Analysis
-
max time kernel
129s -
max time network
141s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-05-2021 21:53
Static task
static1
Behavioral task
behavioral1
Sample
96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f.exe
-
Size
9.6MB
-
MD5
e42d21095d220b1ccd7720e0d3297670
-
SHA1
be8f7f7c13659a1bd01e650362d7a759a50495b6
-
SHA256
96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f
-
SHA512
155b831621f32c54b32854e78fd773744fcab26eee04ded14d6958b9dbd11f31255d8a7340a9b9435d4b10dfb473f63c0d0661f615291be0fec18240c54027c0
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
Pagoloqe.exeAkdmpccp.exeAelncl32.exeAhmgeg32.exeBfcddkkk.exeBjcipioo.exeChmpld32.exeDobgdmma.exeEpqdek32.exeFfabcd32.exeFigdpo32.exeGilnkngm.exeHignflmo.exeHmefmkce.exeHiocgkgg.exeLghpij32.exeOjqqippj.exeNnminjqg.exeEagllk32.exeHaohpb32.exeLijglhim.exePqndlmlj.exePcomnhik.exeDicndide.exeEjhpffbm.exeFkjifhgm.exeHnenepna.exeIaegfk32.exeIgfedd32.exeMkofdjgj.exeDeldecdk.exeImnngekh.exeKgdkklmk.exeKejhjp32.exeOkaefa32.exeOgjbqa32.exeAomcdk32.exeBkimdk32.exeEebckl32.exeEfapeobj.exeGicbnhah.exeGieocg32.exeGhjlddcn.exeGofqfnih.exeIodmhl32.exeIgegoh32.exeLincnmgc.exeLanneipj.exeMjpeemnp.exeOhihpnjb.exeOmfqheii.exePkjaai32.exePpfijp32.exePioncelk.exePhpnqmdj.exePahbjb32.exePkagbhak.exePdilkn32.exeAdpblm32.exeAnifebhd.exeAhnjbkhj.exeAafokqoj.exeAkocdf32.exeAqlllm32.exepid process 684 Pagoloqe.exe 4008 Akdmpccp.exe 2240 Aelncl32.exe 3752 Ahmgeg32.exe 2952 Bfcddkkk.exe 3260 Bjcipioo.exe 192 Chmpld32.exe 2336 Dobgdmma.exe 736 Epqdek32.exe 2616 Ffabcd32.exe 3620 Figdpo32.exe 3020 Gilnkngm.exe 2080 Hignflmo.exe 2288 Hmefmkce.exe 3052 Hiocgkgg.exe 3944 Lghpij32.exe 1248 Ojqqippj.exe 2776 Nnminjqg.exe 788 Eagllk32.exe 2148 Haohpb32.exe 3548 Lijglhim.exe 912 Pqndlmlj.exe 4084 Pcomnhik.exe 3168 Dicndide.exe 3140 Ejhpffbm.exe 572 Fkjifhgm.exe 2244 Hnenepna.exe 3688 Iaegfk32.exe 2920 Igfedd32.exe 3908 Mkofdjgj.exe 1984 Deldecdk.exe 2792 Imnngekh.exe 504 Kgdkklmk.exe 1288 Kejhjp32.exe 2084 Okaefa32.exe 3860 Ogjbqa32.exe 736 Aomcdk32.exe 2616 Bkimdk32.exe 1000 Eebckl32.exe 3024 Efapeobj.exe 3920 Gicbnhah.exe 500 Gieocg32.exe 3876 Ghjlddcn.exe 3944 Gofqfnih.exe 2260 Iodmhl32.exe 416 Igegoh32.exe 2220 Lincnmgc.exe 424 Lanneipj.exe 3936 Mjpeemnp.exe 3868 Ohihpnjb.exe 184 Omfqheii.exe 192 Pkjaai32.exe 2192 Ppfijp32.exe 3528 Pioncelk.exe 2120 Phpnqmdj.exe 1076 Pahbjb32.exe 3512 Pkagbhak.exe 3468 Pdilkn32.exe 3232 Adpblm32.exe 3956 Anifebhd.exe 3752 Ahnjbkhj.exe 4092 Aafokqoj.exe 1660 Akocdf32.exe 988 Aqlllm32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Aelncl32.exeFigdpo32.exeHlcmljlk.exeEpqdek32.exeGofjlg32.exeOdfodj32.exeQihjonqd.exeDjbobhld.exeGicbnhah.exeBbdklobj.exeJhmcmi32.exeBggjdqea.exeKgdkklmk.exeGofqfnih.exeBkfjdeoc.exePphoei32.exePkagbhak.exeIaihjpbh.exeEebckl32.exeMikhed32.exeOipkga32.exeJjejfm32.exeDicndide.exeMjpeemnp.exeBgmjifeg.exeCnbbbo32.exeIodmhl32.exeJjgfll32.exeMcqmbm32.exeMmiakbmn.exeCdlcdbfh.exeFfabcd32.exeBkimdk32.exeChcmdh32.exeJlklcghp.exeAlbffhek.exeDaageh32.exeBdednj32.exeCnnigofl.exeFbcikhje.exeDdbiea32.exeLghpij32.exeDldomaep.exePbihgdmm.exeCcgnopcj.exeJjcmqmag.exeKopnpaal.exeHiocgkgg.exeLijglhim.exeAheqbjbb.exeIkbmce32.exeAcgdhbam.exeFgfhcjmk.exeHlocqk32.exeMiilpdij.exePmlpon32.exeAiopom32.exeDqncebao.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ahmgeg32.exe Aelncl32.exe File opened for modification C:\Windows\SysWOW64\Gilnkngm.exe Figdpo32.exe File created C:\Windows\SysWOW64\Hapedajb.exe Hlcmljlk.exe File created C:\Windows\SysWOW64\Ffabcd32.exe Epqdek32.exe File created C:\Windows\SysWOW64\Pkpjeddb.dll Gofjlg32.exe File created C:\Windows\SysWOW64\Omncmp32.exe Odfodj32.exe File created C:\Windows\SysWOW64\Qcpogc32.exe Qihjonqd.exe File opened for modification C:\Windows\SysWOW64\Dgfoll32.exe Djbobhld.exe File created C:\Windows\SysWOW64\Lcgjnhjd.dll Gicbnhah.exe File created C:\Windows\SysWOW64\Bkmpedik.exe Bbdklobj.exe File created C:\Windows\SysWOW64\Jcbgja32.exe Jhmcmi32.exe File opened for modification C:\Windows\SysWOW64\Bppomfla.exe Bggjdqea.exe File opened for modification C:\Windows\SysWOW64\Kejhjp32.exe Kgdkklmk.exe File created C:\Windows\SysWOW64\Iodmhl32.exe Gofqfnih.exe File opened for modification C:\Windows\SysWOW64\Bgmjifeg.exe Bkfjdeoc.exe File created C:\Windows\SysWOW64\Bofjfi32.dll Pphoei32.exe File created C:\Windows\SysWOW64\Pdilkn32.exe Pkagbhak.exe File created C:\Windows\SysWOW64\Ikbmce32.exe Iaihjpbh.exe File opened for modification C:\Windows\SysWOW64\Efapeobj.exe Eebckl32.exe File created C:\Windows\SysWOW64\Mcqmbm32.exe Mikhed32.exe File created C:\Windows\SysWOW64\Bqfagnfc.dll Oipkga32.exe File created C:\Windows\SysWOW64\Oonpma32.dll Qihjonqd.exe File created C:\Windows\SysWOW64\Jobboc32.exe Jjejfm32.exe File opened for modification C:\Windows\SysWOW64\Ejhpffbm.exe Dicndide.exe File created C:\Windows\SysWOW64\Kejhjp32.exe Kgdkklmk.exe File created C:\Windows\SysWOW64\Ceqqfd32.dll Mjpeemnp.exe File created C:\Windows\SysWOW64\Iphjfola.dll Bgmjifeg.exe File created C:\Windows\SysWOW64\Kphdoanq.dll Cnbbbo32.exe File created C:\Windows\SysWOW64\Igegoh32.exe Iodmhl32.exe File created C:\Windows\SysWOW64\Chfooojg.dll Jjgfll32.exe File created C:\Windows\SysWOW64\Mmiakbmn.exe Mcqmbm32.exe File created C:\Windows\SysWOW64\Mfafdhdn.exe Mmiakbmn.exe File opened for modification C:\Windows\SysWOW64\Cmghhecc.exe Cdlcdbfh.exe File created C:\Windows\SysWOW64\Figdpo32.exe Ffabcd32.exe File created C:\Windows\SysWOW64\Eebckl32.exe Bkimdk32.exe File created C:\Windows\SysWOW64\Flhldbli.dll Chcmdh32.exe File created C:\Windows\SysWOW64\Kfcqlmna.exe Jlklcghp.exe File created C:\Windows\SysWOW64\Inpafa32.dll Albffhek.exe File created C:\Windows\SysWOW64\Ofjchekb.dll Daageh32.exe File created C:\Windows\SysWOW64\Jpboapgi.dll Bdednj32.exe File opened for modification C:\Windows\SysWOW64\Chcmdh32.exe Cnnigofl.exe File created C:\Windows\SysWOW64\Fllndn32.exe Fbcikhje.exe File created C:\Windows\SysWOW64\Ddefjanm.exe Ddbiea32.exe File opened for modification C:\Windows\SysWOW64\Ojqqippj.exe Lghpij32.exe File created C:\Windows\SysWOW64\Blhdclmn.dll Dldomaep.exe File opened for modification C:\Windows\SysWOW64\Mcqmbm32.exe Mikhed32.exe File opened for modification C:\Windows\SysWOW64\Pmomdmmc.exe Pbihgdmm.exe File created C:\Windows\SysWOW64\Idgeahlh.dll Ccgnopcj.exe File created C:\Windows\SysWOW64\Jopeid32.exe Jjcmqmag.exe File opened for modification C:\Windows\SysWOW64\Kihcig32.exe Kopnpaal.exe File opened for modification C:\Windows\SysWOW64\Lghpij32.exe Hiocgkgg.exe File created C:\Windows\SysWOW64\Pqndlmlj.exe Lijglhim.exe File opened for modification C:\Windows\SysWOW64\Pdilkn32.exe Pkagbhak.exe File created C:\Windows\SysWOW64\Bbnelp32.exe Aheqbjbb.exe File created C:\Windows\SysWOW64\Jjcmqmag.exe Ikbmce32.exe File created C:\Windows\SysWOW64\Anmiek32.exe Acgdhbam.exe File created C:\Windows\SysWOW64\Fejilnle.exe Fgfhcjmk.exe File created C:\Windows\SysWOW64\Bhlgci32.exe Bgmjifeg.exe File created C:\Windows\SysWOW64\Hibdjo32.exe Hlocqk32.exe File opened for modification C:\Windows\SysWOW64\Mcnpmm32.exe Miilpdij.exe File created C:\Windows\SysWOW64\Hiobdh32.dll Pmlpon32.exe File created C:\Windows\SysWOW64\Acgdhbam.exe Aiopom32.exe File created C:\Windows\SysWOW64\Cmghhecc.exe Cdlcdbfh.exe File opened for modification C:\Windows\SysWOW64\Dkchbkad.exe Dqncebao.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6208 6156 WerFault.exe Fcabcjnj.exe -
Modifies registry class 64 IoCs
Processes:
Aafokqoj.exeBbdklobj.exeFekpgdoa.exeNpejil32.exeEmjnebcn.exeHibdjo32.exeMcqmbm32.exeOjgnbcfj.exeKonaja32.exeIgegoh32.exeHlocqk32.exeAdpblm32.exeIkhjmg32.exeMiilpdij.exeDdefjanm.exeEjnnnfbg.exeFejilnle.exeAkdmpccp.exePpfijp32.exeJjgfll32.exePbdole32.exeDjbobhld.exeBfcddkkk.exeAkocdf32.exeJjcmqmag.exeJcpkea32.exeClpbhf32.exeEnncjdfk.exeHiocgkgg.exeNnminjqg.exeMkofdjgj.exeAhnjbkhj.exeGenecbok.exePkijgcdg.exeCjfogjfb.exeAnifebhd.exeOmncmp32.exeQldiej32.exeLincnmgc.exePahbjb32.exeCqnknd32.exeDgfoll32.exeLghpij32.exeIaegfk32.exeMcnpmm32.exeCgllfn32.exeAelncl32.exeGieocg32.exeHljjelde.exeLjcooh32.exeMlnnlobe.exeAnmiek32.exeImnngekh.exeCghjedkj.exeDaageh32.exeFbcikhje.exeFaifld32.exeGofjlg32.exeGofqfnih.exeChcmdh32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aafokqoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbdklobj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfjbmble.dll" Fekpgdoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dobloi32.dll" Npejil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Coqcpdej.dll" Emjnebcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hibdjo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcqmbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhbknjkl.dll" Ojgnbcfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Meckdibc.dll" Konaja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nebfie32.dll" Igegoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlghai32.dll" Aafokqoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlocqk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adpblm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ikhjmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Miilpdij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oekiop32.dll" Ddefjanm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejnnnfbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldebba32.dll" Fejilnle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhpidhid.dll" Akdmpccp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppfijp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fekpgdoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chfooojg.dll" Jjgfll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcefmfca.dll" Pbdole32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djbobhld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfcddkkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akocdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lknafggn.dll" Jjcmqmag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dofmhihp.dll" Jcpkea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clpbhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enncjdfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfjmniee.dll" Hiocgkgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnminjqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkofdjgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hclmee32.dll" Ahnjbkhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Genecbok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkijgcdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjfogjfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anifebhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggmmcp32.dll" Omncmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eghhhm32.dll" Qldiej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lincnmgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pahbjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbognoen.dll" Cqnknd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgfoll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkmjpo32.dll" Lghpij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iaegfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcnpmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kaiqpdeg.dll" Cgllfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cqnknd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fipnmhmd.dll" Aelncl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnhiafio.dll" Gieocg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eebeae32.dll" Ppfijp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abphno32.dll" Hljjelde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldlebb32.dll" Ljcooh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlnnlobe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkefihik.dll" Anmiek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nphgikpg.dll" Imnngekh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cghjedkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daageh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbcikhje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Faifld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gofjlg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebgnqj32.dll" Gofqfnih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flhldbli.dll" Chcmdh32.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
WerFault.exepid process 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe 6208 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 6208 WerFault.exe Token: SeBackupPrivilege 6208 WerFault.exe Token: SeDebugPrivilege 6208 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f.exePagoloqe.exeAkdmpccp.exeAelncl32.exeAhmgeg32.exeBfcddkkk.exeBjcipioo.exeChmpld32.exeDobgdmma.exeEpqdek32.exeFfabcd32.exeFigdpo32.exeGilnkngm.exeHignflmo.exeHmefmkce.exeHiocgkgg.exeLghpij32.exeOjqqippj.exeNnminjqg.exeEagllk32.exeHaohpb32.exeLijglhim.exedescription pid process target process PID 852 wrote to memory of 684 852 96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f.exe Pagoloqe.exe PID 852 wrote to memory of 684 852 96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f.exe Pagoloqe.exe PID 852 wrote to memory of 684 852 96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f.exe Pagoloqe.exe PID 684 wrote to memory of 4008 684 Pagoloqe.exe Akdmpccp.exe PID 684 wrote to memory of 4008 684 Pagoloqe.exe Akdmpccp.exe PID 684 wrote to memory of 4008 684 Pagoloqe.exe Akdmpccp.exe PID 4008 wrote to memory of 2240 4008 Akdmpccp.exe Aelncl32.exe PID 4008 wrote to memory of 2240 4008 Akdmpccp.exe Aelncl32.exe PID 4008 wrote to memory of 2240 4008 Akdmpccp.exe Aelncl32.exe PID 2240 wrote to memory of 3752 2240 Aelncl32.exe Ahmgeg32.exe PID 2240 wrote to memory of 3752 2240 Aelncl32.exe Ahmgeg32.exe PID 2240 wrote to memory of 3752 2240 Aelncl32.exe Ahmgeg32.exe PID 3752 wrote to memory of 2952 3752 Ahmgeg32.exe Bfcddkkk.exe PID 3752 wrote to memory of 2952 3752 Ahmgeg32.exe Bfcddkkk.exe PID 3752 wrote to memory of 2952 3752 Ahmgeg32.exe Bfcddkkk.exe PID 2952 wrote to memory of 3260 2952 Bfcddkkk.exe Bjcipioo.exe PID 2952 wrote to memory of 3260 2952 Bfcddkkk.exe Bjcipioo.exe PID 2952 wrote to memory of 3260 2952 Bfcddkkk.exe Bjcipioo.exe PID 3260 wrote to memory of 192 3260 Bjcipioo.exe Chmpld32.exe PID 3260 wrote to memory of 192 3260 Bjcipioo.exe Chmpld32.exe PID 3260 wrote to memory of 192 3260 Bjcipioo.exe Chmpld32.exe PID 192 wrote to memory of 2336 192 Chmpld32.exe Dobgdmma.exe PID 192 wrote to memory of 2336 192 Chmpld32.exe Dobgdmma.exe PID 192 wrote to memory of 2336 192 Chmpld32.exe Dobgdmma.exe PID 2336 wrote to memory of 736 2336 Dobgdmma.exe Epqdek32.exe PID 2336 wrote to memory of 736 2336 Dobgdmma.exe Epqdek32.exe PID 2336 wrote to memory of 736 2336 Dobgdmma.exe Epqdek32.exe PID 736 wrote to memory of 2616 736 Epqdek32.exe Ffabcd32.exe PID 736 wrote to memory of 2616 736 Epqdek32.exe Ffabcd32.exe PID 736 wrote to memory of 2616 736 Epqdek32.exe Ffabcd32.exe PID 2616 wrote to memory of 3620 2616 Ffabcd32.exe Figdpo32.exe PID 2616 wrote to memory of 3620 2616 Ffabcd32.exe Figdpo32.exe PID 2616 wrote to memory of 3620 2616 Ffabcd32.exe Figdpo32.exe PID 3620 wrote to memory of 3020 3620 Figdpo32.exe Gilnkngm.exe PID 3620 wrote to memory of 3020 3620 Figdpo32.exe Gilnkngm.exe PID 3620 wrote to memory of 3020 3620 Figdpo32.exe Gilnkngm.exe PID 3020 wrote to memory of 2080 3020 Gilnkngm.exe Hignflmo.exe PID 3020 wrote to memory of 2080 3020 Gilnkngm.exe Hignflmo.exe PID 3020 wrote to memory of 2080 3020 Gilnkngm.exe Hignflmo.exe PID 2080 wrote to memory of 2288 2080 Hignflmo.exe Hmefmkce.exe PID 2080 wrote to memory of 2288 2080 Hignflmo.exe Hmefmkce.exe PID 2080 wrote to memory of 2288 2080 Hignflmo.exe Hmefmkce.exe PID 2288 wrote to memory of 3052 2288 Hmefmkce.exe Hiocgkgg.exe PID 2288 wrote to memory of 3052 2288 Hmefmkce.exe Hiocgkgg.exe PID 2288 wrote to memory of 3052 2288 Hmefmkce.exe Hiocgkgg.exe PID 3052 wrote to memory of 3944 3052 Hiocgkgg.exe Lghpij32.exe PID 3052 wrote to memory of 3944 3052 Hiocgkgg.exe Lghpij32.exe PID 3052 wrote to memory of 3944 3052 Hiocgkgg.exe Lghpij32.exe PID 3944 wrote to memory of 1248 3944 Lghpij32.exe Ojqqippj.exe PID 3944 wrote to memory of 1248 3944 Lghpij32.exe Ojqqippj.exe PID 3944 wrote to memory of 1248 3944 Lghpij32.exe Ojqqippj.exe PID 1248 wrote to memory of 2776 1248 Ojqqippj.exe Nnminjqg.exe PID 1248 wrote to memory of 2776 1248 Ojqqippj.exe Nnminjqg.exe PID 1248 wrote to memory of 2776 1248 Ojqqippj.exe Nnminjqg.exe PID 2776 wrote to memory of 788 2776 Nnminjqg.exe Eagllk32.exe PID 2776 wrote to memory of 788 2776 Nnminjqg.exe Eagllk32.exe PID 2776 wrote to memory of 788 2776 Nnminjqg.exe Eagllk32.exe PID 788 wrote to memory of 2148 788 Eagllk32.exe Haohpb32.exe PID 788 wrote to memory of 2148 788 Eagllk32.exe Haohpb32.exe PID 788 wrote to memory of 2148 788 Eagllk32.exe Haohpb32.exe PID 2148 wrote to memory of 3548 2148 Haohpb32.exe Lijglhim.exe PID 2148 wrote to memory of 3548 2148 Haohpb32.exe Lijglhim.exe PID 2148 wrote to memory of 3548 2148 Haohpb32.exe Lijglhim.exe PID 3548 wrote to memory of 912 3548 Lijglhim.exe Pqndlmlj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f.exe"C:\Users\Admin\AppData\Local\Temp\96138db76fd5ababbeee7679820f67226dc924cbc02a9d646b8c200ed69a969f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\Pagoloqe.exeC:\Windows\system32\Pagoloqe.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\Akdmpccp.exeC:\Windows\system32\Akdmpccp.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\Aelncl32.exeC:\Windows\system32\Aelncl32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\Ahmgeg32.exeC:\Windows\system32\Ahmgeg32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\Bfcddkkk.exeC:\Windows\system32\Bfcddkkk.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Bjcipioo.exeC:\Windows\system32\Bjcipioo.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\Chmpld32.exeC:\Windows\system32\Chmpld32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:192 -
C:\Windows\SysWOW64\Dobgdmma.exeC:\Windows\system32\Dobgdmma.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\Epqdek32.exeC:\Windows\system32\Epqdek32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\Ffabcd32.exeC:\Windows\system32\Ffabcd32.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Figdpo32.exeC:\Windows\system32\Figdpo32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\Gilnkngm.exeC:\Windows\system32\Gilnkngm.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Hignflmo.exeC:\Windows\system32\Hignflmo.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Hmefmkce.exeC:\Windows\system32\Hmefmkce.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\Hiocgkgg.exeC:\Windows\system32\Hiocgkgg.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\Lghpij32.exeC:\Windows\system32\Lghpij32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\Ojqqippj.exeC:\Windows\system32\Ojqqippj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\Nnminjqg.exeC:\Windows\system32\Nnminjqg.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\Eagllk32.exeC:\Windows\system32\Eagllk32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\Haohpb32.exeC:\Windows\system32\Haohpb32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\Lijglhim.exeC:\Windows\system32\Lijglhim.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\Pqndlmlj.exeC:\Windows\system32\Pqndlmlj.exe23⤵
- Executes dropped EXE
PID:912 -
C:\Windows\SysWOW64\Pcomnhik.exeC:\Windows\system32\Pcomnhik.exe24⤵
- Executes dropped EXE
PID:4084 -
C:\Windows\SysWOW64\Dicndide.exeC:\Windows\system32\Dicndide.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3168 -
C:\Windows\SysWOW64\Ejhpffbm.exeC:\Windows\system32\Ejhpffbm.exe26⤵
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\Fkjifhgm.exeC:\Windows\system32\Fkjifhgm.exe27⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\Hnenepna.exeC:\Windows\system32\Hnenepna.exe28⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Iaegfk32.exeC:\Windows\system32\Iaegfk32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:3688 -
C:\Windows\SysWOW64\Igfedd32.exeC:\Windows\system32\Igfedd32.exe30⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\Mkofdjgj.exeC:\Windows\system32\Mkofdjgj.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:3908 -
C:\Windows\SysWOW64\Deldecdk.exeC:\Windows\system32\Deldecdk.exe32⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\Imnngekh.exeC:\Windows\system32\Imnngekh.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\Kgdkklmk.exeC:\Windows\system32\Kgdkklmk.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:504 -
C:\Windows\SysWOW64\Kejhjp32.exeC:\Windows\system32\Kejhjp32.exe35⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\Okaefa32.exeC:\Windows\system32\Okaefa32.exe36⤵
- Executes dropped EXE
PID:2084 -
C:\Windows\SysWOW64\Ogjbqa32.exeC:\Windows\system32\Ogjbqa32.exe37⤵
- Executes dropped EXE
PID:3860 -
C:\Windows\SysWOW64\Aomcdk32.exeC:\Windows\system32\Aomcdk32.exe38⤵
- Executes dropped EXE
PID:736 -
C:\Windows\SysWOW64\Bkimdk32.exeC:\Windows\system32\Bkimdk32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2616 -
C:\Windows\SysWOW64\Eebckl32.exeC:\Windows\system32\Eebckl32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1000 -
C:\Windows\SysWOW64\Efapeobj.exeC:\Windows\system32\Efapeobj.exe41⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Gicbnhah.exeC:\Windows\system32\Gicbnhah.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3920 -
C:\Windows\SysWOW64\Gieocg32.exeC:\Windows\system32\Gieocg32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:500 -
C:\Windows\SysWOW64\Ghjlddcn.exeC:\Windows\system32\Ghjlddcn.exe44⤵
- Executes dropped EXE
PID:3876 -
C:\Windows\SysWOW64\Gofqfnih.exeC:\Windows\system32\Gofqfnih.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3944 -
C:\Windows\SysWOW64\Iodmhl32.exeC:\Windows\system32\Iodmhl32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\Igegoh32.exeC:\Windows\system32\Igegoh32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:416 -
C:\Windows\SysWOW64\Lincnmgc.exeC:\Windows\system32\Lincnmgc.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:2220 -
C:\Windows\SysWOW64\Lanneipj.exeC:\Windows\system32\Lanneipj.exe49⤵
- Executes dropped EXE
PID:424 -
C:\Windows\SysWOW64\Mjpeemnp.exeC:\Windows\system32\Mjpeemnp.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3936 -
C:\Windows\SysWOW64\Ohihpnjb.exeC:\Windows\system32\Ohihpnjb.exe51⤵
- Executes dropped EXE
PID:3868 -
C:\Windows\SysWOW64\Omfqheii.exeC:\Windows\system32\Omfqheii.exe52⤵
- Executes dropped EXE
PID:184 -
C:\Windows\SysWOW64\Pkjaai32.exeC:\Windows\system32\Pkjaai32.exe53⤵
- Executes dropped EXE
PID:192 -
C:\Windows\SysWOW64\Ppfijp32.exeC:\Windows\system32\Ppfijp32.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2192 -
C:\Windows\SysWOW64\Pioncelk.exeC:\Windows\system32\Pioncelk.exe55⤵
- Executes dropped EXE
PID:3528 -
C:\Windows\SysWOW64\Phpnqmdj.exeC:\Windows\system32\Phpnqmdj.exe56⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\Pahbjb32.exeC:\Windows\system32\Pahbjb32.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:1076 -
C:\Windows\SysWOW64\Pkagbhak.exeC:\Windows\system32\Pkagbhak.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3512 -
C:\Windows\SysWOW64\Pdilkn32.exeC:\Windows\system32\Pdilkn32.exe59⤵
- Executes dropped EXE
PID:3468 -
C:\Windows\SysWOW64\Adpblm32.exeC:\Windows\system32\Adpblm32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\Anifebhd.exeC:\Windows\system32\Anifebhd.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:3956 -
C:\Windows\SysWOW64\Ahnjbkhj.exeC:\Windows\system32\Ahnjbkhj.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:3752 -
C:\Windows\SysWOW64\Aafokqoj.exeC:\Windows\system32\Aafokqoj.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:4092 -
C:\Windows\SysWOW64\Akocdf32.exeC:\Windows\system32\Akocdf32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\Aqlllm32.exeC:\Windows\system32\Aqlllm32.exe65⤵
- Executes dropped EXE
PID:988 -
C:\Windows\SysWOW64\Ajdpebjc.exeC:\Windows\system32\Ajdpebjc.exe66⤵PID:1204
-
C:\Windows\SysWOW64\Aheqbjbb.exeC:\Windows\system32\Aheqbjbb.exe67⤵
- Drops file in System32 directory
PID:3548 -
C:\Windows\SysWOW64\Bbnelp32.exeC:\Windows\system32\Bbnelp32.exe68⤵PID:1976
-
C:\Windows\SysWOW64\Bkfjdeoc.exeC:\Windows\system32\Bkfjdeoc.exe69⤵
- Drops file in System32 directory
PID:4104 -
C:\Windows\SysWOW64\Bgmjifeg.exeC:\Windows\system32\Bgmjifeg.exe70⤵
- Drops file in System32 directory
PID:4120 -
C:\Windows\SysWOW64\Bhlgci32.exeC:\Windows\system32\Bhlgci32.exe71⤵PID:4136
-
C:\Windows\SysWOW64\Bbdklobj.exeC:\Windows\system32\Bbdklobj.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:4152 -
C:\Windows\SysWOW64\Bkmpedik.exeC:\Windows\system32\Bkmpedik.exe73⤵PID:4168
-
C:\Windows\SysWOW64\Bdednj32.exeC:\Windows\system32\Bdednj32.exe74⤵
- Drops file in System32 directory
PID:4184 -
C:\Windows\SysWOW64\Cnnigofl.exeC:\Windows\system32\Cnnigofl.exe75⤵
- Drops file in System32 directory
PID:4200 -
C:\Windows\SysWOW64\Chcmdh32.exeC:\Windows\system32\Chcmdh32.exe76⤵
- Drops file in System32 directory
- Modifies registry class
PID:4216 -
C:\Windows\SysWOW64\Cnpelo32.exeC:\Windows\system32\Cnpelo32.exe77⤵PID:4232
-
C:\Windows\SysWOW64\Cghjedkj.exeC:\Windows\system32\Cghjedkj.exe78⤵
- Modifies registry class
PID:4248 -
C:\Windows\SysWOW64\Cnbbbo32.exeC:\Windows\system32\Cnbbbo32.exe79⤵
- Drops file in System32 directory
PID:4264 -
C:\Windows\SysWOW64\Cgkfkdig.exeC:\Windows\system32\Cgkfkdig.exe80⤵PID:4284
-
C:\Windows\SysWOW64\Dldomaep.exeC:\Windows\system32\Dldomaep.exe81⤵
- Drops file in System32 directory
PID:4300 -
C:\Windows\SysWOW64\Daageh32.exeC:\Windows\system32\Daageh32.exe82⤵
- Drops file in System32 directory
- Modifies registry class
PID:4320 -
C:\Windows\SysWOW64\Fekpgdoa.exeC:\Windows\system32\Fekpgdoa.exe83⤵
- Modifies registry class
PID:4336 -
C:\Windows\SysWOW64\Fncdpjfa.exeC:\Windows\system32\Fncdpjfa.exe84⤵PID:4352
-
C:\Windows\SysWOW64\Fiihmceg.exeC:\Windows\system32\Fiihmceg.exe85⤵PID:4368
-
C:\Windows\SysWOW64\Foeqejco.exeC:\Windows\system32\Foeqejco.exe86⤵PID:4384
-
C:\Windows\SysWOW64\Fhneno32.exeC:\Windows\system32\Fhneno32.exe87⤵PID:4400
-
C:\Windows\SysWOW64\Fbcikhje.exeC:\Windows\system32\Fbcikhje.exe88⤵
- Drops file in System32 directory
- Modifies registry class
PID:4416 -
C:\Windows\SysWOW64\Fllndn32.exeC:\Windows\system32\Fllndn32.exe89⤵PID:4432
-
C:\Windows\SysWOW64\Faifld32.exeC:\Windows\system32\Faifld32.exe90⤵
- Modifies registry class
PID:4448 -
C:\Windows\SysWOW64\Gkakejen.exeC:\Windows\system32\Gkakejen.exe91⤵PID:4464
-
C:\Windows\SysWOW64\Glcdemjn.exeC:\Windows\system32\Glcdemjn.exe92⤵PID:4480
-
C:\Windows\SysWOW64\Gaplmc32.exeC:\Windows\system32\Gaplmc32.exe93⤵PID:4496
-
C:\Windows\SysWOW64\Gkhafioe.exeC:\Windows\system32\Gkhafioe.exe94⤵PID:4512
-
C:\Windows\SysWOW64\Genecbok.exeC:\Windows\system32\Genecbok.exe95⤵
- Modifies registry class
PID:4528 -
C:\Windows\SysWOW64\Gofjlg32.exeC:\Windows\system32\Gofjlg32.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:4544 -
C:\Windows\SysWOW64\Hljjelde.exeC:\Windows\system32\Hljjelde.exe97⤵
- Modifies registry class
PID:4560 -
C:\Windows\SysWOW64\Hagbnbbm.exeC:\Windows\system32\Hagbnbbm.exe98⤵PID:4576
-
C:\Windows\SysWOW64\Hllgkkbc.exeC:\Windows\system32\Hllgkkbc.exe99⤵PID:4592
-
C:\Windows\SysWOW64\Haiocbqj.exeC:\Windows\system32\Haiocbqj.exe100⤵PID:4608
-
C:\Windows\SysWOW64\Hlocqk32.exeC:\Windows\system32\Hlocqk32.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:4624 -
C:\Windows\SysWOW64\Hibdjo32.exeC:\Windows\system32\Hibdjo32.exe102⤵
- Modifies registry class
PID:4640 -
C:\Windows\SysWOW64\Hckhceej.exeC:\Windows\system32\Hckhceej.exe103⤵PID:4656
-
C:\Windows\SysWOW64\Hlcmljlk.exeC:\Windows\system32\Hlcmljlk.exe104⤵
- Drops file in System32 directory
PID:4672 -
C:\Windows\SysWOW64\Hapedajb.exeC:\Windows\system32\Hapedajb.exe105⤵PID:4688
-
C:\Windows\SysWOW64\Ikhjmg32.exeC:\Windows\system32\Ikhjmg32.exe106⤵
- Modifies registry class
PID:4704 -
C:\Windows\SysWOW64\Iiijkn32.exeC:\Windows\system32\Iiijkn32.exe107⤵PID:4720
-
C:\Windows\SysWOW64\Iofbce32.exeC:\Windows\system32\Iofbce32.exe108⤵PID:4736
-
C:\Windows\SysWOW64\Iaihjpbh.exeC:\Windows\system32\Iaihjpbh.exe109⤵
- Drops file in System32 directory
PID:4752 -
C:\Windows\SysWOW64\Ikbmce32.exeC:\Windows\system32\Ikbmce32.exe110⤵
- Drops file in System32 directory
PID:4768 -
C:\Windows\SysWOW64\Jjcmqmag.exeC:\Windows\system32\Jjcmqmag.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:4784 -
C:\Windows\SysWOW64\Jopeid32.exeC:\Windows\system32\Jopeid32.exe112⤵PID:4800
-
C:\Windows\SysWOW64\Jjejfm32.exeC:\Windows\system32\Jjejfm32.exe113⤵
- Drops file in System32 directory
PID:4816 -
C:\Windows\SysWOW64\Jobboc32.exeC:\Windows\system32\Jobboc32.exe114⤵PID:4832
-
C:\Windows\SysWOW64\Jjgfll32.exeC:\Windows\system32\Jjgfll32.exe115⤵
- Drops file in System32 directory
- Modifies registry class
PID:4848 -
C:\Windows\SysWOW64\Jcpkea32.exeC:\Windows\system32\Jcpkea32.exe116⤵
- Modifies registry class
PID:4864 -
C:\Windows\SysWOW64\Jhmcmi32.exeC:\Windows\system32\Jhmcmi32.exe117⤵
- Drops file in System32 directory
PID:4880 -
C:\Windows\SysWOW64\Jcbgja32.exeC:\Windows\system32\Jcbgja32.exe118⤵PID:4896
-
C:\Windows\SysWOW64\Jlklcghp.exeC:\Windows\system32\Jlklcghp.exe119⤵
- Drops file in System32 directory
PID:4912 -
C:\Windows\SysWOW64\Kfcqlmna.exeC:\Windows\system32\Kfcqlmna.exe120⤵PID:4928
-
C:\Windows\SysWOW64\Kkpidcmh.exeC:\Windows\system32\Kkpidcmh.exe121⤵PID:4944
-
C:\Windows\SysWOW64\Kfemalln.exeC:\Windows\system32\Kfemalln.exe122⤵PID:4960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-