Analysis
-
max time kernel
105s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 00:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3964205bdc9c0ba1c097f82b5e1653f0N.exe
Resource
win7-20240704-en
windows7-x64
7 signatures
120 seconds
Behavioral task
behavioral2
Sample
3964205bdc9c0ba1c097f82b5e1653f0N.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
6 signatures
120 seconds
General
-
Target
3964205bdc9c0ba1c097f82b5e1653f0N.exe
-
Size
272KB
-
MD5
3964205bdc9c0ba1c097f82b5e1653f0
-
SHA1
bb162dfce0d25ee509d328cc0da20ed522c76b67
-
SHA256
8a9397247428674697a4fc16d1e37da1ef7b1d61b3d765ae0b42d4db7d353bc7
-
SHA512
e69e71230b69b7d7dc13d91904c71a1ac0f181285c0e13cf447d20b0987da416285b26998bdd025f32f60cb74bcf229bde2412c219265352e2c5186477512d07
-
SSDEEP
6144:Pr99pSVYHOw2bByvZ6Mxv5Rar3O6B9fZSLhZmzbByvZ6Mxv5R:T4DByvNv54B9f01ZmHByvNv5
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edlhflmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hneommgd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qbmgcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Akjego32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iemckeba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oaehkmok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ljjgfapg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgkfpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hfbpgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lepbnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nkicic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Onnefnbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ancghk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lcpojg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjpimmhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Igffla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pfcihi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgqnbmdm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjljeclg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hngkbmea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qnonmkdj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cipkmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hmjlnikl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hgppkbkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Odagbipa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfgbil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Abfjih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dbihlcdm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpeohj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqancihk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icbpla32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lepbnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gdhaihdi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqckihfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ledkippd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Chjaillb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ghiohe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fnbiqpgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kamiblnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jjqbdkjq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjakki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Negafmoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Odhmbh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eobfgdgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jcoecigm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jneqkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mgjalgam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kcflch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hmoeiigg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kedbbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mhljljfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cnmcegjg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcpojg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ingdijfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Melajo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gghjkcaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lncmlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfkhpebd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eogobc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 3964205bdc9c0ba1c097f82b5e1653f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Inqnikmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kfqeok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nhhjghlp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phkpdelj.exe -
Executes dropped EXE 64 IoCs
pid Process 536 Edlhflmi.exe 1008 Ednell32.exe 2244 Eikndc32.exe 5016 Edpbal32.exe 3532 Eimjjb32.exe 2096 Eceobh32.exe 1384 Enkcpq32.exe 864 Echkhh32.exe 2240 Fdghbj32.exe 4364 Fehdjbhj.exe 1252 Fnbiqpgj.exe 2596 Fndffo32.exe 2964 Fcannf32.exe 4944 Fpeohj32.exe 2236 Gllpml32.exe 2752 Gfddeanm.exe 3800 Gqjhcjnc.exe 8 Gqlehi32.exe 3572 Gdhaihdi.exe 4124 Gjdiaobq.exe 4528 Gmcemjad.exe 3168 Gdjnohbf.exe 4304 Gghjkcaj.exe 3596 Gqancihk.exe 4164 Gdljdg32.exe 1360 Hgkfpc32.exe 3492 Hfnglpfb.exe 2652 Hneommgd.exe 940 Hqckihfh.exe 460 Hcagedel.exe 4884 Hfpcaodp.exe 2896 Hngkbmea.exe 4444 Hmjlnikl.exe 1764 Hdacoglo.exe 2468 Hgppkbkb.exe 1712 Hfbpgo32.exe 220 Hmlhciij.exe 5012 Hdcpefjl.exe 2704 Hcfqpc32.exe 4368 Hfdmlo32.exe 4972 Hjpimmhc.exe 408 Hmoeiigg.exe 3048 Hdfmjf32.exe 216 Hgdifa32.exe 1468 Hfgjbnng.exe 4516 Hnnacloj.exe 4312 Igffla32.exe 2832 Inqnikmg.exe 4512 Iqojeglk.exe 4240 Idjfeedd.exe 1492 Ijgonlbk.exe 644 Incknk32.exe 4916 Iemckeba.exe 4824 Igkpgqae.exe 4360 Inehdk32.exe 1980 Iqcdpf32.exe 4968 Icbpla32.exe 1480 Ingdijfo.exe 1484 Ijnenk32.exe 1400 Iedild32.exe 1568 Jjqbdkjq.exe 3944 Jfgbil32.exe 2568 Jfjonl32.exe 4072 Jaocldmh.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Algfnm32.dll Kdllin32.exe File created C:\Windows\SysWOW64\Mnfpba32.dll Nghmme32.exe File created C:\Windows\SysWOW64\Cfoppk32.dll Pkdbea32.exe File created C:\Windows\SysWOW64\Hfpcaodp.exe Hcagedel.exe File created C:\Windows\SysWOW64\Donkhj32.dll Hjpimmhc.exe File created C:\Windows\SysWOW64\Dknnhimh.dll Hfgjbnng.exe File opened for modification C:\Windows\SysWOW64\Ingdijfo.exe Icbpla32.exe File created C:\Windows\SysWOW64\Jfjonl32.exe Jfgbil32.exe File opened for modification C:\Windows\SysWOW64\Qggbea32.exe Qdifie32.exe File created C:\Windows\SysWOW64\Aiilec32.exe Ancghk32.exe File created C:\Windows\SysWOW64\Aipbfbjb.exe Abfjih32.exe File created C:\Windows\SysWOW64\Hcapgi32.dll Ifmihg32.exe File created C:\Windows\SysWOW64\Nobbdb32.exe Nhhjghlp.exe File created C:\Windows\SysWOW64\Flmidc32.dll Cgqnbmdm.exe File created C:\Windows\SysWOW64\Dfpkbbpl.exe Dfnnlcbo.exe File opened for modification C:\Windows\SysWOW64\Edpbal32.exe Eikndc32.exe File created C:\Windows\SysWOW64\Gfddeanm.exe Gllpml32.exe File opened for modification C:\Windows\SysWOW64\Hneommgd.exe Hfnglpfb.exe File created C:\Windows\SysWOW64\Hngkbmea.exe Hfpcaodp.exe File opened for modification C:\Windows\SysWOW64\Hmoeiigg.exe Hjpimmhc.exe File opened for modification C:\Windows\SysWOW64\Gqancihk.exe Gghjkcaj.exe File created C:\Windows\SysWOW64\Hjpdbb32.dll Jaocldmh.exe File opened for modification C:\Windows\SysWOW64\Akjego32.exe Adpmjdeo.exe File created C:\Windows\SysWOW64\Mfhngk32.dll Fldbaf32.exe File created C:\Windows\SysWOW64\Ifmihg32.exe Ijfhcf32.exe File opened for modification C:\Windows\SysWOW64\Pkilpakn.exe Phkpdelj.exe File created C:\Windows\SysWOW64\Fhdcbikg.dll Deehcoed.exe File opened for modification C:\Windows\SysWOW64\Fpeohj32.exe Fcannf32.exe File created C:\Windows\SysWOW64\Enobgohm.dll Gjdiaobq.exe File opened for modification C:\Windows\SysWOW64\Igkpgqae.exe Iemckeba.exe File created C:\Windows\SysWOW64\Blikchjk.dll Lepbnp32.exe File created C:\Windows\SysWOW64\Nkbmhd32.exe Ngfqhegp.exe File opened for modification C:\Windows\SysWOW64\Fldbaf32.exe Fiffek32.exe File opened for modification C:\Windows\SysWOW64\Fcannf32.exe Fndffo32.exe File created C:\Windows\SysWOW64\Ijogom32.dll Hdacoglo.exe File created C:\Windows\SysWOW64\Hcfqpc32.exe Hdcpefjl.exe File created C:\Windows\SysWOW64\Kmmjad32.exe Kmknleog.exe File opened for modification C:\Windows\SysWOW64\Melajo32.exe Mgjalgam.exe File created C:\Windows\SysWOW64\Iqojeglk.exe Inqnikmg.exe File opened for modification C:\Windows\SysWOW64\Modfcd32.exe Mgmnagoj.exe File opened for modification C:\Windows\SysWOW64\Odhmbh32.exe Onnefnbl.exe File created C:\Windows\SysWOW64\Gecmkkka.exe Gpgdcd32.exe File created C:\Windows\SysWOW64\Kjfdfhhi.exe Kdllin32.exe File created C:\Windows\SysWOW64\Kmlfeh32.dll Noionclg.exe File opened for modification C:\Windows\SysWOW64\Efinhaha.exe Eobfgdgo.exe File created C:\Windows\SysWOW64\Akdqle32.dll Kjakki32.exe File created C:\Windows\SysWOW64\Beiena32.dll Lpbfcibd.exe File opened for modification C:\Windows\SysWOW64\Kjljeclg.exe Kpffhj32.exe File created C:\Windows\SysWOW64\Idjfeedd.exe Iqojeglk.exe File opened for modification C:\Windows\SysWOW64\Jfjonl32.exe Jfgbil32.exe File opened for modification C:\Windows\SysWOW64\Ljjnag32.exe Lhlael32.exe File created C:\Windows\SysWOW64\Agiokq32.exe Qbmgcj32.exe File created C:\Windows\SysWOW64\Icggdmfh.dll Qbmgcj32.exe File opened for modification C:\Windows\SysWOW64\Onnefnbl.exe Oecqakea.exe File opened for modification C:\Windows\SysWOW64\Pklheq32.exe Pdapif32.exe File created C:\Windows\SysWOW64\Lohblaio.dll Cnopjghd.exe File created C:\Windows\SysWOW64\Ldpedmlf.exe Lncmlf32.exe File opened for modification C:\Windows\SysWOW64\Lkoglgpn.exe Lohfgfjj.exe File opened for modification C:\Windows\SysWOW64\Noionclg.exe Mhogaidj.exe File opened for modification C:\Windows\SysWOW64\Ngfqhegp.exe Needpm32.exe File created C:\Windows\SysWOW64\Negafmoo.exe Naleen32.exe File created C:\Windows\SysWOW64\Mbohfpml.dll Hpbdobbl.exe File opened for modification C:\Windows\SysWOW64\Jflldklp.exe Jaocldmh.exe File created C:\Windows\SysWOW64\Pnjeal32.exe Pklheq32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7992 7844 WerFault.exe 324 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opcngdpj.dll" Gmcemjad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cglfglph.dll" Jjqbdkjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ljjnag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkjjgdmm.dll" Ngfqhegp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pkdbea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Phpioe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmjapnla.dll" Ehmgeilm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ehmgeilm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hpbdobbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Igffla32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ndoklibd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qdifie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Akjego32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fofofn32.dll" Abfjih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fghgkj32.dll" Edlhflmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hgkfpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qqdbga32.dll" Icbpla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkdjlm32.dll" Bfkhpebd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nkicic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eegblbdp.dll" Phkpdelj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fonebbma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gqjhcjnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gdljdg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hfdmlo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hojnenea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llmpfbag.dll" Idjfeedd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iqcdpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iedild32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Enkcpq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fndffo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Akjego32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fgemdpnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fglcdohl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ifmihg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kjinpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdoiia32.dll" Nhhjghlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gghjkcaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggdpqeob.dll" Inehdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Giecbc32.dll" Kmmjad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Algfnm32.dll" Kdllin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bnadii32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jgfhhicl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fdghbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enobgohm.dll" Gjdiaobq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jflldklp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jglhnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oaehkmok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Odhmbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kfqeok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gecmkkka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 3964205bdc9c0ba1c097f82b5e1653f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gqancihk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hgdifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehphmm32.dll" Ndoklibd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Laceeael.dll" Hlnnobdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onecje32.dll" Kmknleog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipeakn32.dll" Kedbbb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mgmnagoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eogobc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjadlomg.dll" Glpbmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jqjcfona.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jcoecigm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fehdjbhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Donkhj32.dll" Hjpimmhc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 536 2536 3964205bdc9c0ba1c097f82b5e1653f0N.exe 86 PID 2536 wrote to memory of 536 2536 3964205bdc9c0ba1c097f82b5e1653f0N.exe 86 PID 2536 wrote to memory of 536 2536 3964205bdc9c0ba1c097f82b5e1653f0N.exe 86 PID 536 wrote to memory of 1008 536 Edlhflmi.exe 87 PID 536 wrote to memory of 1008 536 Edlhflmi.exe 87 PID 536 wrote to memory of 1008 536 Edlhflmi.exe 87 PID 1008 wrote to memory of 2244 1008 Ednell32.exe 88 PID 1008 wrote to memory of 2244 1008 Ednell32.exe 88 PID 1008 wrote to memory of 2244 1008 Ednell32.exe 88 PID 2244 wrote to memory of 5016 2244 Eikndc32.exe 90 PID 2244 wrote to memory of 5016 2244 Eikndc32.exe 90 PID 2244 wrote to memory of 5016 2244 Eikndc32.exe 90 PID 5016 wrote to memory of 3532 5016 Edpbal32.exe 91 PID 5016 wrote to memory of 3532 5016 Edpbal32.exe 91 PID 5016 wrote to memory of 3532 5016 Edpbal32.exe 91 PID 3532 wrote to memory of 2096 3532 Eimjjb32.exe 92 PID 3532 wrote to memory of 2096 3532 Eimjjb32.exe 92 PID 3532 wrote to memory of 2096 3532 Eimjjb32.exe 92 PID 2096 wrote to memory of 1384 2096 Eceobh32.exe 93 PID 2096 wrote to memory of 1384 2096 Eceobh32.exe 93 PID 2096 wrote to memory of 1384 2096 Eceobh32.exe 93 PID 1384 wrote to memory of 864 1384 Enkcpq32.exe 94 PID 1384 wrote to memory of 864 1384 Enkcpq32.exe 94 PID 1384 wrote to memory of 864 1384 Enkcpq32.exe 94 PID 864 wrote to memory of 2240 864 Echkhh32.exe 96 PID 864 wrote to memory of 2240 864 Echkhh32.exe 96 PID 864 wrote to memory of 2240 864 Echkhh32.exe 96 PID 2240 wrote to memory of 4364 2240 Fdghbj32.exe 97 PID 2240 wrote to memory of 4364 2240 Fdghbj32.exe 97 PID 2240 wrote to memory of 4364 2240 Fdghbj32.exe 97 PID 4364 wrote to memory of 1252 4364 Fehdjbhj.exe 98 PID 4364 wrote to memory of 1252 4364 Fehdjbhj.exe 98 PID 4364 wrote to memory of 1252 4364 Fehdjbhj.exe 98 PID 1252 wrote to memory of 2596 1252 Fnbiqpgj.exe 100 PID 1252 wrote to memory of 2596 1252 Fnbiqpgj.exe 100 PID 1252 wrote to memory of 2596 1252 Fnbiqpgj.exe 100 PID 2596 wrote to memory of 2964 2596 Fndffo32.exe 101 PID 2596 wrote to memory of 2964 2596 Fndffo32.exe 101 PID 2596 wrote to memory of 2964 2596 Fndffo32.exe 101 PID 2964 wrote to memory of 4944 2964 Fcannf32.exe 102 PID 2964 wrote to memory of 4944 2964 Fcannf32.exe 102 PID 2964 wrote to memory of 4944 2964 Fcannf32.exe 102 PID 4944 wrote to memory of 2236 4944 Fpeohj32.exe 103 PID 4944 wrote to memory of 2236 4944 Fpeohj32.exe 103 PID 4944 wrote to memory of 2236 4944 Fpeohj32.exe 103 PID 2236 wrote to memory of 2752 2236 Gllpml32.exe 104 PID 2236 wrote to memory of 2752 2236 Gllpml32.exe 104 PID 2236 wrote to memory of 2752 2236 Gllpml32.exe 104 PID 2752 wrote to memory of 3800 2752 Gfddeanm.exe 105 PID 2752 wrote to memory of 3800 2752 Gfddeanm.exe 105 PID 2752 wrote to memory of 3800 2752 Gfddeanm.exe 105 PID 3800 wrote to memory of 8 3800 Gqjhcjnc.exe 106 PID 3800 wrote to memory of 8 3800 Gqjhcjnc.exe 106 PID 3800 wrote to memory of 8 3800 Gqjhcjnc.exe 106 PID 8 wrote to memory of 3572 8 Gqlehi32.exe 107 PID 8 wrote to memory of 3572 8 Gqlehi32.exe 107 PID 8 wrote to memory of 3572 8 Gqlehi32.exe 107 PID 3572 wrote to memory of 4124 3572 Gdhaihdi.exe 108 PID 3572 wrote to memory of 4124 3572 Gdhaihdi.exe 108 PID 3572 wrote to memory of 4124 3572 Gdhaihdi.exe 108 PID 4124 wrote to memory of 4528 4124 Gjdiaobq.exe 109 PID 4124 wrote to memory of 4528 4124 Gjdiaobq.exe 109 PID 4124 wrote to memory of 4528 4124 Gjdiaobq.exe 109 PID 4528 wrote to memory of 3168 4528 Gmcemjad.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\3964205bdc9c0ba1c097f82b5e1653f0N.exe"C:\Users\Admin\AppData\Local\Temp\3964205bdc9c0ba1c097f82b5e1653f0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Edlhflmi.exeC:\Windows\system32\Edlhflmi.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\Ednell32.exeC:\Windows\system32\Ednell32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\Eikndc32.exeC:\Windows\system32\Eikndc32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Edpbal32.exeC:\Windows\system32\Edpbal32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\Eimjjb32.exeC:\Windows\system32\Eimjjb32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\Eceobh32.exeC:\Windows\system32\Eceobh32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\Enkcpq32.exeC:\Windows\system32\Enkcpq32.exe8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Echkhh32.exeC:\Windows\system32\Echkhh32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\Fdghbj32.exeC:\Windows\system32\Fdghbj32.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\Fehdjbhj.exeC:\Windows\system32\Fehdjbhj.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\Fnbiqpgj.exeC:\Windows\system32\Fnbiqpgj.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\Fndffo32.exeC:\Windows\system32\Fndffo32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\Fcannf32.exeC:\Windows\system32\Fcannf32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\Fpeohj32.exeC:\Windows\system32\Fpeohj32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\Gllpml32.exeC:\Windows\system32\Gllpml32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Gfddeanm.exeC:\Windows\system32\Gfddeanm.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\Gqjhcjnc.exeC:\Windows\system32\Gqjhcjnc.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\Gqlehi32.exeC:\Windows\system32\Gqlehi32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\Gdhaihdi.exeC:\Windows\system32\Gdhaihdi.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\Gjdiaobq.exeC:\Windows\system32\Gjdiaobq.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\Gmcemjad.exeC:\Windows\system32\Gmcemjad.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\Gdjnohbf.exeC:\Windows\system32\Gdjnohbf.exe23⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\Gghjkcaj.exeC:\Windows\system32\Gghjkcaj.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4304 -
C:\Windows\SysWOW64\Gqancihk.exeC:\Windows\system32\Gqancihk.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3596 -
C:\Windows\SysWOW64\Gdljdg32.exeC:\Windows\system32\Gdljdg32.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:4164 -
C:\Windows\SysWOW64\Hgkfpc32.exeC:\Windows\system32\Hgkfpc32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1360 -
C:\Windows\SysWOW64\Hfnglpfb.exeC:\Windows\system32\Hfnglpfb.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3492 -
C:\Windows\SysWOW64\Hneommgd.exeC:\Windows\system32\Hneommgd.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\Hqckihfh.exeC:\Windows\system32\Hqckihfh.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\Hcagedel.exeC:\Windows\system32\Hcagedel.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:460 -
C:\Windows\SysWOW64\Hfpcaodp.exeC:\Windows\system32\Hfpcaodp.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4884 -
C:\Windows\SysWOW64\Hngkbmea.exeC:\Windows\system32\Hngkbmea.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\Hmjlnikl.exeC:\Windows\system32\Hmjlnikl.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4444 -
C:\Windows\SysWOW64\Hdacoglo.exeC:\Windows\system32\Hdacoglo.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\Hgppkbkb.exeC:\Windows\system32\Hgppkbkb.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\Hfbpgo32.exeC:\Windows\system32\Hfbpgo32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\Hmlhciij.exeC:\Windows\system32\Hmlhciij.exe38⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Hdcpefjl.exeC:\Windows\system32\Hdcpefjl.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5012 -
C:\Windows\SysWOW64\Hcfqpc32.exeC:\Windows\system32\Hcfqpc32.exe40⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\Hfdmlo32.exeC:\Windows\system32\Hfdmlo32.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:4368 -
C:\Windows\SysWOW64\Hjpimmhc.exeC:\Windows\system32\Hjpimmhc.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4972 -
C:\Windows\SysWOW64\Hmoeiigg.exeC:\Windows\system32\Hmoeiigg.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:408 -
C:\Windows\SysWOW64\Hdfmjf32.exeC:\Windows\system32\Hdfmjf32.exe44⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\Hgdifa32.exeC:\Windows\system32\Hgdifa32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:216 -
C:\Windows\SysWOW64\Hfgjbnng.exeC:\Windows\system32\Hfgjbnng.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\Hnnacloj.exeC:\Windows\system32\Hnnacloj.exe47⤵
- Executes dropped EXE
PID:4516 -
C:\Windows\SysWOW64\Igffla32.exeC:\Windows\system32\Igffla32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4312 -
C:\Windows\SysWOW64\Inqnikmg.exeC:\Windows\system32\Inqnikmg.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\Iqojeglk.exeC:\Windows\system32\Iqojeglk.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4512 -
C:\Windows\SysWOW64\Idjfeedd.exeC:\Windows\system32\Idjfeedd.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:4240 -
C:\Windows\SysWOW64\Ijgonlbk.exeC:\Windows\system32\Ijgonlbk.exe52⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\Incknk32.exeC:\Windows\system32\Incknk32.exe53⤵
- Executes dropped EXE
PID:644 -
C:\Windows\SysWOW64\Iemckeba.exeC:\Windows\system32\Iemckeba.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4916 -
C:\Windows\SysWOW64\Igkpgqae.exeC:\Windows\system32\Igkpgqae.exe55⤵
- Executes dropped EXE
PID:4824 -
C:\Windows\SysWOW64\Inehdk32.exeC:\Windows\system32\Inehdk32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:4360 -
C:\Windows\SysWOW64\Iqcdpf32.exeC:\Windows\system32\Iqcdpf32.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:1980 -
C:\Windows\SysWOW64\Icbpla32.exeC:\Windows\system32\Icbpla32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4968 -
C:\Windows\SysWOW64\Ingdijfo.exeC:\Windows\system32\Ingdijfo.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\Ijnenk32.exeC:\Windows\system32\Ijnenk32.exe60⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\Iedild32.exeC:\Windows\system32\Iedild32.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:1400 -
C:\Windows\SysWOW64\Jjqbdkjq.exeC:\Windows\system32\Jjqbdkjq.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1568 -
C:\Windows\SysWOW64\Jfgbil32.exeC:\Windows\system32\Jfgbil32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3944 -
C:\Windows\SysWOW64\Jfjonl32.exeC:\Windows\system32\Jfjonl32.exe64⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Jaocldmh.exeC:\Windows\system32\Jaocldmh.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4072 -
C:\Windows\SysWOW64\Jflldklp.exeC:\Windows\system32\Jflldklp.exe66⤵
- Modifies registry class
PID:4948 -
C:\Windows\SysWOW64\Jjghdj32.exeC:\Windows\system32\Jjghdj32.exe67⤵PID:4628
-
C:\Windows\SysWOW64\Jglhnn32.exeC:\Windows\system32\Jglhnn32.exe68⤵
- Modifies registry class
PID:3832 -
C:\Windows\SysWOW64\Jneqkh32.exeC:\Windows\system32\Jneqkh32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:488 -
C:\Windows\SysWOW64\Kcbico32.exeC:\Windows\system32\Kcbico32.exe70⤵PID:2180
-
C:\Windows\SysWOW64\Kfqeok32.exeC:\Windows\system32\Kfqeok32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Kmknleog.exeC:\Windows\system32\Kmknleog.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:4540 -
C:\Windows\SysWOW64\Kmmjad32.exeC:\Windows\system32\Kmmjad32.exe73⤵
- Modifies registry class
PID:4732 -
C:\Windows\SysWOW64\Kedbbb32.exeC:\Windows\system32\Kedbbb32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2708 -
C:\Windows\SysWOW64\Kjakki32.exeC:\Windows\system32\Kjakki32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4924 -
C:\Windows\SysWOW64\Kdiocnbo.exeC:\Windows\system32\Kdiocnbo.exe76⤵PID:2840
-
C:\Windows\SysWOW64\Kfhkpjab.exeC:\Windows\system32\Kfhkpjab.exe77⤵PID:388
-
C:\Windows\SysWOW64\Kampmb32.exeC:\Windows\system32\Kampmb32.exe78⤵PID:2028
-
C:\Windows\SysWOW64\Kdllin32.exeC:\Windows\system32\Kdllin32.exe79⤵
- Drops file in System32 directory
- Modifies registry class
PID:5060 -
C:\Windows\SysWOW64\Kjfdfhhi.exeC:\Windows\system32\Kjfdfhhi.exe80⤵PID:4108
-
C:\Windows\SysWOW64\Ldnion32.exeC:\Windows\system32\Ldnion32.exe81⤵PID:4160
-
C:\Windows\SysWOW64\Lncmlf32.exeC:\Windows\system32\Lncmlf32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\Ldpedmlf.exeC:\Windows\system32\Ldpedmlf.exe83⤵PID:3712
-
C:\Windows\SysWOW64\Lhlael32.exeC:\Windows\system32\Lhlael32.exe84⤵
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\Ljjnag32.exeC:\Windows\system32\Ljjnag32.exe85⤵
- Modifies registry class
PID:2984 -
C:\Windows\SysWOW64\Lepbnp32.exeC:\Windows\system32\Lepbnp32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\Lohfgfjj.exeC:\Windows\system32\Lohfgfjj.exe87⤵
- Drops file in System32 directory
PID:4792 -
C:\Windows\SysWOW64\Lkoglgpn.exeC:\Windows\system32\Lkoglgpn.exe88⤵PID:4836
-
C:\Windows\SysWOW64\Ledkippd.exeC:\Windows\system32\Ledkippd.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3584 -
C:\Windows\SysWOW64\Lompbe32.exeC:\Windows\system32\Lompbe32.exe90⤵PID:1940
-
C:\Windows\SysWOW64\Mghdfgcp.exeC:\Windows\system32\Mghdfgcp.exe91⤵PID:4780
-
C:\Windows\SysWOW64\Meiddo32.exeC:\Windows\system32\Meiddo32.exe92⤵PID:4636
-
C:\Windows\SysWOW64\Mgjalgam.exeC:\Windows\system32\Mgjalgam.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4456 -
C:\Windows\SysWOW64\Melajo32.exeC:\Windows\system32\Melajo32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1880 -
C:\Windows\SysWOW64\Mgmnagoj.exeC:\Windows\system32\Mgmnagoj.exe95⤵
- Drops file in System32 directory
- Modifies registry class
PID:372 -
C:\Windows\SysWOW64\Modfcd32.exeC:\Windows\system32\Modfcd32.exe96⤵PID:4128
-
C:\Windows\SysWOW64\Mhljljfm.exeC:\Windows\system32\Mhljljfm.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3868 -
C:\Windows\SysWOW64\Mepkenef.exeC:\Windows\system32\Mepkenef.exe98⤵PID:5144
-
C:\Windows\SysWOW64\Mhogaidj.exeC:\Windows\system32\Mhogaidj.exe99⤵
- Drops file in System32 directory
PID:5188 -
C:\Windows\SysWOW64\Noionclg.exeC:\Windows\system32\Noionclg.exe100⤵
- Drops file in System32 directory
PID:5240 -
C:\Windows\SysWOW64\Nagljokk.exeC:\Windows\system32\Nagljokk.exe101⤵PID:5296
-
C:\Windows\SysWOW64\Ndehfjjo.exeC:\Windows\system32\Ndehfjjo.exe102⤵PID:5360
-
C:\Windows\SysWOW64\Nkppcd32.exeC:\Windows\system32\Nkppcd32.exe103⤵PID:5404
-
C:\Windows\SysWOW64\Nnnlop32.exeC:\Windows\system32\Nnnlop32.exe104⤵PID:5452
-
C:\Windows\SysWOW64\Needpm32.exeC:\Windows\system32\Needpm32.exe105⤵
- Drops file in System32 directory
PID:5492 -
C:\Windows\SysWOW64\Ngfqhegp.exeC:\Windows\system32\Ngfqhegp.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:5556 -
C:\Windows\SysWOW64\Nkbmhd32.exeC:\Windows\system32\Nkbmhd32.exe107⤵PID:5628
-
C:\Windows\SysWOW64\Naleen32.exeC:\Windows\system32\Naleen32.exe108⤵
- Drops file in System32 directory
PID:5684 -
C:\Windows\SysWOW64\Negafmoo.exeC:\Windows\system32\Negafmoo.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5736 -
C:\Windows\SysWOW64\Nghmme32.exeC:\Windows\system32\Nghmme32.exe110⤵
- Drops file in System32 directory
PID:5776 -
C:\Windows\SysWOW64\Nopeob32.exeC:\Windows\system32\Nopeob32.exe111⤵PID:5828
-
C:\Windows\SysWOW64\Nejnkmml.exeC:\Windows\system32\Nejnkmml.exe112⤵PID:5868
-
C:\Windows\SysWOW64\Nhhjghlp.exeC:\Windows\system32\Nhhjghlp.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5912 -
C:\Windows\SysWOW64\Nobbdb32.exeC:\Windows\system32\Nobbdb32.exe114⤵PID:5952
-
C:\Windows\SysWOW64\Nnebpojg.exeC:\Windows\system32\Nnebpojg.exe115⤵PID:5996
-
C:\Windows\SysWOW64\Ndoklibd.exeC:\Windows\system32\Ndoklibd.exe116⤵
- Modifies registry class
PID:6048 -
C:\Windows\SysWOW64\Nkicic32.exeC:\Windows\system32\Nkicic32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6092 -
C:\Windows\SysWOW64\Odagbipa.exeC:\Windows\system32\Odagbipa.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6136 -
C:\Windows\SysWOW64\Oaehkmok.exeC:\Windows\system32\Oaehkmok.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5196 -
C:\Windows\SysWOW64\Ohophgfg.exeC:\Windows\system32\Ohophgfg.exe120⤵PID:5288
-
C:\Windows\SysWOW64\Oecqakea.exeC:\Windows\system32\Oecqakea.exe121⤵
- Drops file in System32 directory
PID:5392 -
C:\Windows\SysWOW64\Onnefnbl.exeC:\Windows\system32\Onnefnbl.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-