Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe
Resource
win10v2004-20240802-en
General
-
Target
65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe
-
Size
81KB
-
MD5
5af5a718cda039f1a96bfad60fa1fb10
-
SHA1
169e6d3d107c44e592e44fe0a73e5846016e611f
-
SHA256
65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19
-
SHA512
23c6bfed66995263a1e29c18df3d943a20db3b01e1fa564a1ee55068aec52b23acd3aad71cfcade8bdacf9c5bb37027dabef38701dd1d5d86d1c99ede37777eb
-
SSDEEP
1536:BqFHebDNta2CpDITzK71diFxH07m4LO++/+1m6KadhYxU33HX0L:sFHAJBLTqdi/0/LrCimBaH8UH30L
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inebjihf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iogopi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipihpkkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfccogfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pblajhje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfiokmkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noblkqca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocnabm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjlcjf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Piocecgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oikjkc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilfennic.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khbiello.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlljnf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqcejcha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obnehj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Piapkbeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilphdlqh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaonbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llnnmhfe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfbaalbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjlcjf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhegig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nijqcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ieagmcmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koonge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lohqnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lindkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lakfeodm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbjddh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iajdgcab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpegkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmaciefp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nodiqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omalpc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhldbh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfpell32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ommceclc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppgomnai.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbjddh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iijfhbhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Objkmkjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppgomnai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pakdbp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koonge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oikjkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iijfhbhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jaonbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lohqnd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbnlaldg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipihpkkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jojdlfeo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kefiopki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpapnfhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Padnaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oonlfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iogopi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jimldogg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kplmliko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llnnmhfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njedbjej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ommceclc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omopjcjp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfojdh32.exe -
Executes dropped EXE 64 IoCs
pid Process 1824 Hemmac32.exe 1092 Ilfennic.exe 4984 Inebjihf.exe 3020 Iijfhbhl.exe 1804 Iogopi32.exe 4364 Ieagmcmq.exe 3272 Ilkoim32.exe 3732 Ibegfglj.exe 1872 Iiopca32.exe 4548 Ipihpkkd.exe 2352 Iajdgcab.exe 3540 Ilphdlqh.exe 880 Iehmmb32.exe 5008 Jlbejloe.exe 4528 Jaonbc32.exe 2972 Jppnpjel.exe 3040 Jihbip32.exe 3436 Jpegkj32.exe 4684 Jimldogg.exe 796 Jojdlfeo.exe 2300 Jahqiaeb.exe 3776 Khbiello.exe 2080 Klndfj32.exe 3764 Kefiopki.exe 1328 Kplmliko.exe 2344 Koonge32.exe 2556 Khgbqkhj.exe 436 Khiofk32.exe 2944 Kabcopmg.exe 1396 Kcapicdj.exe 2296 Lohqnd32.exe 1340 Lindkm32.exe 3740 Lllagh32.exe 4384 Ljpaqmgb.exe 3840 Llnnmhfe.exe 3240 Lakfeodm.exe 3820 Lfiokmkc.exe 3672 Loacdc32.exe 3432 Mjggal32.exe 4636 Mpapnfhg.exe 1672 Mablfnne.exe 752 Mhldbh32.exe 4608 Mfpell32.exe 3760 Mpeiie32.exe 2544 Mfbaalbi.exe 980 Mlljnf32.exe 5100 Mbibfm32.exe 3204 Mlofcf32.exe 4880 Nciopppp.exe 3724 Nhegig32.exe 4220 Nmaciefp.exe 2268 Nbnlaldg.exe 4484 Njedbjej.exe 2840 Noblkqca.exe 2008 Nijqcf32.exe 3368 Nodiqp32.exe 2564 Ncpeaoih.exe 4572 Nmhijd32.exe 1928 Nqcejcha.exe 1068 Niojoeel.exe 1152 Nqfbpb32.exe 4840 Ofckhj32.exe 764 Ommceclc.exe 5076 Objkmkjj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Lakfeodm.exe Llnnmhfe.exe File opened for modification C:\Windows\SysWOW64\Mfbaalbi.exe Mpeiie32.exe File created C:\Windows\SysWOW64\Mbibfm32.exe Mlljnf32.exe File created C:\Windows\SysWOW64\Ommceclc.exe Ofckhj32.exe File created C:\Windows\SysWOW64\Obnehj32.exe Oophlo32.exe File opened for modification C:\Windows\SysWOW64\Ieagmcmq.exe Iogopi32.exe File created C:\Windows\SysWOW64\Ncpeaoih.exe Nodiqp32.exe File created C:\Windows\SysWOW64\Pninea32.dll Mfbaalbi.exe File created C:\Windows\SysWOW64\Fkaokcqj.dll Mablfnne.exe File created C:\Windows\SysWOW64\Ojgljk32.dll Pfojdh32.exe File opened for modification C:\Windows\SysWOW64\Pfccogfc.exe Piocecgj.exe File created C:\Windows\SysWOW64\Nmhijd32.exe Ncpeaoih.exe File created C:\Windows\SysWOW64\Hjcbmgnb.dll Nqcejcha.exe File opened for modification C:\Windows\SysWOW64\Nqfbpb32.exe Niojoeel.exe File created C:\Windows\SysWOW64\Mjggal32.exe Loacdc32.exe File created C:\Windows\SysWOW64\Hlqeenhm.dll Kefiopki.exe File created C:\Windows\SysWOW64\Omopjcjp.exe Objkmkjj.exe File created C:\Windows\SysWOW64\Ilphdlqh.exe Iajdgcab.exe File created C:\Windows\SysWOW64\Lkjaaljm.dll Jimldogg.exe File created C:\Windows\SysWOW64\Hpfohk32.dll Nmhijd32.exe File created C:\Windows\SysWOW64\Nbnlaldg.exe Nmaciefp.exe File opened for modification C:\Windows\SysWOW64\Kabcopmg.exe Khiofk32.exe File created C:\Windows\SysWOW64\Ljpaqmgb.exe Lllagh32.exe File created C:\Windows\SysWOW64\Kjmgil32.dll Pqbala32.exe File created C:\Windows\SysWOW64\Pififb32.exe Pblajhje.exe File opened for modification C:\Windows\SysWOW64\Jpegkj32.exe Jihbip32.exe File created C:\Windows\SysWOW64\Emkbpmep.dll Niojoeel.exe File opened for modification C:\Windows\SysWOW64\Ommceclc.exe Ofckhj32.exe File opened for modification C:\Windows\SysWOW64\Omopjcjp.exe Objkmkjj.exe File opened for modification C:\Windows\SysWOW64\Ppgomnai.exe Padnaq32.exe File created C:\Windows\SysWOW64\Njlmnj32.dll Ilfennic.exe File created C:\Windows\SysWOW64\Nciopppp.exe Mlofcf32.exe File created C:\Windows\SysWOW64\Pfigmnlg.dll Nodiqp32.exe File opened for modification C:\Windows\SysWOW64\Iajdgcab.exe Ipihpkkd.exe File opened for modification C:\Windows\SysWOW64\Lohqnd32.exe Kcapicdj.exe File created C:\Windows\SysWOW64\Naagioah.dll Nbnlaldg.exe File created C:\Windows\SysWOW64\Ghnllm32.dll Njedbjej.exe File created C:\Windows\SysWOW64\Pjphcf32.dll Ofckhj32.exe File created C:\Windows\SysWOW64\Koonge32.exe Kplmliko.exe File created C:\Windows\SysWOW64\Cknmplfo.dll Omopjcjp.exe File created C:\Windows\SysWOW64\Jlmmnd32.dll Lfiokmkc.exe File opened for modification C:\Windows\SysWOW64\Llnnmhfe.exe Ljpaqmgb.exe File created C:\Windows\SysWOW64\Mablfnne.exe Mpapnfhg.exe File created C:\Windows\SysWOW64\Mhldbh32.exe Mablfnne.exe File created C:\Windows\SysWOW64\Nodiqp32.exe Nijqcf32.exe File created C:\Windows\SysWOW64\Aglmllpq.dll Ilkoim32.exe File created C:\Windows\SysWOW64\Ibegfglj.exe Ilkoim32.exe File opened for modification C:\Windows\SysWOW64\Iiopca32.exe Ibegfglj.exe File opened for modification C:\Windows\SysWOW64\Jahqiaeb.exe Jojdlfeo.exe File created C:\Windows\SysWOW64\Pjlcjf32.exe Ppgomnai.exe File opened for modification C:\Windows\SysWOW64\Inebjihf.exe Ilfennic.exe File opened for modification C:\Windows\SysWOW64\Ljpaqmgb.exe Lllagh32.exe File opened for modification C:\Windows\SysWOW64\Ofckhj32.exe Nqfbpb32.exe File created C:\Windows\SysWOW64\Omalpc32.exe Oonlfo32.exe File created C:\Windows\SysWOW64\Eapjpi32.dll Piapkbeg.exe File opened for modification C:\Windows\SysWOW64\Ibegfglj.exe Ilkoim32.exe File opened for modification C:\Windows\SysWOW64\Jppnpjel.exe Jaonbc32.exe File created C:\Windows\SysWOW64\Lllagh32.exe Lindkm32.exe File created C:\Windows\SysWOW64\Njedbjej.exe Nbnlaldg.exe File created C:\Windows\SysWOW64\Noblkqca.exe Njedbjej.exe File opened for modification C:\Windows\SysWOW64\Obnehj32.exe Oophlo32.exe File created C:\Windows\SysWOW64\Nhoped32.dll Padnaq32.exe File created C:\Windows\SysWOW64\Pbjddh32.exe Piapkbeg.exe File created C:\Windows\SysWOW64\Ilkoim32.exe Ieagmcmq.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 440 1848 WerFault.exe 170 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpapnfhg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njedbjej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nciopppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nijqcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Piapkbeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfojdh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kefiopki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llnnmhfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mablfnne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbnlaldg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Noblkqca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omopjcjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilfennic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lindkm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhldbh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbibfm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqcejcha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppgomnai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlbejloe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jihbip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klndfj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khgbqkhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omalpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hemmac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfbaalbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqfbpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ommceclc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljpaqmgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofckhj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqbala32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pififb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmaciefp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nodiqp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilkoim32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iajdgcab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilphdlqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jpegkj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khiofk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcapicdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oonlfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obnehj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhegig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Niojoeel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ibegfglj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iiopca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jppnpjel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jimldogg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lohqnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfpell32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjlcjf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pbjddh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iehmmb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jaonbc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jojdlfeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Koonge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Objkmkjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfccogfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iijfhbhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iogopi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kplmliko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpeiie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlljnf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocnabm32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lindkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilphdlqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jahqiaeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Klndfj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbibfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlofcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qdhlclpe.dll" Khbiello.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfpell32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfpqiega.dll" Mpeiie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmaciefp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Niojoeel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jppnpjel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jpegkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljpaqmgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pninea32.dll" Mfbaalbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omopjcjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iajdgcab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jihbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdflknog.dll" Mjggal32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfojdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aglmllpq.dll" Ilkoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpnmig32.dll" Jpegkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caecnh32.dll" Mpapnfhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbjddh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbjddh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nijqcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjphcf32.dll" Ofckhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhnoigkk.dll" Ocnabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhoped32.dll" Padnaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cimjkpjn.dll" Inebjihf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ipihpkkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jaonbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpapnfhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqfbpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kplmliko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Damlpgkc.dll" Nhegig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjlcjf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jojdlfeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlqeenhm.dll" Kefiopki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oonlfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dndfnlpc.dll" Oonlfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oophlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppgomnai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khgbqkhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nphnbpql.dll" Khiofk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emkbpmep.dll" Niojoeel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilfennic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlmmnd32.dll" Lfiokmkc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omalpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hemmac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Keoaokpd.dll" Hemmac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jimldogg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Loacdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkaokcqj.dll" Mablfnne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lakfeodm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfpell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlofcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nciopppp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nodiqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njlmnj32.dll" Ilfennic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Himfiblh.dll" Iijfhbhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipihpkkd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3748 wrote to memory of 1824 3748 65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe 87 PID 3748 wrote to memory of 1824 3748 65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe 87 PID 3748 wrote to memory of 1824 3748 65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe 87 PID 1824 wrote to memory of 1092 1824 Hemmac32.exe 88 PID 1824 wrote to memory of 1092 1824 Hemmac32.exe 88 PID 1824 wrote to memory of 1092 1824 Hemmac32.exe 88 PID 1092 wrote to memory of 4984 1092 Ilfennic.exe 89 PID 1092 wrote to memory of 4984 1092 Ilfennic.exe 89 PID 1092 wrote to memory of 4984 1092 Ilfennic.exe 89 PID 4984 wrote to memory of 3020 4984 Inebjihf.exe 90 PID 4984 wrote to memory of 3020 4984 Inebjihf.exe 90 PID 4984 wrote to memory of 3020 4984 Inebjihf.exe 90 PID 3020 wrote to memory of 1804 3020 Iijfhbhl.exe 91 PID 3020 wrote to memory of 1804 3020 Iijfhbhl.exe 91 PID 3020 wrote to memory of 1804 3020 Iijfhbhl.exe 91 PID 1804 wrote to memory of 4364 1804 Iogopi32.exe 92 PID 1804 wrote to memory of 4364 1804 Iogopi32.exe 92 PID 1804 wrote to memory of 4364 1804 Iogopi32.exe 92 PID 4364 wrote to memory of 3272 4364 Ieagmcmq.exe 93 PID 4364 wrote to memory of 3272 4364 Ieagmcmq.exe 93 PID 4364 wrote to memory of 3272 4364 Ieagmcmq.exe 93 PID 3272 wrote to memory of 3732 3272 Ilkoim32.exe 94 PID 3272 wrote to memory of 3732 3272 Ilkoim32.exe 94 PID 3272 wrote to memory of 3732 3272 Ilkoim32.exe 94 PID 3732 wrote to memory of 1872 3732 Ibegfglj.exe 95 PID 3732 wrote to memory of 1872 3732 Ibegfglj.exe 95 PID 3732 wrote to memory of 1872 3732 Ibegfglj.exe 95 PID 1872 wrote to memory of 4548 1872 Iiopca32.exe 96 PID 1872 wrote to memory of 4548 1872 Iiopca32.exe 96 PID 1872 wrote to memory of 4548 1872 Iiopca32.exe 96 PID 4548 wrote to memory of 2352 4548 Ipihpkkd.exe 97 PID 4548 wrote to memory of 2352 4548 Ipihpkkd.exe 97 PID 4548 wrote to memory of 2352 4548 Ipihpkkd.exe 97 PID 2352 wrote to memory of 3540 2352 Iajdgcab.exe 98 PID 2352 wrote to memory of 3540 2352 Iajdgcab.exe 98 PID 2352 wrote to memory of 3540 2352 Iajdgcab.exe 98 PID 3540 wrote to memory of 880 3540 Ilphdlqh.exe 99 PID 3540 wrote to memory of 880 3540 Ilphdlqh.exe 99 PID 3540 wrote to memory of 880 3540 Ilphdlqh.exe 99 PID 880 wrote to memory of 5008 880 Iehmmb32.exe 100 PID 880 wrote to memory of 5008 880 Iehmmb32.exe 100 PID 880 wrote to memory of 5008 880 Iehmmb32.exe 100 PID 5008 wrote to memory of 4528 5008 Jlbejloe.exe 101 PID 5008 wrote to memory of 4528 5008 Jlbejloe.exe 101 PID 5008 wrote to memory of 4528 5008 Jlbejloe.exe 101 PID 4528 wrote to memory of 2972 4528 Jaonbc32.exe 102 PID 4528 wrote to memory of 2972 4528 Jaonbc32.exe 102 PID 4528 wrote to memory of 2972 4528 Jaonbc32.exe 102 PID 2972 wrote to memory of 3040 2972 Jppnpjel.exe 103 PID 2972 wrote to memory of 3040 2972 Jppnpjel.exe 103 PID 2972 wrote to memory of 3040 2972 Jppnpjel.exe 103 PID 3040 wrote to memory of 3436 3040 Jihbip32.exe 104 PID 3040 wrote to memory of 3436 3040 Jihbip32.exe 104 PID 3040 wrote to memory of 3436 3040 Jihbip32.exe 104 PID 3436 wrote to memory of 4684 3436 Jpegkj32.exe 105 PID 3436 wrote to memory of 4684 3436 Jpegkj32.exe 105 PID 3436 wrote to memory of 4684 3436 Jpegkj32.exe 105 PID 4684 wrote to memory of 796 4684 Jimldogg.exe 106 PID 4684 wrote to memory of 796 4684 Jimldogg.exe 106 PID 4684 wrote to memory of 796 4684 Jimldogg.exe 106 PID 796 wrote to memory of 2300 796 Jojdlfeo.exe 107 PID 796 wrote to memory of 2300 796 Jojdlfeo.exe 107 PID 796 wrote to memory of 2300 796 Jojdlfeo.exe 107 PID 2300 wrote to memory of 3776 2300 Jahqiaeb.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe"C:\Users\Admin\AppData\Local\Temp\65b8ff16a8145b9556d471b738bdef70ddbfa0f1a217deec60fedca970465f19N.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\Hemmac32.exeC:\Windows\system32\Hemmac32.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Ilfennic.exeC:\Windows\system32\Ilfennic.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\Inebjihf.exeC:\Windows\system32\Inebjihf.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\Iijfhbhl.exeC:\Windows\system32\Iijfhbhl.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Iogopi32.exeC:\Windows\system32\Iogopi32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Ieagmcmq.exeC:\Windows\system32\Ieagmcmq.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\Ilkoim32.exeC:\Windows\system32\Ilkoim32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\Ibegfglj.exeC:\Windows\system32\Ibegfglj.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\Iiopca32.exeC:\Windows\system32\Iiopca32.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\Ipihpkkd.exeC:\Windows\system32\Ipihpkkd.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\Iajdgcab.exeC:\Windows\system32\Iajdgcab.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Ilphdlqh.exeC:\Windows\system32\Ilphdlqh.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\Iehmmb32.exeC:\Windows\system32\Iehmmb32.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\Jlbejloe.exeC:\Windows\system32\Jlbejloe.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\Jaonbc32.exeC:\Windows\system32\Jaonbc32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\Jppnpjel.exeC:\Windows\system32\Jppnpjel.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\Jihbip32.exeC:\Windows\system32\Jihbip32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\Jpegkj32.exeC:\Windows\system32\Jpegkj32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\Jimldogg.exeC:\Windows\system32\Jimldogg.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\Jojdlfeo.exeC:\Windows\system32\Jojdlfeo.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\Jahqiaeb.exeC:\Windows\system32\Jahqiaeb.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Khbiello.exeC:\Windows\system32\Khbiello.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3776 -
C:\Windows\SysWOW64\Klndfj32.exeC:\Windows\system32\Klndfj32.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Kefiopki.exeC:\Windows\system32\Kefiopki.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3764 -
C:\Windows\SysWOW64\Kplmliko.exeC:\Windows\system32\Kplmliko.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1328 -
C:\Windows\SysWOW64\Koonge32.exeC:\Windows\system32\Koonge32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\Khgbqkhj.exeC:\Windows\system32\Khgbqkhj.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2556 -
C:\Windows\SysWOW64\Khiofk32.exeC:\Windows\system32\Khiofk32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:436 -
C:\Windows\SysWOW64\Kabcopmg.exeC:\Windows\system32\Kabcopmg.exe30⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\Kcapicdj.exeC:\Windows\system32\Kcapicdj.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1396 -
C:\Windows\SysWOW64\Lohqnd32.exeC:\Windows\system32\Lohqnd32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\SysWOW64\Lindkm32.exeC:\Windows\system32\Lindkm32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1340 -
C:\Windows\SysWOW64\Lllagh32.exeC:\Windows\system32\Lllagh32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3740 -
C:\Windows\SysWOW64\Ljpaqmgb.exeC:\Windows\system32\Ljpaqmgb.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4384 -
C:\Windows\SysWOW64\Llnnmhfe.exeC:\Windows\system32\Llnnmhfe.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3840 -
C:\Windows\SysWOW64\Lakfeodm.exeC:\Windows\system32\Lakfeodm.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3240 -
C:\Windows\SysWOW64\Lfiokmkc.exeC:\Windows\system32\Lfiokmkc.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3820 -
C:\Windows\SysWOW64\Loacdc32.exeC:\Windows\system32\Loacdc32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3672 -
C:\Windows\SysWOW64\Mjggal32.exeC:\Windows\system32\Mjggal32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:3432 -
C:\Windows\SysWOW64\Mpapnfhg.exeC:\Windows\system32\Mpapnfhg.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4636 -
C:\Windows\SysWOW64\Mablfnne.exeC:\Windows\system32\Mablfnne.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\Mhldbh32.exeC:\Windows\system32\Mhldbh32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:752 -
C:\Windows\SysWOW64\Mfpell32.exeC:\Windows\system32\Mfpell32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4608 -
C:\Windows\SysWOW64\Mpeiie32.exeC:\Windows\system32\Mpeiie32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3760 -
C:\Windows\SysWOW64\Mfbaalbi.exeC:\Windows\system32\Mfbaalbi.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2544 -
C:\Windows\SysWOW64\Mlljnf32.exeC:\Windows\system32\Mlljnf32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:980 -
C:\Windows\SysWOW64\Mbibfm32.exeC:\Windows\system32\Mbibfm32.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5100 -
C:\Windows\SysWOW64\Mlofcf32.exeC:\Windows\system32\Mlofcf32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3204 -
C:\Windows\SysWOW64\Nciopppp.exeC:\Windows\system32\Nciopppp.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4880 -
C:\Windows\SysWOW64\Nhegig32.exeC:\Windows\system32\Nhegig32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3724 -
C:\Windows\SysWOW64\Nmaciefp.exeC:\Windows\system32\Nmaciefp.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4220 -
C:\Windows\SysWOW64\Nbnlaldg.exeC:\Windows\system32\Nbnlaldg.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\Njedbjej.exeC:\Windows\system32\Njedbjej.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Windows\SysWOW64\Noblkqca.exeC:\Windows\system32\Noblkqca.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\Nijqcf32.exeC:\Windows\system32\Nijqcf32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Nodiqp32.exeC:\Windows\system32\Nodiqp32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3368 -
C:\Windows\SysWOW64\Ncpeaoih.exeC:\Windows\system32\Ncpeaoih.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2564 -
C:\Windows\SysWOW64\Nmhijd32.exeC:\Windows\system32\Nmhijd32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4572 -
C:\Windows\SysWOW64\Nqcejcha.exeC:\Windows\system32\Nqcejcha.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\Niojoeel.exeC:\Windows\system32\Niojoeel.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1068 -
C:\Windows\SysWOW64\Nqfbpb32.exeC:\Windows\system32\Nqfbpb32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1152 -
C:\Windows\SysWOW64\Ofckhj32.exeC:\Windows\system32\Ofckhj32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4840 -
C:\Windows\SysWOW64\Ommceclc.exeC:\Windows\system32\Ommceclc.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\Objkmkjj.exeC:\Windows\system32\Objkmkjj.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\SysWOW64\Omopjcjp.exeC:\Windows\system32\Omopjcjp.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:924 -
C:\Windows\SysWOW64\Oonlfo32.exeC:\Windows\system32\Oonlfo32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Omalpc32.exeC:\Windows\system32\Omalpc32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4788 -
C:\Windows\SysWOW64\Oophlo32.exeC:\Windows\system32\Oophlo32.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:4076 -
C:\Windows\SysWOW64\Obnehj32.exeC:\Windows\system32\Obnehj32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\Ocnabm32.exeC:\Windows\system32\Ocnabm32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\Oikjkc32.exeC:\Windows\system32\Oikjkc32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2040 -
C:\Windows\SysWOW64\Pqbala32.exeC:\Windows\system32\Pqbala32.exe73⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Windows\SysWOW64\Pfojdh32.exeC:\Windows\system32\Pfojdh32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4900 -
C:\Windows\SysWOW64\Padnaq32.exeC:\Windows\system32\Padnaq32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3680 -
C:\Windows\SysWOW64\Ppgomnai.exeC:\Windows\system32\Ppgomnai.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4680 -
C:\Windows\SysWOW64\Pjlcjf32.exeC:\Windows\system32\Pjlcjf32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4656 -
C:\Windows\SysWOW64\Piocecgj.exeC:\Windows\system32\Piocecgj.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\Pfccogfc.exeC:\Windows\system32\Pfccogfc.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:4232 -
C:\Windows\SysWOW64\Piapkbeg.exeC:\Windows\system32\Piapkbeg.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3448 -
C:\Windows\SysWOW64\Pbjddh32.exeC:\Windows\system32\Pbjddh32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2340 -
C:\Windows\SysWOW64\Pakdbp32.exeC:\Windows\system32\Pakdbp32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3992 -
C:\Windows\SysWOW64\Pblajhje.exeC:\Windows\system32\Pblajhje.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1800 -
C:\Windows\SysWOW64\Pififb32.exeC:\Windows\system32\Pififb32.exe84⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 40085⤵
- Program crash
PID:440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4372,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=3980 /prefetch:81⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1848 -ip 18481⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD58614df26e3e8a0de3511f48ff143265a
SHA1ba2c54cdf29360c30e1bcb1a3cae99b51204f451
SHA25633459a93731cfe74f5a67701cd613bda53ff8731dfcf24580682961d05147ad0
SHA5120a077c9744830860b95c61f6ca4bc60dd7b00b4a0c7836ebecc526b7c1e380b8bd0f36179172027a473dc74eea8b65f6a675fe90f150ae1ed92550b4f702161c
-
Filesize
81KB
MD51f2434fe370962b7cf4faaee93eff550
SHA1fdd6e81b6bef702f57620d00bdf8136439193fea
SHA2560776dbb22480a640e2f85907dbf40fcf5201a75ae5d3b62ad291c7f258989326
SHA5127668417edd940b92910d5b9f06dd909f1dc6941971263563739893b3dd331c48de88e53006926f5729cf3d71d2b873538651da6f5de699c8deff03e53cdec519
-
Filesize
81KB
MD5dcdd88d3b32199f7d2b501022b3ad1d7
SHA1f960bf50810865dea05e3f89a60bff8cf51ae1ae
SHA256c0155c1e2a880f46ee07b0b8cf458d98cb3e85e7380eedaa1e5c759b0e488d99
SHA512d1e89141acbbafcd9e71fe8346cc4fb63df64e196d1d4c76346702bb958593bf794e4d8ad9918f8b307578ada011f5eec06748bcf2a20f548688f3d1eacfe5c4
-
Filesize
81KB
MD58450168c364025c20c9ccb254e838d18
SHA1c60a62d31eb65be8fc74bcc9ead5c5b16bc790d6
SHA256a8f58e6d364f8fbcb0600ae76db0e223f4964731ed604c04bdb7f7f90216bf4d
SHA51280bc37dd3ebfe98e23c86c0233f60186ff4179b230ffbf48545a46a86fe370e053bbed25240818f27f08deaf071e0f54314d24267b01dc4f342b25d2275b3b6a
-
Filesize
81KB
MD51774e8f247cb02893ed5aa2d81ba4e39
SHA1f337d1aa949b30cd87e86e743d0407b40865cf93
SHA2564399097c72be465fcc374a2af9034d598fbbc6345c09d597df3291d48baa5158
SHA51264294546d41738b298b974785b71aab753ca226461df1e2ba4eeabd70618280448161461bb9e41ca27725c15d0136fa53c074f75729dbd8885d014bd505a6fb2
-
Filesize
81KB
MD574fd3a2e8dc79b701130313ba1d5f90a
SHA19a3613b945c95176973bc9c692e948d1c8bc1410
SHA256405d1e7def5c2ac051e40bd181867a7cc87d14b25d2ee51546e08af1ebb1ad26
SHA512d5efb904d219c65c9270388e651ce17f41efb3f2acb3d262a2d2bbd0b7c771c88f0361fc776227552cb2c9c0468abcc014a6fb70678e9a61ffdeaface640ea7f
-
Filesize
81KB
MD5fbb8e8dab58bbfb4fc5e1d779aeba7de
SHA1bfe751e9d931c8952c2bd420eed3d95ea100514c
SHA256a83f7861b1357f6beb4c4b96cefba921de4e78f69bebfd2742b85bb20b6b187a
SHA51260eaf1934d0be4e2d9dcd02daef05cdf111a7bab25437895f76ba3d294aeb2a9844d226c8b8d867160f9269849049fab195381d601eb002d54c035ebeed7e97b
-
Filesize
81KB
MD5d6c08e23ec86b394fac3baa3b69b2e99
SHA180917412431da359bde570eaebddd5acc4220863
SHA2564b8589cd4fc041fa1d840bc71dce567975890b6ada6c04f7ada4314c5341d22a
SHA512ad78b90d7a1fde82e22a2744f4444bb5803f4c3a3fa19df5ae6688c75417e045eb58f29928b367bc04acb9476ee1f41112ab8e6f0fd3f948c1b322360645034c
-
Filesize
81KB
MD590bb574a402e24aa628fd8729f936db6
SHA1567d9426ba8b4e4e6788cd385f416f74bfc0bca3
SHA25659dbf67898a61600055fdfa5993769a357b66c55eb6d3b00b7d565a871f29535
SHA51220d6f9bb2e0dc0d3d2d0d6c220a67c3f7646c8a71bea0821a8f337633bc50b2f22b4fd6a7d6c340b380746b21a71943b20b2c767d9fe10944cfbb560c2bf74be
-
Filesize
81KB
MD5e6a25223f1af055ef17a981ce57204ba
SHA1d9c002ce5e9bc16d544045b8ebd363d89e35edb6
SHA256095c7df073c96bb2562ce673aca4474c46804303c08b5890061de479eb04109f
SHA512dd52bd9eb8e025dddcb07a80cc9ff159696329c2fd1db9adba301b3034ed8dc32a2f503aa72ad83f1ea6ee8803375dabfbf9d9427c925192880e82839ae7c9fa
-
Filesize
81KB
MD56b89cd1a09438e39e0958bcea94ea1c4
SHA1eb2058b6fb1d069099e6e9e3fc4cd2c9990b6324
SHA25628828e94e10b77bf42387fa4ebc848535d05e8ca071aa79c7ac5b21ae189529b
SHA5124d7d3de9434807a419b2bae99766d6e65e9c787dc50ca6394be54c408fe2f4ad28713475fa4f98f68101b240416b440e38b87f3a467df5e9f3ee3f6c5cbd7a0b
-
Filesize
81KB
MD515b58268eed8e03598628f49c52cfb07
SHA154d9d19cebeb0ac09ac87fd8631570b4fe372a20
SHA2560bb24c4c604a3d4bae5af990d35708886bc4f33749ff52e8a0637287df71e055
SHA51265d5560290587030e01e17741d244bfb8a81bf9cfc6a657900e88ad78c59d71a27a91cadd193c633b95bec82edc059b2b86460e89fa8ca928a7da1e9efe7f444
-
Filesize
81KB
MD5adfac58f80bae25f3674ed72987a72d9
SHA14bc168981de862241ebc2a0c4188e0f7f3f0dfe9
SHA256c26df83719a13e3377d665f97bc88ae83e8d1488a0d26716134d62b8cc8bfb83
SHA512899a763ca75a7d66e0346a58555678a20a53a14eba12d52173f78756a3cb7509f34840ee3796ba502a3934a6339e2ed1652fb936e88ba78e34acb2b9da3348de
-
Filesize
81KB
MD5d38a36774cbaa3311747b3ec5c3fd064
SHA15d23f2a28e527607ef1dc9588a92f2d344df102c
SHA2569691f051f65e302c27cf4c7a43f813becf7104b4dec19e5b167acb2d209d5a47
SHA5120f3b04000a925926eecde5903358acee254484be027b6e8c6a327bbd7aeb442ea4f0c2c68270b45ee11fc352db38c9f864d950bbe233e2e559517395bfb503ee
-
Filesize
81KB
MD5bf86053a25387e9a9ab12efa870380cd
SHA10433c991b43f14aab080eca3683d12fc20a3be9a
SHA256daff6b53dfd2ddac8125ea8d88a474e7cbedcc19aa04e1862ceb62dda3e9be21
SHA51245fe4e22e9a705d33a649f6df1649165efc3ec7e76a1088ae6d32aa7edcbc0c8bc4af6726b56bafd51bbfce571be11cc24291288da73cbcd55ff13a73dd325d6
-
Filesize
81KB
MD530083df853393cdbd37d30a2623024a7
SHA178a3140bc9e05e2514366fe2dc63824d965ef07c
SHA256aeea626c2fb0ecca70e5704e87a5048c8b9cf228158856ab5d3979660e29d3a4
SHA512142171dad1384e986f6cec4bb8543483931d04aa0559b1f5d192cd1014aa1f8b5a3f1ad9d1c8dae42dca801720d3364fe833be6dd148fa7433a09ee14226aa8b
-
Filesize
81KB
MD5bc32223720cdabce2bf4dd817d991c54
SHA17cda5259b3ca79f652486b5ad9c2e111c5e1f03c
SHA256628111b2c0ded2424957888bfa80905a4085157fd319f4f2618828e8b015d4cf
SHA51209e1c558f172499e6e3cec9f2d656a784ef3733aa34553600f7790d3e243c9ea9640993e8b4a3c1d9fb744043ad1afd44d0775ca5ce371754138baa578b85e79
-
Filesize
81KB
MD5aaf9a22a348b14d9669c986b1433f37c
SHA152fe93736f9c8a401322c8ba09e4ab75867d2dcb
SHA2566918a8b39dc6821473f3bd8388a41579b7286c7b29d749d82814e43194c164ec
SHA5127390e5a0459131705a3e35981bccb6d10c29769160d94076cf095fba156d52efb7e36649fd221baac27c26a9f48ffc31b9b233b1b36c5519998bbd42023d5818
-
Filesize
81KB
MD587027b629ea59fe1173939db5efcb05f
SHA1cceb2c85494eaaf22345ae16a59cd5aa5fc017a3
SHA2560e3ea3241f2dd21988e9ac23a392174a5264cb13ba6a4d28ee67a170c2099f78
SHA51228704a9130aed286c02c7b5324108fb2f9d49ea06ff7b0adcc244b66b843d32aa0e5cc22ec84b5a213bb70b57d54639579b41ac9a84985ddf0e2927537cd5d7c
-
Filesize
81KB
MD5b2163bc03f64765eaad06732b31a8ed4
SHA1b68be42bbf0e1115547b767d19fa4be3611002bb
SHA2567eb93f0798e7095dfb934e152b1aef286791fbfaea343db9bc0e7482d4de96f9
SHA512167ca142bfa43fdd51e7c8ca842e1b7c934888a0df657eb0d7da1271dc2276a5c0169945b454910210ccc0c46bd2dfd5b8f44723f9d1042e62211ea18ae113e3
-
Filesize
81KB
MD54e485b62b2a5ae6697480d79fd5472d7
SHA14b900d2b9b4252405a7d83077db7b283a0c02986
SHA256ceb731f4484d7fba130469bf50cd628dd3a3301d52c0823fb697d5e8c7003f44
SHA51232608de5fcce5600a5a2f108afe472a0b144e4b988a92c5132e6f8a42c620f3a80f8d932eb0eecd828d819c760175e55f96a1bd0659c35fb32746eb4f34939ab
-
Filesize
81KB
MD5b0dd5f7af99cfb8cd503a942536b747e
SHA132b652736224a3891bea69c6cef3bc586b9d5662
SHA256696d07cdf846138dcbac0e1e7215e19a275e070fe48169ff6b1ed523e36101dd
SHA512e969bc06258c5f228666923edf5306390067f0f520cf4fcd9fd64b3df6579463708d06ff92a16413d0b7c8b11d2ab8550a508164a9ca3e05e3f3d6c5f4b823ed
-
Filesize
81KB
MD552c3c0546af47e9f088d063b8d713f4b
SHA17226b74950ca39bf653f517b6cd4e468f6592bb1
SHA256b1329939059385318f30c658c593d9fd37b240dc1afc558837f4cc582e450029
SHA5126b75ccb1290fb61fef757557e2d4ea27b81565d9adc98e6c51100dab6aca36a34611054b5d04e16d5c1bf5702f1b492b2078b70984be1e1815647a8627c212cc
-
Filesize
81KB
MD5af130db06310bbc1397115ed9844ba7f
SHA1f1761b6107f71d5c412c2bbf4a7c66f16b235e9c
SHA256642345fa62fce6a8d0f49d2c3dc51118d10a0cdd140e6f9edd23fc99b0643337
SHA51266253a12d573bb34d2349c48cae4fbe80fc0707eb4156b9935b21cc613aa0339668ef5deb7eba38b3dd7cfd4932349201cbc7e3b1322278eb55f712254812496
-
Filesize
81KB
MD58cee1535d8c43ca7ef5c62530c9c9681
SHA12554456d34e70bbf8fdc42f87b258a5818c702c0
SHA256b761b28e8eb8e2affeaf0c4fb18e56ee7e8e43c3bd7109e79b15ea8bd26449dd
SHA512bf19013a3a7131d2762882fdf7e3131537be11ba9682c3b2e9460265883c939db8f0f3ef7b322d37fbb5714d8c10e5435bdb0046c9f8bcc8a823417ab76dfd8c
-
Filesize
81KB
MD53812a6de8c3b7eb6f6652f7b294c43f2
SHA19a93e0e7a8996049a64a9ba645d99785c842bc95
SHA2566e8a11fc7f6aab9ef430ba02a5fd045942bf4acedc4668683014f38b2cce7971
SHA5125abb42a3326a5a67f92822214b22dbf00cc5e9c2ed6708d4a65d3ef8e028e26689d7c44dfdcef0720f73ee7c40ce6b4aa7d16bff167333983348c685a9b6565c
-
Filesize
81KB
MD5005d12729bd39bd1f5ea535b3fac692e
SHA172f9ea74d6ee6c6bbed3631d2a4b221e09fc9c44
SHA256003b779d4623e8db279d860a9e79dd3f8fac21e6f9a0e53392da673bec95d94d
SHA5127d3f460fc947b295dca6d69cd6bc567271747bd9168b7b5cafebf66f4b4f34941eb343548efa96583d041f9a4c56b5f81e31c1e1531ec83a8f46aa37279a9b90
-
Filesize
81KB
MD54e72d3940aa0141715b2b68149dc2ce2
SHA1be7690c029b9b8b3ab52f130ad525badafef6302
SHA256eabeb91238f025acaa4ba9f2deda4eba3fec810e17a456c4b00a35b2fb76951f
SHA5128714c8fa3e930c5898c54d09728202fd0d402953e3ea16b7ca2adb4538b5967ff53dbc5910303021596e45501d29e62240ff09f8239628f62efb2ab3fe2e181d
-
Filesize
81KB
MD593eb2fa7d8d1ae4e2e6a9ad09a05e49e
SHA123723bb6056a1842701e2cd54e3effa062583b25
SHA2566ea5fe21220eb3b27961c25951327891a06a662e2b0dc6ca28b260d20fa7cd28
SHA5127a859f9b709a465a430f885df01f68f794aee9f94dd506e7f68741dad3d5bb33aee6835481610894b65533530296de090e0e507e856f2ec357aeb303ec81a376
-
Filesize
81KB
MD5560bd077269565ba14382ae0da36d25a
SHA1129dda434f5b3c3f6b57c3c1752d7b62efd0685d
SHA256f004b85604833b4fb446959bf92d1847cc02137b4ef4d8fa1e3b3fb71e4844c8
SHA5127f8f52ef2237f1f53da58ddcc6487e38b488afc4a55d15f70355848986f9fff994ebe5f8dfbe4c9a9d886d1a27d4dfb7ff6e028268794f6b9f7c6a43c57ec31d
-
Filesize
81KB
MD5a3bf11da5e249528a6f92bd045cf7ddc
SHA179af4f28ae8fc4b504588bc6f88aec02a7f9ad9d
SHA2562cb7630c46025d29607b717eecb7c4c235badebae5eb1baf9a8933906942a418
SHA51290dc944b510ef238cc49d1e325d2c8fee90237d945ff1abf06a3506d63310b18cdffdf9a3da51b186cba99a9075ed44f87f50747f938fe49be89923f9a09c879
-
Filesize
81KB
MD5d7986873c541992eb86abef0ea538913
SHA125138e4c961ed6684b0429c69687815dffe64554
SHA2564791db44c88b88efeca349ab2d55016e211c9389d04fa74dc0a0ec65f36f730f
SHA512ff52c997d71261211db58a1d2f50684f4f5690eed8ecc9fcfc65ed43eaa35324a677959134fe2eaf4b37f2033f38fe381339252bb04f3842d55ab2a16eb791e5
-
Filesize
81KB
MD54a00f6cbef84161d551d42370bd12aa1
SHA12f59428dfcb6c536df2791e02549fb94e2875206
SHA256c13e4866984b04bad4d0c67d3e05e09233566d2e66078a3a42b1e47852da495a
SHA5121c327a797e4a7582311620dac4c846d8f8df23436d91a6840d0656d81969325cdb4a8dcca620a40b45ddd0d76b372ed32c773d59fe246680bc4866b108aef137
-
Filesize
81KB
MD570c845ece06a7fdc5fe7ea4e58739a7b
SHA1b64c885ef57c152c2a2016749d353f4989411a71
SHA25665318c6b21d1e7812ff2e896330ed118274c122911e8e4e71e2b4b8a1d0d3f07
SHA512622622cf5d4db64fedb45572f195e7754ae01cfe3d4c343f3d76fa1b6885d94731d711f2c3b8849a5d73ae50368f30471f3161771ade9fc5110efdfa6f2ca4db
-
Filesize
81KB
MD5ce1728b376c14c57664176ede09582fa
SHA115649fcb56ff54f701842ddb2ac52a3b8c9b17bc
SHA2567523a528f171c1227fc6d969008d5e4aa64772dc6c2bf686d74b35b82554d18b
SHA5120facda14d9ae3feb26b85f355e7a8e1fc68d47f9e76563b758cdb85276c67d82e545828da0df664806b70e83e7896775bb760d4f8ff289c5cc283c2cb7f687dd
-
Filesize
81KB
MD562bb204d9d887cf1bf4ee5dcd1b1f8e8
SHA1d24e2bb87bc527b45415a98e4c6379c3b627d9bd
SHA256fc4f6f7dfee8e88bf4a83aa8a7b767a06d66d83e82f749b6b0a64c20427cdbfb
SHA51229724f6c73387c558618b2b8c97d4c8553d9264d4a1ab083e4fb686ea14a934e1625e57a3c387d408011edf704a65f9886960ff5fb228a1500166a52a4cb8f56
-
Filesize
81KB
MD5de8b2f9ec2633498a98021b41ad63140
SHA10d2da706f5774ad3e3be1b2c14348ebe23ca206d
SHA2568506ef9fbdfb1645a353105a78b1e62869c522e38027f78c3ee01bd11e089318
SHA512c75f792deaf302353541207e6fa12cd19b4a8373a551248396d2913ab5bc2c0bafa5d7c846fe26a7103548fb821441fdb3a38848d2387afd069bde91eca1aa37
-
Filesize
81KB
MD5b94d87cc6c7f1a082c62f233c191f29d
SHA1eb72f98bbd45d81e350fa7ae96cb0848e0e13a6b
SHA256c300b98f81545a9399fe9087489371f92be6ae9f2ab6e07a8c4eaa5a901e6835
SHA51266c87176fa6f960e8bb2b345d3c214d893f2c300971fc398312671965b8cdd46184a7a006cc8302a6ab482812ca4bf125130b57c24a50b5c9954bfa5c9ed65e4
-
Filesize
81KB
MD5f749307f2d3ea6183bedbeb7da6a44b0
SHA19cdeabdc50fd168b39fb7c5efee0189ccd59b6e3
SHA2569e63d39f6b2a6b93c02ba219988a75c6d65ff183da93134cb2c867a552199fa9
SHA512f6b9e60c31944a58f60e3be5f9e995992036ce643f52b4a0243ff5a2f757c2f1c503cc591bba9fb0b2768174d771bc847aac08971f58d5cb1673bbee31ca1dbc
-
Filesize
81KB
MD59a34a6485d52d09d56320158d2514138
SHA19365243e83c7be2ab08b32f5eec447a7e0845a30
SHA25636a2643cd58679097b50c341f70d68971490ffc5401ee99e24d93e675a9ac462
SHA5126e9bc7d858f7821662a7a378d7fd68f0fe325852607cddf189e86d003dd611c967c12fef47bfcfa92a126de2656bf0c22cab3c5ecfb5ac92bba80e6f9180e821
-
Filesize
81KB
MD541ea3e321509305b5d7a62eba9379e79
SHA1208812c3482e0a2658ef823f84f70b1ee77701ba
SHA256673184b537fe98edd1e1a305eedf2854fefeec83dd9a0b8e2d62ed9e13f64395
SHA512f69e715b1d09bce7eb8b56be4cb190b718f5f4ea945eddb8a48f3ea85e50e457d1f5ddb7a70789305b82477f6548463eab7995808b2d155220e230df18846e31