Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe
Resource
win10v2004-20240910-en
General
-
Target
eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe
-
Size
52KB
-
MD5
445ab26a2182df3673087754fea9386f
-
SHA1
02ee21188c2dbd713c19c30d64eb07990175b758
-
SHA256
eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772
-
SHA512
7dedb163d01e40b38a339f5f59c2e9790490dd7c42a5715b6da7562811042558d6eb2030de2072b592b5be12f632b614d17c58f90098f7c86d9267f9f79e2b66
-
SSDEEP
768:Phd5PzngFxB9NdoZY1G0EyEDmir2q2izepfE/1H5F/sTqaMABvKWe:DtTgjBMYbEDrr2jY7IMAdKZ
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cncnob32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckgohf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cocjiehd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phfcipoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bacjdbch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdfpkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckebcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckebcg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpbjkn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qacameaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akpoaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akpoaj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhmbqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boldhf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cogddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpiplm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dahmfpap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qobhkjdi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmeandma.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnlhncgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bajqda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cglbhhga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Conanfli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cponen32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chfegk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnmopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmblagmf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aogbfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adcjop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bacjdbch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpdgqmnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddgibkpc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnfkdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dddllkbf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amlogfel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aonhghjl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaldccip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhmbqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpmapodj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckjknfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cogddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgcihgaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaldccip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amcehdod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdojjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgnffj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhblllfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhpofl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caojpaij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpfcfmlp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qobhkjdi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahmjjoig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdojjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bogkmgba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bphgeo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpiplm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boenhgdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdagpnbk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cggimh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aokkahlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aggpfkjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aopemh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aopemh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdmmeo32.exe -
Executes dropped EXE 64 IoCs
pid Process 4504 Pmnbfhal.exe 1984 Pplobcpp.exe 5012 Phcgcqab.exe 2828 Pnmopk32.exe 656 Ppolhcnm.exe 5060 Phfcipoo.exe 2264 Pjdpelnc.exe 2084 Pmblagmf.exe 440 Ppahmb32.exe 2968 Qhhpop32.exe 4320 Qobhkjdi.exe 3596 Qhjmdp32.exe 3356 Qjiipk32.exe 1468 Qacameaj.exe 3400 Ahmjjoig.exe 968 Aogbfi32.exe 1656 Amjbbfgo.exe 4052 Aphnnafb.exe 4448 Adcjop32.exe 1896 Aoioli32.exe 1532 Amlogfel.exe 2132 Adfgdpmi.exe 1688 Akpoaj32.exe 3644 Aokkahlo.exe 1080 Apmhiq32.exe 1232 Aggpfkjj.exe 4660 Aonhghjl.exe 4884 Aaldccip.exe 2424 Adkqoohc.exe 4416 Aopemh32.exe 1776 Amcehdod.exe 4832 Bdmmeo32.exe 1744 Bgkiaj32.exe 2740 Bmeandma.exe 4852 Baannc32.exe 4764 Bdojjo32.exe 3472 Bgnffj32.exe 2668 Boenhgdd.exe 1868 Bacjdbch.exe 3124 Bdagpnbk.exe 3424 Bhmbqm32.exe 3864 Bogkmgba.exe 4740 Bphgeo32.exe 2472 Bhpofl32.exe 5036 Bgbpaipl.exe 2444 Bnlhncgi.exe 3404 Bdfpkm32.exe 3120 Bhblllfo.exe 1660 Bgelgi32.exe 992 Boldhf32.exe 700 Bajqda32.exe 4828 Cpmapodj.exe 2340 Cggimh32.exe 2948 Conanfli.exe 1648 Cammjakm.exe 1724 Cponen32.exe 4164 Chfegk32.exe 1420 Cgifbhid.exe 2012 Ckebcg32.exe 1432 Cncnob32.exe 1824 Caojpaij.exe 3168 Cpbjkn32.exe 2304 Cdmfllhn.exe 536 Cglbhhga.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Lielhgaa.dll Aaldccip.exe File created C:\Windows\SysWOW64\Mgmodn32.dll Bmeandma.exe File opened for modification C:\Windows\SysWOW64\Boenhgdd.exe Bgnffj32.exe File created C:\Windows\SysWOW64\Cammjakm.exe Conanfli.exe File created C:\Windows\SysWOW64\Mmihfl32.dll Conanfli.exe File created C:\Windows\SysWOW64\Dddllkbf.exe Dpiplm32.exe File opened for modification C:\Windows\SysWOW64\Pmnbfhal.exe eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe File created C:\Windows\SysWOW64\Bmeandma.exe Bgkiaj32.exe File created C:\Windows\SysWOW64\Okhbek32.dll Chfegk32.exe File opened for modification C:\Windows\SysWOW64\Ckebcg32.exe Cgifbhid.exe File created C:\Windows\SysWOW64\Bjlfmfbi.dll Cdmfllhn.exe File created C:\Windows\SysWOW64\Ppolhcnm.exe Pnmopk32.exe File created C:\Windows\SysWOW64\Ppahmb32.exe Pmblagmf.exe File opened for modification C:\Windows\SysWOW64\Qhjmdp32.exe Qobhkjdi.exe File opened for modification C:\Windows\SysWOW64\Dafppp32.exe Cogddd32.exe File created C:\Windows\SysWOW64\Dahmfpap.exe Dojqjdbl.exe File created C:\Windows\SysWOW64\Bgbpaipl.exe Bhpofl32.exe File opened for modification C:\Windows\SysWOW64\Boldhf32.exe Bgelgi32.exe File opened for modification C:\Windows\SysWOW64\Cncnob32.exe Ckebcg32.exe File opened for modification C:\Windows\SysWOW64\Cpbjkn32.exe Caojpaij.exe File opened for modification C:\Windows\SysWOW64\Cpdgqmnb.exe Cnfkdb32.exe File opened for modification C:\Windows\SysWOW64\Phfcipoo.exe Ppolhcnm.exe File created C:\Windows\SysWOW64\Bogkmgba.exe Bhmbqm32.exe File created C:\Windows\SysWOW64\Cpfoag32.dll Cnfkdb32.exe File opened for modification C:\Windows\SysWOW64\Dhbebj32.exe Ddgibkpc.exe File opened for modification C:\Windows\SysWOW64\Cdbpgl32.exe Cpfcfmlp.exe File created C:\Windows\SysWOW64\Aokkahlo.exe Akpoaj32.exe File opened for modification C:\Windows\SysWOW64\Aopemh32.exe Adkqoohc.exe File opened for modification C:\Windows\SysWOW64\Bdmmeo32.exe Amcehdod.exe File created C:\Windows\SysWOW64\Bnlhncgi.exe Bgbpaipl.exe File created C:\Windows\SysWOW64\Ckjknfnh.exe Cdpcal32.exe File created C:\Windows\SysWOW64\Dafppp32.exe Cogddd32.exe File opened for modification C:\Windows\SysWOW64\Dgcihgaj.exe Dddllkbf.exe File created C:\Windows\SysWOW64\Pmnbfhal.exe eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe File created C:\Windows\SysWOW64\Hockka32.dll Qjiipk32.exe File created C:\Windows\SysWOW64\Dmncdk32.dll Bphgeo32.exe File created C:\Windows\SysWOW64\Bgelgi32.exe Bhblllfo.exe File created C:\Windows\SysWOW64\Cklhcfle.exe Cgqlcg32.exe File created C:\Windows\SysWOW64\Bacjdbch.exe Boenhgdd.exe File created C:\Windows\SysWOW64\Caojpaij.exe Cncnob32.exe File created C:\Windows\SysWOW64\Mgnddp32.dll Cpbjkn32.exe File created C:\Windows\SysWOW64\Cdbpgl32.exe Cpfcfmlp.exe File opened for modification C:\Windows\SysWOW64\Dkndie32.exe Dgcihgaj.exe File opened for modification C:\Windows\SysWOW64\Adfgdpmi.exe Amlogfel.exe File opened for modification C:\Windows\SysWOW64\Aokkahlo.exe Akpoaj32.exe File created C:\Windows\SysWOW64\Aaldccip.exe Aonhghjl.exe File created C:\Windows\SysWOW64\Amcehdod.exe Aopemh32.exe File created C:\Windows\SysWOW64\Oblknjim.dll Cklhcfle.exe File created C:\Windows\SysWOW64\Mfgomdnj.dll Aphnnafb.exe File created C:\Windows\SysWOW64\Qgaeof32.dll Aoioli32.exe File created C:\Windows\SysWOW64\Aopemh32.exe Adkqoohc.exe File created C:\Windows\SysWOW64\Kfcfimfi.dll eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe File created C:\Windows\SysWOW64\Ifaohg32.dll Amcehdod.exe File opened for modification C:\Windows\SysWOW64\Amjbbfgo.exe Aogbfi32.exe File created C:\Windows\SysWOW64\Ciipkkdj.dll Bgelgi32.exe File created C:\Windows\SysWOW64\Bghgmioe.dll Cogddd32.exe File created C:\Windows\SysWOW64\Glfdiedd.dll Dhbebj32.exe File created C:\Windows\SysWOW64\Cpmapodj.exe Bajqda32.exe File opened for modification C:\Windows\SysWOW64\Cnfkdb32.exe Cocjiehd.exe File created C:\Windows\SysWOW64\Dojqjdbl.exe Dkndie32.exe File created C:\Windows\SysWOW64\Kmephjke.dll Pplobcpp.exe File created C:\Windows\SysWOW64\Ogakfe32.dll Phcgcqab.exe File created C:\Windows\SysWOW64\Qjiipk32.exe Qhjmdp32.exe File opened for modification C:\Windows\SysWOW64\Qjiipk32.exe Qhjmdp32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2840 4152 WerFault.exe 173 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgifbhid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cncnob32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpbjkn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmblagmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qhjmdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amcehdod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdfpkm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cammjakm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdmfllhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdbpgl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgcihgaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhbebj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amjbbfgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amlogfel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apmhiq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgelgi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boldhf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cponen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cocjiehd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cklhcfle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddllkbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dojqjdbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phcgcqab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bacjdbch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhpofl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhblllfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qhhpop32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adfgdpmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bajqda32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgkiaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahmjjoig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdmmeo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdagpnbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cglbhhga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dafppp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aggpfkjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgnffj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgbpaipl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cacckp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgqlcg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpkmal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnmopk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akpoaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aokkahlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aonhghjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baannc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpfcfmlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cogddd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkqaoe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppolhcnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qacameaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdojjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cggimh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckebcg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnfkdb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpdgqmnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjdpelnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppahmb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boenhgdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpmapodj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Conanfli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpiplm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnlhncgi.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdagpnbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cponen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cncnob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkndie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddgibkpc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adkqoohc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhmbqm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpmapodj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dddllkbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aggpfkjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aopemh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Baannc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmihfl32.dll" Conanfli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phcgcqab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kioghlbd.dll" Qacameaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmeandma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qhhpop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aoioli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifaohg32.dll" Amcehdod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmncdk32.dll" Bphgeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgelgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aogbfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhblllfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qkicbhla.dll" Cocjiehd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cklhcfle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpkmal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjceejee.dll" Pmnbfhal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppolhcnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckbcpc32.dll" Ppahmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aokkahlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgbpaipl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehojko32.dll" Bgbpaipl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdfpkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Conanfli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boldhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpdgqmnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckjknfnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cklhcfle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aogbfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgkiaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aqjpajgi.dll" Cglbhhga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dddllkbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhbebj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phfcipoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eepmqdbn.dll" Aogbfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Baannc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eehnaq32.dll" Bajqda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dafppp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Keiifian.dll" Qhhpop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eekgliip.dll" Cpfcfmlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dahmfpap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pplobcpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qacameaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckebcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cglbhhga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmblagmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhhlki32.dll" Qhjmdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qacameaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjllddpj.dll" Bdagpnbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cponen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dllfqd32.dll" Dkndie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahmjjoig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgifbhid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlkidpke.dll" Ckebcg32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3952 wrote to memory of 4504 3952 eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe 84 PID 3952 wrote to memory of 4504 3952 eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe 84 PID 3952 wrote to memory of 4504 3952 eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe 84 PID 4504 wrote to memory of 1984 4504 Pmnbfhal.exe 85 PID 4504 wrote to memory of 1984 4504 Pmnbfhal.exe 85 PID 4504 wrote to memory of 1984 4504 Pmnbfhal.exe 85 PID 1984 wrote to memory of 5012 1984 Pplobcpp.exe 86 PID 1984 wrote to memory of 5012 1984 Pplobcpp.exe 86 PID 1984 wrote to memory of 5012 1984 Pplobcpp.exe 86 PID 5012 wrote to memory of 2828 5012 Phcgcqab.exe 87 PID 5012 wrote to memory of 2828 5012 Phcgcqab.exe 87 PID 5012 wrote to memory of 2828 5012 Phcgcqab.exe 87 PID 2828 wrote to memory of 656 2828 Pnmopk32.exe 88 PID 2828 wrote to memory of 656 2828 Pnmopk32.exe 88 PID 2828 wrote to memory of 656 2828 Pnmopk32.exe 88 PID 656 wrote to memory of 5060 656 Ppolhcnm.exe 89 PID 656 wrote to memory of 5060 656 Ppolhcnm.exe 89 PID 656 wrote to memory of 5060 656 Ppolhcnm.exe 89 PID 5060 wrote to memory of 2264 5060 Phfcipoo.exe 90 PID 5060 wrote to memory of 2264 5060 Phfcipoo.exe 90 PID 5060 wrote to memory of 2264 5060 Phfcipoo.exe 90 PID 2264 wrote to memory of 2084 2264 Pjdpelnc.exe 91 PID 2264 wrote to memory of 2084 2264 Pjdpelnc.exe 91 PID 2264 wrote to memory of 2084 2264 Pjdpelnc.exe 91 PID 2084 wrote to memory of 440 2084 Pmblagmf.exe 93 PID 2084 wrote to memory of 440 2084 Pmblagmf.exe 93 PID 2084 wrote to memory of 440 2084 Pmblagmf.exe 93 PID 440 wrote to memory of 2968 440 Ppahmb32.exe 94 PID 440 wrote to memory of 2968 440 Ppahmb32.exe 94 PID 440 wrote to memory of 2968 440 Ppahmb32.exe 94 PID 2968 wrote to memory of 4320 2968 Qhhpop32.exe 95 PID 2968 wrote to memory of 4320 2968 Qhhpop32.exe 95 PID 2968 wrote to memory of 4320 2968 Qhhpop32.exe 95 PID 4320 wrote to memory of 3596 4320 Qobhkjdi.exe 96 PID 4320 wrote to memory of 3596 4320 Qobhkjdi.exe 96 PID 4320 wrote to memory of 3596 4320 Qobhkjdi.exe 96 PID 3596 wrote to memory of 3356 3596 Qhjmdp32.exe 97 PID 3596 wrote to memory of 3356 3596 Qhjmdp32.exe 97 PID 3596 wrote to memory of 3356 3596 Qhjmdp32.exe 97 PID 3356 wrote to memory of 1468 3356 Qjiipk32.exe 98 PID 3356 wrote to memory of 1468 3356 Qjiipk32.exe 98 PID 3356 wrote to memory of 1468 3356 Qjiipk32.exe 98 PID 1468 wrote to memory of 3400 1468 Qacameaj.exe 99 PID 1468 wrote to memory of 3400 1468 Qacameaj.exe 99 PID 1468 wrote to memory of 3400 1468 Qacameaj.exe 99 PID 3400 wrote to memory of 968 3400 Ahmjjoig.exe 101 PID 3400 wrote to memory of 968 3400 Ahmjjoig.exe 101 PID 3400 wrote to memory of 968 3400 Ahmjjoig.exe 101 PID 968 wrote to memory of 1656 968 Aogbfi32.exe 102 PID 968 wrote to memory of 1656 968 Aogbfi32.exe 102 PID 968 wrote to memory of 1656 968 Aogbfi32.exe 102 PID 1656 wrote to memory of 4052 1656 Amjbbfgo.exe 103 PID 1656 wrote to memory of 4052 1656 Amjbbfgo.exe 103 PID 1656 wrote to memory of 4052 1656 Amjbbfgo.exe 103 PID 4052 wrote to memory of 4448 4052 Aphnnafb.exe 104 PID 4052 wrote to memory of 4448 4052 Aphnnafb.exe 104 PID 4052 wrote to memory of 4448 4052 Aphnnafb.exe 104 PID 4448 wrote to memory of 1896 4448 Adcjop32.exe 105 PID 4448 wrote to memory of 1896 4448 Adcjop32.exe 105 PID 4448 wrote to memory of 1896 4448 Adcjop32.exe 105 PID 1896 wrote to memory of 1532 1896 Aoioli32.exe 106 PID 1896 wrote to memory of 1532 1896 Aoioli32.exe 106 PID 1896 wrote to memory of 1532 1896 Aoioli32.exe 106 PID 1532 wrote to memory of 2132 1532 Amlogfel.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe"C:\Users\Admin\AppData\Local\Temp\eec69844fa72a719686cc72ebc82a5559ca056e71a2e2eab6571bf86e8aba772.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\Pmnbfhal.exeC:\Windows\system32\Pmnbfhal.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\Pplobcpp.exeC:\Windows\system32\Pplobcpp.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Phcgcqab.exeC:\Windows\system32\Phcgcqab.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\Pnmopk32.exeC:\Windows\system32\Pnmopk32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Ppolhcnm.exeC:\Windows\system32\Ppolhcnm.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\Phfcipoo.exeC:\Windows\system32\Phfcipoo.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\Pjdpelnc.exeC:\Windows\system32\Pjdpelnc.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Pmblagmf.exeC:\Windows\system32\Pmblagmf.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\Ppahmb32.exeC:\Windows\system32\Ppahmb32.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\Qhhpop32.exeC:\Windows\system32\Qhhpop32.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Qobhkjdi.exeC:\Windows\system32\Qobhkjdi.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\Qhjmdp32.exeC:\Windows\system32\Qhjmdp32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\Qjiipk32.exeC:\Windows\system32\Qjiipk32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\Qacameaj.exeC:\Windows\system32\Qacameaj.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\Ahmjjoig.exeC:\Windows\system32\Ahmjjoig.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\Aogbfi32.exeC:\Windows\system32\Aogbfi32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\Amjbbfgo.exeC:\Windows\system32\Amjbbfgo.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\Aphnnafb.exeC:\Windows\system32\Aphnnafb.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\Adcjop32.exeC:\Windows\system32\Adcjop32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\Aoioli32.exeC:\Windows\system32\Aoioli32.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\Amlogfel.exeC:\Windows\system32\Amlogfel.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\Adfgdpmi.exeC:\Windows\system32\Adfgdpmi.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\Akpoaj32.exeC:\Windows\system32\Akpoaj32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\Aokkahlo.exeC:\Windows\system32\Aokkahlo.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3644 -
C:\Windows\SysWOW64\Apmhiq32.exeC:\Windows\system32\Apmhiq32.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Windows\SysWOW64\Aggpfkjj.exeC:\Windows\system32\Aggpfkjj.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1232 -
C:\Windows\SysWOW64\Aonhghjl.exeC:\Windows\system32\Aonhghjl.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Windows\SysWOW64\Aaldccip.exeC:\Windows\system32\Aaldccip.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4884 -
C:\Windows\SysWOW64\Adkqoohc.exeC:\Windows\system32\Adkqoohc.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2424 -
C:\Windows\SysWOW64\Aopemh32.exeC:\Windows\system32\Aopemh32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4416 -
C:\Windows\SysWOW64\Amcehdod.exeC:\Windows\system32\Amcehdod.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1776 -
C:\Windows\SysWOW64\Bdmmeo32.exeC:\Windows\system32\Bdmmeo32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\Bgkiaj32.exeC:\Windows\system32\Bgkiaj32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\Bmeandma.exeC:\Windows\system32\Bmeandma.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Baannc32.exeC:\Windows\system32\Baannc32.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4852 -
C:\Windows\SysWOW64\Bdojjo32.exeC:\Windows\system32\Bdojjo32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Windows\SysWOW64\Bgnffj32.exeC:\Windows\system32\Bgnffj32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Windows\SysWOW64\Boenhgdd.exeC:\Windows\system32\Boenhgdd.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\Bacjdbch.exeC:\Windows\system32\Bacjdbch.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SysWOW64\Bdagpnbk.exeC:\Windows\system32\Bdagpnbk.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3124 -
C:\Windows\SysWOW64\Bhmbqm32.exeC:\Windows\system32\Bhmbqm32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3424 -
C:\Windows\SysWOW64\Bogkmgba.exeC:\Windows\system32\Bogkmgba.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3864 -
C:\Windows\SysWOW64\Bphgeo32.exeC:\Windows\system32\Bphgeo32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4740 -
C:\Windows\SysWOW64\Bhpofl32.exeC:\Windows\system32\Bhpofl32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\Bgbpaipl.exeC:\Windows\system32\Bgbpaipl.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5036 -
C:\Windows\SysWOW64\Bnlhncgi.exeC:\Windows\system32\Bnlhncgi.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\Bdfpkm32.exeC:\Windows\system32\Bdfpkm32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3404 -
C:\Windows\SysWOW64\Bhblllfo.exeC:\Windows\system32\Bhblllfo.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3120 -
C:\Windows\SysWOW64\Bgelgi32.exeC:\Windows\system32\Bgelgi32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\Boldhf32.exeC:\Windows\system32\Boldhf32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:992 -
C:\Windows\SysWOW64\Bajqda32.exeC:\Windows\system32\Bajqda32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:700 -
C:\Windows\SysWOW64\Cpmapodj.exeC:\Windows\system32\Cpmapodj.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4828 -
C:\Windows\SysWOW64\Cggimh32.exeC:\Windows\system32\Cggimh32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\Conanfli.exeC:\Windows\system32\Conanfli.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Cammjakm.exeC:\Windows\system32\Cammjakm.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\Cponen32.exeC:\Windows\system32\Cponen32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Chfegk32.exeC:\Windows\system32\Chfegk32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4164 -
C:\Windows\SysWOW64\Cgifbhid.exeC:\Windows\system32\Cgifbhid.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1420 -
C:\Windows\SysWOW64\Ckebcg32.exeC:\Windows\system32\Ckebcg32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2012 -
C:\Windows\SysWOW64\Cncnob32.exeC:\Windows\system32\Cncnob32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1432 -
C:\Windows\SysWOW64\Caojpaij.exeC:\Windows\system32\Caojpaij.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\Cpbjkn32.exeC:\Windows\system32\Cpbjkn32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3168 -
C:\Windows\SysWOW64\Cdmfllhn.exeC:\Windows\system32\Cdmfllhn.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\Cglbhhga.exeC:\Windows\system32\Cglbhhga.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:536 -
C:\Windows\SysWOW64\Ckgohf32.exeC:\Windows\system32\Ckgohf32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4492 -
C:\Windows\SysWOW64\Cocjiehd.exeC:\Windows\system32\Cocjiehd.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4212 -
C:\Windows\SysWOW64\Cnfkdb32.exeC:\Windows\system32\Cnfkdb32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4344 -
C:\Windows\SysWOW64\Cpdgqmnb.exeC:\Windows\system32\Cpdgqmnb.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3668 -
C:\Windows\SysWOW64\Cdpcal32.exeC:\Windows\system32\Cdpcal32.exe70⤵
- Drops file in System32 directory
PID:4848 -
C:\Windows\SysWOW64\Ckjknfnh.exeC:\Windows\system32\Ckjknfnh.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\Cnhgjaml.exeC:\Windows\system32\Cnhgjaml.exe72⤵PID:3112
-
C:\Windows\SysWOW64\Cacckp32.exeC:\Windows\system32\Cacckp32.exe73⤵
- System Location Discovery: System Language Discovery
PID:1888 -
C:\Windows\SysWOW64\Cpfcfmlp.exeC:\Windows\system32\Cpfcfmlp.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:228 -
C:\Windows\SysWOW64\Cdbpgl32.exeC:\Windows\system32\Cdbpgl32.exe75⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\Cgqlcg32.exeC:\Windows\system32\Cgqlcg32.exe76⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:512 -
C:\Windows\SysWOW64\Cklhcfle.exeC:\Windows\system32\Cklhcfle.exe77⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3224 -
C:\Windows\SysWOW64\Cogddd32.exeC:\Windows\system32\Cogddd32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Windows\SysWOW64\Dafppp32.exeC:\Windows\system32\Dafppp32.exe79⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:912 -
C:\Windows\SysWOW64\Dpiplm32.exeC:\Windows\system32\Dpiplm32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\Dddllkbf.exeC:\Windows\system32\Dddllkbf.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1728 -
C:\Windows\SysWOW64\Dgcihgaj.exeC:\Windows\system32\Dgcihgaj.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\SysWOW64\Dkndie32.exeC:\Windows\system32\Dkndie32.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:3000 -
C:\Windows\SysWOW64\Dojqjdbl.exeC:\Windows\system32\Dojqjdbl.exe84⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4100 -
C:\Windows\SysWOW64\Dahmfpap.exeC:\Windows\system32\Dahmfpap.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2872 -
C:\Windows\SysWOW64\Dpkmal32.exeC:\Windows\system32\Dpkmal32.exe86⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2916 -
C:\Windows\SysWOW64\Ddgibkpc.exeC:\Windows\system32\Ddgibkpc.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3676 -
C:\Windows\SysWOW64\Dhbebj32.exeC:\Windows\system32\Dhbebj32.exe88⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\Dkqaoe32.exeC:\Windows\system32\Dkqaoe32.exe89⤵
- System Location Discovery: System Language Discovery
PID:4152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 40090⤵
- Program crash
PID:2840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4152 -ip 41521⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5b912806c77d411cba6a107c3378b2315
SHA1a675e39dd1f2652a1c43e2d35709bff796582a27
SHA256b7bfffa2a5b76dcac7b2b298138c7121047287f62953fefc69c78e46bb9507a5
SHA5123eaae536a212854cbce8abd4554960ab7e97b0689f8c10b3104b88a40a06f7ac6e6cefcb6efef99b45633fbf5410d59635b76199b77c2a3b311409ad8ba014d4
-
Filesize
52KB
MD5a1f80065857e019772f10ab168715342
SHA1899f44689fb81e9dd3f8f207b65556cd133711b9
SHA2563a1aa3135bcfc4d7cf3f2ab902eda6bc9abdd71acdf6d45df11103ee552b6bb4
SHA5127da14f76d5cd89f3a1e9f43906446781b899be0cce2434ef9e3e7d80fe23558179de7c44e6f991b0376fd83a7bcde32fd18b1b63971efb6715f4f93379c5ad81
-
Filesize
52KB
MD5328ff36f50675255e5393e8c92bc5e72
SHA11ab89de0209e2ce375bf073c6ca7fc10591d393f
SHA256997beba0bb6025c800b1ff7bad0c943120175574a2a033533a837a55a823c425
SHA51224a995f29f06ee7ee3bb252376eeb82c22f3281cd9f6a9c44b2d28803aa36a91db0aa613f1d413d8df0f32e8006810305a600754945021fabb15f878dc1ead5a
-
Filesize
52KB
MD5f44cc906823d48eb87a20c26db293073
SHA1ac012f0fb92e04bf8e96c50bec2a1fed61a2fa35
SHA25645717932ff9624d77a538ab1981d928ca08f74d2eb8bc6ea3e48ea53394d7e9a
SHA51258a7f9379b341e355e1d5ebdd895228ae719645673ded9ab7e0325702360deb5a81773d6e1bf2178591cba6fdca1bca6fb5dc600789c468090e837a3d5b86747
-
Filesize
52KB
MD594c9d8500807a7327e898360ad629bf5
SHA111581c84cb4061662d7d7becc1190ea99ff91e47
SHA2566cb07c0d57aeabdebf830959b2393bdc26972f74ce1e748220ce116c8d689992
SHA512ee739776929bc6df7a80a83a51c63732bedad31407585f5298843944e6cde8c889ba7f0e78fdfc82eee3650c03aa0efa1a3f39350751ca034318a7c803a96980
-
Filesize
52KB
MD55b9fc1a0a9bd33ef9eb7655668503fe2
SHA16ac7ed317f7253b7ef9abdd47196e5e55e8305c7
SHA25600b5c4dfc4b65989f910575fed689a27d6da213db8180074eb1238601f03bdea
SHA512fae554b7a48bf281b50b9987cf305ae37e87c615815be4d578a06ede2379fe13535a22dcad73e38e04e6554023dfae96d7a9e303d96f8b64a833c02660319927
-
Filesize
52KB
MD57e1255c9a90d81bc2d71dd7525fda761
SHA12cd3d4fd5b930dbe0f26307de62506059ede8ad4
SHA25662095d57f759d2a1983de6aa15ba12ec82047497f65c79440c863ebf462687e8
SHA51216a6da633da73819d3b05cd8d5d012df2cbb35a0b7b14896c612a896e9493c9568fbfc1e6fbc87c3ee600c8d6a021c950dfbb0b86d7c65df8144b251e21488f1
-
Filesize
52KB
MD5812010b8f11ab5e37e8fc29819a06e31
SHA138c911c201ea5ac091fc294542f882da3a4e06c6
SHA2564a086bfdd01d20922cda75f5c9c064faa886af18627ebbfb5b8e6a30f121f80c
SHA51211e9f664c9313bb7c203b8090e9f86dc0cf780722c68a1613e4088957f4ace4d62ce3edefe4f36a10c85145d2b2d559eaa3b2927dd2c058228f6084eb8cf47c6
-
Filesize
52KB
MD5d43e55180274c4b3190925297c790991
SHA1fd387a191bd8d063048f11e3428edf99a3620628
SHA25618a904281adedf5382439fdc24654e80ade13a498338ca06e0ad68471375b43d
SHA51232a2f281ae300d9edfdde5290328ee6c137c9d211cd7a7dfa76d4c19e93d27b65d627ff42a3d4983c48ad423a3ff991119d6ddb1753ea93085f10c9b5c90093f
-
Filesize
52KB
MD576f1ecb2219b80003896e343933937ab
SHA1ce4bccf0c0b5b8eaeaf0ef5949a8646b034f353f
SHA2568fbb68edf4745c8690f62b5265ec33dde73deb1b0a5a6fe46e716964700f1ef2
SHA512574129e947791bc156cb7efa4b8a4c32d534c3a9e6efee090aec95362e374e78cee0c1596765c62bb4e42128adbe14cddb8500ef001d50d671957948b9bb04bb
-
Filesize
52KB
MD5149305f87ff22428c421551dccd481ab
SHA1f85bfcf72fd02cb348c4854ba1b08feb0bc592ae
SHA25650dd1db9651be9fa0c154dd8b714bacb35dd1815ef8e0fb856f1f9c086a414a4
SHA512a5e4b6e5bd6413c68518e1da05d55ed15676d01bd1a82647a9fa4244fcad220e50ef5772f62faed66b3635d90eed5a73e1e82daa226afb69a2978a6c8b8f1521
-
Filesize
52KB
MD5a5830804436dfd35de1ee28557e30403
SHA1bc2742e2e9c4aba7224915dc8194dc3d0a8287d9
SHA256c065ec4062ee9bb03d2cc9b4f48e30a70d96314165b0b05b5f18d2674109a774
SHA512613e9e3e93b82f5d2bdbfbf942c9e0e9e99b43600d0fdfef78b5a63ed8b4500bd6e14363af923b76f932836b00518a8c2d690f398de7e93c008177c820d09719
-
Filesize
52KB
MD5756258d8cb2ae1df991709e30174bb02
SHA14595592ba9371275ed555f62fb6eaf907e5bc62c
SHA256fa4c1b914db20b8aeed3f9e0b395e583193a3dc2d603f038cd6dd5b2c383ea71
SHA512a59f419dc5e32ef279dbb7dcd8f9e73387ab5383350130ffa63a25eb0859ec41cf1844526b426fa685f1967ef5e180d5b39424d8d0a2da06a5e0c6e0e64dc1f7
-
Filesize
52KB
MD53d370ae76aadf93b85a72fd160417f62
SHA1f4357f7b2a6222e091562afeab9c789494689ce1
SHA256e044b52d35668824cd4997f29aae10ed0b37c85cc9efec732813c8f27e32ff5d
SHA512fe132eaa0d9ca8fdc672a1726226837a45c044ed8e8bc14f1e2474513b64636448f0c05f47ba48732d7160c2e4f4981b3e00da4c8f9dab7e319793a666f5bb0d
-
Filesize
52KB
MD5cedf16aec2d855e0cf9017a3c7fff3de
SHA1f86776d62635efd58c1ebe89cc200471961b15a3
SHA256d3fdf380b3824ff87db6daabe8d3453aada594a30dc7d4f0aa6bff8b56c34587
SHA51231d192d32b8a2f7f92997410e54b487276bfcc989f1a2d2c56cadf9e02457c5561a8a4d1ff7914f967b402594dd9be93a86481c8055cea4b8cb89369f7dd71bf
-
Filesize
52KB
MD53f03d7fe44a9cfd92827042fc18aa26d
SHA17ca72dcbc5a7e23ffe5268e7c7954caa70dbcb60
SHA2567da75de2dbb12d288455b885a81fb864118c49f041ad2ecab5860b3967d47501
SHA512a770e015c41e88ccdf7f7b53729f2cb36cb4fe93fbd37ed92c53b1ee17b45d27075ede4df8f2db79b244e5a180c8ee95ea6c180029d07c767fd1ef0872e8f1f7
-
Filesize
52KB
MD5b00da4ad47eb330b919c36053976c74e
SHA1ee8bf8afc7c2a08a902e49859d2c16bca6a2cf1b
SHA25684613b476fa6309c64baa2cefa00b56bf139f3857610853e664e83ccf84851c8
SHA512b6fa64317df2619311a6f8ca54b3cdba4ccfc50c81e074f0ff55029ca49904d8c3afd329ba82f5af1b0ca34d7c7ba20ac3de4ed7b0683337863d803603f9febf
-
Filesize
52KB
MD597ee3817736227712c03f3dbeec91402
SHA1223410b8f0ea4b34a13709d8a4db09784b0dd045
SHA256f4f9738b46191ddfce926c964b88361db1c76957b2e42cb58c7fedb85ffc6746
SHA512011440d735f08bd401aff64be1cbcd113b8842e1eba259146876e352296687e5684ea2fce111e0dfc76898418124c8fd88c224477927d8e1327b9c295319c08c
-
Filesize
52KB
MD54f824191066e4a6f88aafeab94d0df36
SHA1ee06017d295fdb14598b7f4faf47827e6f019d88
SHA2567197209c7a3335bcfe32169204b3a9ea62aa3b8301506d19a721e48de85e2041
SHA512f0df18119a19e10fd9bcea627f3b776a4e9b5b781957dd359e5a418dcbb22c95940ff7e88a1399c6a2a9ade44396573aeca49c3c29b075a2d20b30e6fead344b
-
Filesize
52KB
MD5e13bc0003d17f306c3f524c20d010473
SHA1f0684cf2cd7e881a973542f4ea7d39ca85ede2ca
SHA256393596815be739e015e9cb73b0009ed740d08482601d78aa7c312a55309dc88e
SHA5125ff8e785d69c2f6e2b759867b7bdcd3ea2b5a9b8764a1e79eec9d0f7320d003a6655a9cdc279dd9644a21bb9d73ab4726b8f8d980cf7ee2b47d0d6d053144160
-
Filesize
52KB
MD50d25e6db9eaefc00c739caac8ecfbd06
SHA150979a8c02ac99880c5b27f9e989f536e68b6d7f
SHA256d90a7c3746aab82a3a4c894b7cd2c4dea9de462b8d2b01a0268dfd4531dc14e9
SHA51251112a32c807cbc95575729ebb57b2bf2a809a72db83539bc0902c7ea07afdbf4bf34c643adf12143bdf53e37b547ff766827c5b415eafa1cf455fea21f07d66
-
Filesize
52KB
MD5c2149cd25a63c3cc979050a6fecaba0c
SHA17aa7fdcee269afa886bee09014c759fd1900c512
SHA2566941fecd071569da3ea89fcbdedf0fab12cc4fa13eaea20162b96af30184f50f
SHA5128122119351c4536b1ea7daba4abea97c0725a4f00bbb61708563ab79b9f612ad7adeb5b77c9e3b26735faf61f3392cac237081f2c17ef7a4c68a2569f55c7c64
-
Filesize
52KB
MD5df8e2f3f70a1a9639ad1b4b2b55f5539
SHA1ff17b6487be6ec8f9590ab4bc1f1762ac26eba03
SHA25673e70f4b5feecd2ac3067bdd37218a24983fe469576ed402f319c192a647e593
SHA512b69430f8c2443db878b56286fe08be0e2f044c69069216c317e3c36d9202600686ae845f659e05c2a1c705321a5c14f44ce740a8bacfeeeb84ec50f80da32e78
-
Filesize
52KB
MD5ff9d17de70440b795e58ba1370b6c243
SHA1a3a2a76b9554392127bdd0f6753c86f327bf4295
SHA256f073e67283c57540780b2d43c70dfcdbee7a2e9a68392ccf2766938490a94e24
SHA5129c57862d886c45b836e45d0d80452702e7f02a86ca42be8cc800d3766b3cdd7499d966beb4b041bbe6f8278af360d2beca51d4f3e62598c125a6613300ba4499
-
Filesize
52KB
MD505dcb405049e152ad4310ae2a872c796
SHA1f21261655a0e211b0f99dd13cfbc63a534e75eac
SHA2565118530515fe8941d5ff244d25fbb1035b0753cdbaf4a0e8c3cd3888d0c3c758
SHA5121b9d163b718be88697f0cff01604de86b623002be176cf528c4d5f1b68d22a0c43bd515b3cab3616474bd68bae0ef1b2d592e497cf7114da896018729b7acea4
-
Filesize
52KB
MD5adef3159f4f4144c6c3fe7c1b889109d
SHA1785c8f3fa57cae5534a749bd7e6ba8282c397e55
SHA25664b0f246bd8d2e7e74a153add13ebc8c833b75e14b27f31047730f92f480c5c4
SHA512130cd6948b86e4c1d1793912a73c00322bdf90cb90aee3dde25c06281c614ccdd18db2ca4ebc42be19257bbabca93da1498a113d3d27c94552dba5818f3395cd
-
Filesize
52KB
MD550a49f64e030f004bf4c3925cccdf5c7
SHA14732af3856628ccb8c73d630e9f38baa281e34c8
SHA256bb897f3088807a7185321f766d387ecdb4afcfe3787abdacb872b7c9a19f7de7
SHA512c71d78a2a0874f721bbed4ceb5f0d2ecdc106d2a080865b23797b40f2a02685d71d81f5d188571c01167c06d1b829c5c2ed094149e5c5410c8718694126eccd8
-
Filesize
52KB
MD51c7b3b1ebafe2aaf42b84293ff1f8351
SHA1ca2459036423e3854c96d16a5795fd6f18cd39b9
SHA256d3be92e5dbdbf77f34e0e14c8a01fcc10b2aaab9b253041f4c60addea31a9161
SHA51299b4aa351f3e3499c29c64e960681deeb1d93a44cdad70c823b1955ddbad0fc9f3aa906ef7906b8157dd415f7f88acbd0904c63b88c84f17661e5c49974c5688
-
Filesize
52KB
MD543902864b0bfe23ecb97edf9748b3192
SHA15bb7a70af2805e84fdba6962804b7bd4474ac2a4
SHA2561ebea262e07920ef8de575aaa73317c1ca35718d8d8adb9d67e8caa22f814d95
SHA512908835b8137a6ee474b52761ebe2d306f6980fc93ef822f7561112c019476830f6f442ecdd8c67bd1d8609a3656b0aee58aa7a34971b8a83c489336c9a449b95
-
Filesize
52KB
MD57dd18e732dd7dda220741687f02ba20e
SHA1ca9f39273a3aeb0a55fba3b863889c91aa3bfff2
SHA256961094427c617805544722d33c284c74bc14a1bed2b884ce3209c188e6a855a9
SHA5128239371a9f859ab81fe355f40a63f99416ef7c53902added9d03fd0b4d0dfa0c89714e4c456e421b92808b0480c7c4f5366ddf5b513a549684979248a8752c15
-
Filesize
52KB
MD5d1323448084853c0f9bcea528ee4caa8
SHA1a39479ecf769592798bb3ccb8de912e4903d029b
SHA256ccd899f8ffc6d7c134d4ea91c778e9097b703a91fd24837f9b8676398cf9d797
SHA51215893efa14629e767eda455b787d30edcdabdd1fe37fbdc20f73bb455c528a2715f2f6305f7b937ee2d8e1d028957a1ec2d18b9aa16c5c07bfe314338d6a96c2
-
Filesize
52KB
MD54eb86a2ba0089de9bd8d0e84dc668683
SHA13223253be666c1a084ebf5205552fb4321b06a4b
SHA25625def69fb82c6300d116428974ec018317860775088581dbaf956e41613083e4
SHA512e0995ef9d9745ed81b491a115d3745bacf08c1fb4079af7b510cb147667d2a6d601e05114f1e910f3fb594f34103e08552b5862e49430c5da9d265873e9aec0a
-
Filesize
52KB
MD5cf83ee1db628eff080ca0d44a19621c1
SHA1f8b16b8f6237e5f173329716d832654c8f03e6f9
SHA256f860d55357bb360bf1d4464c3c622146c727c289519f92238d616a5afed38f94
SHA512f5e20fc6f97f19d7840031ed72c98dc9d350bb242cd0fba40a1a1a66a7e37e94617b82a76a694997077ce14fc1990a432f85a3565093978d86c7e6df9ec8201d
-
Filesize
52KB
MD537ac6700ac291046f761284eb60f5357
SHA14c180432ed782fadaa2f288f64d76339a531052b
SHA256e8032d63033bb3a62977dc3748534d60c6648bb5c713cab02d49f69add2f05f8
SHA51204966c2a7bd18ba105995cdca763e83a7046c5289bc749e3a48d81ce3c83c0c51801ed32329b24d15f7391381b4e2150349aa35c352faf7186657465ec5ee232
-
Filesize
52KB
MD5d89c787cca58c0963290605e3882607f
SHA1223008fa09f708b02ef65a78da8a53dd91777f23
SHA2569595109807f45b4755ab152467d4a823ef6862d12da91c52943d9768dc4bf496
SHA5122ae3664440a591511121f05d84d93dae59c0c39b5c090fb1b496b77528f51654745ba69e23d681a5f54e88c005882f1d33b7a600337f46d1eef76c2d24b8edf7
-
Filesize
52KB
MD553285d683921d2899b00d70f517b7447
SHA1f85882c1e630ffe0f7682ca2ad38972b6207c679
SHA25663a4d4fa3634ec57c59fcd69f5854e10b2c38d9a1dde4be8e6ec3515b9dcde6a
SHA512be664cf19f2191bd9ef03f46fc49a65a990c684896e1c20b4da47a16c6033c4ff191c0b23d840017e7214e11263a73739e1f7ccc1854ee9e9c3caa034f9dba65
-
Filesize
52KB
MD580fd605a1c925240fd993a6c307544db
SHA16a0f91a4f063da3f88c37cdc5e26a98c10d31421
SHA256cd7ebfd13e748666c3d58f2a4ea027027ff513ba6b7f2e37482c22db0491387f
SHA512c7303f378b35391ceb31f67f754600f70c9a86660954e745c28e7de5ebc6c41d6c180cb8fd4d98ee1b18e9704541bdb8899a3ef9bbf9090182ee6801d6ce90c7
-
Filesize
52KB
MD5d2f3f69118251f656801172e3de84eca
SHA1b9aa0491e00b44068d7d05d13c1b7c9d6c8f169b
SHA256520a4c142a7ac89b9144f1fe3b22ec3398f2068d9a28ee496b1e229b368d3322
SHA5126beeaab21f4c2e16df98717bf16c233659898217f60e5f19fec55be0f880723caf1d8603cedd251d2e508f4a1c45959ce5f32051bbd64e07d2fd9f6f758984cb
-
Filesize
52KB
MD5e7ce24e09bc08e73b9e922afd2b08daf
SHA192733a190f3650d5c5b5f88ec0d8f8aca70f352c
SHA256203f36e66b82ff5845f9d0b880507786ca3ce70737d06c3e8b492fb5e8021285
SHA51297261e3355bd8887696f0a322d4c26ee599ad03251ba4943255889d572c35bacd123d78a3a9c2c4b1bcb79aa89bed6620f5d95ecf76ccc84f22e31b35b79bfaf
-
Filesize
52KB
MD59145847d942cf11d8b038c187d2a30eb
SHA199b4c9b600eae14564d64a83500579d516ccd0c6
SHA256cf0a890d04646919577ab5512da8ac9cc21958a4786cd930d81271be65a82507
SHA512a55d6dca29d8b97377b98f5a44f90ce9c90da6e6086cfbbff4a0e8fe6bf227e27be1269128b2ac0fe80c7b47985f9651171bc4eddefd35fb7de04a9544b91206