Resubmissions
23-05-2024 18:27
240523-w3rwpabg71 10Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 05:56
Behavioral task
behavioral1
Sample
09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe
Resource
win10v2004-20240508-en
General
-
Target
09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe
-
Size
337KB
-
MD5
a305932576371ff8a142a9ea4f25edf0
-
SHA1
db746a739992bfd2bbff4265b2c5c804c46bf178
-
SHA256
09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772
-
SHA512
a56fe078442e3d7dcdfc4199172ebb04a5c619183efb3fb87b3103c99cc019566812e615e69a970784f7e3f1d4688a2a37c59fedaf6a77a7a25ff00f63326529
-
SSDEEP
3072:/6ff1Df5LXDbdPXgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:/Gf5LzxX1+fIyG5jZkCwi8r
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Nelfeo32.exeKnnhjcog.exeDmplkd32.exeDbqqkkbo.exeJjjpnlbd.exeNjmqnobn.exeNkbfpeec.exeKcbnnpka.exePdfehh32.exeNnfpinmi.exeNdpjnq32.exeCcgjopal.exeHpqldc32.exeMhkgnkoj.exeIhmnldib.exeDmdhcddh.exeMcpcdg32.exeGddqejni.exeFfobhg32.exeOacoqnci.exeLlpchaqg.exeMdmngm32.exeNpadcfnl.exeHigjaoci.exeOgjdmbil.exePhcgcqab.exeMociol32.exePbljoafi.exeGblbca32.exeNlefjnno.exeJgbhdkml.exeDdgplado.exeLjmmcbdp.exeMdddhlbl.exeEemgkpef.exeGgicbe32.exePhfjcf32.exeDdjmba32.exe09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exeNcihikcg.exeMoefdljc.exeJopiom32.exeOchamg32.exeCidgdg32.exeIqfcbahb.exePmlmkn32.exeCnindhpg.exeQejfkmem.exe09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exeKckqbj32.exeNgjkfd32.exeJapmcfcc.exeMmpbkm32.exeKkgiimng.exeAddaif32.exeJpaekqhh.exeKaflio32.exeBcahmb32.exeBohbhmfm.exeEoideh32.exeKkpnga32.exeMadbagif.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nelfeo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knnhjcog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmplkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbqqkkbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjjpnlbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njmqnobn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkbfpeec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcbnnpka.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdfehh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnfpinmi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndpjnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccgjopal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpqldc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhkgnkoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihmnldib.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmdhcddh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcpcdg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gddqejni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffobhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oacoqnci.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llpchaqg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdmngm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npadcfnl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Higjaoci.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogjdmbil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phcgcqab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mociol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbljoafi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gblbca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlefjnno.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgbhdkml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddgplado.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljmmcbdp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdddhlbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eemgkpef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggicbe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phfjcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjmba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddjmba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Moefdljc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jopiom32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ochamg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cidgdg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iqfcbahb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmlmkn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnindhpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qejfkmem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kckqbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngjkfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Japmcfcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmpbkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkgiimng.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Addaif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Addaif32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpaekqhh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaflio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcahmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bohbhmfm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eoideh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkpnga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Madbagif.exe -
Executes dropped EXE 64 IoCs
Processes:
Ngcgcjnc.exeNbhkac32.exeNqklmpdd.exeNcihikcg.exeNgedij32.exeNkqpjidj.exeNnolfdcn.exeNbkhfc32.exeNqmhbpba.exeNdidbn32.exeNcldnkae.exeNkcmohbg.exeOohgdhfn.exeOimkbaed.exePkogiikb.exePakllc32.exePefhlaie.exePeieba32.exePkenjh32.exePcmeke32.exePkhjph32.exeQlggjk32.exeQepkbpak.exeQcclld32.exeAjndioga.exeAaiimadl.exeAkamff32.exeAlqjpi32.exeAckbmcjl.exeAhgjejhd.exeAfkknogn.exeBfngdn32.exeBlhpqhlh.exeBcahmb32.exeBfpdin32.exeBljlfh32.exeBkmmaeap.exeBbgeno32.exeBkoigdom.exeBombmcec.exeBjbfklei.exeBbnkonbd.exeCcmgiaig.exeCijpahho.exeCjjlkk32.exeCcbadp32.exeCioilg32.exeCmjemflb.exeCoiaiakf.exeCbgnemjj.exeCiafbg32.exeCcgjopal.exeDfefkkqp.exeDpnkdq32.exeDcigeooj.exeDifpmfna.exeDmalne32.exeDckdjomg.exeDmdhcddh.exeDbqqkkbo.exeDflmlj32.exeDikihe32.exeDlieda32.exeDcpmen32.exepid process 2428 Ngcgcjnc.exe 220 Nbhkac32.exe 1584 Nqklmpdd.exe 1856 Ncihikcg.exe 1468 Ngedij32.exe 60 Nkqpjidj.exe 2264 Nnolfdcn.exe 4996 Nbkhfc32.exe 2068 Nqmhbpba.exe 1904 Ndidbn32.exe 4636 Ncldnkae.exe 2848 Nkcmohbg.exe 1032 Oohgdhfn.exe 1384 Oimkbaed.exe 3520 Pkogiikb.exe 4676 Pakllc32.exe 4440 Pefhlaie.exe 3464 Peieba32.exe 2996 Pkenjh32.exe 4948 Pcmeke32.exe 2196 Pkhjph32.exe 3992 Qlggjk32.exe 544 Qepkbpak.exe 3832 Qcclld32.exe 3636 Ajndioga.exe 3620 Aaiimadl.exe 4996 Akamff32.exe 3664 Alqjpi32.exe 556 Ackbmcjl.exe 2124 Ahgjejhd.exe 4332 Afkknogn.exe 3984 Bfngdn32.exe 704 Blhpqhlh.exe 3648 Bcahmb32.exe 1436 Bfpdin32.exe 4392 Bljlfh32.exe 2320 Bkmmaeap.exe 1424 Bbgeno32.exe 2296 Bkoigdom.exe 5012 Bombmcec.exe 5124 Bjbfklei.exe 5164 Bbnkonbd.exe 5204 Ccmgiaig.exe 5240 Cijpahho.exe 5288 Cjjlkk32.exe 5340 Ccbadp32.exe 5388 Cioilg32.exe 5436 Cmjemflb.exe 5488 Coiaiakf.exe 5532 Cbgnemjj.exe 5572 Ciafbg32.exe 5612 Ccgjopal.exe 5652 Dfefkkqp.exe 5692 Dpnkdq32.exe 5732 Dcigeooj.exe 5772 Difpmfna.exe 5812 Dmalne32.exe 5852 Dckdjomg.exe 5892 Dmdhcddh.exe 5932 Dbqqkkbo.exe 5964 Dflmlj32.exe 6004 Dikihe32.exe 6048 Dlieda32.exe 6092 Dcpmen32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ncldnkae.exeAdndoe32.exeIpeeobbe.exeEfjimhnh.exeGlengm32.exeJlmfeg32.exeBebjdgmj.exeCkclhn32.exeJekqmhia.exePnifekmd.exeIkbfgppo.exePpgegd32.exePnmopk32.exeCpqlfa32.exeLfeljd32.exeAmfhgj32.exeBeaecjab.exeEcoaijio.exeEdoncm32.exeEincadmf.exeGddqejni.exeGjcfcakn.exeLhadgmge.exeFgcjea32.exePakllc32.exeFibhpbea.exeFcddkggf.exeIcdoolge.exe09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exeEbnfbcbc.exeFbbpmb32.exeIgajal32.exeQejfkmem.exeIqfcbahb.exeAckbmcjl.exeEiieicml.exePlmmif32.exeIllfdc32.exeJinboekc.exeDojlhg32.exeDkhnjk32.exeNehjmnei.exeIgieoleg.exeIdcepgmg.exeQemhbj32.exeNfcabp32.exeKkgdhp32.exeFekclnif.exeGllajf32.exeJopiom32.exeBcahmb32.exeGncchb32.exePmeoqlpl.exeBlknpdho.exeLeedqa32.exePfbfjk32.exeMhhcne32.exeDflmlj32.exeHckeoeno.exeMcqjon32.exeNamegfql.exeNgcgcjnc.exePoliea32.exedescription ioc process File created C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File created C:\Windows\SysWOW64\Bjeehbgh.dll Adndoe32.exe File created C:\Windows\SysWOW64\Hebqnm32.dll Ipeeobbe.exe File created C:\Windows\SysWOW64\Knienl32.dll Efjimhnh.exe File opened for modification C:\Windows\SysWOW64\Gbofcghl.exe Glengm32.exe File created C:\Windows\SysWOW64\Jddnfd32.exe Jlmfeg32.exe File created C:\Windows\SysWOW64\Bhpfqcln.exe Bebjdgmj.exe File opened for modification C:\Windows\SysWOW64\Cnahdi32.exe Ckclhn32.exe File created C:\Windows\SysWOW64\Lpefcn32.dll Jekqmhia.exe File created C:\Windows\SysWOW64\Giidol32.dll Pnifekmd.exe File opened for modification C:\Windows\SysWOW64\Inqbclob.exe Ikbfgppo.exe File created C:\Windows\SysWOW64\Pfandnla.exe Ppgegd32.exe File created C:\Windows\SysWOW64\Occmjg32.dll Pnmopk32.exe File created C:\Windows\SysWOW64\Cmdmpe32.exe Cpqlfa32.exe File created C:\Windows\SysWOW64\Llodgnja.exe Lfeljd32.exe File opened for modification C:\Windows\SysWOW64\Apddce32.exe Amfhgj32.exe File created C:\Windows\SysWOW64\Blknpdho.exe Beaecjab.exe File created C:\Windows\SysWOW64\Edoncm32.exe Ecoaijio.exe File created C:\Windows\SysWOW64\Epeohn32.exe Edoncm32.exe File created C:\Windows\SysWOW64\Edcgnmml.exe Eincadmf.exe File created C:\Windows\SysWOW64\Cpnhfn32.dll Gddqejni.exe File opened for modification C:\Windows\SysWOW64\Gdhjpjjd.exe Gjcfcakn.exe File created C:\Windows\SysWOW64\Leedqa32.exe Lhadgmge.exe File created C:\Windows\SysWOW64\Fhefmjlp.exe Fgcjea32.exe File created C:\Windows\SysWOW64\Qhkjegqi.dll Pakllc32.exe File opened for modification C:\Windows\SysWOW64\Fbjmhh32.exe Fibhpbea.exe File created C:\Windows\SysWOW64\Gphddlfp.exe Fcddkggf.exe File created C:\Windows\SysWOW64\Qeikficp.dll Icdoolge.exe File opened for modification C:\Windows\SysWOW64\Oohgdhfn.exe 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe File opened for modification C:\Windows\SysWOW64\Fpbflg32.exe Ebnfbcbc.exe File created C:\Windows\SysWOW64\Fealin32.exe Fbbpmb32.exe File created C:\Windows\SysWOW64\Iedjmioj.exe Igajal32.exe File created C:\Windows\SysWOW64\Qifbll32.exe Qejfkmem.exe File created C:\Windows\SysWOW64\Icdoolge.exe Iqfcbahb.exe File opened for modification C:\Windows\SysWOW64\Ahgjejhd.exe Ackbmcjl.exe File created C:\Windows\SysWOW64\Fcniglmb.exe Eiieicml.exe File opened for modification C:\Windows\SysWOW64\Poliea32.exe Plmmif32.exe File opened for modification C:\Windows\SysWOW64\Iojbpo32.exe Illfdc32.exe File created C:\Windows\SysWOW64\Doepmnag.dll Jinboekc.exe File created C:\Windows\SysWOW64\Dfqdid32.exe Dojlhg32.exe File opened for modification C:\Windows\SysWOW64\Dngjff32.exe Dkhnjk32.exe File created C:\Windows\SysWOW64\Nncoaq32.exe Nehjmnei.exe File opened for modification C:\Windows\SysWOW64\Ihmnldib.exe Igieoleg.exe File created C:\Windows\SysWOW64\Inlihl32.exe Idcepgmg.exe File created C:\Windows\SysWOW64\Qhkdof32.exe Qemhbj32.exe File created C:\Windows\SysWOW64\Ocgbld32.exe Nfcabp32.exe File created C:\Windows\SysWOW64\Eqfnqg32.dll Kkgdhp32.exe File opened for modification C:\Windows\SysWOW64\Fhiphi32.exe Fekclnif.exe File created C:\Windows\SysWOW64\Dipffc32.dll Gllajf32.exe File created C:\Windows\SysWOW64\Jckeokan.exe Jopiom32.exe File created C:\Windows\SysWOW64\Bfpdin32.exe Bcahmb32.exe File created C:\Windows\SysWOW64\Gemkelcd.exe Gncchb32.exe File opened for modification C:\Windows\SysWOW64\Pcpgmf32.exe Pmeoqlpl.exe File opened for modification C:\Windows\SysWOW64\Bfabmmhe.exe Blknpdho.exe File opened for modification C:\Windows\SysWOW64\Lfgahikm.exe Leedqa32.exe File created C:\Windows\SysWOW64\Pgcbbc32.exe Pfbfjk32.exe File created C:\Windows\SysWOW64\Nbogaaom.dll Mhhcne32.exe File created C:\Windows\SysWOW64\Ipehcj32.dll Dflmlj32.exe File created C:\Windows\SysWOW64\Gefchq32.dll Hckeoeno.exe File created C:\Windows\SysWOW64\Nqjgbadl.dll Mcqjon32.exe File created C:\Windows\SysWOW64\Ejhdfi32.dll Illfdc32.exe File created C:\Windows\SysWOW64\Pdgfaf32.dll Namegfql.exe File created C:\Windows\SysWOW64\Ipkobd32.dll Ngcgcjnc.exe File created C:\Windows\SysWOW64\Pjdhhc32.dll Poliea32.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process 3152 2848 WerFault.exe 13304 13264 WerFault.exe Dkqaoe32.exe 5428 6752 WerFault.exe Edoncm32.exe 12468 12868 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Modifies registry class 64 IoCs
Processes:
Kkgiimng.exeLjeafb32.exeObpkcc32.exeLoiong32.exeMmbanbmg.exePalbgl32.exeQmanljfo.exeDgfdojfm.exeGphddlfp.exeJakchf32.exeMmebpbod.exeOakjnnap.exeChfegk32.exeNkjckkcg.exeQbkcek32.exeAdkgje32.exeHpqldc32.exeMehafq32.exeKdbjhbbd.exeQmhlgmmm.exeBgpcliao.exeOhhfknjf.exeAbpcja32.exeQemhbj32.exeDnpdegjp.exeBoldhf32.exe09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exePakllc32.exeCijpahho.exeJdfjld32.exeJepjhg32.exeLmdnbn32.exePklamb32.exeJddnfd32.exeOlfghg32.exePeahgl32.exeKnnhjcog.exeMfeeabda.exeNcaklhdi.exeGlmhdm32.exeIqdfmajd.exeLnjgfb32.exeMojopk32.exeOflfdbip.exePkmhgh32.exeMeiioonj.exeIllfdc32.exeCnjdpaki.exeOdedipge.exeEleimp32.exeEcoaijio.exeFfaong32.exeMedglemj.exeAbdfkj32.exeEjalcgkg.exeJcbdgb32.exeLndagg32.exeOlanmgig.exeOaqbkn32.exeAlbpkc32.exeNfcabp32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aljejh32.dll" Kkgiimng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljeafb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Obpkcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Loiong32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmbanbmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Palbgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cimhefgb.dll" Qmanljfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndcfmi32.dll" Dgfdojfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gphddlfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jakchf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmebpbod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeojbmkh.dll" Mmebpbod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oakjnnap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgnddp32.dll" Chfegk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbnjfh32.dll" Nkjckkcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qbkcek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfklem32.dll" Adkgje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpqldc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mehafq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdbjhbbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbecoe32.dll" Qmhlgmmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgpcliao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohhfknjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abpcja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qemhbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnpdegjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Boldhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhkjegqi.dll" Pakllc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cijpahho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejljgqdp.dll" Jdfjld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkgiimng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amdcghbo.dll" Jepjhg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmdnbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Docpdpol.dll" Jakchf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pklamb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jddnfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gabmaqlh.dll" Olfghg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Peahgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knnhjcog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfeeabda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bebggf32.dll" Ncaklhdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igmcfhol.dll" Glmhdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofigcd32.dll" Iqdfmajd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncpgam32.dll" Lnjgfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkglgq32.dll" Mojopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbndhppc.dll" Oflfdbip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edkamckh.dll" Pkmhgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmnajl32.dll" Meiioonj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Illfdc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnjdpaki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odedipge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpbibenl.dll" Eleimp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecoaijio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffaong32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqcgfpia.dll" Medglemj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abdfkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfjkjgbh.dll" Ejalcgkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcbdgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lndagg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmnogj32.dll" Olanmgig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lebcnn32.dll" Oaqbkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Albpkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfcabp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 1076 taskmgr.exe Token: SeSystemProfilePrivilege 1076 taskmgr.exe Token: SeCreateGlobalPrivilege 1076 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe 1076 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exeNgcgcjnc.exeNbhkac32.exeNqklmpdd.exeNcihikcg.exeNgedij32.exeNkqpjidj.exeNnolfdcn.exeNbkhfc32.exeNqmhbpba.exeNdidbn32.exeNcldnkae.exe09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exeOohgdhfn.exeOimkbaed.exePkogiikb.exePakllc32.exePefhlaie.exePeieba32.exePkenjh32.exePcmeke32.exePkhjph32.exedescription pid process target process PID 4160 wrote to memory of 2428 4160 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe Ngcgcjnc.exe PID 4160 wrote to memory of 2428 4160 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe Ngcgcjnc.exe PID 4160 wrote to memory of 2428 4160 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe Ngcgcjnc.exe PID 2428 wrote to memory of 220 2428 Ngcgcjnc.exe Nbhkac32.exe PID 2428 wrote to memory of 220 2428 Ngcgcjnc.exe Nbhkac32.exe PID 2428 wrote to memory of 220 2428 Ngcgcjnc.exe Nbhkac32.exe PID 220 wrote to memory of 1584 220 Nbhkac32.exe Nqklmpdd.exe PID 220 wrote to memory of 1584 220 Nbhkac32.exe Nqklmpdd.exe PID 220 wrote to memory of 1584 220 Nbhkac32.exe Nqklmpdd.exe PID 1584 wrote to memory of 1856 1584 Nqklmpdd.exe Ncihikcg.exe PID 1584 wrote to memory of 1856 1584 Nqklmpdd.exe Ncihikcg.exe PID 1584 wrote to memory of 1856 1584 Nqklmpdd.exe Ncihikcg.exe PID 1856 wrote to memory of 1468 1856 Ncihikcg.exe Ngedij32.exe PID 1856 wrote to memory of 1468 1856 Ncihikcg.exe Ngedij32.exe PID 1856 wrote to memory of 1468 1856 Ncihikcg.exe Ngedij32.exe PID 1468 wrote to memory of 60 1468 Ngedij32.exe Nkqpjidj.exe PID 1468 wrote to memory of 60 1468 Ngedij32.exe Nkqpjidj.exe PID 1468 wrote to memory of 60 1468 Ngedij32.exe Nkqpjidj.exe PID 60 wrote to memory of 2264 60 Nkqpjidj.exe Nnolfdcn.exe PID 60 wrote to memory of 2264 60 Nkqpjidj.exe Nnolfdcn.exe PID 60 wrote to memory of 2264 60 Nkqpjidj.exe Nnolfdcn.exe PID 2264 wrote to memory of 4996 2264 Nnolfdcn.exe Nbkhfc32.exe PID 2264 wrote to memory of 4996 2264 Nnolfdcn.exe Nbkhfc32.exe PID 2264 wrote to memory of 4996 2264 Nnolfdcn.exe Nbkhfc32.exe PID 4996 wrote to memory of 2068 4996 Nbkhfc32.exe Nqmhbpba.exe PID 4996 wrote to memory of 2068 4996 Nbkhfc32.exe Nqmhbpba.exe PID 4996 wrote to memory of 2068 4996 Nbkhfc32.exe Nqmhbpba.exe PID 2068 wrote to memory of 1904 2068 Nqmhbpba.exe Ndidbn32.exe PID 2068 wrote to memory of 1904 2068 Nqmhbpba.exe Ndidbn32.exe PID 2068 wrote to memory of 1904 2068 Nqmhbpba.exe Ndidbn32.exe PID 1904 wrote to memory of 4636 1904 Ndidbn32.exe Ncldnkae.exe PID 1904 wrote to memory of 4636 1904 Ndidbn32.exe Ncldnkae.exe PID 1904 wrote to memory of 4636 1904 Ndidbn32.exe Ncldnkae.exe PID 4636 wrote to memory of 2848 4636 Ncldnkae.exe Nkcmohbg.exe PID 4636 wrote to memory of 2848 4636 Ncldnkae.exe Nkcmohbg.exe PID 4636 wrote to memory of 2848 4636 Ncldnkae.exe Nkcmohbg.exe PID 3424 wrote to memory of 1032 3424 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe Oohgdhfn.exe PID 3424 wrote to memory of 1032 3424 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe Oohgdhfn.exe PID 3424 wrote to memory of 1032 3424 09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe Oohgdhfn.exe PID 1032 wrote to memory of 1384 1032 Oohgdhfn.exe Oimkbaed.exe PID 1032 wrote to memory of 1384 1032 Oohgdhfn.exe Oimkbaed.exe PID 1032 wrote to memory of 1384 1032 Oohgdhfn.exe Oimkbaed.exe PID 1384 wrote to memory of 3520 1384 Oimkbaed.exe Pkogiikb.exe PID 1384 wrote to memory of 3520 1384 Oimkbaed.exe Pkogiikb.exe PID 1384 wrote to memory of 3520 1384 Oimkbaed.exe Pkogiikb.exe PID 3520 wrote to memory of 4676 3520 Pkogiikb.exe Pakllc32.exe PID 3520 wrote to memory of 4676 3520 Pkogiikb.exe Pakllc32.exe PID 3520 wrote to memory of 4676 3520 Pkogiikb.exe Pakllc32.exe PID 4676 wrote to memory of 4440 4676 Pakllc32.exe Pefhlaie.exe PID 4676 wrote to memory of 4440 4676 Pakllc32.exe Pefhlaie.exe PID 4676 wrote to memory of 4440 4676 Pakllc32.exe Pefhlaie.exe PID 4440 wrote to memory of 3464 4440 Pefhlaie.exe Peieba32.exe PID 4440 wrote to memory of 3464 4440 Pefhlaie.exe Peieba32.exe PID 4440 wrote to memory of 3464 4440 Pefhlaie.exe Peieba32.exe PID 3464 wrote to memory of 2996 3464 Peieba32.exe Pkenjh32.exe PID 3464 wrote to memory of 2996 3464 Peieba32.exe Pkenjh32.exe PID 3464 wrote to memory of 2996 3464 Peieba32.exe Pkenjh32.exe PID 2996 wrote to memory of 4948 2996 Pkenjh32.exe Pcmeke32.exe PID 2996 wrote to memory of 4948 2996 Pkenjh32.exe Pcmeke32.exe PID 2996 wrote to memory of 4948 2996 Pkenjh32.exe Pcmeke32.exe PID 4948 wrote to memory of 2196 4948 Pcmeke32.exe Pkhjph32.exe PID 4948 wrote to memory of 2196 4948 Pcmeke32.exe Pkhjph32.exe PID 4948 wrote to memory of 2196 4948 Pcmeke32.exe Pkhjph32.exe PID 2196 wrote to memory of 3992 2196 Pkhjph32.exe Qlggjk32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe"C:\Users\Admin\AppData\Local\Temp\09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\Ngcgcjnc.exeC:\Windows\system32\Ngcgcjnc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Nbkhfc32.exeC:\Windows\system32\Nbkhfc32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe13⤵
- Executes dropped EXE
PID:2848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 40014⤵
- Program crash
PID:3152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2848 -ip 28481⤵PID:3932
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1076
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe"C:\Users\Admin\AppData\Local\Temp\09b1244ffa65451751d8b90c7853de52deeb64b977978b30d79147fef1235772.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\Oohgdhfn.exeC:\Windows\system32\Oohgdhfn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\Oimkbaed.exeC:\Windows\system32\Oimkbaed.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Pkogiikb.exeC:\Windows\system32\Pkogiikb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\Pakllc32.exeC:\Windows\system32\Pakllc32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\Pefhlaie.exeC:\Windows\system32\Pefhlaie.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\Peieba32.exeC:\Windows\system32\Peieba32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\Pkenjh32.exeC:\Windows\system32\Pkenjh32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Pcmeke32.exeC:\Windows\system32\Pcmeke32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\Pkhjph32.exeC:\Windows\system32\Pkhjph32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\Qlggjk32.exeC:\Windows\system32\Qlggjk32.exe11⤵
- Executes dropped EXE
PID:3992 -
C:\Windows\SysWOW64\Qepkbpak.exeC:\Windows\system32\Qepkbpak.exe12⤵
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\Qcclld32.exeC:\Windows\system32\Qcclld32.exe13⤵
- Executes dropped EXE
PID:3832 -
C:\Windows\SysWOW64\Ajndioga.exeC:\Windows\system32\Ajndioga.exe14⤵
- Executes dropped EXE
PID:3636 -
C:\Windows\SysWOW64\Aaiimadl.exeC:\Windows\system32\Aaiimadl.exe15⤵
- Executes dropped EXE
PID:3620 -
C:\Windows\SysWOW64\Akamff32.exeC:\Windows\system32\Akamff32.exe16⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\SysWOW64\Alqjpi32.exeC:\Windows\system32\Alqjpi32.exe17⤵
- Executes dropped EXE
PID:3664 -
C:\Windows\SysWOW64\Ackbmcjl.exeC:\Windows\system32\Ackbmcjl.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\Ahgjejhd.exeC:\Windows\system32\Ahgjejhd.exe19⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\Afkknogn.exeC:\Windows\system32\Afkknogn.exe20⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\Bfngdn32.exeC:\Windows\system32\Bfngdn32.exe21⤵
- Executes dropped EXE
PID:3984 -
C:\Windows\SysWOW64\Blhpqhlh.exeC:\Windows\system32\Blhpqhlh.exe22⤵
- Executes dropped EXE
PID:704 -
C:\Windows\SysWOW64\Bcahmb32.exeC:\Windows\system32\Bcahmb32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3648 -
C:\Windows\SysWOW64\Bfpdin32.exeC:\Windows\system32\Bfpdin32.exe24⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\SysWOW64\Bljlfh32.exeC:\Windows\system32\Bljlfh32.exe25⤵
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Bkmmaeap.exeC:\Windows\system32\Bkmmaeap.exe26⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Bbgeno32.exeC:\Windows\system32\Bbgeno32.exe27⤵
- Executes dropped EXE
PID:1424 -
C:\Windows\SysWOW64\Bkoigdom.exeC:\Windows\system32\Bkoigdom.exe28⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\Bombmcec.exeC:\Windows\system32\Bombmcec.exe29⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\Bjbfklei.exeC:\Windows\system32\Bjbfklei.exe30⤵
- Executes dropped EXE
PID:5124 -
C:\Windows\SysWOW64\Bbnkonbd.exeC:\Windows\system32\Bbnkonbd.exe31⤵
- Executes dropped EXE
PID:5164 -
C:\Windows\SysWOW64\Ccmgiaig.exeC:\Windows\system32\Ccmgiaig.exe32⤵
- Executes dropped EXE
PID:5204 -
C:\Windows\SysWOW64\Cijpahho.exeC:\Windows\system32\Cijpahho.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:5240 -
C:\Windows\SysWOW64\Cjjlkk32.exeC:\Windows\system32\Cjjlkk32.exe34⤵
- Executes dropped EXE
PID:5288 -
C:\Windows\SysWOW64\Ccbadp32.exeC:\Windows\system32\Ccbadp32.exe35⤵
- Executes dropped EXE
PID:5340 -
C:\Windows\SysWOW64\Cioilg32.exeC:\Windows\system32\Cioilg32.exe36⤵
- Executes dropped EXE
PID:5388 -
C:\Windows\SysWOW64\Cmjemflb.exeC:\Windows\system32\Cmjemflb.exe37⤵
- Executes dropped EXE
PID:5436 -
C:\Windows\SysWOW64\Coiaiakf.exeC:\Windows\system32\Coiaiakf.exe38⤵
- Executes dropped EXE
PID:5488 -
C:\Windows\SysWOW64\Cbgnemjj.exeC:\Windows\system32\Cbgnemjj.exe39⤵
- Executes dropped EXE
PID:5532 -
C:\Windows\SysWOW64\Ciafbg32.exeC:\Windows\system32\Ciafbg32.exe40⤵
- Executes dropped EXE
PID:5572 -
C:\Windows\SysWOW64\Ccgjopal.exeC:\Windows\system32\Ccgjopal.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5612 -
C:\Windows\SysWOW64\Dfefkkqp.exeC:\Windows\system32\Dfefkkqp.exe42⤵
- Executes dropped EXE
PID:5652 -
C:\Windows\SysWOW64\Dpnkdq32.exeC:\Windows\system32\Dpnkdq32.exe43⤵
- Executes dropped EXE
PID:5692 -
C:\Windows\SysWOW64\Dcigeooj.exeC:\Windows\system32\Dcigeooj.exe44⤵
- Executes dropped EXE
PID:5732 -
C:\Windows\SysWOW64\Difpmfna.exeC:\Windows\system32\Difpmfna.exe45⤵
- Executes dropped EXE
PID:5772 -
C:\Windows\SysWOW64\Dmalne32.exeC:\Windows\system32\Dmalne32.exe46⤵
- Executes dropped EXE
PID:5812 -
C:\Windows\SysWOW64\Dckdjomg.exeC:\Windows\system32\Dckdjomg.exe47⤵
- Executes dropped EXE
PID:5852 -
C:\Windows\SysWOW64\Dmdhcddh.exeC:\Windows\system32\Dmdhcddh.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5892 -
C:\Windows\SysWOW64\Dbqqkkbo.exeC:\Windows\system32\Dbqqkkbo.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5932 -
C:\Windows\SysWOW64\Dflmlj32.exeC:\Windows\system32\Dflmlj32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5964 -
C:\Windows\SysWOW64\Dikihe32.exeC:\Windows\system32\Dikihe32.exe51⤵
- Executes dropped EXE
PID:6004 -
C:\Windows\SysWOW64\Dlieda32.exeC:\Windows\system32\Dlieda32.exe52⤵
- Executes dropped EXE
PID:6048 -
C:\Windows\SysWOW64\Dcpmen32.exeC:\Windows\system32\Dcpmen32.exe53⤵
- Executes dropped EXE
PID:6092 -
C:\Windows\SysWOW64\Dimenegi.exeC:\Windows\system32\Dimenegi.exe54⤵PID:6132
-
C:\Windows\SysWOW64\Ecbjkngo.exeC:\Windows\system32\Ecbjkngo.exe55⤵PID:2272
-
C:\Windows\SysWOW64\Ebejfk32.exeC:\Windows\system32\Ebejfk32.exe56⤵PID:5200
-
C:\Windows\SysWOW64\Emkndc32.exeC:\Windows\system32\Emkndc32.exe57⤵PID:5256
-
C:\Windows\SysWOW64\Ecefqnel.exeC:\Windows\system32\Ecefqnel.exe58⤵PID:5348
-
C:\Windows\SysWOW64\Efccmidp.exeC:\Windows\system32\Efccmidp.exe59⤵PID:5420
-
C:\Windows\SysWOW64\Elpkep32.exeC:\Windows\system32\Elpkep32.exe60⤵PID:5476
-
C:\Windows\SysWOW64\Eplgeokq.exeC:\Windows\system32\Eplgeokq.exe61⤵PID:5496
-
C:\Windows\SysWOW64\Ejalcgkg.exeC:\Windows\system32\Ejalcgkg.exe62⤵
- Modifies registry class
PID:5568 -
C:\Windows\SysWOW64\Emphocjj.exeC:\Windows\system32\Emphocjj.exe63⤵PID:3660
-
C:\Windows\SysWOW64\Eifhdd32.exeC:\Windows\system32\Eifhdd32.exe64⤵PID:5608
-
C:\Windows\SysWOW64\Eppqqn32.exeC:\Windows\system32\Eppqqn32.exe65⤵PID:5684
-
C:\Windows\SysWOW64\Efjimhnh.exeC:\Windows\system32\Efjimhnh.exe66⤵
- Drops file in System32 directory
PID:5748 -
C:\Windows\SysWOW64\Eiieicml.exeC:\Windows\system32\Eiieicml.exe67⤵
- Drops file in System32 directory
PID:5792 -
C:\Windows\SysWOW64\Fcniglmb.exeC:\Windows\system32\Fcniglmb.exe68⤵PID:5884
-
C:\Windows\SysWOW64\Fikbocki.exeC:\Windows\system32\Fikbocki.exe69⤵PID:5952
-
C:\Windows\SysWOW64\Fpejlmcf.exeC:\Windows\system32\Fpejlmcf.exe70⤵PID:6028
-
C:\Windows\SysWOW64\Ffobhg32.exeC:\Windows\system32\Ffobhg32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6080 -
C:\Windows\SysWOW64\Fmikeaap.exeC:\Windows\system32\Fmikeaap.exe72⤵PID:6128
-
C:\Windows\SysWOW64\Fllkqn32.exeC:\Windows\system32\Fllkqn32.exe73⤵PID:5160
-
C:\Windows\SysWOW64\Ffaong32.exeC:\Windows\system32\Ffaong32.exe74⤵
- Modifies registry class
PID:5276 -
C:\Windows\SysWOW64\Fmkgkapm.exeC:\Windows\system32\Fmkgkapm.exe75⤵PID:5448
-
C:\Windows\SysWOW64\Fpjcgm32.exeC:\Windows\system32\Fpjcgm32.exe76⤵PID:2752
-
C:\Windows\SysWOW64\Ffclcgfn.exeC:\Windows\system32\Ffclcgfn.exe77⤵PID:4532
-
C:\Windows\SysWOW64\Fibhpbea.exeC:\Windows\system32\Fibhpbea.exe78⤵
- Drops file in System32 directory
PID:5636 -
C:\Windows\SysWOW64\Fbjmhh32.exeC:\Windows\system32\Fbjmhh32.exe79⤵PID:5756
-
C:\Windows\SysWOW64\Fideeaco.exeC:\Windows\system32\Fideeaco.exe80⤵PID:5844
-
C:\Windows\SysWOW64\Glcaambb.exeC:\Windows\system32\Glcaambb.exe81⤵PID:6000
-
C:\Windows\SysWOW64\Gdjibj32.exeC:\Windows\system32\Gdjibj32.exe82⤵PID:6088
-
C:\Windows\SysWOW64\Gjdaodja.exeC:\Windows\system32\Gjdaodja.exe83⤵PID:5156
-
C:\Windows\SysWOW64\Gmbmkpie.exeC:\Windows\system32\Gmbmkpie.exe84⤵PID:5376
-
C:\Windows\SysWOW64\Glengm32.exeC:\Windows\system32\Glengm32.exe85⤵
- Drops file in System32 directory
PID:5524 -
C:\Windows\SysWOW64\Gbofcghl.exeC:\Windows\system32\Gbofcghl.exe86⤵PID:4048
-
C:\Windows\SysWOW64\Gjfnedho.exeC:\Windows\system32\Gjfnedho.exe87⤵PID:5800
-
C:\Windows\SysWOW64\Glgjlm32.exeC:\Windows\system32\Glgjlm32.exe88⤵PID:6076
-
C:\Windows\SysWOW64\Gdobnj32.exeC:\Windows\system32\Gdobnj32.exe89⤵PID:5228
-
C:\Windows\SysWOW64\Gkhkjd32.exeC:\Windows\system32\Gkhkjd32.exe90⤵PID:4952
-
C:\Windows\SysWOW64\Gdaociml.exeC:\Windows\system32\Gdaociml.exe91⤵PID:5828
-
C:\Windows\SysWOW64\Gbdoof32.exeC:\Windows\system32\Gbdoof32.exe92⤵PID:6072
-
C:\Windows\SysWOW64\Gingkqkd.exeC:\Windows\system32\Gingkqkd.exe93⤵PID:5508
-
C:\Windows\SysWOW64\Gdcliikj.exeC:\Windows\system32\Gdcliikj.exe94⤵PID:5808
-
C:\Windows\SysWOW64\Gkmdecbg.exeC:\Windows\system32\Gkmdecbg.exe95⤵PID:2136
-
C:\Windows\SysWOW64\Hmlpaoaj.exeC:\Windows\system32\Hmlpaoaj.exe96⤵PID:5596
-
C:\Windows\SysWOW64\Hpjmnjqn.exeC:\Windows\system32\Hpjmnjqn.exe97⤵PID:6176
-
C:\Windows\SysWOW64\Hbhijepa.exeC:\Windows\system32\Hbhijepa.exe98⤵PID:6220
-
C:\Windows\SysWOW64\Hibafp32.exeC:\Windows\system32\Hibafp32.exe99⤵PID:6276
-
C:\Windows\SysWOW64\Hmnmgnoh.exeC:\Windows\system32\Hmnmgnoh.exe100⤵PID:6320
-
C:\Windows\SysWOW64\Hplicjok.exeC:\Windows\system32\Hplicjok.exe101⤵PID:6360
-
C:\Windows\SysWOW64\Hckeoeno.exeC:\Windows\system32\Hckeoeno.exe102⤵
- Drops file in System32 directory
PID:6404 -
C:\Windows\SysWOW64\Hkbmqb32.exeC:\Windows\system32\Hkbmqb32.exe103⤵PID:6444
-
C:\Windows\SysWOW64\Hlcjhkdp.exeC:\Windows\system32\Hlcjhkdp.exe104⤵PID:6488
-
C:\Windows\SysWOW64\Hcmbee32.exeC:\Windows\system32\Hcmbee32.exe105⤵PID:6528
-
C:\Windows\SysWOW64\Higjaoci.exeC:\Windows\system32\Higjaoci.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6568 -
C:\Windows\SysWOW64\Hcpojd32.exeC:\Windows\system32\Hcpojd32.exe107⤵PID:6612
-
C:\Windows\SysWOW64\Hmechmip.exeC:\Windows\system32\Hmechmip.exe108⤵PID:6656
-
C:\Windows\SysWOW64\Hgmgqc32.exeC:\Windows\system32\Hgmgqc32.exe109⤵PID:6696
-
C:\Windows\SysWOW64\Iljpij32.exeC:\Windows\system32\Iljpij32.exe110⤵PID:6736
-
C:\Windows\SysWOW64\Idahjg32.exeC:\Windows\system32\Idahjg32.exe111⤵PID:6780
-
C:\Windows\SysWOW64\Ikkpgafg.exeC:\Windows\system32\Ikkpgafg.exe112⤵PID:6824
-
C:\Windows\SysWOW64\Ilmmni32.exeC:\Windows\system32\Ilmmni32.exe113⤵PID:6864
-
C:\Windows\SysWOW64\Idcepgmg.exeC:\Windows\system32\Idcepgmg.exe114⤵
- Drops file in System32 directory
PID:6908 -
C:\Windows\SysWOW64\Inlihl32.exeC:\Windows\system32\Inlihl32.exe115⤵PID:6952
-
C:\Windows\SysWOW64\Igdnabjh.exeC:\Windows\system32\Igdnabjh.exe116⤵PID:6992
-
C:\Windows\SysWOW64\Ikpjbq32.exeC:\Windows\system32\Ikpjbq32.exe117⤵PID:7024
-
C:\Windows\SysWOW64\Innfnl32.exeC:\Windows\system32\Innfnl32.exe118⤵PID:7068
-
C:\Windows\SysWOW64\Ipmbjgpi.exeC:\Windows\system32\Ipmbjgpi.exe119⤵PID:7108
-
C:\Windows\SysWOW64\Iggjga32.exeC:\Windows\system32\Iggjga32.exe120⤵PID:7164
-
C:\Windows\SysWOW64\Ikbfgppo.exeC:\Windows\system32\Ikbfgppo.exe121⤵
- Drops file in System32 directory
PID:5920 -
C:\Windows\SysWOW64\Inqbclob.exeC:\Windows\system32\Inqbclob.exe122⤵PID:1240
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-