Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe
Resource
win10v2004-20240802-en
General
-
Target
80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe
-
Size
80KB
-
MD5
8864f7609d75c9394b739d49d0015030
-
SHA1
86123d0cd55ffcc9b6dc925c3a964b6eaecbed11
-
SHA256
80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6
-
SHA512
b7ef5462fec1700798ccee09f8bdcb3569d2f4225b96f8fbd978776e8aa1d59c428021d96eef2359b3025eea6f2e762dbf8d8dbdf58cc5387e8d0f0f61f02ccd
-
SSDEEP
1536:ubzL7WaugUFHkIGw/DoGvHQ8nxaA05PVbiVLN+zL20gJi1i9:Q/7Wao1kAoGo8g5PVbiVLgzL20WKS
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pncgmkmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqbdjfln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjjhbl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfkedibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfkedibe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdbiedpa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajfhnjhq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajkaii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjokdipf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgehcmmm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmlcbbcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qnjnnj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agoabn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnhjohkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acjclpcf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chjaol32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djgjlelk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qdbiedpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beihma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acnlgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baicac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beihma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cabfga32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cffdpghg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmcibama.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acjclpcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bebblb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qnjnnj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anmjcieo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcbmka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qnhahj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdkcde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnpppgdj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delnin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pflplnlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmpcfdmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qnhahj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajhddjfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajhddjfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agoabn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnbmefbg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceckcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqpgdfnp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnhjohkb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnffqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddjejl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afjlnk32.exe -
Executes dropped EXE 64 IoCs
pid Process 3596 Pjeoglgc.exe 3344 Pqpgdfnp.exe 2692 Pdkcde32.exe 4708 Pflplnlg.exe 1004 Pncgmkmj.exe 2136 Pqbdjfln.exe 3572 Pcppfaka.exe 4404 Pjjhbl32.exe 4596 Pqdqof32.exe 4832 Pcbmka32.exe 2200 Pfaigm32.exe 1000 Qnhahj32.exe 3016 Qdbiedpa.exe 5056 Qnjnnj32.exe 4808 Anmjcieo.exe 5116 Acjclpcf.exe 4276 Ajckij32.exe 516 Aqncedbp.exe 4936 Afjlnk32.exe 1320 Ajfhnjhq.exe 1552 Acnlgp32.exe 4768 Ajhddjfn.exe 4784 Aabmqd32.exe 2328 Ajkaii32.exe 3076 Aminee32.exe 3556 Agoabn32.exe 60 Bnhjohkb.exe 812 Bebblb32.exe 4584 Bjokdipf.exe 1724 Baicac32.exe 1988 Bffkij32.exe 1512 Bmpcfdmg.exe 2828 Bgehcmmm.exe 920 Bnpppgdj.exe 3480 Beihma32.exe 3140 Bfkedibe.exe 4608 Bnbmefbg.exe 772 Chjaol32.exe 1620 Cfmajipb.exe 768 Cndikf32.exe 4084 Cabfga32.exe 2372 Chmndlge.exe 4804 Cnffqf32.exe 3616 Cdcoim32.exe 3824 Cmlcbbcj.exe 4332 Ceckcp32.exe 404 Cfdhkhjj.exe 1760 Cdhhdlid.exe 384 Cffdpghg.exe 868 Calhnpgn.exe 660 Ddjejl32.exe 1624 Dopigd32.exe 1612 Dmcibama.exe 4232 Dejacond.exe 208 Djgjlelk.exe 2992 Delnin32.exe 3124 Delnin32.exe 2760 Dfnjafap.exe 3104 Daconoae.exe 2944 Ddakjkqi.exe 4220 Dfpgffpm.exe 1496 Dogogcpo.exe 2012 Daekdooc.exe 4152 Dddhpjof.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Gblnkg32.dll Bnpppgdj.exe File created C:\Windows\SysWOW64\Cabfga32.exe Cndikf32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Aqncedbp.exe Ajckij32.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File opened for modification C:\Windows\SysWOW64\Acjclpcf.exe Anmjcieo.exe File opened for modification C:\Windows\SysWOW64\Pcppfaka.exe Pqbdjfln.exe File opened for modification C:\Windows\SysWOW64\Aabmqd32.exe Ajhddjfn.exe File opened for modification C:\Windows\SysWOW64\Bebblb32.exe Bnhjohkb.exe File created C:\Windows\SysWOW64\Baicac32.exe Bjokdipf.exe File opened for modification C:\Windows\SysWOW64\Baicac32.exe Bjokdipf.exe File created C:\Windows\SysWOW64\Dfpgffpm.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Dopigd32.exe Ddjejl32.exe File opened for modification C:\Windows\SysWOW64\Afjlnk32.exe Aqncedbp.exe File created C:\Windows\SysWOW64\Idnljnaa.dll Ajhddjfn.exe File opened for modification C:\Windows\SysWOW64\Aminee32.exe Ajkaii32.exe File opened for modification C:\Windows\SysWOW64\Bgehcmmm.exe Bmpcfdmg.exe File opened for modification C:\Windows\SysWOW64\Gmcfdb32.dll Delnin32.exe File created C:\Windows\SysWOW64\Daconoae.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Lipdae32.dll Pqdqof32.exe File created C:\Windows\SysWOW64\Aqncedbp.exe Ajckij32.exe File created C:\Windows\SysWOW64\Fmjkjk32.dll Cdcoim32.exe File created C:\Windows\SysWOW64\Pncgmkmj.exe Pflplnlg.exe File opened for modification C:\Windows\SysWOW64\Chmndlge.exe Cabfga32.exe File created C:\Windows\SysWOW64\Aoglcqao.dll Cabfga32.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Kgldjcmk.dll Qnhahj32.exe File opened for modification C:\Windows\SysWOW64\Dopigd32.exe Ddjejl32.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dfpgffpm.exe File created C:\Windows\SysWOW64\Cndikf32.exe Cfmajipb.exe File created C:\Windows\SysWOW64\Bmpcfdmg.exe Bffkij32.exe File created C:\Windows\SysWOW64\Hfggmg32.dll Bgehcmmm.exe File opened for modification C:\Windows\SysWOW64\Pjeoglgc.exe 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe File opened for modification C:\Windows\SysWOW64\Ajfhnjhq.exe Afjlnk32.exe File created C:\Windows\SysWOW64\Kmfjodai.dll Dopigd32.exe File created C:\Windows\SysWOW64\Gmcfdb32.dll Djgjlelk.exe File created C:\Windows\SysWOW64\Ajhddjfn.exe Acnlgp32.exe File created C:\Windows\SysWOW64\Bfkedibe.exe Beihma32.exe File opened for modification C:\Windows\SysWOW64\Bnbmefbg.exe Bfkedibe.exe File opened for modification C:\Windows\SysWOW64\Cndikf32.exe Cfmajipb.exe File created C:\Windows\SysWOW64\Pjeoglgc.exe 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe File created C:\Windows\SysWOW64\Pqpgdfnp.exe Pjeoglgc.exe File created C:\Windows\SysWOW64\Qoqbfpfe.dll Acjclpcf.exe File created C:\Windows\SysWOW64\Bgehcmmm.exe Bmpcfdmg.exe File created C:\Windows\SysWOW64\Ebdijfii.dll Bmpcfdmg.exe File created C:\Windows\SysWOW64\Lfjhbihm.dll Chmndlge.exe File created C:\Windows\SysWOW64\Naeheh32.dll Cffdpghg.exe File created C:\Windows\SysWOW64\Hmphmhjc.dll Pfaigm32.exe File created C:\Windows\SysWOW64\Jijjfldq.dll Bffkij32.exe File created C:\Windows\SysWOW64\Ickfifmb.dll Afjlnk32.exe File created C:\Windows\SysWOW64\Bfddbh32.dll Ajkaii32.exe File opened for modification C:\Windows\SysWOW64\Beihma32.exe Bnpppgdj.exe File created C:\Windows\SysWOW64\Jocbigff.dll Pjeoglgc.exe File opened for modification C:\Windows\SysWOW64\Cfmajipb.exe Chjaol32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File created C:\Windows\SysWOW64\Chjaol32.exe Bnbmefbg.exe File created C:\Windows\SysWOW64\Chmndlge.exe Cabfga32.exe File opened for modification C:\Windows\SysWOW64\Qnjnnj32.exe Qdbiedpa.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Ndkqipob.dll Cndikf32.exe File opened for modification C:\Windows\SysWOW64\Ajckij32.exe Acjclpcf.exe File created C:\Windows\SysWOW64\Hcjccj32.dll Ddjejl32.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Dfpgffpm.exe File opened for modification C:\Windows\SysWOW64\Pflplnlg.exe Pdkcde32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4280 3716 WerFault.exe 149 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceckcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pncgmkmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acjclpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqncedbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beihma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cndikf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chmndlge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bebblb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnbmefbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmcibama.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajkaii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcppfaka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qdbiedpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agoabn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmpcfdmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnpppgdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjeoglgc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dopigd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pflplnlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delnin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnjnnj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajhddjfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddjejl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnhahj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajfhnjhq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bffkij32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Calhnpgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqbdjfln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcbmka32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjokdipf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgehcmmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chjaol32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnffqf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpgffpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqdqof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmlcbbcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqpgdfnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajckij32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aabmqd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnhjohkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cffdpghg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dejacond.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjjhbl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anmjcieo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afjlnk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdkcde32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfkedibe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfmajipb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cabfga32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djgjlelk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baicac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfdhkhjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdhhdlid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delnin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beeppfin.dll" Dejacond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aabmqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qnhahj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnhjohkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imbajm32.dll" Chjaol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjeoglgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qdbiedpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmdjdl32.dll" Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bffkij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dejacond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfpgffpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pflplnlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkmlea32.dll" Qnjnnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chjaol32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdkcde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbagnedl.dll" Pncgmkmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqdqof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmcjlfqa.dll" Anmjcieo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajckij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agoabn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cndikf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cabfga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdcoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfpgffpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcppfaka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcppfaka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmlcbbcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdhhdlid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfaigm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acjclpcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oahicipe.dll" Aabmqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpnnia32.dll" Baicac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndkqipob.dll" Cndikf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfanhp32.dll" Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Calhnpgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ochpdn32.dll" Pjjhbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qnhahj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceckcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghilmi32.dll" Ceckcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfdhkhjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aminee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmmmebhb.dll" Aqncedbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjjhbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anmjcieo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfddbh32.dll" Ajkaii32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bebblb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnbmefbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bneljh32.dll" Bjokdipf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgehcmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pflplnlg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2560 wrote to memory of 3596 2560 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe 82 PID 2560 wrote to memory of 3596 2560 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe 82 PID 2560 wrote to memory of 3596 2560 80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe 82 PID 3596 wrote to memory of 3344 3596 Pjeoglgc.exe 83 PID 3596 wrote to memory of 3344 3596 Pjeoglgc.exe 83 PID 3596 wrote to memory of 3344 3596 Pjeoglgc.exe 83 PID 3344 wrote to memory of 2692 3344 Pqpgdfnp.exe 84 PID 3344 wrote to memory of 2692 3344 Pqpgdfnp.exe 84 PID 3344 wrote to memory of 2692 3344 Pqpgdfnp.exe 84 PID 2692 wrote to memory of 4708 2692 Pdkcde32.exe 85 PID 2692 wrote to memory of 4708 2692 Pdkcde32.exe 85 PID 2692 wrote to memory of 4708 2692 Pdkcde32.exe 85 PID 4708 wrote to memory of 1004 4708 Pflplnlg.exe 86 PID 4708 wrote to memory of 1004 4708 Pflplnlg.exe 86 PID 4708 wrote to memory of 1004 4708 Pflplnlg.exe 86 PID 1004 wrote to memory of 2136 1004 Pncgmkmj.exe 87 PID 1004 wrote to memory of 2136 1004 Pncgmkmj.exe 87 PID 1004 wrote to memory of 2136 1004 Pncgmkmj.exe 87 PID 2136 wrote to memory of 3572 2136 Pqbdjfln.exe 88 PID 2136 wrote to memory of 3572 2136 Pqbdjfln.exe 88 PID 2136 wrote to memory of 3572 2136 Pqbdjfln.exe 88 PID 3572 wrote to memory of 4404 3572 Pcppfaka.exe 89 PID 3572 wrote to memory of 4404 3572 Pcppfaka.exe 89 PID 3572 wrote to memory of 4404 3572 Pcppfaka.exe 89 PID 4404 wrote to memory of 4596 4404 Pjjhbl32.exe 90 PID 4404 wrote to memory of 4596 4404 Pjjhbl32.exe 90 PID 4404 wrote to memory of 4596 4404 Pjjhbl32.exe 90 PID 4596 wrote to memory of 4832 4596 Pqdqof32.exe 91 PID 4596 wrote to memory of 4832 4596 Pqdqof32.exe 91 PID 4596 wrote to memory of 4832 4596 Pqdqof32.exe 91 PID 4832 wrote to memory of 2200 4832 Pcbmka32.exe 92 PID 4832 wrote to memory of 2200 4832 Pcbmka32.exe 92 PID 4832 wrote to memory of 2200 4832 Pcbmka32.exe 92 PID 2200 wrote to memory of 1000 2200 Pfaigm32.exe 93 PID 2200 wrote to memory of 1000 2200 Pfaigm32.exe 93 PID 2200 wrote to memory of 1000 2200 Pfaigm32.exe 93 PID 1000 wrote to memory of 3016 1000 Qnhahj32.exe 94 PID 1000 wrote to memory of 3016 1000 Qnhahj32.exe 94 PID 1000 wrote to memory of 3016 1000 Qnhahj32.exe 94 PID 3016 wrote to memory of 5056 3016 Qdbiedpa.exe 95 PID 3016 wrote to memory of 5056 3016 Qdbiedpa.exe 95 PID 3016 wrote to memory of 5056 3016 Qdbiedpa.exe 95 PID 5056 wrote to memory of 4808 5056 Qnjnnj32.exe 96 PID 5056 wrote to memory of 4808 5056 Qnjnnj32.exe 96 PID 5056 wrote to memory of 4808 5056 Qnjnnj32.exe 96 PID 4808 wrote to memory of 5116 4808 Anmjcieo.exe 97 PID 4808 wrote to memory of 5116 4808 Anmjcieo.exe 97 PID 4808 wrote to memory of 5116 4808 Anmjcieo.exe 97 PID 5116 wrote to memory of 4276 5116 Acjclpcf.exe 98 PID 5116 wrote to memory of 4276 5116 Acjclpcf.exe 98 PID 5116 wrote to memory of 4276 5116 Acjclpcf.exe 98 PID 4276 wrote to memory of 516 4276 Ajckij32.exe 99 PID 4276 wrote to memory of 516 4276 Ajckij32.exe 99 PID 4276 wrote to memory of 516 4276 Ajckij32.exe 99 PID 516 wrote to memory of 4936 516 Aqncedbp.exe 100 PID 516 wrote to memory of 4936 516 Aqncedbp.exe 100 PID 516 wrote to memory of 4936 516 Aqncedbp.exe 100 PID 4936 wrote to memory of 1320 4936 Afjlnk32.exe 101 PID 4936 wrote to memory of 1320 4936 Afjlnk32.exe 101 PID 4936 wrote to memory of 1320 4936 Afjlnk32.exe 101 PID 1320 wrote to memory of 1552 1320 Ajfhnjhq.exe 102 PID 1320 wrote to memory of 1552 1320 Ajfhnjhq.exe 102 PID 1320 wrote to memory of 1552 1320 Ajfhnjhq.exe 102 PID 1552 wrote to memory of 4768 1552 Acnlgp32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe"C:\Users\Admin\AppData\Local\Temp\80258d961cac3694e83efaf89743d2520453936d0d08ea58af5c7f4dcdd1a0f6N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Pjeoglgc.exeC:\Windows\system32\Pjeoglgc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\Pqpgdfnp.exeC:\Windows\system32\Pqpgdfnp.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\Pdkcde32.exeC:\Windows\system32\Pdkcde32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\Pflplnlg.exeC:\Windows\system32\Pflplnlg.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\Pncgmkmj.exeC:\Windows\system32\Pncgmkmj.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\Pqbdjfln.exeC:\Windows\system32\Pqbdjfln.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\Pcppfaka.exeC:\Windows\system32\Pcppfaka.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\Pjjhbl32.exeC:\Windows\system32\Pjjhbl32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\Pqdqof32.exeC:\Windows\system32\Pqdqof32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\Pcbmka32.exeC:\Windows\system32\Pcbmka32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\Pfaigm32.exeC:\Windows\system32\Pfaigm32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\Qnhahj32.exeC:\Windows\system32\Qnhahj32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\Qdbiedpa.exeC:\Windows\system32\Qdbiedpa.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\Qnjnnj32.exeC:\Windows\system32\Qnjnnj32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\Anmjcieo.exeC:\Windows\system32\Anmjcieo.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\Acjclpcf.exeC:\Windows\system32\Acjclpcf.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\Ajckij32.exeC:\Windows\system32\Ajckij32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\Aqncedbp.exeC:\Windows\system32\Aqncedbp.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\Afjlnk32.exeC:\Windows\system32\Afjlnk32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\Ajfhnjhq.exeC:\Windows\system32\Ajfhnjhq.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\Acnlgp32.exeC:\Windows\system32\Acnlgp32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\Ajhddjfn.exeC:\Windows\system32\Ajhddjfn.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Windows\SysWOW64\Aabmqd32.exeC:\Windows\system32\Aabmqd32.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4784 -
C:\Windows\SysWOW64\Ajkaii32.exeC:\Windows\system32\Ajkaii32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2328 -
C:\Windows\SysWOW64\Aminee32.exeC:\Windows\system32\Aminee32.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:3076 -
C:\Windows\SysWOW64\Agoabn32.exeC:\Windows\system32\Agoabn32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3556 -
C:\Windows\SysWOW64\Bnhjohkb.exeC:\Windows\system32\Bnhjohkb.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:60 -
C:\Windows\SysWOW64\Bebblb32.exeC:\Windows\system32\Bebblb32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:812 -
C:\Windows\SysWOW64\Bjokdipf.exeC:\Windows\system32\Bjokdipf.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4584 -
C:\Windows\SysWOW64\Baicac32.exeC:\Windows\system32\Baicac32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Bffkij32.exeC:\Windows\system32\Bffkij32.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\Bmpcfdmg.exeC:\Windows\system32\Bmpcfdmg.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\Bgehcmmm.exeC:\Windows\system32\Bgehcmmm.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2828 -
C:\Windows\SysWOW64\Bnpppgdj.exeC:\Windows\system32\Bnpppgdj.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:920 -
C:\Windows\SysWOW64\Beihma32.exeC:\Windows\system32\Beihma32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\SysWOW64\Bfkedibe.exeC:\Windows\system32\Bfkedibe.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Windows\SysWOW64\Bnbmefbg.exeC:\Windows\system32\Bnbmefbg.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4608 -
C:\Windows\SysWOW64\Chjaol32.exeC:\Windows\system32\Chjaol32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:772 -
C:\Windows\SysWOW64\Cfmajipb.exeC:\Windows\system32\Cfmajipb.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\Cndikf32.exeC:\Windows\system32\Cndikf32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:768 -
C:\Windows\SysWOW64\Cabfga32.exeC:\Windows\system32\Cabfga32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4084 -
C:\Windows\SysWOW64\Chmndlge.exeC:\Windows\system32\Chmndlge.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\Cnffqf32.exeC:\Windows\system32\Cnffqf32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\SysWOW64\Cdcoim32.exeC:\Windows\system32\Cdcoim32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3616 -
C:\Windows\SysWOW64\Cmlcbbcj.exeC:\Windows\system32\Cmlcbbcj.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3824 -
C:\Windows\SysWOW64\Ceckcp32.exeC:\Windows\system32\Ceckcp32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4332 -
C:\Windows\SysWOW64\Cfdhkhjj.exeC:\Windows\system32\Cfdhkhjj.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:404 -
C:\Windows\SysWOW64\Cdhhdlid.exeC:\Windows\system32\Cdhhdlid.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1760 -
C:\Windows\SysWOW64\Cffdpghg.exeC:\Windows\system32\Cffdpghg.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:384 -
C:\Windows\SysWOW64\Calhnpgn.exeC:\Windows\system32\Calhnpgn.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:868 -
C:\Windows\SysWOW64\Ddjejl32.exeC:\Windows\system32\Ddjejl32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:660 -
C:\Windows\SysWOW64\Dopigd32.exeC:\Windows\system32\Dopigd32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\Dmcibama.exeC:\Windows\system32\Dmcibama.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1612 -
C:\Windows\SysWOW64\Dejacond.exeC:\Windows\system32\Dejacond.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4232 -
C:\Windows\SysWOW64\Djgjlelk.exeC:\Windows\system32\Djgjlelk.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:208 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3124 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4260 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3104 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2944 -
C:\Windows\SysWOW64\Dfpgffpm.exeC:\Windows\system32\Dfpgffpm.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4220 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1496 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2012 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4152 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe69⤵
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 22870⤵
- Program crash
PID:4280
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3716 -ip 37161⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b857951fa8a8d4605fd15be910e5f693
SHA1cc6e859f0ce930d5bd1f443f791b23e823487a43
SHA256eb523601ca4ccce9cdc485582b1ac4b4c503a0f2defe09442c3110caf32160fd
SHA5124235804574eeeb4b1635e7bde5ea65acf2fd2119cb5791f66990c08aeca0bc505c7e1be32728407bded73765be5dfb90c0fd6dc0c476c494613f932b90f61891
-
Filesize
80KB
MD54455427091d9b626b7a9a4ddb08b52a2
SHA1c3afebd5e9d27d3f9d9bf6c66cd5c917fe5328f1
SHA256cad2345396728ac37919464e4ce98b55c2ac92852814b8dc1b70c86aef447bf6
SHA5123744ce627a6972e325b90ae8c23258c900707f90fea8fa0e88c142f1154ac5bbc4889cecb417316c7d949179bc47629f8cfb80ffebc538006ad0f57608e9ac4b
-
Filesize
80KB
MD578e3f8ba6a81641d1e4e24fca83f5a23
SHA1b272e7ac457a5f2efb2b0564bc06c8ac8a9b7aad
SHA256537548d58148e199d2cbbdd32f56cf28dd8d006c00ac411ce34edef6752b4b9d
SHA512696a3d0dc0df06f5fc987e93e0046fc64212ed6111a849d3f4894ceaac47824e3a162472ef454f0acca9af49cd3350708b0e2efa1ac8a1b473f8f0a5432e4807
-
Filesize
80KB
MD59fab06cb8740df33a39b69f5add58a99
SHA119c675ad8f5fb48b2b00b42477b93ba981ce16c4
SHA256b425da7172973f5d224f96c52fd65610dd7488fdf5660f464a73590e4ba5a85e
SHA5127b048c9c6f7c40a9971c654fd0838d6ef6358b68583a3f24f276ffa063c342acc89bde015ed046c753549bd4a568ea43b214956860e1e82b6650ad6f1ae421ec
-
Filesize
80KB
MD5a9aea15f547010170d9d6d9c153f032e
SHA1e50effb15034bbe07c53ec56855430e305861f44
SHA25681ee8b037ee155750917583a8eeff2406852bede0924d8b68a647b660adf1083
SHA512b2aacfe8c1770a30d4c2590c022ecb0632114f01619a4f15fa1a5c009164c7d41781b420957af89b50758a40c5ca0f5e426092a4329e2851e48ad588cb1eabee
-
Filesize
80KB
MD57bc045ba6d2f340827b1143bf1994e43
SHA16f2fdc38252b29736ff41b272fff855a0849bd7d
SHA2563977b27ec0f7256f96d18c86a54e7221fcb537586e0ea65522282837b13dc153
SHA512cb1aabe2966b7dcad4d750b670d14a306315975e5209128bcb07396010a6a112f0469665b329e3f8a1744cb2ac6af296b054a18230ef1aa8d6c84544a7467416
-
Filesize
80KB
MD5a720e58ded9b746c467e95fc48405a04
SHA1e389ba311cd3d87f8bd3e2c5dc17eb197ddddd9a
SHA256ca41ed9c80c8e9e63dfaa1c5d335822974ca8e23e41cdf606d74023b6fd083c1
SHA512192bcffac6e0a0e007d94b6d12458a15e729dd3ecc8cfb7cce65d2d53a5901533a69e98c7df1edee3f921021087de3ca302533bbddb585d2a9e146c8e3df4e1a
-
Filesize
80KB
MD5af634b78d99af5d7cefca6c593b9e65d
SHA1bccdbf93ecd6eff8e72e5f214a9c82d378c596d0
SHA256feeed7cb0b9a7c462e515b213cb4dd317dc7879ac0b8c870048be67d883a45e0
SHA51265c2a1886bf79f361622198efb86c49ca62b1d11d705c22c3b70598f91393909e05ee6d2ce894214d14a3c7288668d5aa65bca6b9c640d82a83807d4205d395d
-
Filesize
80KB
MD543ee051c3f209d0442e4a12c7a86024f
SHA15f78993bd092d094cf967c61e0d003108163b4a4
SHA2565265549e8f4e2271aa6bcefbbecf6d9871689bee50389dc1cb1e43fb5bdd5068
SHA5121e9cba446567339e94f13523cc15bf8a4c644c6014fee4776744b9bd9ec1cdf7f747f1804ec011dd64b32e1f05ae572950721f3c4d0d0887bb9e8e7d52858555
-
Filesize
80KB
MD5a81dfee0dacad992b96bdd2f57d24c65
SHA1c4fbd08d65e144190544a1cafb28a094c024681f
SHA256fa333e91354ae42d8fe82a6e9ae6972e9766df0bd788fdbda3dbbbd6efe08cbc
SHA5122677d298f5d395a6f68876a9eb41cee9c07a81aed1d4c917892673555374c9622beab56ae6eed8ed4a4ede317a7280f39b77d9b3c84b84eeb54ad8e62fab002e
-
Filesize
80KB
MD526fb7c32bce5a827d63263e5ab00f011
SHA10c1e9e43043a41424461a2e889975fbe96f01d43
SHA256cd92756087c5419d837b7b3eec6590abbe4de6259c663569646cf7056b8c4fb5
SHA5124b6aee6717171e20f29728a09518e34ed48a12dcfbcf5bcf469660e358fe1178d846e5b03bb401e27b439ff541d8c1df487725ac4ba7537c731568ab5d3f1fbf
-
Filesize
80KB
MD57ac18c0de6e660b9516417b176d3787d
SHA1102eb8f8da33291637007d86089b0184c0508481
SHA256810af076ad66267aa605cb8a5262590826672b39969ec409efc88ae91810c52e
SHA5120f351e5b9c289e061ab0749e5d72d733e9f01e8c4191f06e6d7febb89e1c95b74b552b885726cba630c23499c1bf2ad2b1b98379df3c591df15b9cc5706215fb
-
Filesize
80KB
MD5ec9b4f8760a37fd4fe7436c73952c2ce
SHA18d0465bdd8acd962c732479e756320ba81e83f76
SHA256bdd8a6149fe1163c081a72c4c2940a986e2d8594c51d2c8de26c9695880bf246
SHA51255b9fc0e27a93a80dbca919c8eec8b08395ad0bbbd6b42a105c447a46904009734c691db27803eec9513565bc16981b7a271f202f9fc618f0a7769c2c61f97d9
-
Filesize
80KB
MD51d2b83eedc3eb453f26e45b80c475239
SHA186312156b83d7334e221af77cfe5032f7c96b908
SHA25655e8120d16cc8e9ac523c5c3d746c540ea976f40533732ae4911939db194c419
SHA512caffd8eb05ee600f9bddc5d91b662c45c3ba2715d4fc80eef51099041bd78a9b047f54c2e9de65901604f1f7e1154cf5dd1f935a817ac7f1ad830a8f94ccc8fc
-
Filesize
80KB
MD5ce7b0f3896c973d0b3e79c405916b46b
SHA166afd5d548477203a5708876fba5b034995dcfcd
SHA2566a489f4fa18bc74e2556b6b0c44076ea5b2492425698c76a03e1337679b8eaf4
SHA51294c9bb88a476e08c8d681aaaf4b6448a7129c247dacefa8b4b429b9b50b260134b97597e4624d6e1a28df6827864fa135e34eac5992e9ea807725733b0fbfbc8
-
Filesize
80KB
MD503ecb1cd9f304ed13a9e02f06a1f2227
SHA1f738d61c86ed3d0c785adaeb988c335241b3243a
SHA25633c6978df8c242ce14933ff570f52c6df3a0801818ae6932e1aabf42b6b7fef4
SHA512d13841522ad58ce887d12bd53c1cbbbbd867dc4247512e9ab3c10e15649ad14ddf9a8e275b5ad3a6bf2bb14597b938348b0684bfe67b18fb2cffcd8cb1825be4
-
Filesize
80KB
MD51d794eb3e55ead753efb05c00830dd5f
SHA1e59fdc272e796348f04ae408659bdb3011e23730
SHA256831d54f0f2c81a1b3a982d02ba589e86129bb0d94f86c7980df342a959e501ca
SHA5129f255954783a9f03d5a4f51d6b9ec1089725941a5c29770ff9872e1bc9fe09d0d4b28eb4c304d5c1df932d86dc18e56c14cf5ba8d700149c538b83c6241b620c
-
Filesize
80KB
MD594c17b87d0dd9d9a27b22d72fe10f8c9
SHA1ef626b141baaeb9047ed0c28951dd47a57cb57f0
SHA256c78a9dd13e3378f506c89484fae1fb54447fd6bb7591aa68838c8069afd22d4e
SHA51259e2453c467b5374898f750728f2bfa9ab474e3fbdfef37f762b69698bbc8cefabb2938f5dc05773dff296f1665dcc06954f736e4123fcc73e829106df6cb6ba
-
Filesize
80KB
MD589de1afdbf3e359b30c3de0d6884fc78
SHA17eb99d8e86fad6f2e3a7f5f96f622229ae1ae3ce
SHA256dae1a4db11cf97afffc4849eed2b47946dba8ac1b636dd71091fcf50437d3a3d
SHA512e621523186f2eefdbec0d85923b4da20f18a0edb203980538c5470371c4a46da4756d50825b384afccdf6e4e7dc08038aa704cd8bd3c36dc00aa3f5a5137cec5
-
Filesize
80KB
MD52b8e5a4a773bd5245e952da3692b2e8c
SHA1034c05c10c655928b34922b3b657a11b2a0a01ba
SHA256d7e0bc79c114c81befc48f6ad5a3befb0b3b15eb96f1dfa5f11d3d32f6d2e9e7
SHA5126678c2f20bf99fadb9861558f865ef706231fc92530261d76b14ff64f54a50bf0caeb64ea1f94dce6d0a117307a09f97967b2d2af8b2e17ca0fe52d5fea9603d
-
Filesize
80KB
MD59f8f7adb75820a6827ed45e63e2675f9
SHA1cc78538e8152359aee7525da9b6718880561c603
SHA2566746dc98b437a5d06a6ef32ce634db9cc11dc65869bc50d9f8cdf7476039e6de
SHA512fd1f6c2974c2a5cde782fa490558915bbf8fed2e9a205fe3321e6556dcdfe51f9cfbcf897b1d96f4c2c337b46b378283f8c92944cd863d06e6c16ae649c926c9
-
Filesize
80KB
MD5c477420464798295295aab00a927f447
SHA1b2f1b8f46662b2fe824e78c3dc9fecf5239e263a
SHA25635db9340467b72c56ea5289c80f983541c06b28dba3a9670326e1d3e51f9d181
SHA5124031f551cf3a2a934a396352ac725129103b7fd095173f32fd149342743e7c5567e232b5f3c59386e664a5a9f78c4ead4731b70d2ebee79af1924043c880fe40
-
Filesize
80KB
MD5174097f9b616efb7518f0e96e27fbb3b
SHA17b8b62e6015085bb4ed98752b5d4fc2ce30bfd70
SHA256f7fc7db9b9d7eaf967332419a7ff8370bcb2d4651b3597f76857573057693022
SHA51240d20766920235e1ef2076ad94993dc5e6d3198e7fe32724351f6c97e17be07580f9c2f40d524240f8a379af07b1b72922232e88fa5f025e4feac02f575a1532
-
Filesize
80KB
MD5d32e0fb1dcf96f588dcccf9f4085be0f
SHA1b645cf8bd61aeb21112de061fcc499731dd46a56
SHA256f65130da685b649cac2e72f9a1228abf9a496f6136ca2d46c6c949b73ea9212e
SHA5121471eebe0bc86eb231628f25d3054afa96b28584b832b4a5a8d551f38532deb33fd39eabd077b09c5e76675228580a7456d3694e25b2a69a9117131180564b4c
-
Filesize
80KB
MD5b8ca68f5e64d40d6806eead285a7b621
SHA1c6bb0a55fe3375781c05c732bb298da068c7e358
SHA2561a79b2acc7c3255d8c843af7d8294371a69bc142d4076cd570faadc5d46fa8e5
SHA512958bc71d75973b0907ec33468360b5824b1463061389b86166195eae9125ed89d266899ab85551faa093fbb97d6576cc7bac8b10eb30ae17be2d2ae2b9c45829
-
Filesize
80KB
MD500a486e0d4e26262024a9ac6b92e6e44
SHA1302180d43fbdd7f3eb474a4011c0dbe915727406
SHA256c57d907507ded7230d6f34f85047129a07ea8155c10e3bd473fc77058b6c917c
SHA512bded8b407d0011e31232e9be3b4291273bc2920bbff7cc79e5493767659e298daceb9b269c7e0da719d2f3fb83c4e776399ea3d4b07b9db7caf06220b056a943
-
Filesize
80KB
MD574f6e4312d1f3da9a504e9d209485c86
SHA1e16652304aebaecda9216cba5785b39c7f26b49f
SHA256dd195a659bbde51a3862afa1209e4633dc1dddce33ab2e158f541b68f824f29a
SHA5127081ed0ad9983d454a6afb48fdf94b92e60df9437a381fb564994e750baa60c948606c2a7f035228c84faad8581702f5359697b568edf3828a0b8207cc98d119
-
Filesize
80KB
MD5407217d7340bae6aa3dd76fc6126355d
SHA15ef9e96c35007f26bb876916e93a58edd8fa1215
SHA25602365da250470855790a66ec288b24c5c10637f7da688dd0e47b77c1b4d8e3a4
SHA5126f2799a0d275fe6a027efef3482ca525874993766a130545018a331ea9684c8fa8fd099001f85a4375b274f5237c601f76a241e633d528b89f97b1811759d128
-
Filesize
80KB
MD593f761ba5c9da30e41cce9f91e75771f
SHA1a2a4932c25baf3d1edbe31aa9562f8a985a98eb5
SHA256dbeff0b99ecdbb157278b7e82c65b2e16ea22331e3b45100dbcee1128e5fd8be
SHA5125f8f1eabaeb899edd5625db77f64533fd33407245515997c95c88a7948d3ed9120e3231d5101ec843e7c25a56a77862a85e2930d1627ca1bafbacb24bc60a156
-
Filesize
80KB
MD574e1960763fe7cc96ccbafccf7ef6b18
SHA16db78875eb46fa43243a9164b180287248f7f203
SHA2566afde317499b271ea39697a6de1e3aca2ff063b120c08145ab7622fece6ead9d
SHA5122d63468afbf0ed80129fd22b275ea7f3daf3e65156713bbe554888d819ad55376841e92ca1509f961314f621fae3113ce9fc7f4945845ec4df165cd2c35f1f9e
-
Filesize
80KB
MD57fa247dfa2e9c50cb55ee91b30f457f7
SHA17389f35ad3cd92ab5720065dc22c1b1dcfa29652
SHA256fe845e58575b07288c315ce4dc26104605db2c43c6de35da88261f35f96162a1
SHA5128aa79dfa4a267693e9c71f58fda60198bd34cbc8dad1f44de76a7cab15dd4f049e5c6cad12a6ee5b333e5ed24a15c4efa0a58b84f0744c4ce56978eed25bd951
-
Filesize
80KB
MD5c00567a50d501a8f5910f9d8fe64c502
SHA1768242d23ae24e76cf334490195166fab0d82592
SHA256a6431b3d718c8cedf537141dbc83eeeee1ce5fbbe62c9c788ede25aaa5a08f2c
SHA512e2688411fecafd96f28a5308e9eb9c151dc4c7596121f3a821415f248c37a2aaa6e58635fcbbbedad91063e048dc5ffd89204efc573f71f6ff8c957ca60205d9
-
Filesize
80KB
MD59980b08bbae0f23cf16b70c6ea2897fd
SHA12ed98219dbea3b23410ac668d15ea1fbdb6e61a8
SHA2565ddba5a69b44de2cb6cbd1fd6e50a699fa14aa1227d350453972b51de3f32c14
SHA512b6b1b65c0e0ead204009d829b953e4f331424962a6d3d96647037a1027a1186cadd48498eebcd19ce1717484cece314e9e07867bf40964849fe2769bb54af166
-
Filesize
80KB
MD5dccb382ea6504f46c60a529af9820796
SHA16f5ed18fed02f6fd66b2b61c31a88804cdf1f624
SHA2569112194c5dc1363c522339c4465c2396924f88dfa93f4bc4f7627da79cb45a48
SHA51288d39a5e5a38211ed2ecdc5bf78d06f8f2fc0fb29dd39ccfff754f3c9cb82dc5e765ce3a6f1699ade3794cdd58d5dd8b8dd85300e1d4d8bad8f1bfc3e524513e
-
Filesize
80KB
MD525d92604d4008ec6021e2037706ea7f9
SHA1e8681f66ab215fbbcc4d62332f6278f3df9ae776
SHA2566abe34941e1a819f1b72d5cbb79c4d53f27248cc2f849144bc2a6021e69d578f
SHA512514a637892665ac9b1c6b1047ae785599b252974c0f8c1b4ff3ca63fcd0f951e5aa45268fe12ef8e6d56838c7cf3012cbb0585368acebb0be9660f08cd5605ee
-
Filesize
80KB
MD54dfe800eee9af40faad16c54691abb99
SHA124ee636376bfda2ea2a4b5b546871008e2306e98
SHA25607e294ae44b28d776bf96bd1be7b52c8c6f4aab3ff0fd280faeef264e2f43f00
SHA512c8d95c74efa4e10b330a80c7b19430ec6c857e9920ae77fcf9a45c6b0898b279782374ed3c8e6a0458c34d6b8216a5d1d5c42288ef8e7a00741e24fc9af24114
-
Filesize
80KB
MD5d24ffc210b084ed8782da79c02273488
SHA1e7f4000e07d156e04b36eeea9d91295a7937a123
SHA2567d1af85422d02f5949853c3ddba5088e0fa403450aca8fcb4398d1f1d9e863c9
SHA51262e901626148391ee76be4cba1c44ef8648e41170b3f547ac860c2c261116e8ba3e39ab6d1f58239a473cb86fb8d390e0b314518a3f7e893d27367a81a73792b
-
Filesize
80KB
MD5014d04d3ee499c1671e1bd5c0c218ad7
SHA1833e60722bd7f9a1fbb7dafe928e029efcc63ea9
SHA256f667650db514ea4871b85cf43d73c6cf645396f8b57b375974b0898c59a2597b
SHA5121597bf533356e7a2e5eee6e30bb4c0211bac0f79481b25b77eda4f3ac325ee0cd73f95fb7302f08f099c58656c657061d073f73c92e89c91ec8ad3f0aed43d46