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\Mkjfpo32.exeC:\Windows\system32\Mkjfpo32.exe101⤵
- Modifies registry class
PID:5268 -
C:\Windows\SysWOW64\Noebqnnk.exeC:\Windows\system32\Noebqnnk.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6048 -
C:\Windows\SysWOW64\Nbdomi32.exeC:\Windows\system32\Nbdomi32.exe103⤵PID:5020
-
C:\Windows\SysWOW64\Ndbkid32.exeC:\Windows\system32\Ndbkid32.exe104⤵
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\Nhngjcdl.exeC:\Windows\system32\Nhngjcdl.exe105⤵
- Drops file in System32 directory
PID:4224 -
C:\Windows\SysWOW64\Nohofm32.exeC:\Windows\system32\Nohofm32.exe106⤵
- Drops file in System32 directory
PID:5508 -
C:\Windows\SysWOW64\Nnjobjbc.exeC:\Windows\system32\Nnjobjbc.exe107⤵
- Modifies registry class
PID:2692 -
C:\Windows\SysWOW64\Nojllm32.exeC:\Windows\system32\Nojllm32.exe108⤵PID:5480
-
C:\Windows\SysWOW64\Ngeqpoga.exeC:\Windows\system32\Ngeqpoga.exe109⤵
- Drops file in System32 directory
PID:1396 -
C:\Windows\SysWOW64\Nnoimi32.exeC:\Windows\system32\Nnoimi32.exe110⤵
- Drops file in System32 directory
- Modifies registry class
PID:1480 -
C:\Windows\SysWOW64\Nhemjb32.exeC:\Windows\system32\Nhemjb32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4812 -
C:\Windows\SysWOW64\Nnaebi32.exeC:\Windows\system32\Nnaebi32.exe112⤵
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\Ngjjko32.exeC:\Windows\system32\Ngjjko32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3020 -
C:\Windows\SysWOW64\Ooabml32.exeC:\Windows\system32\Ooabml32.exe114⤵PID:3208
-
C:\Windows\SysWOW64\Oiifeajn.exeC:\Windows\system32\Oiifeajn.exe115⤵
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\Oglgan32.exeC:\Windows\system32\Oglgan32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5256 -
C:\Windows\SysWOW64\Onfonhhf.exeC:\Windows\system32\Onfonhhf.exe117⤵PID:5972
-
C:\Windows\SysWOW64\Oilcka32.exeC:\Windows\system32\Oilcka32.exe118⤵PID:5896
-
C:\Windows\SysWOW64\Onhlch32.exeC:\Windows\system32\Onhlch32.exe119⤵PID:4496
-
C:\Windows\SysWOW64\Oebdpbnp.exeC:\Windows\system32\Oebdpbnp.exe120⤵
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\Okllml32.exeC:\Windows\system32\Okllml32.exe121⤵PID:5364
-
C:\Windows\SysWOW64\Obfdifli.exeC:\Windows\system32\Obfdifli.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-