Analysis
-
max time kernel
34s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 05:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
63d3a70446cea0705840ab06d24d3680N.exe
Resource
win7-20240708-en
windows7-x64
7 signatures
120 seconds
Behavioral task
behavioral2
Sample
63d3a70446cea0705840ab06d24d3680N.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
6 signatures
120 seconds
General
-
Target
63d3a70446cea0705840ab06d24d3680N.exe
-
Size
74KB
-
MD5
63d3a70446cea0705840ab06d24d3680
-
SHA1
0c48ceeb7d123b7f81d5286ef1bb7d34c980445b
-
SHA256
92fa857e55e441d432d70fa8e0437f9a6aac989233cafa8bdd0d703157cb917c
-
SHA512
13db0e15cadb1407195032f4e4eb4773eb7683ec18a5422df8b3ae439f2ce06713b699c92c97099ccf2dbe4bfe43597c25dccaa5daf1d3bfbbe20a54d60e7d98
-
SSDEEP
1536:SqHgo2ni+7qNCNYgBnNRJxsH4su4CmoD7Bv2kQH:THgNi++ghBNRs5ufmoD7R2p
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mammfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oclbok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qadhba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfadke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Phjgdm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnkdlagc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nqpfil32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbacqdem.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oclbok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocoodjan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pbkbff32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 63d3a70446cea0705840ab06d24d3680N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mammfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjhcphkf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afdmphme.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onojfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ocoodjan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ojhgad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qhoqolhm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abjnei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mnfjab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Madcgpao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmlmhodi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmkigb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aekgfdpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bnbkgech.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oojmegqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ogjkei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noecjh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfpkgblc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Alglin32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgffdk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkdokjdd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lplqoiai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mofgkebk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bebmgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nfhefc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqpbhobj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omdfgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oqpbhobj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbokaelh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bakkad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhibik32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndgiok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofbhlbja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhqico32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mideho32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdpbnlbe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adjkol32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pceeei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pegalaad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omgcmp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbkbff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bakkad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 63d3a70446cea0705840ab06d24d3680N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mdbocl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mhlonk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mchldhej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfhefc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Obkegbnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bohejibe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Limogpna.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlenijej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pceeei32.exe -
Executes dropped EXE 64 IoCs
pid Process 324 Lgobkdom.exe 2288 Limogpna.exe 2684 Lpggdj32.exe 2828 Lcecpe32.exe 2892 Llnhikkb.exe 2908 Lchpeebo.exe 2864 Lhehnlqf.exe 3056 Lplqoiai.exe 2660 Mammfa32.exe 1980 Mideho32.exe 2784 Mkeapgng.exe 2808 Mcmiqdnj.exe 1796 Mhibik32.exe 2968 Mlenijej.exe 1828 Mnfjab32.exe 1444 Mdpbnlbe.exe 1992 Mhlonk32.exe 2372 Mofgkebk.exe 1880 Madcgpao.exe 308 Mpgccm32.exe 2488 Mdbocl32.exe 2168 Mjohlb32.exe 2320 Mnkdlagc.exe 592 Mchldhej.exe 3032 Mgcheg32.exe 1204 Ndgiok32.exe 2232 Nfhefc32.exe 2076 Njdagbjd.exe 2732 Nclfpg32.exe 2748 Nfkblc32.exe 2900 Nqpfil32.exe 2756 Nbacqdem.exe 2604 Nfmoabnf.exe 2152 Nhlkmnmj.exe 2280 Noecjh32.exe 2688 Nfpkgblc.exe 2040 Nhnhcnkg.exe 2928 Nohpph32.exe 2920 Nnkpkdio.exe 1140 Ofbhlbja.exe 760 Oipdhm32.exe 1884 Ogcddjpo.exe 1768 Oojmegqa.exe 2552 Odgennoi.exe 2244 Ogeajjnl.exe 264 Okamjh32.exe 576 Onojfd32.exe 832 Obkegbnb.exe 2980 Oeibcnmf.exe 2328 Oclbok32.exe 2200 Okcjphdc.exe 1900 Onaflccf.exe 2852 Omdfgq32.exe 2880 Oqpbhobj.exe 2616 Ocoodjan.exe 2636 Ogjkei32.exe 1480 Ojhgad32.exe 2560 Omgcmp32.exe 2024 Oabonopg.exe 2044 Ocakjjok.exe 2156 Ofohfeoo.exe 1956 Oindba32.exe 2996 Pphlokep.exe 2204 Pcchoj32.exe -
Loads dropped DLL 64 IoCs
pid Process 2904 63d3a70446cea0705840ab06d24d3680N.exe 2904 63d3a70446cea0705840ab06d24d3680N.exe 324 Lgobkdom.exe 324 Lgobkdom.exe 2288 Limogpna.exe 2288 Limogpna.exe 2684 Lpggdj32.exe 2684 Lpggdj32.exe 2828 Lcecpe32.exe 2828 Lcecpe32.exe 2892 Llnhikkb.exe 2892 Llnhikkb.exe 2908 Lchpeebo.exe 2908 Lchpeebo.exe 2864 Lhehnlqf.exe 2864 Lhehnlqf.exe 3056 Lplqoiai.exe 3056 Lplqoiai.exe 2660 Mammfa32.exe 2660 Mammfa32.exe 1980 Mideho32.exe 1980 Mideho32.exe 2784 Mkeapgng.exe 2784 Mkeapgng.exe 2808 Mcmiqdnj.exe 2808 Mcmiqdnj.exe 1796 Mhibik32.exe 1796 Mhibik32.exe 2968 Mlenijej.exe 2968 Mlenijej.exe 1828 Mnfjab32.exe 1828 Mnfjab32.exe 1444 Mdpbnlbe.exe 1444 Mdpbnlbe.exe 1992 Mhlonk32.exe 1992 Mhlonk32.exe 2372 Mofgkebk.exe 2372 Mofgkebk.exe 1880 Madcgpao.exe 1880 Madcgpao.exe 308 Mpgccm32.exe 308 Mpgccm32.exe 2488 Mdbocl32.exe 2488 Mdbocl32.exe 2168 Mjohlb32.exe 2168 Mjohlb32.exe 2320 Mnkdlagc.exe 2320 Mnkdlagc.exe 592 Mchldhej.exe 592 Mchldhej.exe 3032 Mgcheg32.exe 3032 Mgcheg32.exe 1204 Ndgiok32.exe 1204 Ndgiok32.exe 2232 Nfhefc32.exe 2232 Nfhefc32.exe 2076 Njdagbjd.exe 2076 Njdagbjd.exe 2732 Nclfpg32.exe 2732 Nclfpg32.exe 2748 Nfkblc32.exe 2748 Nfkblc32.exe 2900 Nqpfil32.exe 2900 Nqpfil32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Oinflf32.dll Pbkbff32.exe File opened for modification C:\Windows\SysWOW64\Qmkigb32.exe Qjmmkgga.exe File opened for modification C:\Windows\SysWOW64\Lgobkdom.exe 63d3a70446cea0705840ab06d24d3680N.exe File opened for modification C:\Windows\SysWOW64\Mdbocl32.exe Mpgccm32.exe File opened for modification C:\Windows\SysWOW64\Ndgiok32.exe Mgcheg32.exe File opened for modification C:\Windows\SysWOW64\Odgennoi.exe Oojmegqa.exe File opened for modification C:\Windows\SysWOW64\Onaflccf.exe Okcjphdc.exe File created C:\Windows\SysWOW64\Goelfn32.dll Pceeei32.exe File opened for modification C:\Windows\SysWOW64\Pengmqkl.exe Pbokaelh.exe File created C:\Windows\SysWOW64\Ongckh32.dll Qadhba32.exe File opened for modification C:\Windows\SysWOW64\Lcecpe32.exe Lpggdj32.exe File created C:\Windows\SysWOW64\Gjllpppq.dll Lchpeebo.exe File opened for modification C:\Windows\SysWOW64\Nfkblc32.exe Nclfpg32.exe File opened for modification C:\Windows\SysWOW64\Nfpkgblc.exe Noecjh32.exe File created C:\Windows\SysWOW64\Onojfd32.exe Okamjh32.exe File created C:\Windows\SysWOW64\Jmehoabj.dll Oqpbhobj.exe File opened for modification C:\Windows\SysWOW64\Aaiamamk.exe Aibjlcli.exe File created C:\Windows\SysWOW64\Apchim32.exe Alglin32.exe File opened for modification C:\Windows\SysWOW64\Bokapipc.exe Bkoepj32.exe File opened for modification C:\Windows\SysWOW64\Bgffdk32.exe Bdgjhp32.exe File created C:\Windows\SysWOW64\Cqfcngpa.dll Bkabejfg.exe File created C:\Windows\SysWOW64\Mnfjab32.exe Mlenijej.exe File opened for modification C:\Windows\SysWOW64\Noecjh32.exe Nhlkmnmj.exe File opened for modification C:\Windows\SysWOW64\Oabonopg.exe Omgcmp32.exe File created C:\Windows\SysWOW64\Pjmqldee.exe Pfadke32.exe File created C:\Windows\SysWOW64\Aljinncb.exe Aillbbdn.exe File created C:\Windows\SysWOW64\Bokapipc.exe Bkoepj32.exe File created C:\Windows\SysWOW64\Bgkppkih.exe Bdlccoje.exe File created C:\Windows\SysWOW64\Nnkpkdio.exe Nohpph32.exe File created C:\Windows\SysWOW64\Aibonhfb.dll Obkegbnb.exe File opened for modification C:\Windows\SysWOW64\Pnabkgfb.exe Plcfokfn.exe File opened for modification C:\Windows\SysWOW64\Qjkpegic.exe Qhldiljp.exe File opened for modification C:\Windows\SysWOW64\Akafff32.exe Abjnei32.exe File created C:\Windows\SysWOW64\Ndpqii32.dll Aekgfdpj.exe File opened for modification C:\Windows\SysWOW64\Oindba32.exe Ofohfeoo.exe File created C:\Windows\SysWOW64\Pegalaad.exe Pbhepfbq.exe File created C:\Windows\SysWOW64\Kbipfnlb.dll Aljinncb.exe File created C:\Windows\SysWOW64\Fbdjmo32.dll Nqpfil32.exe File opened for modification C:\Windows\SysWOW64\Ogjkei32.exe Ocoodjan.exe File created C:\Windows\SysWOW64\Plmajoob.dll Qhoqolhm.exe File created C:\Windows\SysWOW64\Cdpbblaf.dll Aidfacjf.exe File created C:\Windows\SysWOW64\Aleoco32.exe Aigcgc32.exe File created C:\Windows\SysWOW64\Pcchoj32.exe Pphlokep.exe File created C:\Windows\SysWOW64\Qmkigb32.exe Qjmmkgga.exe File created C:\Windows\SysWOW64\Pcghicbm.dll Bohejibe.exe File created C:\Windows\SysWOW64\Nanalgmf.dll Mnfjab32.exe File opened for modification C:\Windows\SysWOW64\Okamjh32.exe Ogeajjnl.exe File created C:\Windows\SysWOW64\Aekgfdpj.exe Adjkol32.exe File created C:\Windows\SysWOW64\Pmkhcg32.dll Apoonnac.exe File opened for modification C:\Windows\SysWOW64\Aigcgc32.exe Aekgfdpj.exe File created C:\Windows\SysWOW64\Limogpna.exe Lgobkdom.exe File created C:\Windows\SysWOW64\Obkegbnb.exe Onojfd32.exe File created C:\Windows\SysWOW64\Ocoodjan.exe Oqpbhobj.exe File opened for modification C:\Windows\SysWOW64\Pcchoj32.exe Pphlokep.exe File created C:\Windows\SysWOW64\Qhldiljp.exe Pengmqkl.exe File opened for modification C:\Windows\SysWOW64\Apoonnac.exe Aidfacjf.exe File created C:\Windows\SysWOW64\Dhlgdedc.dll Bkdokjdd.exe File created C:\Windows\SysWOW64\Bomneh32.exe Bkabejfg.exe File created C:\Windows\SysWOW64\Mpgccm32.exe Madcgpao.exe File created C:\Windows\SysWOW64\Bkopmiic.dll Nbacqdem.exe File opened for modification C:\Windows\SysWOW64\Qhoqolhm.exe Qadhba32.exe File opened for modification C:\Windows\SysWOW64\Abjnei32.exe Adhnillo.exe File opened for modification C:\Windows\SysWOW64\Aleoco32.exe Aigcgc32.exe File created C:\Windows\SysWOW64\Mandkeki.dll Apchim32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2396 2176 WerFault.exe 154 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcghicbm.dll" Bohejibe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bomneh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mcmiqdnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aiipmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mnfjab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aibonhfb.dll" Obkegbnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bainld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bomneh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oljpfqgg.dll" Lcecpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lchpeebo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhfgpj32.dll" Njdagbjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qmilachg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Adjkol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aekgfdpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Abadeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mlenijej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mdpbnlbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njdagbjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkkmploq.dll" Pphlokep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qmilachg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mpgccm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mjohlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bohejibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bakkad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Okamjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Plcfokfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmocegaj.dll" Oojmegqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pbhepfbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfmeflod.dll" Bokapipc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bkabejfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 63d3a70446cea0705840ab06d24d3680N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nqpfil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjeinc32.dll" Nhlkmnmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pphlokep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pbokaelh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aiipmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aillbbdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djhjjc32.dll" Bgffdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lcecpe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lchpeebo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldkhgheg.dll" Bhecnndq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bkdokjdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ocoodjan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oindba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aigcgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Foknlg32.dll" Aillbbdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lgobkdom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Omdfgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pbkbff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afkcqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhjabc32.dll" Ndgiok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pbhepfbq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mdbocl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ndgiok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oclbok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pceeei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pffnfdhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgdqnb32.dll" Alglin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 63d3a70446cea0705840ab06d24d3680N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nanalgmf.dll" Mnfjab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bdlccoje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bkoepj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bokapipc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bgffdk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 324 2904 63d3a70446cea0705840ab06d24d3680N.exe 29 PID 2904 wrote to memory of 324 2904 63d3a70446cea0705840ab06d24d3680N.exe 29 PID 2904 wrote to memory of 324 2904 63d3a70446cea0705840ab06d24d3680N.exe 29 PID 2904 wrote to memory of 324 2904 63d3a70446cea0705840ab06d24d3680N.exe 29 PID 324 wrote to memory of 2288 324 Lgobkdom.exe 30 PID 324 wrote to memory of 2288 324 Lgobkdom.exe 30 PID 324 wrote to memory of 2288 324 Lgobkdom.exe 30 PID 324 wrote to memory of 2288 324 Lgobkdom.exe 30 PID 2288 wrote to memory of 2684 2288 Limogpna.exe 31 PID 2288 wrote to memory of 2684 2288 Limogpna.exe 31 PID 2288 wrote to memory of 2684 2288 Limogpna.exe 31 PID 2288 wrote to memory of 2684 2288 Limogpna.exe 31 PID 2684 wrote to memory of 2828 2684 Lpggdj32.exe 32 PID 2684 wrote to memory of 2828 2684 Lpggdj32.exe 32 PID 2684 wrote to memory of 2828 2684 Lpggdj32.exe 32 PID 2684 wrote to memory of 2828 2684 Lpggdj32.exe 32 PID 2828 wrote to memory of 2892 2828 Lcecpe32.exe 33 PID 2828 wrote to memory of 2892 2828 Lcecpe32.exe 33 PID 2828 wrote to memory of 2892 2828 Lcecpe32.exe 33 PID 2828 wrote to memory of 2892 2828 Lcecpe32.exe 33 PID 2892 wrote to memory of 2908 2892 Llnhikkb.exe 34 PID 2892 wrote to memory of 2908 2892 Llnhikkb.exe 34 PID 2892 wrote to memory of 2908 2892 Llnhikkb.exe 34 PID 2892 wrote to memory of 2908 2892 Llnhikkb.exe 34 PID 2908 wrote to memory of 2864 2908 Lchpeebo.exe 35 PID 2908 wrote to memory of 2864 2908 Lchpeebo.exe 35 PID 2908 wrote to memory of 2864 2908 Lchpeebo.exe 35 PID 2908 wrote to memory of 2864 2908 Lchpeebo.exe 35 PID 2864 wrote to memory of 3056 2864 Lhehnlqf.exe 36 PID 2864 wrote to memory of 3056 2864 Lhehnlqf.exe 36 PID 2864 wrote to memory of 3056 2864 Lhehnlqf.exe 36 PID 2864 wrote to memory of 3056 2864 Lhehnlqf.exe 36 PID 3056 wrote to memory of 2660 3056 Lplqoiai.exe 37 PID 3056 wrote to memory of 2660 3056 Lplqoiai.exe 37 PID 3056 wrote to memory of 2660 3056 Lplqoiai.exe 37 PID 3056 wrote to memory of 2660 3056 Lplqoiai.exe 37 PID 2660 wrote to memory of 1980 2660 Mammfa32.exe 38 PID 2660 wrote to memory of 1980 2660 Mammfa32.exe 38 PID 2660 wrote to memory of 1980 2660 Mammfa32.exe 38 PID 2660 wrote to memory of 1980 2660 Mammfa32.exe 38 PID 1980 wrote to memory of 2784 1980 Mideho32.exe 39 PID 1980 wrote to memory of 2784 1980 Mideho32.exe 39 PID 1980 wrote to memory of 2784 1980 Mideho32.exe 39 PID 1980 wrote to memory of 2784 1980 Mideho32.exe 39 PID 2784 wrote to memory of 2808 2784 Mkeapgng.exe 40 PID 2784 wrote to memory of 2808 2784 Mkeapgng.exe 40 PID 2784 wrote to memory of 2808 2784 Mkeapgng.exe 40 PID 2784 wrote to memory of 2808 2784 Mkeapgng.exe 40 PID 2808 wrote to memory of 1796 2808 Mcmiqdnj.exe 41 PID 2808 wrote to memory of 1796 2808 Mcmiqdnj.exe 41 PID 2808 wrote to memory of 1796 2808 Mcmiqdnj.exe 41 PID 2808 wrote to memory of 1796 2808 Mcmiqdnj.exe 41 PID 1796 wrote to memory of 2968 1796 Mhibik32.exe 42 PID 1796 wrote to memory of 2968 1796 Mhibik32.exe 42 PID 1796 wrote to memory of 2968 1796 Mhibik32.exe 42 PID 1796 wrote to memory of 2968 1796 Mhibik32.exe 42 PID 2968 wrote to memory of 1828 2968 Mlenijej.exe 43 PID 2968 wrote to memory of 1828 2968 Mlenijej.exe 43 PID 2968 wrote to memory of 1828 2968 Mlenijej.exe 43 PID 2968 wrote to memory of 1828 2968 Mlenijej.exe 43 PID 1828 wrote to memory of 1444 1828 Mnfjab32.exe 44 PID 1828 wrote to memory of 1444 1828 Mnfjab32.exe 44 PID 1828 wrote to memory of 1444 1828 Mnfjab32.exe 44 PID 1828 wrote to memory of 1444 1828 Mnfjab32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\63d3a70446cea0705840ab06d24d3680N.exe"C:\Users\Admin\AppData\Local\Temp\63d3a70446cea0705840ab06d24d3680N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Lgobkdom.exeC:\Windows\system32\Lgobkdom.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\Limogpna.exeC:\Windows\system32\Limogpna.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\Lpggdj32.exeC:\Windows\system32\Lpggdj32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Lcecpe32.exeC:\Windows\system32\Lcecpe32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Llnhikkb.exeC:\Windows\system32\Llnhikkb.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\Lchpeebo.exeC:\Windows\system32\Lchpeebo.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Lhehnlqf.exeC:\Windows\system32\Lhehnlqf.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Lplqoiai.exeC:\Windows\system32\Lplqoiai.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\Mammfa32.exeC:\Windows\system32\Mammfa32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Mideho32.exeC:\Windows\system32\Mideho32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\Mkeapgng.exeC:\Windows\system32\Mkeapgng.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Mcmiqdnj.exeC:\Windows\system32\Mcmiqdnj.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Mhibik32.exeC:\Windows\system32\Mhibik32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\Mlenijej.exeC:\Windows\system32\Mlenijej.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Mnfjab32.exeC:\Windows\system32\Mnfjab32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\Mdpbnlbe.exeC:\Windows\system32\Mdpbnlbe.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1444 -
C:\Windows\SysWOW64\Mhlonk32.exeC:\Windows\system32\Mhlonk32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1992 -
C:\Windows\SysWOW64\Mofgkebk.exeC:\Windows\system32\Mofgkebk.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2372 -
C:\Windows\SysWOW64\Madcgpao.exeC:\Windows\system32\Madcgpao.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1880 -
C:\Windows\SysWOW64\Mpgccm32.exeC:\Windows\system32\Mpgccm32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:308 -
C:\Windows\SysWOW64\Mdbocl32.exeC:\Windows\system32\Mdbocl32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Mjohlb32.exeC:\Windows\system32\Mjohlb32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Mnkdlagc.exeC:\Windows\system32\Mnkdlagc.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2320 -
C:\Windows\SysWOW64\Mchldhej.exeC:\Windows\system32\Mchldhej.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:592 -
C:\Windows\SysWOW64\Mgcheg32.exeC:\Windows\system32\Mgcheg32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\Ndgiok32.exeC:\Windows\system32\Ndgiok32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1204 -
C:\Windows\SysWOW64\Nfhefc32.exeC:\Windows\system32\Nfhefc32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2232 -
C:\Windows\SysWOW64\Njdagbjd.exeC:\Windows\system32\Njdagbjd.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2076 -
C:\Windows\SysWOW64\Nclfpg32.exeC:\Windows\system32\Nclfpg32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2732 -
C:\Windows\SysWOW64\Nfkblc32.exeC:\Windows\system32\Nfkblc32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748 -
C:\Windows\SysWOW64\Nqpfil32.exeC:\Windows\system32\Nqpfil32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2900 -
C:\Windows\SysWOW64\Nbacqdem.exeC:\Windows\system32\Nbacqdem.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2756 -
C:\Windows\SysWOW64\Nfmoabnf.exeC:\Windows\system32\Nfmoabnf.exe34⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\Nhlkmnmj.exeC:\Windows\system32\Nhlkmnmj.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2152 -
C:\Windows\SysWOW64\Noecjh32.exeC:\Windows\system32\Noecjh32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2280 -
C:\Windows\SysWOW64\Nfpkgblc.exeC:\Windows\system32\Nfpkgblc.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Nhnhcnkg.exeC:\Windows\system32\Nhnhcnkg.exe38⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\Nohpph32.exeC:\Windows\system32\Nohpph32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\Nnkpkdio.exeC:\Windows\system32\Nnkpkdio.exe40⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\Ofbhlbja.exeC:\Windows\system32\Ofbhlbja.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\Oipdhm32.exeC:\Windows\system32\Oipdhm32.exe42⤵
- Executes dropped EXE
PID:760 -
C:\Windows\SysWOW64\Ogcddjpo.exeC:\Windows\system32\Ogcddjpo.exe43⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\Oojmegqa.exeC:\Windows\system32\Oojmegqa.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1768 -
C:\Windows\SysWOW64\Odgennoi.exeC:\Windows\system32\Odgennoi.exe45⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\Ogeajjnl.exeC:\Windows\system32\Ogeajjnl.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\Okamjh32.exeC:\Windows\system32\Okamjh32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:264 -
C:\Windows\SysWOW64\Onojfd32.exeC:\Windows\system32\Onojfd32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:576 -
C:\Windows\SysWOW64\Obkegbnb.exeC:\Windows\system32\Obkegbnb.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:832 -
C:\Windows\SysWOW64\Oeibcnmf.exeC:\Windows\system32\Oeibcnmf.exe50⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Oclbok32.exeC:\Windows\system32\Oclbok32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2328 -
C:\Windows\SysWOW64\Okcjphdc.exeC:\Windows\system32\Okcjphdc.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\Onaflccf.exeC:\Windows\system32\Onaflccf.exe53⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\Omdfgq32.exeC:\Windows\system32\Omdfgq32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2852 -
C:\Windows\SysWOW64\Oqpbhobj.exeC:\Windows\system32\Oqpbhobj.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\Ocoodjan.exeC:\Windows\system32\Ocoodjan.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\Ogjkei32.exeC:\Windows\system32\Ogjkei32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\Ojhgad32.exeC:\Windows\system32\Ojhgad32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\Omgcmp32.exeC:\Windows\system32\Omgcmp32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2560 -
C:\Windows\SysWOW64\Oabonopg.exeC:\Windows\system32\Oabonopg.exe60⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Ocakjjok.exeC:\Windows\system32\Ocakjjok.exe61⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Ofohfeoo.exeC:\Windows\system32\Ofohfeoo.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2156 -
C:\Windows\SysWOW64\Oindba32.exeC:\Windows\system32\Oindba32.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:1956 -
C:\Windows\SysWOW64\Pphlokep.exeC:\Windows\system32\Pphlokep.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2996 -
C:\Windows\SysWOW64\Pcchoj32.exeC:\Windows\system32\Pcchoj32.exe65⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Pfadke32.exeC:\Windows\system32\Pfadke32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3012 -
C:\Windows\SysWOW64\Pjmqldee.exeC:\Windows\system32\Pjmqldee.exe67⤵PID:940
-
C:\Windows\SysWOW64\Pmlmhodi.exeC:\Windows\system32\Pmlmhodi.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1512 -
C:\Windows\SysWOW64\Pceeei32.exeC:\Windows\system32\Pceeei32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Pbhepfbq.exeC:\Windows\system32\Pbhepfbq.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:776 -
C:\Windows\SysWOW64\Pegalaad.exeC:\Windows\system32\Pegalaad.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2220 -
C:\Windows\SysWOW64\Pibmmp32.exeC:\Windows\system32\Pibmmp32.exe72⤵PID:2540
-
C:\Windows\SysWOW64\Plqjilia.exeC:\Windows\system32\Plqjilia.exe73⤵PID:2988
-
C:\Windows\SysWOW64\Pbkbff32.exeC:\Windows\system32\Pbkbff32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Pffnfdhg.exeC:\Windows\system32\Pffnfdhg.exe75⤵
- Modifies registry class
PID:2612 -
C:\Windows\SysWOW64\Phgjnm32.exeC:\Windows\system32\Phgjnm32.exe76⤵PID:1976
-
C:\Windows\SysWOW64\Plcfokfn.exeC:\Windows\system32\Plcfokfn.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:2800 -
C:\Windows\SysWOW64\Pnabkgfb.exeC:\Windows\system32\Pnabkgfb.exe78⤵PID:1704
-
C:\Windows\SysWOW64\Papogbef.exeC:\Windows\system32\Papogbef.exe79⤵PID:2632
-
C:\Windows\SysWOW64\Phjgdm32.exeC:\Windows\system32\Phjgdm32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2252 -
C:\Windows\SysWOW64\Pjhcphkf.exeC:\Windows\system32\Pjhcphkf.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1584 -
C:\Windows\SysWOW64\Pbokaelh.exeC:\Windows\system32\Pbokaelh.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\Pengmqkl.exeC:\Windows\system32\Pengmqkl.exe83⤵
- Drops file in System32 directory
PID:1664 -
C:\Windows\SysWOW64\Qhldiljp.exeC:\Windows\system32\Qhldiljp.exe84⤵
- Drops file in System32 directory
PID:2524 -
C:\Windows\SysWOW64\Qjkpegic.exeC:\Windows\system32\Qjkpegic.exe85⤵PID:1752
-
C:\Windows\SysWOW64\Qmilachg.exeC:\Windows\system32\Qmilachg.exe86⤵
- Modifies registry class
PID:2088 -
C:\Windows\SysWOW64\Qadhba32.exeC:\Windows\system32\Qadhba32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2888 -
C:\Windows\SysWOW64\Qhoqolhm.exeC:\Windows\system32\Qhoqolhm.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2436 -
C:\Windows\SysWOW64\Qjmmkgga.exeC:\Windows\system32\Qjmmkgga.exe89⤵
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\Qmkigb32.exeC:\Windows\system32\Qmkigb32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1908 -
C:\Windows\SysWOW64\Afdmphme.exeC:\Windows\system32\Afdmphme.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1220 -
C:\Windows\SysWOW64\Aibjlcli.exeC:\Windows\system32\Aibjlcli.exe92⤵
- Drops file in System32 directory
PID:536 -
C:\Windows\SysWOW64\Aaiamamk.exeC:\Windows\system32\Aaiamamk.exe93⤵PID:1048
-
C:\Windows\SysWOW64\Adhnillo.exeC:\Windows\system32\Adhnillo.exe94⤵
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\Abjnei32.exeC:\Windows\system32\Abjnei32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1396 -
C:\Windows\SysWOW64\Akafff32.exeC:\Windows\system32\Akafff32.exe96⤵PID:2500
-
C:\Windows\SysWOW64\Aidfacjf.exeC:\Windows\system32\Aidfacjf.exe97⤵
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\Apoonnac.exeC:\Windows\system32\Apoonnac.exe98⤵
- Drops file in System32 directory
PID:2188 -
C:\Windows\SysWOW64\Adjkol32.exeC:\Windows\system32\Adjkol32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2848 -
C:\Windows\SysWOW64\Aekgfdpj.exeC:\Windows\system32\Aekgfdpj.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Aigcgc32.exeC:\Windows\system32\Aigcgc32.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:2624 -
C:\Windows\SysWOW64\Aleoco32.exeC:\Windows\system32\Aleoco32.exe102⤵PID:1492
-
C:\Windows\SysWOW64\Aocloj32.exeC:\Windows\system32\Aocloj32.exe103⤵PID:2656
-
C:\Windows\SysWOW64\Afkcqg32.exeC:\Windows\system32\Afkcqg32.exe104⤵
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\Aiipmb32.exeC:\Windows\system32\Aiipmb32.exe105⤵
- Modifies registry class
PID:1164 -
C:\Windows\SysWOW64\Alglin32.exeC:\Windows\system32\Alglin32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2572 -
C:\Windows\SysWOW64\Apchim32.exeC:\Windows\system32\Apchim32.exe107⤵
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\Abadeh32.exeC:\Windows\system32\Abadeh32.exe108⤵
- Modifies registry class
PID:2416 -
C:\Windows\SysWOW64\Aillbbdn.exeC:\Windows\system32\Aillbbdn.exe109⤵
- Drops file in System32 directory
- Modifies registry class
PID:1420 -
C:\Windows\SysWOW64\Aljinncb.exeC:\Windows\system32\Aljinncb.exe110⤵
- Drops file in System32 directory
PID:272 -
C:\Windows\SysWOW64\Bohejibe.exeC:\Windows\system32\Bohejibe.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Bebmgc32.exeC:\Windows\system32\Bebmgc32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2132 -
C:\Windows\SysWOW64\Bhqico32.exeC:\Windows\system32\Bhqico32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2736 -
C:\Windows\SysWOW64\Bkoepj32.exeC:\Windows\system32\Bkoepj32.exe114⤵
- Drops file in System32 directory
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\Bokapipc.exeC:\Windows\system32\Bokapipc.exe115⤵
- Modifies registry class
PID:2956 -
C:\Windows\SysWOW64\Bainld32.exeC:\Windows\system32\Bainld32.exe116⤵
- Modifies registry class
PID:2368 -
C:\Windows\SysWOW64\Bdgjhp32.exeC:\Windows\system32\Bdgjhp32.exe117⤵
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\Bgffdk32.exeC:\Windows\system32\Bgffdk32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:912 -
C:\Windows\SysWOW64\Bkabejfg.exeC:\Windows\system32\Bkabejfg.exe119⤵
- Drops file in System32 directory
- Modifies registry class
PID:1044 -
C:\Windows\SysWOW64\Bomneh32.exeC:\Windows\system32\Bomneh32.exe120⤵
- Modifies registry class
PID:556 -
C:\Windows\SysWOW64\Bakkad32.exeC:\Windows\system32\Bakkad32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\Bhecnndq.exeC:\Windows\system32\Bhecnndq.exe122⤵
- Modifies registry class
PID:2148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-