Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-05-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe
-
Size
5.7MB
-
MD5
dd0c228c145084ca7fb7c4c9992db0de
-
SHA1
fafb80dc4eb5b861efccfa89267c36a7f20f97cb
-
SHA256
c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b
-
SHA512
40a459b26ef3c4370f5ac5b6f66d16a4168575859aa27415818ec9d92a4dbe15a17a24b975ccb4dc5aad80457bc0211a66a08237cdf92ae673deac6cc10d4592
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
Obfbpdfj.exePoopjdjl.exePboefbnp.exePiljhl32.exeQcflfa32.exeAapbbmhj.exeAenkik32.exeBcpgcnaj.exeEigliaid.exeHlmpcgfk.exeJcjnln32.exeLjkeqe32.exeNcdbph32.exeNcfofhfp.exeOcmefg32.exeOlnpnc32.exeQhpqob32.exeDobqjgie.exeFkkgke32.exeGnjlnnpe.exeHbddpklo.exeKlfefm32.exeLfhleajh.exeLfaokpbm.exeMmbmhicb.exeOfbaikfh.exeQfpmji32.exeAhfpekkb.exeBampooec.exeFbehmibe.exeFdhndd32.exeFifgkbdj.exeHpphnj32.exeJpggff32.exeMfgnah32.exeOfajnebl.exePfcgddpi.exePmnoqo32.exePbjgiefn.exePidpep32.exePbmdoedk.exePmbhlnca.exePboade32.exePcomnhik.exePmgagm32.exeQfofpc32.exeQphkhhmm.exeQfaceb32.exeAcecog32.exeAmnhgl32.exeAfflpbpd.exeApoaig32.exeAigebm32.exeApanogdb.exeAiibgm32.exeApcjdgbo.exeAfmbaa32.exeBpfgjf32.exeBfpofqhi.exeBaecdigo.exeBfbllpfg.exeBmldijmc.exeBbimaakk.exeBicenk32.exepid process 2540 Obfbpdfj.exe 3464 Poopjdjl.exe 3664 Pboefbnp.exe 2232 Piljhl32.exe 2448 Qcflfa32.exe 508 Aapbbmhj.exe 3912 Aenkik32.exe 188 Bcpgcnaj.exe 2316 Eigliaid.exe 3508 Hlmpcgfk.exe 1332 Jcjnln32.exe 2100 Ljkeqe32.exe 2900 Ncdbph32.exe 3832 Ncfofhfp.exe 3956 Ocmefg32.exe 3928 Olnpnc32.exe 3680 Qhpqob32.exe 1924 Dobqjgie.exe 1664 Fkkgke32.exe 1992 Gnjlnnpe.exe 2420 Hbddpklo.exe 2236 Klfefm32.exe 2280 Lfhleajh.exe 1248 Lfaokpbm.exe 1204 Mmbmhicb.exe 744 Ofbaikfh.exe 1564 Qfpmji32.exe 3696 Ahfpekkb.exe 3452 Bampooec.exe 416 Fbehmibe.exe 4104 Fdhndd32.exe 4132 Fifgkbdj.exe 4164 Hpphnj32.exe 4188 Jpggff32.exe 4208 Mfgnah32.exe 4228 Ofajnebl.exe 4248 Pfcgddpi.exe 4268 Pmnoqo32.exe 4288 Pbjgiefn.exe 4308 Pidpep32.exe 4328 Pbmdoedk.exe 4348 Pmbhlnca.exe 4368 Pboade32.exe 4388 Pcomnhik.exe 4408 Pmgagm32.exe 4428 Qfofpc32.exe 4448 Qphkhhmm.exe 4500 Qfaceb32.exe 4520 Acecog32.exe 4540 Amnhgl32.exe 4560 Afflpbpd.exe 4580 Apoaig32.exe 4600 Aigebm32.exe 4620 Apanogdb.exe 4640 Aiibgm32.exe 4660 Apcjdgbo.exe 4680 Afmbaa32.exe 4700 Bpfgjf32.exe 4720 Bfpofqhi.exe 4740 Baecdigo.exe 4760 Bfbllpfg.exe 4780 Bmldijmc.exe 4800 Bbimaakk.exe 4820 Bicenk32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ndqncn32.exeCljmfo32.exeLfiqcfcp.exeDncbcb32.exeIcebcj32.exeMfgnah32.exeFqiodo32.exeOcbghc32.exeBeplbgmk.exeEggpjdap.exeJeeooqng.exeEheibgfe.exeLfaokpbm.exePbmdoedk.exeApoaig32.exeKebeeege.exeIfhhkdlj.exeMjpeemnp.exeEaphhc32.exeIeflbi32.exeHpphnj32.exeMckhpf32.exeNaiggaqd.exeEmjbfp32.exeFgemlbep.exeHoimlmge.exeAhfpekkb.exeGkfibg32.exeMljicmbb.exeOcidadgg.exeOlfbeijb.exeHdlbaddd.exeJgmdjmcc.exeMeagam32.exeHhhheb32.exeBalidhag.exeKoccmldn.exeKmqccckb.exeMdiqhi32.exeNcfofhfp.exeDmojeh32.exeInldeo32.exeKblbhk32.exeOmfqheii.exeFifgkbdj.exeHgmbne32.exeLheklp32.exeOkfoapod.exeBfldld32.exeCpgoagip.exeBbnflq32.exeIgcbdnkn.exeNebphjgd.exePadpijbk.exePokmhn32.exeJiknbo32.exePbjgiefn.exePidpep32.exeBoblojkh.exePoopjdjl.exeQfofpc32.exeQfaceb32.exedescription ioc process File created C:\Windows\SysWOW64\Nkkfphmm.exe Ndqncn32.exe File created C:\Windows\SysWOW64\Cbdebinb.exe Cljmfo32.exe File created C:\Windows\SysWOW64\Gohkln32.dll Lfiqcfcp.exe File created C:\Windows\SysWOW64\Demjpmom.exe Dncbcb32.exe File created C:\Windows\SysWOW64\Iqibmn32.exe Icebcj32.exe File opened for modification C:\Windows\SysWOW64\Ofajnebl.exe Mfgnah32.exe File created C:\Windows\SysWOW64\Ihnpmh32.dll Fqiodo32.exe File opened for modification C:\Windows\SysWOW64\Pdccpk32.exe Ocbghc32.exe File created C:\Windows\SysWOW64\Bpepopma.exe Beplbgmk.exe File opened for modification C:\Windows\SysWOW64\Emahgo32.exe Eggpjdap.exe File created C:\Windows\SysWOW64\Kncnpcdi.dll Jeeooqng.exe File created C:\Windows\SysWOW64\Ebkmppfk.exe Eheibgfe.exe File created C:\Windows\SysWOW64\Mmbmhicb.exe Lfaokpbm.exe File created C:\Windows\SysWOW64\Aqdmoe32.dll Pbmdoedk.exe File created C:\Windows\SysWOW64\Cmaeicim.dll Apoaig32.exe File created C:\Windows\SysWOW64\Kllmao32.exe Kebeeege.exe File opened for modification C:\Windows\SysWOW64\Joplcj32.exe Ifhhkdlj.exe File opened for modification C:\Windows\SysWOW64\Mpmnmdlh.exe Mjpeemnp.exe File created C:\Windows\SysWOW64\Mldeqcki.dll Eaphhc32.exe File created C:\Windows\SysWOW64\Mjjlhlhc.dll Ieflbi32.exe File created C:\Windows\SysWOW64\Bcdqbjmg.dll Mjpeemnp.exe File opened for modification C:\Windows\SysWOW64\Jpggff32.exe Hpphnj32.exe File created C:\Windows\SysWOW64\Dnpfjo32.dll Mckhpf32.exe File created C:\Windows\SysWOW64\Ololejpj.exe Naiggaqd.exe File created C:\Windows\SysWOW64\Eddkcj32.exe Emjbfp32.exe File created C:\Windows\SysWOW64\Pncnhjkf.dll Fgemlbep.exe File created C:\Windows\SysWOW64\Onejjlml.dll Hoimlmge.exe File created C:\Windows\SysWOW64\Ogbffpke.dll Ahfpekkb.exe File opened for modification C:\Windows\SysWOW64\Gbpaoaem.exe Gkfibg32.exe File opened for modification C:\Windows\SysWOW64\Mbdapg32.exe Mljicmbb.exe File created C:\Windows\SysWOW64\Odjqim32.exe Ocidadgg.exe File created C:\Windows\SysWOW64\Obcjnphj.exe Olfbeijb.exe File created C:\Windows\SysWOW64\Hfmoiljc.exe Hdlbaddd.exe File created C:\Windows\SysWOW64\Jngmgg32.exe Jgmdjmcc.exe File created C:\Windows\SysWOW64\Mfccieke.exe Meagam32.exe File created C:\Windows\SysWOW64\Epakai32.dll Hhhheb32.exe File created C:\Windows\SysWOW64\Bbnflq32.exe Balidhag.exe File created C:\Windows\SysWOW64\Kemkjf32.exe Koccmldn.exe File opened for modification C:\Windows\SysWOW64\Kgfgplkh.exe Kmqccckb.exe File opened for modification C:\Windows\SysWOW64\Mkcidcpi.exe Mdiqhi32.exe File opened for modification C:\Windows\SysWOW64\Ocmefg32.exe Ncfofhfp.exe File created C:\Windows\SysWOW64\Mdlbdqbi.dll Dmojeh32.exe File created C:\Windows\SysWOW64\Mfcapd32.dll Inldeo32.exe File created C:\Windows\SysWOW64\Cbdgmjeq.dll Kblbhk32.exe File created C:\Windows\SysWOW64\Phkeen32.exe Omfqheii.exe File opened for modification C:\Windows\SysWOW64\Hpphnj32.exe Fifgkbdj.exe File opened for modification C:\Windows\SysWOW64\Hngkjpln.exe Hgmbne32.exe File created C:\Windows\SysWOW64\Beaqch32.dll Lheklp32.exe File created C:\Windows\SysWOW64\Oekcnioj.exe Okfoapod.exe File opened for modification C:\Windows\SysWOW64\Bkimdk32.exe Bfldld32.exe File created C:\Windows\SysWOW64\Dedgjngg.exe Cpgoagip.exe File created C:\Windows\SysWOW64\Kdhipi32.dll Bbnflq32.exe File created C:\Windows\SysWOW64\Edqobd32.dll Igcbdnkn.exe File created C:\Windows\SysWOW64\Ibbljmnb.dll Nebphjgd.exe File opened for modification C:\Windows\SysWOW64\Phnhec32.exe Padpijbk.exe File opened for modification C:\Windows\SysWOW64\Pdgfpd32.exe Pokmhn32.exe File created C:\Windows\SysWOW64\Jcdclb32.dll Jiknbo32.exe File created C:\Windows\SysWOW64\Gnnpdc32.dll Pbjgiefn.exe File opened for modification C:\Windows\SysWOW64\Pbmdoedk.exe Pidpep32.exe File created C:\Windows\SysWOW64\Iqhbbfkl.dll Boblojkh.exe File created C:\Windows\SysWOW64\Hcnlck32.exe Hhhheb32.exe File created C:\Windows\SysWOW64\Bldeio32.dll Poopjdjl.exe File created C:\Windows\SysWOW64\Gdpghk32.dll Qfofpc32.exe File created C:\Windows\SysWOW64\Acecog32.exe Qfaceb32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4180 2376 WerFault.exe Qgjdmiem.exe -
Modifies registry class 64 IoCs
Processes:
Hjdiibjm.exeBchbqn32.exeLoceic32.exeQfnhkfod.exePmnoqo32.exePidpep32.exeEkafpjph.exeGkcllgob.exeJmdmmn32.exeNkookg32.exePopnmcoi.exeCekknfcn.exeDbpengcd.exeJpggff32.exeOfajnebl.exeKehbofop.exeKllmao32.exeLgcmgc32.exeEbkmppfk.exeFhjbmf32.exeFbogko32.exeGlhdjbjd.exeQmigbgjm.exeLehdkn32.exeLmcippkm.exePomjmm32.exeMckhpf32.exeBllqdabe.exeDeigoc32.exeHoimlmge.exeHcnlck32.exeQphkhhmm.exeBfbllpfg.exeJeoohhgk.exeNdqncn32.exeDdhkgkqo.exeMdiqhi32.exePdeike32.exeCimfdm32.exeFdhndd32.exeCkighmdb.exeJligeboh.exeBeplbgmk.exeEpjdndij.exeHeceig32.exePnmgidba.exec921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exeEggpjdap.exeHfhfnm32.exePdgfpd32.exePohqbn32.exeAfcbfe32.exeLoapnj32.exeOlfbeijb.exeDaooaf32.exeFcenkk32.exeLnloidhh.exeMmjhfi32.exeCijknjmp.exeAiphgh32.exeKgfgplkh.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjdiibjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bchbqn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Loceic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gllkmd32.dll" Qfnhkfod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aicnjiqc.dll" Pmnoqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbjaeohf.dll" Pidpep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ennpnfbq.dll" Ekafpjph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkcllgob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elheoojp.dll" Jmdmmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkookg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npjpbo32.dll" Popnmcoi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cekknfcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbpengcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipjqkl32.dll" Jpggff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofajnebl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kehbofop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kllmao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgcmgc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebkmppfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kfkmmnnf.dll" Fhjbmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pklehl32.dll" Fbogko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Glhdjbjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfcdnkoi.dll" Qmigbgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lehdkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmcippkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aloemo32.dll" Pomjmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnpfjo32.dll" Mckhpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iolekdel.dll" Bllqdabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deigoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hoimlmge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obnolp32.dll" Hcnlck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qphkhhmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfbllpfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jeoohhgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndqncn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjifof32.dll" Ddhkgkqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpkgmiaa.dll" Mdiqhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdeike32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cimfdm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdhndd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckighmdb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jligeboh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmidin32.dll" Beplbgmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlinjdaf.dll" Epjdndij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Epjdndij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Heceig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnmgidba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajdcgp32.dll" Eggpjdap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilqlie32.dll" Hfhfnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdgfpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elhbhmkk.dll" Pohqbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afcbfe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Loapnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpofkl32.dll" Nkookg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olfbeijb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daooaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfcecd32.dll" Fcenkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnloidhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmjhfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cijknjmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aiphgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnkfpe32.dll" Kgfgplkh.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
WerFault.exepid process 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4180 WerFault.exe Token: SeBackupPrivilege 4180 WerFault.exe Token: SeDebugPrivilege 4180 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exeObfbpdfj.exePoopjdjl.exePboefbnp.exePiljhl32.exeQcflfa32.exeAapbbmhj.exeAenkik32.exeBcpgcnaj.exeEigliaid.exeHlmpcgfk.exeJcjnln32.exeLjkeqe32.exeNcdbph32.exeNcfofhfp.exeOcmefg32.exeOlnpnc32.exeQhpqob32.exeDobqjgie.exeFkkgke32.exeGnjlnnpe.exeHbddpklo.exedescription pid process target process PID 644 wrote to memory of 2540 644 c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe Obfbpdfj.exe PID 644 wrote to memory of 2540 644 c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe Obfbpdfj.exe PID 644 wrote to memory of 2540 644 c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe Obfbpdfj.exe PID 2540 wrote to memory of 3464 2540 Obfbpdfj.exe Poopjdjl.exe PID 2540 wrote to memory of 3464 2540 Obfbpdfj.exe Poopjdjl.exe PID 2540 wrote to memory of 3464 2540 Obfbpdfj.exe Poopjdjl.exe PID 3464 wrote to memory of 3664 3464 Poopjdjl.exe Pboefbnp.exe PID 3464 wrote to memory of 3664 3464 Poopjdjl.exe Pboefbnp.exe PID 3464 wrote to memory of 3664 3464 Poopjdjl.exe Pboefbnp.exe PID 3664 wrote to memory of 2232 3664 Pboefbnp.exe Piljhl32.exe PID 3664 wrote to memory of 2232 3664 Pboefbnp.exe Piljhl32.exe PID 3664 wrote to memory of 2232 3664 Pboefbnp.exe Piljhl32.exe PID 2232 wrote to memory of 2448 2232 Piljhl32.exe Qcflfa32.exe PID 2232 wrote to memory of 2448 2232 Piljhl32.exe Qcflfa32.exe PID 2232 wrote to memory of 2448 2232 Piljhl32.exe Qcflfa32.exe PID 2448 wrote to memory of 508 2448 Qcflfa32.exe Aapbbmhj.exe PID 2448 wrote to memory of 508 2448 Qcflfa32.exe Aapbbmhj.exe PID 2448 wrote to memory of 508 2448 Qcflfa32.exe Aapbbmhj.exe PID 508 wrote to memory of 3912 508 Aapbbmhj.exe Aenkik32.exe PID 508 wrote to memory of 3912 508 Aapbbmhj.exe Aenkik32.exe PID 508 wrote to memory of 3912 508 Aapbbmhj.exe Aenkik32.exe PID 3912 wrote to memory of 188 3912 Aenkik32.exe Bcpgcnaj.exe PID 3912 wrote to memory of 188 3912 Aenkik32.exe Bcpgcnaj.exe PID 3912 wrote to memory of 188 3912 Aenkik32.exe Bcpgcnaj.exe PID 188 wrote to memory of 2316 188 Bcpgcnaj.exe Eigliaid.exe PID 188 wrote to memory of 2316 188 Bcpgcnaj.exe Eigliaid.exe PID 188 wrote to memory of 2316 188 Bcpgcnaj.exe Eigliaid.exe PID 2316 wrote to memory of 3508 2316 Eigliaid.exe Hlmpcgfk.exe PID 2316 wrote to memory of 3508 2316 Eigliaid.exe Hlmpcgfk.exe PID 2316 wrote to memory of 3508 2316 Eigliaid.exe Hlmpcgfk.exe PID 3508 wrote to memory of 1332 3508 Hlmpcgfk.exe Jcjnln32.exe PID 3508 wrote to memory of 1332 3508 Hlmpcgfk.exe Jcjnln32.exe PID 3508 wrote to memory of 1332 3508 Hlmpcgfk.exe Jcjnln32.exe PID 1332 wrote to memory of 2100 1332 Jcjnln32.exe Ljkeqe32.exe PID 1332 wrote to memory of 2100 1332 Jcjnln32.exe Ljkeqe32.exe PID 1332 wrote to memory of 2100 1332 Jcjnln32.exe Ljkeqe32.exe PID 2100 wrote to memory of 2900 2100 Ljkeqe32.exe Ncdbph32.exe PID 2100 wrote to memory of 2900 2100 Ljkeqe32.exe Ncdbph32.exe PID 2100 wrote to memory of 2900 2100 Ljkeqe32.exe Ncdbph32.exe PID 2900 wrote to memory of 3832 2900 Ncdbph32.exe Ncfofhfp.exe PID 2900 wrote to memory of 3832 2900 Ncdbph32.exe Ncfofhfp.exe PID 2900 wrote to memory of 3832 2900 Ncdbph32.exe Ncfofhfp.exe PID 3832 wrote to memory of 3956 3832 Ncfofhfp.exe Ocmefg32.exe PID 3832 wrote to memory of 3956 3832 Ncfofhfp.exe Ocmefg32.exe PID 3832 wrote to memory of 3956 3832 Ncfofhfp.exe Ocmefg32.exe PID 3956 wrote to memory of 3928 3956 Ocmefg32.exe Olnpnc32.exe PID 3956 wrote to memory of 3928 3956 Ocmefg32.exe Olnpnc32.exe PID 3956 wrote to memory of 3928 3956 Ocmefg32.exe Olnpnc32.exe PID 3928 wrote to memory of 3680 3928 Olnpnc32.exe Qhpqob32.exe PID 3928 wrote to memory of 3680 3928 Olnpnc32.exe Qhpqob32.exe PID 3928 wrote to memory of 3680 3928 Olnpnc32.exe Qhpqob32.exe PID 3680 wrote to memory of 1924 3680 Qhpqob32.exe Dobqjgie.exe PID 3680 wrote to memory of 1924 3680 Qhpqob32.exe Dobqjgie.exe PID 3680 wrote to memory of 1924 3680 Qhpqob32.exe Dobqjgie.exe PID 1924 wrote to memory of 1664 1924 Dobqjgie.exe Fkkgke32.exe PID 1924 wrote to memory of 1664 1924 Dobqjgie.exe Fkkgke32.exe PID 1924 wrote to memory of 1664 1924 Dobqjgie.exe Fkkgke32.exe PID 1664 wrote to memory of 1992 1664 Fkkgke32.exe Gnjlnnpe.exe PID 1664 wrote to memory of 1992 1664 Fkkgke32.exe Gnjlnnpe.exe PID 1664 wrote to memory of 1992 1664 Fkkgke32.exe Gnjlnnpe.exe PID 1992 wrote to memory of 2420 1992 Gnjlnnpe.exe Hbddpklo.exe PID 1992 wrote to memory of 2420 1992 Gnjlnnpe.exe Hbddpklo.exe PID 1992 wrote to memory of 2420 1992 Gnjlnnpe.exe Hbddpklo.exe PID 2420 wrote to memory of 2236 2420 Hbddpklo.exe Klfefm32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe"C:\Users\Admin\AppData\Local\Temp\c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\Obfbpdfj.exeC:\Windows\system32\Obfbpdfj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Poopjdjl.exeC:\Windows\system32\Poopjdjl.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\Pboefbnp.exeC:\Windows\system32\Pboefbnp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\Piljhl32.exeC:\Windows\system32\Piljhl32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Qcflfa32.exeC:\Windows\system32\Qcflfa32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Aapbbmhj.exeC:\Windows\system32\Aapbbmhj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\Aenkik32.exeC:\Windows\system32\Aenkik32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\Bcpgcnaj.exeC:\Windows\system32\Bcpgcnaj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Windows\SysWOW64\Eigliaid.exeC:\Windows\system32\Eigliaid.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\Hlmpcgfk.exeC:\Windows\system32\Hlmpcgfk.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\Jcjnln32.exeC:\Windows\system32\Jcjnln32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\Ljkeqe32.exeC:\Windows\system32\Ljkeqe32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\Ncdbph32.exeC:\Windows\system32\Ncdbph32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Ncfofhfp.exeC:\Windows\system32\Ncfofhfp.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\Ocmefg32.exeC:\Windows\system32\Ocmefg32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\Olnpnc32.exeC:\Windows\system32\Olnpnc32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\Qhpqob32.exeC:\Windows\system32\Qhpqob32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\Dobqjgie.exeC:\Windows\system32\Dobqjgie.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Fkkgke32.exeC:\Windows\system32\Fkkgke32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Gnjlnnpe.exeC:\Windows\system32\Gnjlnnpe.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\Hbddpklo.exeC:\Windows\system32\Hbddpklo.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\Klfefm32.exeC:\Windows\system32\Klfefm32.exe23⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\Lfhleajh.exeC:\Windows\system32\Lfhleajh.exe24⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\Lfaokpbm.exeC:\Windows\system32\Lfaokpbm.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1248 -
C:\Windows\SysWOW64\Mmbmhicb.exeC:\Windows\system32\Mmbmhicb.exe26⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\SysWOW64\Ofbaikfh.exeC:\Windows\system32\Ofbaikfh.exe27⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\Qfpmji32.exeC:\Windows\system32\Qfpmji32.exe28⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\Ahfpekkb.exeC:\Windows\system32\Ahfpekkb.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3696 -
C:\Windows\SysWOW64\Bampooec.exeC:\Windows\system32\Bampooec.exe30⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\SysWOW64\Fbehmibe.exeC:\Windows\system32\Fbehmibe.exe31⤵
- Executes dropped EXE
PID:416 -
C:\Windows\SysWOW64\Fdhndd32.exeC:\Windows\system32\Fdhndd32.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:4104 -
C:\Windows\SysWOW64\Fifgkbdj.exeC:\Windows\system32\Fifgkbdj.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4132 -
C:\Windows\SysWOW64\Hpphnj32.exeC:\Windows\system32\Hpphnj32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4164 -
C:\Windows\SysWOW64\Jpggff32.exeC:\Windows\system32\Jpggff32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:4188 -
C:\Windows\SysWOW64\Mfgnah32.exeC:\Windows\system32\Mfgnah32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4208 -
C:\Windows\SysWOW64\Ofajnebl.exeC:\Windows\system32\Ofajnebl.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:4228 -
C:\Windows\SysWOW64\Pfcgddpi.exeC:\Windows\system32\Pfcgddpi.exe38⤵
- Executes dropped EXE
PID:4248 -
C:\Windows\SysWOW64\Pmnoqo32.exeC:\Windows\system32\Pmnoqo32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:4268 -
C:\Windows\SysWOW64\Pbjgiefn.exeC:\Windows\system32\Pbjgiefn.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4288 -
C:\Windows\SysWOW64\Pidpep32.exeC:\Windows\system32\Pidpep32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4308 -
C:\Windows\SysWOW64\Pbmdoedk.exeC:\Windows\system32\Pbmdoedk.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4328 -
C:\Windows\SysWOW64\Pmbhlnca.exeC:\Windows\system32\Pmbhlnca.exe43⤵
- Executes dropped EXE
PID:4348 -
C:\Windows\SysWOW64\Pboade32.exeC:\Windows\system32\Pboade32.exe44⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\Pcomnhik.exeC:\Windows\system32\Pcomnhik.exe45⤵
- Executes dropped EXE
PID:4388 -
C:\Windows\SysWOW64\Pmgagm32.exeC:\Windows\system32\Pmgagm32.exe46⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\Qfofpc32.exeC:\Windows\system32\Qfofpc32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4428 -
C:\Windows\SysWOW64\Qphkhhmm.exeC:\Windows\system32\Qphkhhmm.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:4448 -
C:\Windows\SysWOW64\Qfaceb32.exeC:\Windows\system32\Qfaceb32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4500 -
C:\Windows\SysWOW64\Acecog32.exeC:\Windows\system32\Acecog32.exe50⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\SysWOW64\Amnhgl32.exeC:\Windows\system32\Amnhgl32.exe51⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\Afflpbpd.exeC:\Windows\system32\Afflpbpd.exe52⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\Apoaig32.exeC:\Windows\system32\Apoaig32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4580 -
C:\Windows\SysWOW64\Aigebm32.exeC:\Windows\system32\Aigebm32.exe54⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\Apanogdb.exeC:\Windows\system32\Apanogdb.exe55⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\Aiibgm32.exeC:\Windows\system32\Aiibgm32.exe56⤵
- Executes dropped EXE
PID:4640 -
C:\Windows\SysWOW64\Apcjdgbo.exeC:\Windows\system32\Apcjdgbo.exe57⤵
- Executes dropped EXE
PID:4660 -
C:\Windows\SysWOW64\Afmbaa32.exeC:\Windows\system32\Afmbaa32.exe58⤵
- Executes dropped EXE
PID:4680 -
C:\Windows\SysWOW64\Bpfgjf32.exeC:\Windows\system32\Bpfgjf32.exe59⤵
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\Bfpofqhi.exeC:\Windows\system32\Bfpofqhi.exe60⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\SysWOW64\Baecdigo.exeC:\Windows\system32\Baecdigo.exe61⤵
- Executes dropped EXE
PID:4740 -
C:\Windows\SysWOW64\Bfbllpfg.exeC:\Windows\system32\Bfbllpfg.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:4760 -
C:\Windows\SysWOW64\Bmldijmc.exeC:\Windows\system32\Bmldijmc.exe63⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\Bbimaakk.exeC:\Windows\system32\Bbimaakk.exe64⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\Bicenk32.exeC:\Windows\system32\Bicenk32.exe65⤵
- Executes dropped EXE
PID:4820 -
C:\Windows\SysWOW64\Bpmmjejd.exeC:\Windows\system32\Bpmmjejd.exe66⤵PID:4840
-
C:\Windows\SysWOW64\Bfgegp32.exeC:\Windows\system32\Bfgegp32.exe67⤵PID:4856
-
C:\Windows\SysWOW64\Balidhag.exeC:\Windows\system32\Balidhag.exe68⤵
- Drops file in System32 directory
PID:4872 -
C:\Windows\SysWOW64\Bbnflq32.exeC:\Windows\system32\Bbnflq32.exe69⤵
- Drops file in System32 directory
PID:4888 -
C:\Windows\SysWOW64\Cmcjii32.exeC:\Windows\system32\Cmcjii32.exe70⤵PID:4904
-
C:\Windows\SysWOW64\Cbpbap32.exeC:\Windows\system32\Cbpbap32.exe71⤵PID:4920
-
C:\Windows\SysWOW64\Cijknjmp.exeC:\Windows\system32\Cijknjmp.exe72⤵
- Modifies registry class
PID:4936 -
C:\Windows\SysWOW64\Cdoolc32.exeC:\Windows\system32\Cdoolc32.exe73⤵PID:4952
-
C:\Windows\SysWOW64\Ckighmdb.exeC:\Windows\system32\Ckighmdb.exe74⤵
- Modifies registry class
PID:4968 -
C:\Windows\SysWOW64\Cpfpqdbj.exeC:\Windows\system32\Cpfpqdbj.exe75⤵PID:4984
-
C:\Windows\SysWOW64\Cgphmn32.exeC:\Windows\system32\Cgphmn32.exe76⤵PID:5000
-
C:\Windows\SysWOW64\Cahipggj.exeC:\Windows\system32\Cahipggj.exe77⤵PID:5016
-
C:\Windows\SysWOW64\Ccieho32.exeC:\Windows\system32\Ccieho32.exe78⤵PID:5032
-
C:\Windows\SysWOW64\Dmojeh32.exeC:\Windows\system32\Dmojeh32.exe79⤵
- Drops file in System32 directory
PID:5048 -
C:\Windows\SysWOW64\Ddibbbdk.exeC:\Windows\system32\Ddibbbdk.exe80⤵PID:5064
-
C:\Windows\SysWOW64\Dkcjollh.exeC:\Windows\system32\Dkcjollh.exe81⤵PID:5080
-
C:\Windows\SysWOW64\Dppbgcjo.exeC:\Windows\system32\Dppbgcjo.exe82⤵PID:5096
-
C:\Windows\SysWOW64\Dgikcm32.exeC:\Windows\system32\Dgikcm32.exe83⤵PID:5112
-
C:\Windows\SysWOW64\Daooaf32.exeC:\Windows\system32\Daooaf32.exe84⤵
- Modifies registry class
PID:2264 -
C:\Windows\SysWOW64\Dcplhngp.exeC:\Windows\system32\Dcplhngp.exe85⤵PID:4172
-
C:\Windows\SysWOW64\Dpdlbb32.exeC:\Windows\system32\Dpdlbb32.exe86⤵PID:1128
-
C:\Windows\SysWOW64\Dgndolmg.exeC:\Windows\system32\Dgndolmg.exe87⤵PID:1212
-
C:\Windows\SysWOW64\Dadhlemm.exeC:\Windows\system32\Dadhlemm.exe88⤵PID:4184
-
C:\Windows\SysWOW64\Egqadlkd.exeC:\Windows\system32\Egqadlkd.exe89⤵PID:1796
-
C:\Windows\SysWOW64\Enjiafca.exeC:\Windows\system32\Enjiafca.exe90⤵PID:4216
-
C:\Windows\SysWOW64\Eddanp32.exeC:\Windows\system32\Eddanp32.exe91⤵PID:4048
-
C:\Windows\SysWOW64\Ejajfg32.exeC:\Windows\system32\Ejajfg32.exe92⤵PID:4144
-
C:\Windows\SysWOW64\Epkbbapb.exeC:\Windows\system32\Epkbbapb.exe93⤵PID:1792
-
C:\Windows\SysWOW64\Ekafpjph.exeC:\Windows\system32\Ekafpjph.exe94⤵
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Eakomdgd.exeC:\Windows\system32\Eakomdgd.exe95⤵PID:3768
-
C:\Windows\SysWOW64\Eclkdl32.exeC:\Windows\system32\Eclkdl32.exe96⤵PID:4256
-
C:\Windows\SysWOW64\Ejfcafdp.exeC:\Windows\system32\Ejfcafdp.exe97⤵PID:4336
-
C:\Windows\SysWOW64\Ekepki32.exeC:\Windows\system32\Ekepki32.exe98⤵PID:3548
-
C:\Windows\SysWOW64\Eaphhc32.exeC:\Windows\system32\Eaphhc32.exe99⤵
- Drops file in System32 directory
PID:3996 -
C:\Windows\SysWOW64\Fcqdplin.exeC:\Windows\system32\Fcqdplin.exe100⤵PID:3480
-
C:\Windows\SysWOW64\Fjkmlf32.exeC:\Windows\system32\Fjkmlf32.exe101⤵PID:4456
-
C:\Windows\SysWOW64\Fdpaio32.exeC:\Windows\system32\Fdpaio32.exe102⤵PID:3760
-
C:\Windows\SysWOW64\Fkjifhgm.exeC:\Windows\system32\Fkjifhgm.exe103⤵PID:412
-
C:\Windows\SysWOW64\Fcenkk32.exeC:\Windows\system32\Fcenkk32.exe104⤵
- Modifies registry class
PID:4568 -
C:\Windows\SysWOW64\Fjofgele.exeC:\Windows\system32\Fjofgele.exe105⤵PID:4648
-
C:\Windows\SysWOW64\Fqiodo32.exeC:\Windows\system32\Fqiodo32.exe106⤵
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\Fgcgqiko.exeC:\Windows\system32\Fgcgqiko.exe107⤵PID:3020
-
C:\Windows\SysWOW64\Faiknbkd.exeC:\Windows\system32\Faiknbkd.exe108⤵PID:4748
-
C:\Windows\SysWOW64\Gkcllgob.exeC:\Windows\system32\Gkcllgob.exe109⤵
- Modifies registry class
PID:4828 -
C:\Windows\SysWOW64\Gqpddnnj.exeC:\Windows\system32\Gqpddnnj.exe110⤵PID:508
-
C:\Windows\SysWOW64\Gkfibg32.exeC:\Windows\system32\Gkfibg32.exe111⤵
- Drops file in System32 directory
PID:4492 -
C:\Windows\SysWOW64\Gbpaoaem.exeC:\Windows\system32\Gbpaoaem.exe112⤵PID:4488
-
C:\Windows\SysWOW64\Gcanfi32.exeC:\Windows\system32\Gcanfi32.exe113⤵PID:4100
-
C:\Windows\SysWOW64\Gngbcb32.exeC:\Windows\system32\Gngbcb32.exe114⤵PID:3540
-
C:\Windows\SysWOW64\Gdqjplbn.exeC:\Windows\system32\Gdqjplbn.exe115⤵PID:2864
-
C:\Windows\SysWOW64\Gbdjjp32.exeC:\Windows\system32\Gbdjjp32.exe116⤵PID:5136
-
C:\Windows\SysWOW64\Gcfgahfe.exeC:\Windows\system32\Gcfgahfe.exe117⤵PID:5152
-
C:\Windows\SysWOW64\Gjponb32.exeC:\Windows\system32\Gjponb32.exe118⤵PID:5168
-
C:\Windows\SysWOW64\Hqjgkmeo.exeC:\Windows\system32\Hqjgkmeo.exe119⤵PID:5184
-
C:\Windows\SysWOW64\Hkolhe32.exeC:\Windows\system32\Hkolhe32.exe120⤵PID:5200
-
C:\Windows\SysWOW64\Hbidepmb.exeC:\Windows\system32\Hbidepmb.exe121⤵PID:5216
-
C:\Windows\SysWOW64\Hcjqmh32.exeC:\Windows\system32\Hcjqmh32.exe122⤵PID:5232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-