Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe
Resource
win10v2004-20240802-en
General
-
Target
57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe
-
Size
640KB
-
MD5
e9990af3caef34a043db8c46cd3e14f0
-
SHA1
1bdb5b7db44d2093091a06181df28708aac4d0f5
-
SHA256
57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8
-
SHA512
37330f913eda27d0df6a52b59ae449e64b50755db76e85ff3cf478ad4277aa7ed26dee3cbcd0911d2f8d76396efe860f28cce22910cbea0f6c93a84c1b043a08
-
SSDEEP
3072:xWd8GPhzaMRYQfIdAx7nx4f4+xGkIs6COoU60EaBNNVBZ:Yd8GPhzafIIEnR+AkOCOu0EajNVBZ
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfkedibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aqppkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amgapeea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfmajipb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfiafg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oponmilc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Olhlhjpd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdfjifjo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfhhoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bfhhoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Beihma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdhhdlid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqfdnhfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pdkcde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfaigm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmbplc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmgjgcgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pcppfaka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmpcfdmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bapiabak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmqmma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndfqbhia.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nckndeni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnneknob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pgioqq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmpcfdmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmlcbbcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojgbfocc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ojgbfocc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ojaelm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnonbk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aminee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oqfdnhfk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddmaok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djgjlelk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndfqbhia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bcoenmao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cenahpha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olhlhjpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Olmeci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pclgkb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmiflbel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmqmma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cegdnopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pfaigm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajhddjfn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmbplc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfpnph32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cegdnopg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmkjkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdfkolkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ncfdie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qgcbgo32.exe -
Executes dropped EXE 64 IoCs
pid Process 4740 Ncfdie32.exe 4260 Ndfqbhia.exe 2236 Nnneknob.exe 4092 Nckndeni.exe 1216 Oponmilc.exe 4504 Ojgbfocc.exe 1004 Ocpgod32.exe 1652 Olhlhjpd.exe 1020 Oqfdnhfk.exe 1220 Olmeci32.exe 2616 Ojaelm32.exe 2436 Pdfjifjo.exe 760 Pnonbk32.exe 4088 Pclgkb32.exe 2320 Pdkcde32.exe 3180 Pgioqq32.exe 4248 Pcppfaka.exe 4820 Pnfdcjkg.exe 2288 Pfaigm32.exe 1952 Qmkadgpo.exe 1336 Qjoankoi.exe 1536 Qgcbgo32.exe 4020 Ageolo32.exe 1488 Agglboim.exe 1756 Aqppkd32.exe 2936 Ajhddjfn.exe 3516 Amgapeea.exe 3456 Aminee32.exe 1684 Bmkjkd32.exe 1836 Bganhm32.exe 4844 Beeoaapl.exe 4276 Bmpcfdmg.exe 3292 Bfhhoi32.exe 4356 Bmbplc32.exe 3680 Beihma32.exe 892 Bfkedibe.exe 2480 Bapiabak.exe 3692 Bcoenmao.exe 4424 Cfmajipb.exe 3076 Cmgjgcgo.exe 980 Cenahpha.exe 1360 Cfpnph32.exe 2844 Cmiflbel.exe 4808 Ceqnmpfo.exe 4396 Cjmgfgdf.exe 2408 Cmlcbbcj.exe 4348 Cdfkolkf.exe 2556 Cjpckf32.exe 3132 Cajlhqjp.exe 2192 Cdhhdlid.exe 4444 Cffdpghg.exe 5036 Cmqmma32.exe 768 Cegdnopg.exe 4680 Dfiafg32.exe 2572 Dmcibama.exe 2484 Ddmaok32.exe 3204 Djgjlelk.exe 1940 Dmefhako.exe 2804 Dhkjej32.exe 5096 Dodbbdbb.exe 2496 Daconoae.exe 1744 Dhmgki32.exe 2812 Deagdn32.exe 2840 Dddhpjof.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dhmgki32.exe Daconoae.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Ojaelm32.exe Olmeci32.exe File created C:\Windows\SysWOW64\Pnfdcjkg.exe Pcppfaka.exe File created C:\Windows\SysWOW64\Lnlden32.dll Pcppfaka.exe File created C:\Windows\SysWOW64\Bmbplc32.exe Bfhhoi32.exe File created C:\Windows\SysWOW64\Cmiflbel.exe Cfpnph32.exe File created C:\Windows\SysWOW64\Ceqnmpfo.exe Cmiflbel.exe File opened for modification C:\Windows\SysWOW64\Pgioqq32.exe Pdkcde32.exe File created C:\Windows\SysWOW64\Dpmdoo32.dll Ageolo32.exe File created C:\Windows\SysWOW64\Ihidlk32.dll Bganhm32.exe File created C:\Windows\SysWOW64\Beihma32.exe Bmbplc32.exe File opened for modification C:\Windows\SysWOW64\Cajlhqjp.exe Cjpckf32.exe File opened for modification C:\Windows\SysWOW64\Ddmaok32.exe Dmcibama.exe File opened for modification C:\Windows\SysWOW64\Dmcibama.exe Dfiafg32.exe File created C:\Windows\SysWOW64\Kahdohfm.dll Dhmgki32.exe File created C:\Windows\SysWOW64\Fjbnapki.dll Pdfjifjo.exe File opened for modification C:\Windows\SysWOW64\Pfaigm32.exe Pnfdcjkg.exe File created C:\Windows\SysWOW64\Akmfnc32.dll Aminee32.exe File created C:\Windows\SysWOW64\Qopkop32.dll Bmkjkd32.exe File created C:\Windows\SysWOW64\Cfmajipb.exe Bcoenmao.exe File created C:\Windows\SysWOW64\Lpggmhkg.dll Cajlhqjp.exe File created C:\Windows\SysWOW64\Ehaaclak.dll Pdkcde32.exe File opened for modification C:\Windows\SysWOW64\Bfhhoi32.exe Bmpcfdmg.exe File created C:\Windows\SysWOW64\Mmnbeadp.dll Bapiabak.exe File created C:\Windows\SysWOW64\Jffggf32.dll Cmlcbbcj.exe File created C:\Windows\SysWOW64\Dmefhako.exe Djgjlelk.exe File opened for modification C:\Windows\SysWOW64\Ncfdie32.exe 57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe File created C:\Windows\SysWOW64\Oqfdnhfk.exe Olhlhjpd.exe File created C:\Windows\SysWOW64\Jhbffb32.dll Bfkedibe.exe File created C:\Windows\SysWOW64\Dfiafg32.exe Cegdnopg.exe File created C:\Windows\SysWOW64\Jjjald32.dll Dmcibama.exe File created C:\Windows\SysWOW64\Cacamdcd.dll Cdfkolkf.exe File opened for modification C:\Windows\SysWOW64\Dodbbdbb.exe Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Ocpgod32.exe Ojgbfocc.exe File created C:\Windows\SysWOW64\Debdld32.dll Ojgbfocc.exe File opened for modification C:\Windows\SysWOW64\Pnfdcjkg.exe Pcppfaka.exe File created C:\Windows\SysWOW64\Aminee32.exe Amgapeea.exe File created C:\Windows\SysWOW64\Bmkjkd32.exe Aminee32.exe File opened for modification C:\Windows\SysWOW64\Cfmajipb.exe Bcoenmao.exe File created C:\Windows\SysWOW64\Cajlhqjp.exe Cjpckf32.exe File created C:\Windows\SysWOW64\Olmeci32.exe Oqfdnhfk.exe File opened for modification C:\Windows\SysWOW64\Pcppfaka.exe Pgioqq32.exe File created C:\Windows\SysWOW64\Pfaigm32.exe Pnfdcjkg.exe File opened for modification C:\Windows\SysWOW64\Aminee32.exe Amgapeea.exe File opened for modification C:\Windows\SysWOW64\Bmkjkd32.exe Aminee32.exe File created C:\Windows\SysWOW64\Cjpckf32.exe Cdfkolkf.exe File created C:\Windows\SysWOW64\Nnneknob.exe Ndfqbhia.exe File opened for modification C:\Windows\SysWOW64\Oponmilc.exe Nckndeni.exe File opened for modification C:\Windows\SysWOW64\Aqppkd32.exe Agglboim.exe File opened for modification C:\Windows\SysWOW64\Bganhm32.exe Bmkjkd32.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Bapiabak.exe Bfkedibe.exe File created C:\Windows\SysWOW64\Cjmgfgdf.exe Ceqnmpfo.exe File created C:\Windows\SysWOW64\Pnonbk32.exe Pdfjifjo.exe File created C:\Windows\SysWOW64\Qjoankoi.exe Qmkadgpo.exe File opened for modification C:\Windows\SysWOW64\Agglboim.exe Ageolo32.exe File created C:\Windows\SysWOW64\Oicmfmok.dll Aqppkd32.exe File created C:\Windows\SysWOW64\Jpcnha32.dll Bfhhoi32.exe File opened for modification C:\Windows\SysWOW64\Bfkedibe.exe Beihma32.exe File created C:\Windows\SysWOW64\Fmjkjk32.dll Cjmgfgdf.exe File opened for modification C:\Windows\SysWOW64\Cmqmma32.exe Cffdpghg.exe File opened for modification C:\Windows\SysWOW64\Djgjlelk.exe Ddmaok32.exe File created C:\Windows\SysWOW64\Pclgkb32.exe Pnonbk32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3224 5072 WerFault.exe 147 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndfqbhia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olhlhjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olmeci32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qgcbgo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjpckf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qmkadgpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ageolo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmiflbel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceqnmpfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojgbfocc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfaigm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmpcfdmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cegdnopg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nckndeni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfmajipb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmgjgcgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfpnph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cajlhqjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncfdie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnonbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqppkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beihma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcppfaka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bcoenmao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgioqq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajhddjfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocpgod32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oqfdnhfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmkjkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfhhoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cenahpha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmlcbbcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beeoaapl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfkedibe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oponmilc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aminee32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfiafg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nnneknob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pclgkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnfdcjkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qjoankoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agglboim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amgapeea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cffdpghg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddmaok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmefhako.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmbplc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdfjifjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdkcde32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bapiabak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdfkolkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdhhdlid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojaelm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjmgfgdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djgjlelk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bganhm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmqmma32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpmdoo32.dll" Ageolo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajhddjfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qopkop32.dll" Bmkjkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ndfqbhia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oqfdnhfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ojaelm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Empbnb32.dll" Pnfdcjkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgcail32.dll" Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nckndeni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Olhlhjpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmdlbjng.dll" Ajhddjfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gidbim32.dll" Djgjlelk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jijjfldq.dll" Beeoaapl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmbplc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjfhhm32.dll" Cfmajipb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pgioqq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pfaigm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qmkadgpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qgcbgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlklhm32.dll" Agglboim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpggmhkg.dll" Cajlhqjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Djgjlelk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnmnbf32.dll" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhbopgfn.dll" Ncfdie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efmolq32.dll" Qgcbgo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajhddjfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhbffb32.dll" Bfkedibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dchfiejc.dll" Cdhhdlid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Beihma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bapiabak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbloam32.dll" Cfpnph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdfjifjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pdfjifjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qjoankoi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bfhhoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gblnkg32.dll" Bmbplc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nckndeni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Amgapeea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cenahpha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jffggf32.dll" Cmlcbbcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ncfdie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nnneknob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aqppkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmpcfdmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cenahpha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oqfdnhfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghngib32.dll" Pclgkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgepdkpo.dll" Nnneknob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Olmeci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pnfdcjkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oicmfmok.dll" Aqppkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjjald32.dll" Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Dddhpjof.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 844 wrote to memory of 4740 844 57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe 82 PID 844 wrote to memory of 4740 844 57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe 82 PID 844 wrote to memory of 4740 844 57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe 82 PID 4740 wrote to memory of 4260 4740 Ncfdie32.exe 83 PID 4740 wrote to memory of 4260 4740 Ncfdie32.exe 83 PID 4740 wrote to memory of 4260 4740 Ncfdie32.exe 83 PID 4260 wrote to memory of 2236 4260 Ndfqbhia.exe 84 PID 4260 wrote to memory of 2236 4260 Ndfqbhia.exe 84 PID 4260 wrote to memory of 2236 4260 Ndfqbhia.exe 84 PID 2236 wrote to memory of 4092 2236 Nnneknob.exe 85 PID 2236 wrote to memory of 4092 2236 Nnneknob.exe 85 PID 2236 wrote to memory of 4092 2236 Nnneknob.exe 85 PID 4092 wrote to memory of 1216 4092 Nckndeni.exe 86 PID 4092 wrote to memory of 1216 4092 Nckndeni.exe 86 PID 4092 wrote to memory of 1216 4092 Nckndeni.exe 86 PID 1216 wrote to memory of 4504 1216 Oponmilc.exe 87 PID 1216 wrote to memory of 4504 1216 Oponmilc.exe 87 PID 1216 wrote to memory of 4504 1216 Oponmilc.exe 87 PID 4504 wrote to memory of 1004 4504 Ojgbfocc.exe 88 PID 4504 wrote to memory of 1004 4504 Ojgbfocc.exe 88 PID 4504 wrote to memory of 1004 4504 Ojgbfocc.exe 88 PID 1004 wrote to memory of 1652 1004 Ocpgod32.exe 89 PID 1004 wrote to memory of 1652 1004 Ocpgod32.exe 89 PID 1004 wrote to memory of 1652 1004 Ocpgod32.exe 89 PID 1652 wrote to memory of 1020 1652 Olhlhjpd.exe 90 PID 1652 wrote to memory of 1020 1652 Olhlhjpd.exe 90 PID 1652 wrote to memory of 1020 1652 Olhlhjpd.exe 90 PID 1020 wrote to memory of 1220 1020 Oqfdnhfk.exe 91 PID 1020 wrote to memory of 1220 1020 Oqfdnhfk.exe 91 PID 1020 wrote to memory of 1220 1020 Oqfdnhfk.exe 91 PID 1220 wrote to memory of 2616 1220 Olmeci32.exe 92 PID 1220 wrote to memory of 2616 1220 Olmeci32.exe 92 PID 1220 wrote to memory of 2616 1220 Olmeci32.exe 92 PID 2616 wrote to memory of 2436 2616 Ojaelm32.exe 93 PID 2616 wrote to memory of 2436 2616 Ojaelm32.exe 93 PID 2616 wrote to memory of 2436 2616 Ojaelm32.exe 93 PID 2436 wrote to memory of 760 2436 Pdfjifjo.exe 94 PID 2436 wrote to memory of 760 2436 Pdfjifjo.exe 94 PID 2436 wrote to memory of 760 2436 Pdfjifjo.exe 94 PID 760 wrote to memory of 4088 760 Pnonbk32.exe 95 PID 760 wrote to memory of 4088 760 Pnonbk32.exe 95 PID 760 wrote to memory of 4088 760 Pnonbk32.exe 95 PID 4088 wrote to memory of 2320 4088 Pclgkb32.exe 96 PID 4088 wrote to memory of 2320 4088 Pclgkb32.exe 96 PID 4088 wrote to memory of 2320 4088 Pclgkb32.exe 96 PID 2320 wrote to memory of 3180 2320 Pdkcde32.exe 97 PID 2320 wrote to memory of 3180 2320 Pdkcde32.exe 97 PID 2320 wrote to memory of 3180 2320 Pdkcde32.exe 97 PID 3180 wrote to memory of 4248 3180 Pgioqq32.exe 98 PID 3180 wrote to memory of 4248 3180 Pgioqq32.exe 98 PID 3180 wrote to memory of 4248 3180 Pgioqq32.exe 98 PID 4248 wrote to memory of 4820 4248 Pcppfaka.exe 99 PID 4248 wrote to memory of 4820 4248 Pcppfaka.exe 99 PID 4248 wrote to memory of 4820 4248 Pcppfaka.exe 99 PID 4820 wrote to memory of 2288 4820 Pnfdcjkg.exe 100 PID 4820 wrote to memory of 2288 4820 Pnfdcjkg.exe 100 PID 4820 wrote to memory of 2288 4820 Pnfdcjkg.exe 100 PID 2288 wrote to memory of 1952 2288 Pfaigm32.exe 101 PID 2288 wrote to memory of 1952 2288 Pfaigm32.exe 101 PID 2288 wrote to memory of 1952 2288 Pfaigm32.exe 101 PID 1952 wrote to memory of 1336 1952 Qmkadgpo.exe 102 PID 1952 wrote to memory of 1336 1952 Qmkadgpo.exe 102 PID 1952 wrote to memory of 1336 1952 Qmkadgpo.exe 102 PID 1336 wrote to memory of 1536 1336 Qjoankoi.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe"C:\Users\Admin\AppData\Local\Temp\57754483c6b9791dd00f0abe32797849029a1e42829990f2129fc00125358ca8N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\Ncfdie32.exeC:\Windows\system32\Ncfdie32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\Ndfqbhia.exeC:\Windows\system32\Ndfqbhia.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\Nnneknob.exeC:\Windows\system32\Nnneknob.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Nckndeni.exeC:\Windows\system32\Nckndeni.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\Oponmilc.exeC:\Windows\system32\Oponmilc.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\Ojgbfocc.exeC:\Windows\system32\Ojgbfocc.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\Ocpgod32.exeC:\Windows\system32\Ocpgod32.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\Olhlhjpd.exeC:\Windows\system32\Olhlhjpd.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\Oqfdnhfk.exeC:\Windows\system32\Oqfdnhfk.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\Olmeci32.exeC:\Windows\system32\Olmeci32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\Ojaelm32.exeC:\Windows\system32\Ojaelm32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Pdfjifjo.exeC:\Windows\system32\Pdfjifjo.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\Pnonbk32.exeC:\Windows\system32\Pnonbk32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\Pclgkb32.exeC:\Windows\system32\Pclgkb32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\Pdkcde32.exeC:\Windows\system32\Pdkcde32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Pgioqq32.exeC:\Windows\system32\Pgioqq32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\Pcppfaka.exeC:\Windows\system32\Pcppfaka.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\Pnfdcjkg.exeC:\Windows\system32\Pnfdcjkg.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\Pfaigm32.exeC:\Windows\system32\Pfaigm32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\Qmkadgpo.exeC:\Windows\system32\Qmkadgpo.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\Qjoankoi.exeC:\Windows\system32\Qjoankoi.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\Qgcbgo32.exeC:\Windows\system32\Qgcbgo32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1536 -
C:\Windows\SysWOW64\Ageolo32.exeC:\Windows\system32\Ageolo32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4020 -
C:\Windows\SysWOW64\Agglboim.exeC:\Windows\system32\Agglboim.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\Aqppkd32.exeC:\Windows\system32\Aqppkd32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Ajhddjfn.exeC:\Windows\system32\Ajhddjfn.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2936 -
C:\Windows\SysWOW64\Amgapeea.exeC:\Windows\system32\Amgapeea.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3516 -
C:\Windows\SysWOW64\Aminee32.exeC:\Windows\system32\Aminee32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\Bmkjkd32.exeC:\Windows\system32\Bmkjkd32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Bganhm32.exeC:\Windows\system32\Bganhm32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\SysWOW64\Beeoaapl.exeC:\Windows\system32\Beeoaapl.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4844 -
C:\Windows\SysWOW64\Bmpcfdmg.exeC:\Windows\system32\Bmpcfdmg.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4276 -
C:\Windows\SysWOW64\Bfhhoi32.exeC:\Windows\system32\Bfhhoi32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3292 -
C:\Windows\SysWOW64\Bmbplc32.exeC:\Windows\system32\Bmbplc32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4356 -
C:\Windows\SysWOW64\Beihma32.exeC:\Windows\system32\Beihma32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3680 -
C:\Windows\SysWOW64\Bfkedibe.exeC:\Windows\system32\Bfkedibe.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:892 -
C:\Windows\SysWOW64\Bapiabak.exeC:\Windows\system32\Bapiabak.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Bcoenmao.exeC:\Windows\system32\Bcoenmao.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Windows\SysWOW64\Cfmajipb.exeC:\Windows\system32\Cfmajipb.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4424 -
C:\Windows\SysWOW64\Cmgjgcgo.exeC:\Windows\system32\Cmgjgcgo.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Windows\SysWOW64\Cenahpha.exeC:\Windows\system32\Cenahpha.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Cfpnph32.exeC:\Windows\system32\Cfpnph32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1360 -
C:\Windows\SysWOW64\Cmiflbel.exeC:\Windows\system32\Cmiflbel.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\Ceqnmpfo.exeC:\Windows\system32\Ceqnmpfo.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\SysWOW64\Cjmgfgdf.exeC:\Windows\system32\Cjmgfgdf.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4396 -
C:\Windows\SysWOW64\Cmlcbbcj.exeC:\Windows\system32\Cmlcbbcj.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2408 -
C:\Windows\SysWOW64\Cdfkolkf.exeC:\Windows\system32\Cdfkolkf.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Windows\SysWOW64\Cjpckf32.exeC:\Windows\system32\Cjpckf32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\Cajlhqjp.exeC:\Windows\system32\Cajlhqjp.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3132 -
C:\Windows\SysWOW64\Cdhhdlid.exeC:\Windows\system32\Cdhhdlid.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2192 -
C:\Windows\SysWOW64\Cffdpghg.exeC:\Windows\system32\Cffdpghg.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\Cmqmma32.exeC:\Windows\system32\Cmqmma32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5036 -
C:\Windows\SysWOW64\Cegdnopg.exeC:\Windows\system32\Cegdnopg.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:768 -
C:\Windows\SysWOW64\Dfiafg32.exeC:\Windows\system32\Dfiafg32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4680 -
C:\Windows\SysWOW64\Dmcibama.exeC:\Windows\system32\Dmcibama.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2572 -
C:\Windows\SysWOW64\Ddmaok32.exeC:\Windows\system32\Ddmaok32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\Djgjlelk.exeC:\Windows\system32\Djgjlelk.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3204 -
C:\Windows\SysWOW64\Dmefhako.exeC:\Windows\system32\Dmefhako.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5096 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2496 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2812 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2840 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe66⤵
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe67⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 42468⤵
- Program crash
PID:3224
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5072 -ip 50721⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD50246eb9c91fb16a384a0cb8e1d44e6e1
SHA1cf9ae02607cb6199154cf7765275394d422c67e7
SHA256a10b06ae9ecb96450e8f7f413b767086b3f7d4f07fe512ba5aaf161e1c49bc4c
SHA51239e879d891434570efc0e7445ff5368707589038d34e3df5f8d56df2431cdeafe5f7d7d1e14586c965c7374d293c6a8b375764839a9b59c33e088d020ff9bb7e
-
Filesize
640KB
MD51224c43553caf4876e52e473a19dbaba
SHA107600ae9f5ed5a8372b7e83e9d40f081cbb8efcd
SHA2563c2bc71c198000c66856f646fafc50d9dc2a43a1d42abf1255bb9d9dddc8627f
SHA512aaeb77b36602e4a1465d63f40f6ccedb537eb7e8f1046c7cd5cb093d81c84527e26072ae637f990ff5063359f62f17a89c49c802b2e53256eff5793ff7689604
-
Filesize
640KB
MD555e00a4b7688d1cdf54381ab62d71f70
SHA1da479511d66ca2a903fc7e7d32eda774e0d9f951
SHA2561e1164ecde47391fc2bd24eaee308db2e7e27179aec6cb8e331b743dd6967dc8
SHA512face77990d7592754dc68ea0d55ca0f0eadcecbfdafd199883af39a2f5dad4fcd8fb42c71391ad1dbb79588f3f6825a4c1b2fabc90a53dfd362d062ef4e9443c
-
Filesize
384KB
MD535177c128214d9653f4c1590c6e128b7
SHA129fca042044f5903db7d3c77ca2640fae10cc052
SHA256586eb1baad0f25ed5fcece505080bec7b735bf0d58aa9094105f1ded5299bc2f
SHA5123e4a0cfabad4bc0d2051eac113c615b112df983630f7abc15469e4876769ddb14691b21b89e664fde43ceb1d0223c7acba42a735d692bcbef4949914cd9f8af6
-
Filesize
640KB
MD5bf6ccb445cb737292eb62108d1f16ecc
SHA1fcd7fe12995d190a9b40f673d2db86f3daaefca5
SHA2563149024db1a9abac86c964885fddaaa6e239b92f39f783fc5abc513bacf53076
SHA5122ec529673497cc8510a32327f50fe309d789566e6b67969256e19cc8889545c81f92136671449cc373dc35eb7f472389b51827cd111a87ec875403da30933225
-
Filesize
640KB
MD59b5c6ca0eb2d02b3dcd5964c477fac45
SHA1dfecb68d08dcb42f1b17a4589565a950b91ef294
SHA2565aceb780d67ec910cbd6eb19124ba89935574283f8d233b088474aca1a997240
SHA5120fe873f633c38902e61296f1b95b5f565f561bcbdb95d6a868ce063b2993cb18d028d3081c4b633303064ea67de3c383e5a43e6c79019098c2a15ab302415930
-
Filesize
448KB
MD5aa3f740d167446864f2e4e726a1f786e
SHA11d1740853586f20219ee6e429203ca32cb76ec36
SHA25698667ba8c4876a74d6095b14be72291c4be53a252472e2824a0418259f36ac0b
SHA512e54fec9f50a6cfe8666a3d54beef93bc02d25c07f476f8c1178cc8471f5fe603c14a97cd50b9b9bd84bb33248a7638d5e3b7c822a8e67a6448761e2099ba09c5
-
Filesize
640KB
MD5da3500b63f95e6779991f569258341a6
SHA1063045b701ff1254c10df2722a64b0501f15fc90
SHA256e540c93e8710fac98f84a5be83425e6e88dfe95af141f506308b9eae7aa307eb
SHA512923a2c3e11ac906270a40ab3374f81472e86a1733ffaa46339457ba4bcca9c04910c157319fa361b791b2b3c159388a452843a26bd8df102095340ef909152b8
-
Filesize
640KB
MD53f926e383b9b017c9c84660b91625833
SHA15bd0af93596dab954d5aecc83d19a34cd3ea6f91
SHA256a710ec48e65a64fb77929d098af24233b8cb53d1c70e7d122c2a3ec25645c3a5
SHA512ed94333ba2abd2a28249f071af403a94a0836b1a56a524067056953f3cf4391101d5197f5b428093389cfd9e6d8a3737c096f51e2b1793dc279373512b705353
-
Filesize
512KB
MD527379666ad01747dc13b37d614feed86
SHA1d0feb5b350909ceff1e224f56f8d0e99a3ce55c6
SHA256b897a656c4dd338f6a8a9c40d27bbe62998ec1c824eef2c3e9ad8084ef06f0ae
SHA51222e509da696eb1d4515c77024b4240f505932132064f92d8615f497d799074befecc11be972575959c5ff0b474f728bded43bdbd2eaeffd10c7b474ec13932a1
-
Filesize
640KB
MD560aea9dd86c64d19b3bb71ace216189a
SHA10a830cbfbaf889580e7194fe830b69c16fb8809f
SHA256d942b4dd92ff5fdc2ee9ebe681ed7ff97d9d94f0feb4962252badc1765790e34
SHA5128cd5b50af8a812e8a61b4d123dd02e8114f96706f83244017c960678295353376fd538b64fe943c304ff0da599e5f2a4270089e428773811272c9597f6d453dc
-
Filesize
448KB
MD510cf954bf2b4d72f023552d9a5a43f71
SHA1cc5ebd1acdcf63df6e6b82cd747433373d0f40d4
SHA2565161258b38b5fd675988cbbf75317ba2d4a44d89b28bbbe619a875f864634036
SHA512d92d84b42d43d9f55947dd2a25f63f2bf8c4ae19a9716b77c3938bf1e5a707f1eae48bdeca04fff5cf9efbcd540ddf7c9788729e8f91f53aa03371ab225c57ec
-
Filesize
576KB
MD562d0ad183014cd2164f6888c91207901
SHA1ea86358075b19ce52a82b6fb7b566d12415c8690
SHA256fa63b1751d83398ba4d37e94765046026cfe919178270969ede329dccd7b7b06
SHA512fc6b2d7276d63da6e396e99d0aab91f9b583c3b9c50892aa144c0f61e696bedb4eeca137055b7dcc1224f952682d316d59adba2de4d7561fe4649bc202927545
-
Filesize
640KB
MD56efcbbd06e72268c772ad4092669cdb0
SHA10ef51b4447e454ec9389c430ade02c147c6d5130
SHA256412300a98df516f2446d6e2764fec4e51ba5b01e4d45421febaf0a810f228881
SHA512ee1b8ee5fa0bb86cc23f257ec1199cf2265a764f2390ffeec1f4080f6edf6bf37643a963888e91174557c84f5339401d6483f73f7bd6f581b6169ff9897b4bfc
-
Filesize
640KB
MD5265a39d1c8ae6a6e0cbfd3327e2aa1b2
SHA115bf8c7f3e77d3584e8bedbc3dd063fe5e52f7df
SHA2561eded83a9b1920a7e5c2dd6d8d474ae2434a20131d1529f0174549cd16ca4f6a
SHA512b4fdaf750973532b549899461028c1dc1bd57eeec6ac67987fd1fa281a53377464623ec11eb7361ac953a28d2ace548a7e6ca3745c9531fd9d1ea2b315aa9b71
-
Filesize
640KB
MD5d263038889fcd9b0b97700c51f6b7391
SHA1f7ce91d005dbb02163ae86f70f9f3b90ea7ec67c
SHA2562fb06e6344bfc5b5629acea8de7e25add460338e682fc22e8448ef8878cafa6b
SHA512c7b45bc4df18cf56f6d934facd39bd2a8f467eaf60a2d78e0cd71c9c218525fe7bec08565f255f002981e1d34b30813ad16770e0b06471ff0b965598755c578c
-
Filesize
640KB
MD532e8229726677222f518547ca90b4769
SHA1f628d6f44909baa6f694fc9e747c12c19b30e309
SHA256f791bcfdffc367c658e1b6d518f44a6861def75c78203426108e883342616aa1
SHA5122b23cb19e7e89e09460e296259534c935f164df426af4d29d6c87583d200b0bc8a5f255380d29cb3e9b04d055738734626ab708375b60b260ff68ebb1c5a792e
-
Filesize
640KB
MD513257234c735c4b6577185d2a6b4e249
SHA1d2df49ba2da1e4d28dc8583e22d264c7727ea198
SHA2569b7b2e6b8270b955fba02d35f1da34a6b829219ab972fa06252ec2165a7e4407
SHA5123b967c7702da3912775adc763be62ef171d5bd3d051204994ba4eef910034750850cc0b15297e6acaa5efc792de3df51166a2ecd7eac7acdec5f49f1b02fc7a2
-
Filesize
512KB
MD5999b892e03dfc72be7f45a01777b7b4e
SHA117dc7cd02f1143224dd7af74388d32cb09164caf
SHA256033aceaae6e75a4488a4d340d2b6d031572b628abb749f2278f9e778d7751bdd
SHA5122ec26af531fc03a7fb236e8796dc67d2130ac8f5806acba809c0ca4215b395c19c6a2a54066827b3ae71b56f6046b01a790ac2bc9761110e2c6d30f66512cdcc
-
Filesize
512KB
MD5be95c07034a674bf1af3dc82c0e60f56
SHA1040e8f12476d4e6bc02878c5b2aa1857f892095f
SHA256f82471800ea3ec324eeaea2a55f14c8b7afe208de544ae1cd2d9a742cde46e6e
SHA51244d634561a7d5b22b33f585f997adc732ce742d3e10d9c2876c8724d19c0f74799495862225f5d2b3c6149bb67483bfef156ec15fbf3a150feaf21d498715316
-
Filesize
256KB
MD581d5a7bfe571f52355ff4f7545bed0c3
SHA109f1888f1858157e5712bd076ae659bd684f8664
SHA256d9c6761a3a5c120c5c1b29e8f2022bfc2c20da3e3d5889dbb3fb3f32f5f747a6
SHA5123ae922cae57419d5a933df8b79918bcba0179162e343c846680ff14834302b4b3348e6927e044006f38b395139118f827b50c2ee9893eede918b989f99d6be50
-
Filesize
640KB
MD5d83891dffa41c48a1fddd04459c7d267
SHA1467d08b04510ee099a3426dfd8798709c238b36e
SHA256ee53e1d35375dc547de36b4a16599949ed9fce4ea6b0d3a0447b95df7563c1aa
SHA5120ceeca4ad894d5257472447b12a8c4d6c6bd9066b8b78ba784a77117bc65079049a6e9ad10207f641f78c70f1943acc88dc82438f05a1162319b02d78ad5e5b1
-
Filesize
640KB
MD5325380a71047613cc63f5ac0956565d2
SHA1be8379615f272267c247814e7e345c0d7a40b696
SHA25678a6024e27928176fcceafa2d368133c2b899d1f1bf060efdc869e1219030806
SHA5126d91b347af77464428453610efc4bb2ac0095a21d79b2c18326f122cef4cf7660b3520536f277218a295ef97944debbdbde988b8f9956e45d51c60f844dc813e
-
Filesize
7KB
MD5ec58f4a92b9ae615e388d3135e9185c2
SHA15fa9dd0847002049e43eba495c3cc644182e2d23
SHA25661d4e4cd7bd437c8d4732f4906dd7886f77e80683c124266feb94365b1ef1c34
SHA512e8691ccbcc39ca723d9b7b0f2c8c6cc46512d719c8c4c35fd3d10fd84a9f5ce1800539b5f09f05e652db11b6ab6953d03763a5512f25a56902b3c9a461795b89
-
Filesize
640KB
MD51237f85449e6e0f64a3faca1346fca66
SHA1014d2bf4bfa8d743d0a02f2a4e014a53b0789f0b
SHA2568b5079804eed369b116f28af0bdfb9c42011d8b1538ab83efcd22a1ae6f393dd
SHA512737fe59350833d2306408ec6904512d168221e6a523a5fa449ee9d96d5aa5494f6942c98039f1ccaeb7083a629fb9e23ad9c6ddad0d0e129edc0f1928c122151
-
Filesize
64KB
MD58ef39848dc770fd375db04f7d48558d9
SHA153dd9d2705f440d2ef42aebca0d86493c0b579b7
SHA25636007f9dc65d35e797454dddbdbdc37a7e55654615c7f6a506e58dd90ab0d3b5
SHA51283a7c49ed70a99ba622c26fa252180ad1c90e05c9767ed737f80bc7775658af919cfc08cbefdad7f5cb9220b73d98fd8b099e47e9582f82407af78dadb018f10
-
Filesize
640KB
MD5dfc12910e01a4af9073f40e768699a3c
SHA15d3719da7e9cf30e6dc81ca903483e6df8f53c54
SHA256f7d27a3efac61bbeaf81dbf8525e28ce93da974793514b16c8116396ed5f50b5
SHA5129cc76f981b19cab6d122523cf07fc2c45a19a3ab8cfa775862b8c630ca08c48038c0aaeea232cad5bcf07376b667a1beaaf29cae0b0bc036df663956631aecb6
-
Filesize
640KB
MD53b5ae4a7323ecf997f747f9fd4444ef1
SHA116ba21cdafafa3174622560a2d6cd13261c502e8
SHA256ede24155e49d97e8fb014ff6a045963e7989a83cb9aaa23ee02b287ccd472e1d
SHA5127151f6bd101d3954b67f9089ef021ba4221682e13387b577cb855cc4a96eb4b9d59922809a59a75ac503a29f0cc5d135883821ed7836dec82a5c933d387e7394
-
Filesize
640KB
MD5f33f182e16add75b8df83ca690313831
SHA1cc85e14be98c51e41537a8e21338c2698705d8c1
SHA256ad2f2ee9fb852317653ba485bc54cddf76f4866eb402b626a07cb87cbfe71fff
SHA512c487bb9937b58a58b961c9715ff25821e83d905f29aa387cdacdeccc2d55b874e54519d7838a8ff4e790d83c458130bbb2962fe3b38cb5a6fccf26d86fdeb099
-
Filesize
640KB
MD52eeca66ee168f57e3e2b81177ae82618
SHA1a30ed2f7a6d25d038e27ca405fd74e559b0c3f67
SHA256e9df2ddd9e47a5714371a7a7c7f69a7e660218fb483e96ec0dedc18ebb5c0c22
SHA5129bb08a076dfc5d70b7826db0ed004a4efcc465ba457cfd94920db65670ed184cc5dc21055de015a466c02ca1951b3f9aeeb26242abd57ad37356212bb54f6d60
-
Filesize
640KB
MD5a1d0ff90d123333c61ae1bbb2ea01cd2
SHA19d3fad742a867bf138f3a7acc3380c4e179fcf6f
SHA256af9a75bd495d1672a13e2f47ab3a639c53461349d9c7ee8e13a1375b157e361e
SHA512eaeeb6074a1849d467a9337c8c7af63dd5fb7e784c354e425f5927e69fd02b1bb200c6334c34cf81e2c0de1bda5b37683509d9db3c221c666b88eafc8639d884
-
Filesize
640KB
MD525ca14b2ac0c53be59b905734017c482
SHA157f4d7b76f5bd4b2196936cd02e34e0688faba8f
SHA256fa0a94caa23546b2f8e6e53f59ca8e50f39709a3be3e35bd4cafa35fa3e488f8
SHA51249954e6f60c275a436dd38218eb8158527e4806b116e38a0864b518e9289a7083bbbb3d16cc85bfa02d8dcd99144d9bd1576b1effa7b617b6fecd52e4dd38b12
-
Filesize
640KB
MD5a3e880b733f74ff527bedfccb7d936e2
SHA110788a5cd846dd35df846d6c5ba2fe40548e28d0
SHA256ea033584f3b89002ef1c02a3a4df40018666a19c9a83e4cb0b0096318969f94f
SHA512ae7ff52d196aa250371c1e64a1469c4d1dd01bfedb4618791e780750ff5ed0451bfc9bad43e9365f64fd3c3db3ede4c406c95d5ff930473d7546701195a6deb8
-
Filesize
640KB
MD5de06eb62bf62adc48e09ee9a2c0233e3
SHA17273786a8e54655a29d5014f6625527813827378
SHA25608bf5a958486016ef53c7793be7affcf7be93ab15259bd3389aa44e82556f0d5
SHA512a2008e549f0b6e0a123d0800b663df2a70a22e9af009b39cf04a5c264a414fa4b894c919394c7a11f57ebeac7858b3f1a7f66f0afd206330de01c65ccc5d40f1
-
Filesize
640KB
MD572d7b25abc62efb8b57a9ee9cc6ffd0c
SHA136696de04aa4bcfd3eb0a2e1e03e04a50e12aa4e
SHA2563fc443d420057bd7de5f7985ae144d20a72c61382d0d7bd4e0c6b10f36a2bd52
SHA512e182bac869f6a646a7ade1e216376a3bf10913110b6c4922e323a8ffca97a1654c429993d00bb9eba1992971542f57df33de6ca854ad00f4fe0c9964d2121276
-
Filesize
640KB
MD54ef4ae2a44b6d1510d2d038b0ce2cab4
SHA139bd8b8031c33722d149aa1f1f36ee5d65578a8b
SHA25689484995d7d4df745415b0d2a631f8f3f1d1f4d6d96d0dae276d5632ac833bf6
SHA512fa00df18431f153612d7103c3aeb5a3d456c8a2b80b7dca1a63ffc4abcceff8de2168ad6ea0db2f36aa4c7f43636786c0cb9ab989e73213cf791de6683ebe0be
-
Filesize
640KB
MD5a8f3fb41a75ccaeca13dd6d471bb607b
SHA1a90ec0b1900454c6bad0a8db8a32668ef824ff88
SHA256231c5aa0a6091f346c41373b67c2766a85248b644dca6c5b9e25b70d7e60b393
SHA5125543bcbe6b4231a374aebb97009a7d3e47c23e50fb4cbb81f59f489a3dfeaaaf1f06330e10fa2707f2ff2f0a08e6552cbafb838f1fa04eaf1d1d1e0ab1e8d501
-
Filesize
640KB
MD52d13420a734454e86d428262f8eb7b1f
SHA1420e172f82deedb14a3f914292a3c21d8b31ddfc
SHA256a5af4849675c125aea88ccfad8632ccf4bb2609ec6349727d2a0bb1ddb6bae6a
SHA5127e00289d8af46eaf671a45295ec3bbcbb0ac41db230832ab2b6eae0c5ff37931a0ac4a04d48cc2abb75b74972f3cd4bb23cb6e8bcc1c05db0ea8670726697a91
-
Filesize
640KB
MD5e4eb9c2a107da48f778bb2e0eebf2ae1
SHA18ff6b83272c34fba0c30e5c6e0b0e9e458de1d70
SHA256b5c33116a299839cebfa1e1da052d73404c6bf55773e40b14ccc10e229a6afd0
SHA5127eb014a3fd9af71550ddca689cf371f27d0702c90a85a9e8f2cdd583be3f5a1163cf5797852a04bb75bf7d7a10e8b2cf97f160c403f85a22caf12c29e0ae1f22
-
Filesize
640KB
MD593d4e2ab2ff476ec009170970e3e12b6
SHA103b029a543874ce85f096c4b33256d8e4997a831
SHA256197c7da2dfbecb98b5ca735e8ea9f352b4b00c61916190869d4824b70d7f5ddc
SHA5124c8eaf941d0ea3b737f4538f906083e43c287b2bca3f72c7796a685231e4d89d0593fd1bd58492a926ace290863cbda56089c737185e5fb9237d573df47fc2a6
-
Filesize
640KB
MD5f818b3c3ce90e773e6f7b50de5f0a820
SHA18911e5b986f66108bea09db629981341469a351f
SHA256c3441775c8e84a4f88ed1cadfb34d07d42571094947a6085c7be32a2f89ebe0c
SHA51203d28273fa8d5f6e8dd0425e5bee6fe3b67a9475f3dde4b14207826bb550a6e635ac14efa219cb994ddb5de0c14a87f2c1d1e466a8bec5b5cb41b72e99f2882d
-
Filesize
640KB
MD56a834b65c91a4c53fc0e65ca393d0b26
SHA17e973d7a4761c510920eb34f620b8e44413640ec
SHA256a8da34f0acd8add2eab0beeff335e532c97ae63132cab17254f3346c364cb439
SHA512d2d266fa1375a31ee3d114465186d7140cee92991d768f5917b93ff3f2d2f553bfd5b701e9e9896c9a00cf384e4201059dad4e98090433c1c4ed18992d2c5d5a
-
Filesize
640KB
MD53f28852ca69dde3ca28890d8a01429f1
SHA17a8baa794ffe515b6cd440561a5c7c60c8126ab6
SHA25647f99492e5d4e5995090d1bbd8b1633fe2e01a55d5dc7ffd2895b5c40132ea65
SHA51275caacea5e4884824a72cb3a547c2705351bcc41185a0b2a47c89d00b56446f9e8797e616c57fda591032edd5a6962dc7bedea0a7fd0207c842f7cf6f217707a
-
Filesize
640KB
MD553f382a2a556d8aae3a9b7841e36f203
SHA113423131539a0bcc5768bd425b08a551d15d9ccd
SHA256b0b4101aff2e6f45dd00a9370e5b511399dc11641423e944e1f5cae8e7ebfdb5
SHA512e362ac40547da7a8e7eae325a5bbfbd334efc90aaa0f06a3296f411d92dcb48f69a880916f9986a81070ae91529c25f30c4b272e5e353ed9f71a5bb38459f69b
-
Filesize
640KB
MD5ff709092c8e1a1b70fc44ffd6d74dc50
SHA1db1970cc4437f1da1b037dae99f02f4232a7a948
SHA2563f215509765e264f6226a42efc4897301b71f1b1eaa833e108d21620f0eaec0d
SHA5125ef682ba1d8d3fd31d1a5d6bc5fe6b84d30af295788b61ace61b8b6a73479b129572aa509703ddd4d68177eff3bdba1580c54c507e496b0e5d492cb0c90563e4
-
Filesize
640KB
MD5f43491a665de79462826648a4a261f27
SHA1a1e33f65d142fe44424eed35a304f7b605d53060
SHA256857c3f6210c6bac2901eee57ddc7550a51e10721366c3d98afe255f9f2191ebe
SHA512ecbe34c0a40e02d12cc97e882886baa0f2e675f3e039f649be41054c2e6305d1f04dff77e35e969cc5ca2decb490f3c449564c9372ffb6d2450a33a228e635f3
-
Filesize
640KB
MD50e2b1caafad2e0e3ff0d5b986ddc95dd
SHA165607b9b0c4f9d963eb7e2dac7060dcbf8e72296
SHA256b092506cc84cdaab4ab8f1f081ba968177c9a2057ca986e4f241b25746a3d280
SHA5129e46c1b515f9dcd8e83a1b2f6497937fe70211eede3673dcf18d3ba2f1e102236f06a36819525e23f2e740866712d627d3ccb61adcbedca3236118889258cb58