Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 17:32
Behavioral task
behavioral1
Sample
feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe
Resource
win10v2004-20240802-en
General
-
Target
feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe
-
Size
276KB
-
MD5
ea3ea5ec636bce993e41989ba5d737f0
-
SHA1
02afaf172addacde5b668af27fd027b5c4b5133b
-
SHA256
feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56
-
SHA512
f2c04b2068e10008f91b0270da508860eee7e9c6d3f0dabe6f3760b9d60704b20ea8f1123c45bc0cd95feccec9954ee2edc8358b8a9d1b047e216030b5a57f15
-
SSDEEP
6144:PqX7MKsnRByfa/iROdWZHEFJ7aWN1rtMsQBOSGaF+:CX7IyS2HEGWN1RMs1S7
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Halaloif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jldkeeig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nhlfoodc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oljoen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jlidpe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mddkbbfg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qppkhfec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kocphojh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhdggb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Madbagif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pecpknke.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lehhqg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omcbkl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkmhgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gbpnjdkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ieqpbm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laffpi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhbciqln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Napameoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odljjo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfjcep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mklfjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mddkbbfg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mojopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nomlek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pehjfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qfjcep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Klbgfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nbdkhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Omaeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pkmhgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gnfooe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgcmbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlidpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lknjhokg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhlfoodc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omaeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ibdplaho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nhbciqln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Odjmdocp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ocknbglo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hqghqpnl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdhbpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdnebc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgocgjgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ilfodgeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ilmedf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iloajfml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iloajfml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klbgfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lehhqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mdnebc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcfmneaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qppkhfec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jddiegbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leoejh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndlacapp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocknbglo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkfkng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aflpkpjm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afnlpohj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Igmoih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Memalfcb.exe -
Executes dropped EXE 64 IoCs
pid Process 3612 Gdknpp32.exe 2016 Gbpnjdkg.exe 1312 Gnfooe32.exe 4832 Hgocgjgk.exe 752 Hqghqpnl.exe 1712 Hjolie32.exe 2772 Hgcmbj32.exe 3452 Halaloif.exe 3260 Hnpaec32.exe 4568 Hejjanpm.exe 3124 Ilfodgeg.exe 3364 Igmoih32.exe 4624 Ieqpbm32.exe 5104 Ibdplaho.exe 3544 Ilmedf32.exe 704 Iloajfml.exe 3180 Jbijgp32.exe 3752 Jaljbmkd.exe 3448 Jldkeeig.exe 2528 Jlfhke32.exe 1212 Jlidpe32.exe 4944 Jddiegbm.exe 1844 Kdhbpf32.exe 4280 Klbgfc32.exe 4340 Kocphojh.exe 2888 Klgqabib.exe 4968 Leoejh32.exe 2556 Laffpi32.exe 3248 Lknjhokg.exe 380 Lhbkac32.exe 3972 Lhdggb32.exe 2984 Lehhqg32.exe 2488 Mdnebc32.exe 1960 Memalfcb.exe 1444 Madbagif.exe 556 Mklfjm32.exe 3956 Mddkbbfg.exe 2952 Mojopk32.exe 3776 Nhbciqln.exe 2860 Nomlek32.exe 1908 Nheqnpjk.exe 4908 Ncjdki32.exe 4352 Ndlacapp.exe 3412 Napameoi.exe 3720 Nhjjip32.exe 3236 Nkhfek32.exe 4936 Nhlfoodc.exe 3332 Ncaklhdi.exe 5040 Nbdkhe32.exe 4612 Oljoen32.exe 1264 Ohqpjo32.exe 3632 Odgqopeb.exe 3540 Odjmdocp.exe 4312 Omaeem32.exe 3584 Ocknbglo.exe 3636 Odljjo32.exe 2980 Omcbkl32.exe 1564 Oflfdbip.exe 1556 Pofhbgmn.exe 3280 Pecpknke.exe 3068 Pkmhgh32.exe 4376 Pfbmdabh.exe 1104 Pmmeak32.exe 1856 Pcfmneaa.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nhjjip32.exe Napameoi.exe File opened for modification C:\Windows\SysWOW64\Pcfmneaa.exe Pmmeak32.exe File created C:\Windows\SysWOW64\Nonhbi32.dll Pehjfm32.exe File created C:\Windows\SysWOW64\Pmmfoj32.dll feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe File created C:\Windows\SysWOW64\Fljloomi.dll Hqghqpnl.exe File created C:\Windows\SysWOW64\Pakfglam.dll Jbijgp32.exe File opened for modification C:\Windows\SysWOW64\Laffpi32.exe Leoejh32.exe File created C:\Windows\SysWOW64\Mbdpdane.dll Lhdggb32.exe File created C:\Windows\SysWOW64\Iloajfml.exe Ilmedf32.exe File created C:\Windows\SysWOW64\Mojopk32.exe Mddkbbfg.exe File opened for modification C:\Windows\SysWOW64\Odgqopeb.exe Ohqpjo32.exe File created C:\Windows\SysWOW64\Mpaflkim.dll Oflfdbip.exe File created C:\Windows\SysWOW64\Ilmedf32.exe Ibdplaho.exe File created C:\Windows\SysWOW64\Kdlmhj32.dll Lknjhokg.exe File created C:\Windows\SysWOW64\Kpmmhc32.dll Oljoen32.exe File created C:\Windows\SysWOW64\Afnlpohj.exe Acppddig.exe File created C:\Windows\SysWOW64\Afgfhaab.dll Jldkeeig.exe File opened for modification C:\Windows\SysWOW64\Qppkhfec.exe Qifbll32.exe File created C:\Windows\SysWOW64\Cifiamoa.dll Mklfjm32.exe File created C:\Windows\SysWOW64\Nnmmnbnl.dll Omaeem32.exe File opened for modification C:\Windows\SysWOW64\Omcbkl32.exe Odljjo32.exe File opened for modification C:\Windows\SysWOW64\Pmmeak32.exe Pfbmdabh.exe File opened for modification C:\Windows\SysWOW64\Kdhbpf32.exe Jddiegbm.exe File created C:\Windows\SysWOW64\Odgqopeb.exe Ohqpjo32.exe File opened for modification C:\Windows\SysWOW64\Odjmdocp.exe Odgqopeb.exe File created C:\Windows\SysWOW64\Pkabbgol.exe Pehjfm32.exe File created C:\Windows\SysWOW64\Ejcdfahd.dll Afnlpohj.exe File opened for modification C:\Windows\SysWOW64\Iloajfml.exe Ilmedf32.exe File created C:\Windows\SysWOW64\Dhfhohgp.dll Kdhbpf32.exe File opened for modification C:\Windows\SysWOW64\Oflfdbip.exe Omcbkl32.exe File created C:\Windows\SysWOW64\Pmmeak32.exe Pfbmdabh.exe File created C:\Windows\SysWOW64\Qppkhfec.exe Qifbll32.exe File created C:\Windows\SysWOW64\Aknmjgje.dll Acppddig.exe File created C:\Windows\SysWOW64\Hgcmbj32.exe Hjolie32.exe File opened for modification C:\Windows\SysWOW64\Lknjhokg.exe Laffpi32.exe File created C:\Windows\SysWOW64\Najlgpeb.dll Laffpi32.exe File created C:\Windows\SysWOW64\Gnfooe32.exe Gbpnjdkg.exe File created C:\Windows\SysWOW64\Mdnebc32.exe Lehhqg32.exe File created C:\Windows\SysWOW64\Bhejfl32.dll Mddkbbfg.exe File opened for modification C:\Windows\SysWOW64\Nhlfoodc.exe Nkhfek32.exe File created C:\Windows\SysWOW64\Pofhbgmn.exe Oflfdbip.exe File created C:\Windows\SysWOW64\Gbpnjdkg.exe Gdknpp32.exe File opened for modification C:\Windows\SysWOW64\Gnfooe32.exe Gbpnjdkg.exe File opened for modification C:\Windows\SysWOW64\Qfjcep32.exe Qppkhfec.exe File created C:\Windows\SysWOW64\Acppddig.exe Amfhgj32.exe File created C:\Windows\SysWOW64\Jlidpe32.exe Jlfhke32.exe File created C:\Windows\SysWOW64\Qkfkng32.exe Qfjcep32.exe File created C:\Windows\SysWOW64\Kjekja32.dll Gnfooe32.exe File opened for modification C:\Windows\SysWOW64\Jbijgp32.exe Iloajfml.exe File created C:\Windows\SysWOW64\Klbgfc32.exe Kdhbpf32.exe File created C:\Windows\SysWOW64\Jaljbmkd.exe Jbijgp32.exe File created C:\Windows\SysWOW64\Jgcnomaa.dll Leoejh32.exe File created C:\Windows\SysWOW64\Ohqpjo32.exe Oljoen32.exe File opened for modification C:\Windows\SysWOW64\Pecpknke.exe Pofhbgmn.exe File created C:\Windows\SysWOW64\Pfbmdabh.exe Pkmhgh32.exe File opened for modification C:\Windows\SysWOW64\Gdknpp32.exe feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe File created C:\Windows\SysWOW64\Ghikqj32.dll Ilfodgeg.exe File created C:\Windows\SysWOW64\Lehhqg32.exe Lhdggb32.exe File opened for modification C:\Windows\SysWOW64\Nomlek32.exe Nhbciqln.exe File created C:\Windows\SysWOW64\Eknanh32.dll Nhjjip32.exe File created C:\Windows\SysWOW64\Pkmhgh32.exe Pecpknke.exe File created C:\Windows\SysWOW64\Lapmnano.dll Hgocgjgk.exe File opened for modification C:\Windows\SysWOW64\Jaljbmkd.exe Jbijgp32.exe File opened for modification C:\Windows\SysWOW64\Nhbciqln.exe Mojopk32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mddkbbfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omaeem32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjolie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdnebc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilmedf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlfhke32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jddiegbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndlacapp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oljoen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkmhgh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gdknpp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcfmneaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qppkhfec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qifbll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nomlek32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pofhbgmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qfjcep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hejjanpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odljjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ieqpbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Napameoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Halaloif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnpaec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acppddig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lehhqg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odgqopeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfbmdabh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pehjfm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkabbgol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amfhgj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amhdmi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgcmbj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbijgp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgocgjgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iloajfml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nheqnpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohqpjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocknbglo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oflfdbip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qkfkng32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kocphojh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Memalfcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mojopk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odjmdocp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omcbkl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pecpknke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pbljoafi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igmoih32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Madbagif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncjdki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jldkeeig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Laffpi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ibdplaho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhlfoodc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Leoejh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncaklhdi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbdkhe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jaljbmkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klbgfc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkhfek32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aflpkpjm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klgqabib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhbkac32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ilfodgeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jbijgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nhjjip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Daliqjnc.dll" Pcfmneaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pkabbgol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iloajfml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jlfhke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Klgqabib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kchhih32.dll" Lehhqg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qfjcep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndnoffic.dll" Jddiegbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oljoen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hqghqpnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjonchmn.dll" Nheqnpjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Codncb32.dll" Ncaklhdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Odgqopeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdknpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Najlgpeb.dll" Laffpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pmmeak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pehjfm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hnpaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jlidpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgcnomaa.dll" Leoejh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lhdggb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqcgfpia.dll" Mojopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nhbciqln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nbdkhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qifbll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjekja32.dll" Gnfooe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Memalfcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nngihj32.dll" Memalfcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Omaeem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Odljjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Halaloif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Klbgfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lknjhokg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pecpknke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkiigchm.dll" Pecpknke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmmfoj32.dll" feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbdpdane.dll" Lhdggb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkjbah32.dll" Klbgfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oflfdbip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gdknpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Odljjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Klbgfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kocphojh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdghfg32.dll" Mdnebc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nhbciqln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nhlfoodc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ncaklhdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Omcbkl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pmmeak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejcdfahd.dll" Afnlpohj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmkjoj32.dll" Jlfhke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Napameoi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qppkhfec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fljloomi.dll" Hqghqpnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lknjhokg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kannaq32.dll" Pmmeak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hnpaec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Igmoih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Memalfcb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3612 3276 feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe 89 PID 3276 wrote to memory of 3612 3276 feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe 89 PID 3276 wrote to memory of 3612 3276 feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe 89 PID 3612 wrote to memory of 2016 3612 Gdknpp32.exe 90 PID 3612 wrote to memory of 2016 3612 Gdknpp32.exe 90 PID 3612 wrote to memory of 2016 3612 Gdknpp32.exe 90 PID 2016 wrote to memory of 1312 2016 Gbpnjdkg.exe 91 PID 2016 wrote to memory of 1312 2016 Gbpnjdkg.exe 91 PID 2016 wrote to memory of 1312 2016 Gbpnjdkg.exe 91 PID 1312 wrote to memory of 4832 1312 Gnfooe32.exe 92 PID 1312 wrote to memory of 4832 1312 Gnfooe32.exe 92 PID 1312 wrote to memory of 4832 1312 Gnfooe32.exe 92 PID 4832 wrote to memory of 752 4832 Hgocgjgk.exe 93 PID 4832 wrote to memory of 752 4832 Hgocgjgk.exe 93 PID 4832 wrote to memory of 752 4832 Hgocgjgk.exe 93 PID 752 wrote to memory of 1712 752 Hqghqpnl.exe 94 PID 752 wrote to memory of 1712 752 Hqghqpnl.exe 94 PID 752 wrote to memory of 1712 752 Hqghqpnl.exe 94 PID 1712 wrote to memory of 2772 1712 Hjolie32.exe 95 PID 1712 wrote to memory of 2772 1712 Hjolie32.exe 95 PID 1712 wrote to memory of 2772 1712 Hjolie32.exe 95 PID 2772 wrote to memory of 3452 2772 Hgcmbj32.exe 96 PID 2772 wrote to memory of 3452 2772 Hgcmbj32.exe 96 PID 2772 wrote to memory of 3452 2772 Hgcmbj32.exe 96 PID 3452 wrote to memory of 3260 3452 Halaloif.exe 97 PID 3452 wrote to memory of 3260 3452 Halaloif.exe 97 PID 3452 wrote to memory of 3260 3452 Halaloif.exe 97 PID 3260 wrote to memory of 4568 3260 Hnpaec32.exe 98 PID 3260 wrote to memory of 4568 3260 Hnpaec32.exe 98 PID 3260 wrote to memory of 4568 3260 Hnpaec32.exe 98 PID 4568 wrote to memory of 3124 4568 Hejjanpm.exe 99 PID 4568 wrote to memory of 3124 4568 Hejjanpm.exe 99 PID 4568 wrote to memory of 3124 4568 Hejjanpm.exe 99 PID 3124 wrote to memory of 3364 3124 Ilfodgeg.exe 100 PID 3124 wrote to memory of 3364 3124 Ilfodgeg.exe 100 PID 3124 wrote to memory of 3364 3124 Ilfodgeg.exe 100 PID 3364 wrote to memory of 4624 3364 Igmoih32.exe 101 PID 3364 wrote to memory of 4624 3364 Igmoih32.exe 101 PID 3364 wrote to memory of 4624 3364 Igmoih32.exe 101 PID 4624 wrote to memory of 5104 4624 Ieqpbm32.exe 102 PID 4624 wrote to memory of 5104 4624 Ieqpbm32.exe 102 PID 4624 wrote to memory of 5104 4624 Ieqpbm32.exe 102 PID 5104 wrote to memory of 3544 5104 Ibdplaho.exe 103 PID 5104 wrote to memory of 3544 5104 Ibdplaho.exe 103 PID 5104 wrote to memory of 3544 5104 Ibdplaho.exe 103 PID 3544 wrote to memory of 704 3544 Ilmedf32.exe 104 PID 3544 wrote to memory of 704 3544 Ilmedf32.exe 104 PID 3544 wrote to memory of 704 3544 Ilmedf32.exe 104 PID 704 wrote to memory of 3180 704 Iloajfml.exe 105 PID 704 wrote to memory of 3180 704 Iloajfml.exe 105 PID 704 wrote to memory of 3180 704 Iloajfml.exe 105 PID 3180 wrote to memory of 3752 3180 Jbijgp32.exe 106 PID 3180 wrote to memory of 3752 3180 Jbijgp32.exe 106 PID 3180 wrote to memory of 3752 3180 Jbijgp32.exe 106 PID 3752 wrote to memory of 3448 3752 Jaljbmkd.exe 107 PID 3752 wrote to memory of 3448 3752 Jaljbmkd.exe 107 PID 3752 wrote to memory of 3448 3752 Jaljbmkd.exe 107 PID 3448 wrote to memory of 2528 3448 Jldkeeig.exe 108 PID 3448 wrote to memory of 2528 3448 Jldkeeig.exe 108 PID 3448 wrote to memory of 2528 3448 Jldkeeig.exe 108 PID 2528 wrote to memory of 1212 2528 Jlfhke32.exe 109 PID 2528 wrote to memory of 1212 2528 Jlfhke32.exe 109 PID 2528 wrote to memory of 1212 2528 Jlfhke32.exe 109 PID 1212 wrote to memory of 4944 1212 Jlidpe32.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe"C:\Users\Admin\AppData\Local\Temp\feea3e519a14cd6f7c3c07aec2f34f9cda63a72db78896d5fb6d9080a356dc56N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\Gdknpp32.exeC:\Windows\system32\Gdknpp32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\Gbpnjdkg.exeC:\Windows\system32\Gbpnjdkg.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\Gnfooe32.exeC:\Windows\system32\Gnfooe32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\Hgocgjgk.exeC:\Windows\system32\Hgocgjgk.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\Hqghqpnl.exeC:\Windows\system32\Hqghqpnl.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\Hjolie32.exeC:\Windows\system32\Hjolie32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\Hgcmbj32.exeC:\Windows\system32\Hgcmbj32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\Halaloif.exeC:\Windows\system32\Halaloif.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\Hnpaec32.exeC:\Windows\system32\Hnpaec32.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\Hejjanpm.exeC:\Windows\system32\Hejjanpm.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\Ilfodgeg.exeC:\Windows\system32\Ilfodgeg.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\Igmoih32.exeC:\Windows\system32\Igmoih32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\Ieqpbm32.exeC:\Windows\system32\Ieqpbm32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\Ibdplaho.exeC:\Windows\system32\Ibdplaho.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\Ilmedf32.exeC:\Windows\system32\Ilmedf32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\Iloajfml.exeC:\Windows\system32\Iloajfml.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\Jbijgp32.exeC:\Windows\system32\Jbijgp32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\Jaljbmkd.exeC:\Windows\system32\Jaljbmkd.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\Jldkeeig.exeC:\Windows\system32\Jldkeeig.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\Jlfhke32.exeC:\Windows\system32\Jlfhke32.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\Jlidpe32.exeC:\Windows\system32\Jlidpe32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\Jddiegbm.exeC:\Windows\system32\Jddiegbm.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4944 -
C:\Windows\SysWOW64\Kdhbpf32.exeC:\Windows\system32\Kdhbpf32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1844 -
C:\Windows\SysWOW64\Klbgfc32.exeC:\Windows\system32\Klbgfc32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4280 -
C:\Windows\SysWOW64\Kocphojh.exeC:\Windows\system32\Kocphojh.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4340 -
C:\Windows\SysWOW64\Klgqabib.exeC:\Windows\system32\Klgqabib.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Leoejh32.exeC:\Windows\system32\Leoejh32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4968 -
C:\Windows\SysWOW64\Laffpi32.exeC:\Windows\system32\Laffpi32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2556 -
C:\Windows\SysWOW64\Lknjhokg.exeC:\Windows\system32\Lknjhokg.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3248 -
C:\Windows\SysWOW64\Lhbkac32.exeC:\Windows\system32\Lhbkac32.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:380 -
C:\Windows\SysWOW64\Lhdggb32.exeC:\Windows\system32\Lhdggb32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3972 -
C:\Windows\SysWOW64\Lehhqg32.exeC:\Windows\system32\Lehhqg32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2984 -
C:\Windows\SysWOW64\Mdnebc32.exeC:\Windows\system32\Mdnebc32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Memalfcb.exeC:\Windows\system32\Memalfcb.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\Madbagif.exeC:\Windows\system32\Madbagif.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\Mklfjm32.exeC:\Windows\system32\Mklfjm32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\Mddkbbfg.exeC:\Windows\system32\Mddkbbfg.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3956 -
C:\Windows\SysWOW64\Mojopk32.exeC:\Windows\system32\Mojopk32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2952 -
C:\Windows\SysWOW64\Nhbciqln.exeC:\Windows\system32\Nhbciqln.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3776 -
C:\Windows\SysWOW64\Nomlek32.exeC:\Windows\system32\Nomlek32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\Nheqnpjk.exeC:\Windows\system32\Nheqnpjk.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\Ncjdki32.exeC:\Windows\system32\Ncjdki32.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Windows\SysWOW64\Ndlacapp.exeC:\Windows\system32\Ndlacapp.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Windows\SysWOW64\Napameoi.exeC:\Windows\system32\Napameoi.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3412 -
C:\Windows\SysWOW64\Nhjjip32.exeC:\Windows\system32\Nhjjip32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3720 -
C:\Windows\SysWOW64\Nkhfek32.exeC:\Windows\system32\Nkhfek32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3236 -
C:\Windows\SysWOW64\Nhlfoodc.exeC:\Windows\system32\Nhlfoodc.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4936 -
C:\Windows\SysWOW64\Ncaklhdi.exeC:\Windows\system32\Ncaklhdi.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3332 -
C:\Windows\SysWOW64\Nbdkhe32.exeC:\Windows\system32\Nbdkhe32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5040 -
C:\Windows\SysWOW64\Oljoen32.exeC:\Windows\system32\Oljoen32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4612 -
C:\Windows\SysWOW64\Ohqpjo32.exeC:\Windows\system32\Ohqpjo32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Windows\SysWOW64\Odgqopeb.exeC:\Windows\system32\Odgqopeb.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3632 -
C:\Windows\SysWOW64\Odjmdocp.exeC:\Windows\system32\Odjmdocp.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Windows\SysWOW64\Omaeem32.exeC:\Windows\system32\Omaeem32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4312 -
C:\Windows\SysWOW64\Ocknbglo.exeC:\Windows\system32\Ocknbglo.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Windows\SysWOW64\Odljjo32.exeC:\Windows\system32\Odljjo32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3636 -
C:\Windows\SysWOW64\Omcbkl32.exeC:\Windows\system32\Omcbkl32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2980 -
C:\Windows\SysWOW64\Oflfdbip.exeC:\Windows\system32\Oflfdbip.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1564 -
C:\Windows\SysWOW64\Pofhbgmn.exeC:\Windows\system32\Pofhbgmn.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\Pecpknke.exeC:\Windows\system32\Pecpknke.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3280 -
C:\Windows\SysWOW64\Pkmhgh32.exeC:\Windows\system32\Pkmhgh32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\Pfbmdabh.exeC:\Windows\system32\Pfbmdabh.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4376 -
C:\Windows\SysWOW64\Pmmeak32.exeC:\Windows\system32\Pmmeak32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1104 -
C:\Windows\SysWOW64\Pcfmneaa.exeC:\Windows\system32\Pcfmneaa.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1856 -
C:\Windows\SysWOW64\Pehjfm32.exeC:\Windows\system32\Pehjfm32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3216 -
C:\Windows\SysWOW64\Pkabbgol.exeC:\Windows\system32\Pkabbgol.exe67⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4440 -
C:\Windows\SysWOW64\Pbljoafi.exeC:\Windows\system32\Pbljoafi.exe68⤵
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Windows\SysWOW64\Qifbll32.exeC:\Windows\system32\Qifbll32.exe69⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5148 -
C:\Windows\SysWOW64\Qppkhfec.exeC:\Windows\system32\Qppkhfec.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5192 -
C:\Windows\SysWOW64\Qfjcep32.exeC:\Windows\system32\Qfjcep32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5236 -
C:\Windows\SysWOW64\Qkfkng32.exeC:\Windows\system32\Qkfkng32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:5280 -
C:\Windows\SysWOW64\Aflpkpjm.exeC:\Windows\system32\Aflpkpjm.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:5324 -
C:\Windows\SysWOW64\Amfhgj32.exeC:\Windows\system32\Amfhgj32.exe74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5372 -
C:\Windows\SysWOW64\Acppddig.exeC:\Windows\system32\Acppddig.exe75⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5416 -
C:\Windows\SysWOW64\Afnlpohj.exeC:\Windows\system32\Afnlpohj.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5460 -
C:\Windows\SysWOW64\Amhdmi32.exeC:\Windows\system32\Amhdmi32.exe77⤵
- System Location Discovery: System Language Discovery
PID:5504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4308,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=1032 /prefetch:81⤵PID:1320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5da0bc35b345964eafa7a9e2feccd16fd
SHA1211f0d982b150eb2bcb62386052940676615eac6
SHA256ab54f48a6bc5f67a2ade150ac483adc43afb9990dc28738d8139c2a6f601e2e2
SHA512216559998ec663ce3ae43769ee5bd960fc3b1da6967cf73b679dc89211ec02b1fb922fb69f93e2dc14fd5fb851ebb79d372562f1b9d97a3adb3133f95710c24e
-
Filesize
276KB
MD5804bc903015567f5c98ccd0ba1e0ed81
SHA1f423270878ecf5d05f41c9b0d27f02110387ac22
SHA256882be4138d59c305a64baac7b2fd98313d7da4367dabb62f5cdbfb5353d53f68
SHA512c676c2321362b38288a977df4145bfa1cf0e2696804db4e0ae318911af2cbb0b57ea225c81d86df15d7adf826d74a628e47af0c668965889fabb0f1d49d554b7
-
Filesize
276KB
MD52278707bf031a17fdffb68a6c9b01618
SHA1ba304e6075e50f07997297adac13e61fa611f821
SHA256c923639a4e3a6d5cd6d25c9930da7ce87b7032c34be67ec46627f2496b308e46
SHA512e8101abbfeb43fac6e5005de3a5684495c7d60c51d530bc638360bd0e81617d65be1c2854e14147cc3954a619737aa1543dc159b2a7e5f169cfccbfa35d5118d
-
Filesize
276KB
MD5307db668d2e7604c1d642c24f7b6b737
SHA1f672f5b9ab5099f4e75f11d44cd2858e64c979b0
SHA25617b8a84b10740d080a42fb57a8ca00498eb7af3356725664a014051bef91d102
SHA5128feebff82bb3e6dde250a72f293ccf24045233a0b898ccb4c2cb3c41e30ce362a31d085ea55a99735820aeab23e3b392f7a7464e3ba6fd5cecae8eb7c884d0e7
-
Filesize
276KB
MD5d5607dbc2a53a6d20ea1e3b07953da76
SHA16208dc92baac108e003b219b85982dd21ccee7c9
SHA25640552015a01011a54a81433feaaec72a531c79a3ecb861c0e0b449338faa752c
SHA512ee7cc06788893e2b47ecb72c5067f27e58b68fd9eb6143ca19743a2e7141d0229b89f72048a9612ef4211b18ae010e744626858723528dfd20c7af5932d2535b
-
Filesize
276KB
MD57826c920f6537a26d483c54b86db66f4
SHA1e2d0faff97ea10eb7fbced5295e6aadd3a09f9da
SHA25638ad61a9141eb79a9fe2a72333b8627d5e481f828eaebe3a1ac67ed615c75849
SHA51290a33fcc41e9dfd2bbc5a9e6e70f758e069fd90559eba0241ceb00e9ad852b08cf0117699cabe48c05cb1417e7fd30d6b527f5e48e9ae1da7984c522f0107dbd
-
Filesize
276KB
MD5e4ccea2411c03ce89f81a339dedec263
SHA1ce139fdf78e40f21ceac7f082e19f5b667aa2024
SHA256c970cf77ee14670cc52eed7613991d573124088ec87560970cacc697c8e5be1a
SHA5120bd770c97d91f1bf1692969c0b6c1d50c4c2acdc4421ea8986fd32184a1abcc84e09b955bed028dfb207b9975394dc0143c4a3589294c2ccfed830068a8270e9
-
Filesize
276KB
MD5c200ac45b30718d5f427924e4b57d5d6
SHA1a5ba7f882349fdd59c9307dbca069b4104aa0848
SHA256efd55c9ba44d92f86c9e61d69cab28ec97bddda0e6d3cc65144b3f20af810acb
SHA5122ef9c5a2b5862c7f797c9c5f8c621bd8aeebe13f71e580a9dc546e50ebca126085e05ed6add3508c7a2f2b6477c3cc140feb999242fbc512c68885f07df7fe59
-
Filesize
276KB
MD5195b46b98e87fde373cbaf085cc65621
SHA178534f5db708e98c2c916f244bd0ad0515d7ba42
SHA25682b52a7496fda4dcf430557d9a42098f48947880961cf6c66a57ddcb3d31132e
SHA5121ac5310f8710773eab928c77be8772c08f8773b14ef15fac63bc3cb17d85da672f9605264d93c0fae7e636822356a5a532d48d5d8d8c236526b6a29085857355
-
Filesize
276KB
MD5ca560eb2a7c63346a4b68fcb871f24e1
SHA1122351adddfbd342aba7d41e46752577c0c3a62b
SHA256e2dc040cabb28afca33511be48ea855d9221295a541d60e9c7fc9106ef4bc6de
SHA5126f145ef64908d358cd94ee204fecd828e7d7402ffc704ab9c8ad8e51ff40ba69e365b149d31df87ad2a1787b896f1edf3af99d0fd0dec71bb3984ffaca0f6e36
-
Filesize
276KB
MD506b7ae4c063bed7f2e95ef90f835d090
SHA171198984676361512bc907ee3310707dfbb86e93
SHA256e8573e0437f727e4e962084ff26e2856ad3534a02951e1130bf876176d85a282
SHA5124820a461cabbdc96755067ff84267f1036de0c619d6cd8c430bc810313e56632aaab9f17f6c0322a5e006bae122836726fcdf4b43fc1094a231d0c59c7efb7a2
-
Filesize
276KB
MD5026ee2bb0ff95c00b88be59560922164
SHA1668632760a46c98b9367e803d7a10cf7d1039121
SHA2564de8b4ee546d9f48919341245d684b1e58ce89259d7ad48ccad9bea2e2fbd4b9
SHA512571325a2cecc585ee9fd8ca750ab28627c7d78bf9765c419ece4d075a524a35121e6b041b7bbd559c470c8ab742b568ef07b9df57da1db07c1f706449c41e326
-
Filesize
276KB
MD5cbf8992afddc1813a92be12bc7380fe2
SHA144eb5d0639b48a6ddb6e54f676df0f73a224d119
SHA2561e36c66d2c4cbc1f445e38f3e9a7033df68bcfd2258efb43d63abcba2f075ec1
SHA512fcf2ea47f50bbdafa3aa3d0be1387a3f59ffb9c8c0747fcaf758f3bb8986542f3dd458be66a8f81cabd84706ad4b4a330c5a471ae8b6b2c994dc6199769817ae
-
Filesize
276KB
MD59b76d80c0907f9d9fb2c302b3971861b
SHA1c690f514c8fcb20ace911bb3998edaa4df7f1312
SHA256771176e3180d7159c92553fcbb401bf9c23daf98d2c0f1b3ac58d87ea85c06ba
SHA5121b013b52c2a1c269c9cc3930888743a7144e96389779ca549733fe6f2a3997ed348cc2b19c47cc0c09530efdcfb6c5ba8d77e02207d2047129c63046b60ab071
-
Filesize
276KB
MD59fcbc4c9c00d30b4e8dd609ffc342c30
SHA1e4f108bf78e740a329b246309796e96932919bd9
SHA2564d30e7b74bf94c08e2ffbfa683a12b5dc9c50c8db8a41b246285924ae2e59cde
SHA512d68bb8c5f895ed60bba7908271823ec8b734b21b1dc0a17184623c0c13d55b5a393853fcf8e8ffa3b2879cf6fc3632e87e4b8b8832478c055341d8267073e017
-
Filesize
276KB
MD5013906e2c5328792213df51cea4eb1e7
SHA1bd7b85446f89747ca95a3675d107c588d677058b
SHA256b0f330f8894fa125adeb546ae09897fb2a27fa9560f9cf13ac325a6589d3dc14
SHA512df403399c871091871ea6a4059bee2e595e6fa121348a8af8c36ddb9f683eceb40d3906ded68c7940384d5cf62bbe0904f534117588ca1a9238dfbfcc25b20b9
-
Filesize
276KB
MD5438daf3df25a764f199c54548a87d047
SHA1a5fed9583122701aedb8989c501550dc470fc5a3
SHA2567998e9e7a6e123cfa2784d5206b9f41a30517a25dd16c6df216d06e90ebbabf3
SHA51279e5f5a59c92c77fea044769d0890c5eaa6d7e54fd530815f8a6b6aef215ac028edbe8669143a5a0ac216c0e5ff892a989545a46950edd72f1480680d317216a
-
Filesize
276KB
MD5ce1058afd3dbdb5fbd651dd996bcaebc
SHA1b46975b14114facd54625b079b844ad29e20a8db
SHA256b2355d60de2350075b721c9442a124bb85831a3850c122ac5dc20192bbcbf7a5
SHA5121bc436a8748215ea56536921b88d046e356bdb665afa25c791abbedb1e040f10d430efcd869ae137fa94d83a1635197f2435cd49b31a0758b8d655edc34083d9
-
Filesize
276KB
MD5fe65502d6a74f96a20df447cfe77eb44
SHA1f165220cbb077d836b8aedb8dd90499a236f3a64
SHA256aa9dfe492302b15f5b8bebb028e8432914aed290b37e5f3b2d88c56cc43f66f1
SHA5120d058efe8a8920492b0c79fdf501bd4c506cd5752ad3cdf01b339e700b1739d09a01627df0fa4842e6a06e67aca3fabd9f429daae8832fa02a1001d4e461a9d5
-
Filesize
276KB
MD599968ef2d3679b1c24ae12256f48584e
SHA1b9e86b2c70cbec68be9556bfe1d9f95346a1f104
SHA25604f5c115bb013a1319d07ebe2d007a0845e9623ad923c4e10bb3b91f07c2a145
SHA5121a02b0e2f3bbb743deff464af634c7a0472cfdd930176b6afa1b341bb7097ccef18fce620798a99cb23ce613a2721b7fd5e939838d4134f8d383c36eb52b7ce6
-
Filesize
276KB
MD5af839cf5f1448760b21147a58804dfc2
SHA1741f5f808ceb34552ecc5619acef05fb4021f0ad
SHA256c4e1d5ca54156ca0a67f10220ed0f45aab3f8427057dde40aca7e98922b1e0a1
SHA512db1c8a14456a627c53f5000fa3ea27311ba0184fc2abdae125e8cd3263e7b65ce52fc66892ea05e2b8db2269b377701be19d75472d15573d31567ab533aad714
-
Filesize
276KB
MD5f6b01cf0b9bc796640a1036c66bf7bbc
SHA1f5046631475404a4bc260f04c9fc36926140fdf3
SHA2565a89ab2da4cdbd7983d517b3d5dc912237cb123bc0982371a0ac2250d55c4627
SHA512e3f4265e85fa43d2d8e743557257db6aba994ef04dbba3c09ffbf6a9668a13bf4a27b8bc9dc7ebd12ee32c5f9271669a855fe8918b1624bdc3fddbe2c2e924c2
-
Filesize
276KB
MD589d29c3b9f80dbe5e2f999aaff2ba9a0
SHA127a88468368c6f8820d8f39d1896317e0fd3df5d
SHA256afa020e34721553586fa76969adbfbf59594fd67fc84867979ffa7c5cdd08ff2
SHA51259177e20c016230ca590c7a4b8beb0eee4aee899cc7b1ad4753b0155ee59b7b00618d59ef1bdeb3179a0a0844b53e69ffc038d5a83991c880d6f6944bbb8cd84
-
Filesize
276KB
MD524dcc1b2d19b5898d2b85d1314ebacb3
SHA1fc830bfa6bfa244fa1ea6de000af1ca18549dbdb
SHA256a42f77b955e6b28d2c4f44833c9cf83aad3acb5872906491ec2ec8b094d92bd2
SHA5124039594ab2f3ba9fe5f6c31391a9f52d322cc7155119e79a3cbb029cfe6f89f0f6c6f2e276b067c4695db036263a228c8cd76e5438f9db2d52675f18bba5c64a
-
Filesize
276KB
MD534b8e1acf677b7294aa60a77282f4443
SHA1117f477d2e3292f2ba0a18dccd8e0e22be140f30
SHA256507c0d463112522575435dea36006a162b9320628d14e9aa1da8db85ae786ff8
SHA512bbf33200e3d95bec0b1f3be63ea2b256c237e4560afd12cc210f95a8f0a14522c8327dbdb04afac9e4b78b355fbc52601898cb55b02e0f12f90b29aa913b1cb1
-
Filesize
276KB
MD5d0251d1e25820154383f8b00152d3363
SHA1fe80c8ea41f6456fdd10b302e7b7f9e81143fbda
SHA256fc95cfb690f45987378538b2b53dc1418f0f110593f1a3203af69fa73854949c
SHA51220aa8807fc913d43dd887c1a7db989e7a4778f51b47ebca0197a0c90cb7707b97393342ef7ec760213caf202ff3fa85017bbdc5c29cf63693ce8202d07f48a8c
-
Filesize
276KB
MD5f8d62db1a5adf54a77e4f8a4c80ea885
SHA1747635e36007630b957a96443a93e4e9d3722983
SHA2567ca6ffa52578285d86e6103b1037bd4c2c79d5a02b5879e395b1d44c3e4bf337
SHA512120761c47b3ab68b8e58c7a7f00cb4b8f9a4058e0bdd59dd5dfe9347f77b40d3c7e2075d4f22e93911abcae5a1f6044c010bbaeb90fac9ea7939c81616ac9ac6
-
Filesize
7KB
MD51c8c5265a745198b76c9d4fe29319d19
SHA185a5e5dfebbdc965ed1efdec262a396ab200688d
SHA256f991c304ef1b89816e38347fd2be7fa8cbe5c34aa1911ced7ad591b9b61119e3
SHA5126ce48fff7de81cb9852b27aa7f28cf8a63ab2c5e5e0387a5af7e502e1ceea54eed91083f23a761988972a76c0fc090f43f033fb5184f09281fc593a49f14d43d
-
Filesize
276KB
MD5e81ad4a37821c7e64bed1aab01ed20cd
SHA1339098385732eba1a9afd7184bac09c08b550c1b
SHA256bc39edd2f5b8e0f1982dc728a6ede6cdb6aecf490284e05c94b8b5648d29a9c9
SHA51258eadd962c05a8f91ec6bb82fcefbb8f45909a762f16bab8d1ddc16f07fe04a36aa83331482647dd4da1f184f61c258afa9271e7b65056d5721ae7f5fd1b83e9
-
Filesize
276KB
MD5d9900ede96b46386ef11d19898ce2211
SHA1c53153a354ee155c7a01068c8d5590550d680a5d
SHA256e44b008ebbee4ae8b5f5fcf9bd2f52136c5175aa558272176c9b759e56703b9a
SHA5123645d5057d0c70c06878ebf54ddebf945af8cd9fca88be4fba58eb5e1227e8773106cf8e29a381023006d9076f59eb6cd3accd42745cacd4ca72569336fef929
-
Filesize
276KB
MD59ecc8de3c64b84dd3a729118cfd2217a
SHA1327130b92c1cd6f7b482d4eeee4422e5ab0e6722
SHA256f1b2ba57b0ae3ee67e00956ed3e1e25d51312d47141c1f9687a1e6d3e677dacb
SHA512ccce0365ff2a1289e1b729f028e7a9df5dfc80060038bd8985d7dbde6f7633b92762f3036d3bccc1e83d34f7b2d7a6f84ffedbd2262d38f8838f12cac20ba634
-
Filesize
276KB
MD518cc277443cc61e3fd1f8a992d3fdbb4
SHA1cbb9db9c7b64efc0e3e419ca8ad0c410aa4bbaf3
SHA256d52792077eb6510f620adee5b72879db8737d1c05d6f55220cdc250104f6116a
SHA512e6b5fff3c9489e8aaf651ed7207474ba7fb0ecdd38cc77dae120f9af76c93ecb9d21889644e9a2786138c2ed07b12ae728d21249868ff80561cce4afe9fd56bc
-
Filesize
276KB
MD506ef0c109c6765b5ca6a91bda5c83c69
SHA12e97574aff03ca9685bdf3db916ab2d30ecf41c8
SHA256439a3d14466798e7fa71b46142b2d7150a20f3c46f2639dd976f1aac775dfcac
SHA512463648314c700e44cf3255dd87bb55ec0f129fe67cfacdd522b8bee160eeb1d20ba73312c9a01576c02c2443ec487335e815012a8f84e50a1d9e8c28b207fac0
-
Filesize
256KB
MD53a1d02c627136d0ab7393d96756bca73
SHA13a7340066c72f0f21eb668566ccdfd503bde9434
SHA256aef026d0de203ee1b4e9780e25fbd95156ac5f6c05b5ba6b1e74e2a80961ac09
SHA51298407a97c4a71a4fad83ac5eec21e0330f7d159dbb6bddf47c35157a56eaa9a375cc2edd2c81ae5f6e4850d4025b745467aaafa32d7d066dfc46349d86835a17
-
Filesize
276KB
MD5322a97b74aafe4582ee45b0b9783b822
SHA101eda2932e48c2db71ed611d695a6f99663dd2c2
SHA256d93a974967df5d6f759ca2d229dc5cf6abf839b43ad96e7f56befb742d8bfe13
SHA5122c91e10391aba9f8e14015e1998f0ffdca96da901946adebbb04347839ef5a2b688204972c69743ee46081203fb3e88d0f41eb11f674f901eefa3e3559b3b6e8
-
Filesize
276KB
MD5559ef95e6fc9af430a7e3c37355db53f
SHA10d4e3e2312182eb931d314f0f109921328356c15
SHA256621712dd363bd6d1801e37ce48a85e2304f2bb962b853609b47599366b3faf94
SHA512fba77a7453633a3452e8a1fd54722659bbb4e89d7e60844485e160fa399d197dd7444441eac38619692a93b1794ee032b84881d9137a88c10d2fa92e5044d5b5
-
Filesize
276KB
MD5e92e69fd678c867626ce107423dd6c21
SHA1726e22692057d001fcd4fb7e103cf065069670e5
SHA2568f86458983e1da74b86c875d54d9de90db59fad2f434dd64538b516d5632c30b
SHA51270b90e4c3b9e19f23b92411cc6b4860ba1f5f0f35b7645efbb6eb744415029b6421c78896ce79c34d75e2f8b49cef3fe76b0b1e8a2aac1cdd3041a85582137f5
-
Filesize
276KB
MD53a20e9e9019c34a21d04c1bc8799a3da
SHA1e9ae1c7c9090662f1c241628d8df1a83c392a4b0
SHA2565a1de9b7e78b20f32deade41745fa78e7ade050e22bc4bdbd5d34f2d0c808fd9
SHA512eb6dfb806949fad494d4ee39b2a63c8dd764d89294dc5bae1a513731646532b5f66a4aa289b36e7468a3628cbd1be48cf65e891dbf2ab76abc94e13520355fcd
-
Filesize
276KB
MD5cfd3ea672db53b0e63d297146f0b57d2
SHA1f8393e102602270919101c8756d49a56eafc815a
SHA25652819ce5053e40afd32be29891bfef4567e5e4740826fafe82325a5b83b00be3
SHA5121d05def873f562f9c4cc1da2cc0230b9b116d570cc3d31273f0607237b0890a62d077b9cb9c2b8275c27a7c0a05d30bd6a2a5a02ffad22294c0aa21902e09f7c