Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe
Resource
win10v2004-20241007-en
General
-
Target
f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe
-
Size
296KB
-
MD5
d6c960f0ee144b7cbe12e6471fc331ef
-
SHA1
de9d1dca5c0a7de396c04b1361c3125d4c7d34f0
-
SHA256
f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555
-
SHA512
b001d18cbae2218df89ed93ae1dd0dfc62a39173f8a134b870b46a5b9152c69c070ffbd032ff76740680efe909d18e76b4c682551b80ab1ddb40df30e497649d
-
SSDEEP
3072:4ww81Knd4/EOp01w7dztsjRtARA1+6NhZ6P0c9fpxg6pg:BPKd4/EOp01w3slvNPKG6g
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nckndeni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pqbdjfln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qqfmde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qqijje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofcmfodb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beglgani.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdfkolkf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjcbbmif.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acjclpcf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bebblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daconoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ogifjcdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pgefeajb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqdqof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aeniabfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cnicfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aclpap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aeklkchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bnbmefbg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cenahpha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cagobalc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofcmfodb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bebblb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qgqeappe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qffbbldm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anadoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agoabn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajckij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acnlgp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjcbbmif.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pclgkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pclgkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qffbbldm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ageolo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Beglgani.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfmajipb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnlaml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgefeajb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqbdjfln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqkgpedc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bfdodjhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Belebq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Olmeci32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeniabfd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfmajipb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cndikf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cagobalc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdfkolkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bnpppgdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djdmffnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oponmilc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oponmilc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojllan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgqeappe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajckij32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
pid Process 1616 Nckndeni.exe 5052 Oponmilc.exe 3308 Ogifjcdp.exe 2440 Ogkcpbam.exe 3724 Odocigqg.exe 3456 Ojllan32.exe 3224 Olkhmi32.exe 1084 Ofcmfodb.exe 1224 Olmeci32.exe 1548 Ogbipa32.exe 3552 Pnlaml32.exe 5068 Pgefeajb.exe 4296 Pjcbbmif.exe 1864 Pclgkb32.exe 4792 Pmdkch32.exe 2400 Pdkcde32.exe 2700 Pqbdjfln.exe 1620 Pqdqof32.exe 3244 Pfaigm32.exe 3996 Qqfmde32.exe 5092 Qgqeappe.exe 4304 Qqijje32.exe 4708 Qcgffqei.exe 4196 Qffbbldm.exe 2128 Aqkgpedc.exe 2420 Acjclpcf.exe 2092 Ageolo32.exe 1080 Ajckij32.exe 4960 Ambgef32.exe 2860 Aclpap32.exe 3152 Ajfhnjhq.exe 1924 Anadoi32.exe 4260 Aeklkchg.exe 116 Acnlgp32.exe 3440 Afmhck32.exe 4692 Aeniabfd.exe 4756 Afoeiklb.exe 2060 Ajkaii32.exe 2064 Aadifclh.exe 4104 Agoabn32.exe 1436 Bnhjohkb.exe 1020 Bebblb32.exe 2960 Bfdodjhm.exe 3956 Baicac32.exe 1804 Bgcknmop.exe 620 Bmpcfdmg.exe 4140 Beglgani.exe 2768 Bnpppgdj.exe 1868 Bclhhnca.exe 2308 Bnbmefbg.exe 2276 Belebq32.exe 2156 Cfmajipb.exe 4536 Cndikf32.exe 5036 Cenahpha.exe 4488 Cfpnph32.exe 2096 Ceqnmpfo.exe 2840 Cnicfe32.exe 4784 Cagobalc.exe 4816 Cdfkolkf.exe 1888 Cjpckf32.exe 4268 Ceehho32.exe 3128 Cjbpaf32.exe 4984 Cegdnopg.exe 864 Ddjejl32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Pqdqof32.exe Pqbdjfln.exe File created C:\Windows\SysWOW64\Qcgffqei.exe Qqijje32.exe File opened for modification C:\Windows\SysWOW64\Aeklkchg.exe Anadoi32.exe File created C:\Windows\SysWOW64\Aadifclh.exe Ajkaii32.exe File created C:\Windows\SysWOW64\Jekpanpa.dll Cjpckf32.exe File created C:\Windows\SysWOW64\Ogkcpbam.exe Ogifjcdp.exe File opened for modification C:\Windows\SysWOW64\Pfaigm32.exe Pqdqof32.exe File created C:\Windows\SysWOW64\Ajkaii32.exe Afoeiklb.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Panfqmhb.dll Pgefeajb.exe File opened for modification C:\Windows\SysWOW64\Qffbbldm.exe Qcgffqei.exe File created C:\Windows\SysWOW64\Aoqimi32.dll Qcgffqei.exe File created C:\Windows\SysWOW64\Jjlogcip.dll Bnpppgdj.exe File created C:\Windows\SysWOW64\Ehfnmfki.dll Qffbbldm.exe File opened for modification C:\Windows\SysWOW64\Ogkcpbam.exe Ogifjcdp.exe File created C:\Windows\SysWOW64\Ooojbbid.dll Ajkaii32.exe File created C:\Windows\SysWOW64\Cdfkolkf.exe Cagobalc.exe File created C:\Windows\SysWOW64\Maghgl32.dll Aeklkchg.exe File created C:\Windows\SysWOW64\Bclhhnca.exe Bnpppgdj.exe File created C:\Windows\SysWOW64\Delnin32.exe Dmefhako.exe File created C:\Windows\SysWOW64\Pqbdjfln.exe Pdkcde32.exe File created C:\Windows\SysWOW64\Bkjpmk32.dll Aeniabfd.exe File opened for modification C:\Windows\SysWOW64\Aadifclh.exe Ajkaii32.exe File opened for modification C:\Windows\SysWOW64\Bfdodjhm.exe Bebblb32.exe File created C:\Windows\SysWOW64\Baicac32.exe Bfdodjhm.exe File created C:\Windows\SysWOW64\Jdbnaa32.dll Qqijje32.exe File created C:\Windows\SysWOW64\Qffbbldm.exe Qcgffqei.exe File created C:\Windows\SysWOW64\Mgcail32.dll Cjbpaf32.exe File opened for modification C:\Windows\SysWOW64\Ajfhnjhq.exe Aclpap32.exe File created C:\Windows\SysWOW64\Ckmllpik.dll Ceqnmpfo.exe File opened for modification C:\Windows\SysWOW64\Ceehho32.exe Cjpckf32.exe File created C:\Windows\SysWOW64\Djdmffnn.exe Ddjejl32.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Ojllan32.exe Odocigqg.exe File created C:\Windows\SysWOW64\Bebblb32.exe Bnhjohkb.exe File opened for modification C:\Windows\SysWOW64\Beglgani.exe Bmpcfdmg.exe File created C:\Windows\SysWOW64\Cndikf32.exe Cfmajipb.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Qqfmde32.exe Pfaigm32.exe File created C:\Windows\SysWOW64\Dmefhako.exe Ddmaok32.exe File created C:\Windows\SysWOW64\Ogifjcdp.exe Oponmilc.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Kmfjodai.dll Djdmffnn.exe File created C:\Windows\SysWOW64\Pnlaml32.exe Ogbipa32.exe File opened for modification C:\Windows\SysWOW64\Pdkcde32.exe Pmdkch32.exe File created C:\Windows\SysWOW64\Ambgef32.exe Ajckij32.exe File created C:\Windows\SysWOW64\Bfdodjhm.exe Bebblb32.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Oponmilc.exe Nckndeni.exe File created C:\Windows\SysWOW64\Qoqbfpfe.dll Ageolo32.exe File created C:\Windows\SysWOW64\Ceehho32.exe Cjpckf32.exe File opened for modification C:\Windows\SysWOW64\Qgqeappe.exe Qqfmde32.exe File created C:\Windows\SysWOW64\Oahicipe.dll Afoeiklb.exe File created C:\Windows\SysWOW64\Belebq32.exe Bnbmefbg.exe File created C:\Windows\SysWOW64\Ddmaok32.exe Dmcibama.exe File created C:\Windows\SysWOW64\Ofcmfodb.exe Olkhmi32.exe File created C:\Windows\SysWOW64\Fqjamcpe.dll Cfmajipb.exe File created C:\Windows\SysWOW64\Dhkjej32.exe Delnin32.exe File opened for modification C:\Windows\SysWOW64\Baicac32.exe Bfdodjhm.exe File opened for modification C:\Windows\SysWOW64\Belebq32.exe Bnbmefbg.exe File opened for modification C:\Windows\SysWOW64\Cegdnopg.exe Cjbpaf32.exe File created C:\Windows\SysWOW64\Oammoc32.dll Dhkjej32.exe File created C:\Windows\SysWOW64\Hiclgb32.dll Ojllan32.exe File opened for modification C:\Windows\SysWOW64\Ofcmfodb.exe Olkhmi32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4048 3700 WerFault.exe 160 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfmajipb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qcgffqei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajckij32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acnlgp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aadifclh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Belebq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnicfe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqdqof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qqijje32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqkgpedc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baicac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajkaii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cagobalc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdfkolkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddmaok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogkcpbam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogbipa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdkcde32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeklkchg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djdmffnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmdkch32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anadoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfpnph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjcbbmif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acjclpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afoeiklb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgcknmop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cndikf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cenahpha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmefhako.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delnin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqbdjfln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qffbbldm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ambgef32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bebblb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odocigqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olmeci32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajfhnjhq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjbpaf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmcibama.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oponmilc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogifjcdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qgqeappe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceehho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgefeajb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bclhhnca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddjejl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnpppgdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnlaml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfaigm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeniabfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beglgani.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agoabn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnbmefbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceqnmpfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nckndeni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojllan32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Olkhmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gqckln32.dll" Olmeci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afmhck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ceqnmpfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qoqbfpfe.dll" Ageolo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bgcknmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ceehho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qqfmde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aclpap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phiifkjp.dll" Bnhjohkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofcmfodb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Acnlgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lommhphi.dll" Agoabn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cagobalc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pnlaml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjpgii32.dll" Ogbipa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pdkcde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nckndeni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcnhho32.dll" Ogifjcdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aclpap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmhnkg32.dll" Bmpcfdmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgepdkpo.dll" f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Acnlgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bnbmefbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmcfdb32.dll" Dmefhako.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qqijje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ageolo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdeahgnm.dll" Anadoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aeklkchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkfdhbpg.dll" Bclhhnca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Belebq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Olmeci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pqbdjfln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ogifjcdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjjald32.dll" Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdbnaa32.dll" Qqijje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Baicac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imbajm32.dll" Belebq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cndikf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fqjamcpe.dll" Cfmajipb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pgefeajb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pqdqof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efmolq32.dll" Acjclpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cndikf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ojllan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Afoeiklb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cagobalc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmfjodai.dll" Djdmffnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfanhp32.dll" Cegdnopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Odocigqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pmdkch32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 1616 2588 f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe 83 PID 2588 wrote to memory of 1616 2588 f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe 83 PID 2588 wrote to memory of 1616 2588 f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe 83 PID 1616 wrote to memory of 5052 1616 Nckndeni.exe 84 PID 1616 wrote to memory of 5052 1616 Nckndeni.exe 84 PID 1616 wrote to memory of 5052 1616 Nckndeni.exe 84 PID 5052 wrote to memory of 3308 5052 Oponmilc.exe 85 PID 5052 wrote to memory of 3308 5052 Oponmilc.exe 85 PID 5052 wrote to memory of 3308 5052 Oponmilc.exe 85 PID 3308 wrote to memory of 2440 3308 Ogifjcdp.exe 86 PID 3308 wrote to memory of 2440 3308 Ogifjcdp.exe 86 PID 3308 wrote to memory of 2440 3308 Ogifjcdp.exe 86 PID 2440 wrote to memory of 3724 2440 Ogkcpbam.exe 87 PID 2440 wrote to memory of 3724 2440 Ogkcpbam.exe 87 PID 2440 wrote to memory of 3724 2440 Ogkcpbam.exe 87 PID 3724 wrote to memory of 3456 3724 Odocigqg.exe 88 PID 3724 wrote to memory of 3456 3724 Odocigqg.exe 88 PID 3724 wrote to memory of 3456 3724 Odocigqg.exe 88 PID 3456 wrote to memory of 3224 3456 Ojllan32.exe 89 PID 3456 wrote to memory of 3224 3456 Ojllan32.exe 89 PID 3456 wrote to memory of 3224 3456 Ojllan32.exe 89 PID 3224 wrote to memory of 1084 3224 Olkhmi32.exe 90 PID 3224 wrote to memory of 1084 3224 Olkhmi32.exe 90 PID 3224 wrote to memory of 1084 3224 Olkhmi32.exe 90 PID 1084 wrote to memory of 1224 1084 Ofcmfodb.exe 91 PID 1084 wrote to memory of 1224 1084 Ofcmfodb.exe 91 PID 1084 wrote to memory of 1224 1084 Ofcmfodb.exe 91 PID 1224 wrote to memory of 1548 1224 Olmeci32.exe 92 PID 1224 wrote to memory of 1548 1224 Olmeci32.exe 92 PID 1224 wrote to memory of 1548 1224 Olmeci32.exe 92 PID 1548 wrote to memory of 3552 1548 Ogbipa32.exe 93 PID 1548 wrote to memory of 3552 1548 Ogbipa32.exe 93 PID 1548 wrote to memory of 3552 1548 Ogbipa32.exe 93 PID 3552 wrote to memory of 5068 3552 Pnlaml32.exe 94 PID 3552 wrote to memory of 5068 3552 Pnlaml32.exe 94 PID 3552 wrote to memory of 5068 3552 Pnlaml32.exe 94 PID 5068 wrote to memory of 4296 5068 Pgefeajb.exe 95 PID 5068 wrote to memory of 4296 5068 Pgefeajb.exe 95 PID 5068 wrote to memory of 4296 5068 Pgefeajb.exe 95 PID 4296 wrote to memory of 1864 4296 Pjcbbmif.exe 96 PID 4296 wrote to memory of 1864 4296 Pjcbbmif.exe 96 PID 4296 wrote to memory of 1864 4296 Pjcbbmif.exe 96 PID 1864 wrote to memory of 4792 1864 Pclgkb32.exe 97 PID 1864 wrote to memory of 4792 1864 Pclgkb32.exe 97 PID 1864 wrote to memory of 4792 1864 Pclgkb32.exe 97 PID 4792 wrote to memory of 2400 4792 Pmdkch32.exe 98 PID 4792 wrote to memory of 2400 4792 Pmdkch32.exe 98 PID 4792 wrote to memory of 2400 4792 Pmdkch32.exe 98 PID 2400 wrote to memory of 2700 2400 Pdkcde32.exe 99 PID 2400 wrote to memory of 2700 2400 Pdkcde32.exe 99 PID 2400 wrote to memory of 2700 2400 Pdkcde32.exe 99 PID 2700 wrote to memory of 1620 2700 Pqbdjfln.exe 100 PID 2700 wrote to memory of 1620 2700 Pqbdjfln.exe 100 PID 2700 wrote to memory of 1620 2700 Pqbdjfln.exe 100 PID 1620 wrote to memory of 3244 1620 Pqdqof32.exe 101 PID 1620 wrote to memory of 3244 1620 Pqdqof32.exe 101 PID 1620 wrote to memory of 3244 1620 Pqdqof32.exe 101 PID 3244 wrote to memory of 3996 3244 Pfaigm32.exe 102 PID 3244 wrote to memory of 3996 3244 Pfaigm32.exe 102 PID 3244 wrote to memory of 3996 3244 Pfaigm32.exe 102 PID 3996 wrote to memory of 5092 3996 Qqfmde32.exe 103 PID 3996 wrote to memory of 5092 3996 Qqfmde32.exe 103 PID 3996 wrote to memory of 5092 3996 Qqfmde32.exe 103 PID 5092 wrote to memory of 4304 5092 Qgqeappe.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe"C:\Users\Admin\AppData\Local\Temp\f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Nckndeni.exeC:\Windows\system32\Nckndeni.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\Oponmilc.exeC:\Windows\system32\Oponmilc.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\Ogifjcdp.exeC:\Windows\system32\Ogifjcdp.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\Ogkcpbam.exeC:\Windows\system32\Ogkcpbam.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Odocigqg.exeC:\Windows\system32\Odocigqg.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\Ojllan32.exeC:\Windows\system32\Ojllan32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\Olkhmi32.exeC:\Windows\system32\Olkhmi32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\Ofcmfodb.exeC:\Windows\system32\Ofcmfodb.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\Olmeci32.exeC:\Windows\system32\Olmeci32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\Ogbipa32.exeC:\Windows\system32\Ogbipa32.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\Pnlaml32.exeC:\Windows\system32\Pnlaml32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\Pgefeajb.exeC:\Windows\system32\Pgefeajb.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\Pjcbbmif.exeC:\Windows\system32\Pjcbbmif.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\Pclgkb32.exeC:\Windows\system32\Pclgkb32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\Pmdkch32.exeC:\Windows\system32\Pmdkch32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\Pdkcde32.exeC:\Windows\system32\Pdkcde32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\Pqbdjfln.exeC:\Windows\system32\Pqbdjfln.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\Pqdqof32.exeC:\Windows\system32\Pqdqof32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\Pfaigm32.exeC:\Windows\system32\Pfaigm32.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\Qqfmde32.exeC:\Windows\system32\Qqfmde32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\Qgqeappe.exeC:\Windows\system32\Qgqeappe.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\Qqijje32.exeC:\Windows\system32\Qqijje32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4304 -
C:\Windows\SysWOW64\Qcgffqei.exeC:\Windows\system32\Qcgffqei.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\SysWOW64\Qffbbldm.exeC:\Windows\system32\Qffbbldm.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4196 -
C:\Windows\SysWOW64\Aqkgpedc.exeC:\Windows\system32\Aqkgpedc.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\Acjclpcf.exeC:\Windows\system32\Acjclpcf.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Ageolo32.exeC:\Windows\system32\Ageolo32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2092 -
C:\Windows\SysWOW64\Ajckij32.exeC:\Windows\system32\Ajckij32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Windows\SysWOW64\Ambgef32.exeC:\Windows\system32\Ambgef32.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4960 -
C:\Windows\SysWOW64\Aclpap32.exeC:\Windows\system32\Aclpap32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2860 -
C:\Windows\SysWOW64\Ajfhnjhq.exeC:\Windows\system32\Ajfhnjhq.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\SysWOW64\Anadoi32.exeC:\Windows\system32\Anadoi32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1924 -
C:\Windows\SysWOW64\Aeklkchg.exeC:\Windows\system32\Aeklkchg.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4260 -
C:\Windows\SysWOW64\Acnlgp32.exeC:\Windows\system32\Acnlgp32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:116 -
C:\Windows\SysWOW64\Afmhck32.exeC:\Windows\system32\Afmhck32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:3440 -
C:\Windows\SysWOW64\Aeniabfd.exeC:\Windows\system32\Aeniabfd.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4692 -
C:\Windows\SysWOW64\Afoeiklb.exeC:\Windows\system32\Afoeiklb.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4756 -
C:\Windows\SysWOW64\Ajkaii32.exeC:\Windows\system32\Ajkaii32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\Aadifclh.exeC:\Windows\system32\Aadifclh.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\Agoabn32.exeC:\Windows\system32\Agoabn32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4104 -
C:\Windows\SysWOW64\Bnhjohkb.exeC:\Windows\system32\Bnhjohkb.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1436 -
C:\Windows\SysWOW64\Bebblb32.exeC:\Windows\system32\Bebblb32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\Bfdodjhm.exeC:\Windows\system32\Bfdodjhm.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\Baicac32.exeC:\Windows\system32\Baicac32.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3956 -
C:\Windows\SysWOW64\Bgcknmop.exeC:\Windows\system32\Bgcknmop.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1804 -
C:\Windows\SysWOW64\Bmpcfdmg.exeC:\Windows\system32\Bmpcfdmg.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:620 -
C:\Windows\SysWOW64\Beglgani.exeC:\Windows\system32\Beglgani.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4140 -
C:\Windows\SysWOW64\Bnpppgdj.exeC:\Windows\system32\Bnpppgdj.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\Bclhhnca.exeC:\Windows\system32\Bclhhnca.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1868 -
C:\Windows\SysWOW64\Bnbmefbg.exeC:\Windows\system32\Bnbmefbg.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\Belebq32.exeC:\Windows\system32\Belebq32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Cfmajipb.exeC:\Windows\system32\Cfmajipb.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2156 -
C:\Windows\SysWOW64\Cndikf32.exeC:\Windows\system32\Cndikf32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4536 -
C:\Windows\SysWOW64\Cenahpha.exeC:\Windows\system32\Cenahpha.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SysWOW64\Cfpnph32.exeC:\Windows\system32\Cfpnph32.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4488 -
C:\Windows\SysWOW64\Ceqnmpfo.exeC:\Windows\system32\Ceqnmpfo.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\Cnicfe32.exeC:\Windows\system32\Cnicfe32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\Cagobalc.exeC:\Windows\system32\Cagobalc.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4784 -
C:\Windows\SysWOW64\Cdfkolkf.exeC:\Windows\system32\Cdfkolkf.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4816 -
C:\Windows\SysWOW64\Cjpckf32.exeC:\Windows\system32\Cjpckf32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\Ceehho32.exeC:\Windows\system32\Ceehho32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4268 -
C:\Windows\SysWOW64\Cjbpaf32.exeC:\Windows\system32\Cjbpaf32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3128 -
C:\Windows\SysWOW64\Cegdnopg.exeC:\Windows\system32\Cegdnopg.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:4984 -
C:\Windows\SysWOW64\Ddjejl32.exeC:\Windows\system32\Ddjejl32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:864 -
C:\Windows\SysWOW64\Djdmffnn.exeC:\Windows\system32\Djdmffnn.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\Dmcibama.exeC:\Windows\system32\Dmcibama.exe67⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3640 -
C:\Windows\SysWOW64\Ddmaok32.exeC:\Windows\system32\Ddmaok32.exe68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Windows\SysWOW64\Dmefhako.exeC:\Windows\system32\Dmefhako.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1812 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe71⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:3320 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:4420 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5104 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2152 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe77⤵
- System Location Discovery: System Language Discovery
PID:3700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 40878⤵
- Program crash
PID:4048
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3700 -ip 37001⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5bb608ed95dc39190b0a9f314d07a894a
SHA13b29ffd8fcfaee8923bd2c506db877e7fd665aa1
SHA2567e333cca8d89338e9b2218f12511803b1f510f0ae31eaa4998a621b04e327a76
SHA51217961e2b8deeaeb12e4f4809efed18ec01ba98b469d81818dbbec8f25bc468328120feb86297bdbc69f34aa0fbc3c8712e95f932597fe9736de9ceaffcf2a5f1
-
Filesize
296KB
MD5c70a2e39921e308fede4e7959bd3935b
SHA124605482f861eea1a26ef8f63677c6ef028a10c4
SHA25621c1340c986ba08264f18e98cf6f4ceee95f7848981ea1de8a34b3aa1d553ffb
SHA512c429c70f00ac10374f15ccd48d99a906a568e2fe6e58079ac6ab0f64eb97ed4b877318260f0a5ac1844cab426397a5eb6c89582d9fd53188c9116f8b757ee8d1
-
Filesize
296KB
MD559737f854375476e9deecf9be926f12f
SHA1f00c46d68868fe41ca9dab0009de2502b8f7fdcd
SHA256b2d35ad9567c98ad17dfa6fd9927d72e1327ec5399eb548609b364c51faa82f9
SHA51220428ddea4b273cc147c3ad252dd5256ea7d545724b4200827facf30426aef36a15bbd6e7e68fb57d1b2756ba34a8ca30651846c4070ccc25d863b09d89d3113
-
Filesize
296KB
MD5123157507e057ce8ea9cd461ec2e7787
SHA1a7ed6fc15fc125e62d2347c8b28b277f4080bac9
SHA2568e2d60ed0a5f873394eee9d8c491402291f32a2d8d676cccf2ca99741a04da6d
SHA512ee51522a6a4a38b9e46105b9c9ae2e93f2631fc0cdce90b822cf72440d52d330ebcf5808ff17ff26ddd9aca71a43e902c38d1e6db40e38f07646da2e799e9561
-
Filesize
296KB
MD536b55ff3e1c6b2041540f4295aa44933
SHA1d8abf98fa06e1eca3d4f47823286406c755c1a56
SHA25627488fe2a9b2d9ded4eaca6e838fc616144ddd1cf2fa7f8fd12774db5a1046a5
SHA5124b56f1590d281080ed6126b9d759ee4c396150428cb57dcad8a91166407b122743e5708d3eaa40016569ccf4d267386c30d746ce4cb186f820741aa6ff1c180b
-
Filesize
296KB
MD54f43a763fc7c73aea4d9c6abebf86d83
SHA140937d7e24ebea228a73473849be3ff47a8047ce
SHA256709973116e7cb696a7e302e4942561b708c6db06d13a36c538bad2c69c4a98cb
SHA512e0c9084e3725ba106c440cfcfba0f240493bc0cc8681ea6a025b1c543643f58d8051a8b2147fa0f19e01599f158162323a178af8f4024239eb5fd12c68c05f80
-
Filesize
296KB
MD552d2c43c7f9a7ca49110c33de06f4e30
SHA1d723518128f2d22f16f3f10cf212f0fe3af366bd
SHA25604812a385ccc1744f5684303f8d341b1c89306881efdb311fc823785b904604e
SHA512f1304b6e441e42b3135ee04e46036859c9db55a3b16994febbfb117147f575f4f12ac8af1737f0efe990d275636ac4eaa6dea6b01561b46a11929ba280fc6e69
-
Filesize
296KB
MD52bb262050cae566b80f7765e77e42ee1
SHA1b0cd1ea6932daa4641f7ce97cee9d4c040a8308a
SHA2565ffc7992f5625c6fa502c2b4c3c719775722015a20965b43f386e81a933dd435
SHA512e027d122454d5f3f30af527fc6432f15965da26fc8bcfa5154a5ad7dbfec5948bd4af479f836c3873b271b385f9494d09520fd398fbee0583beda944880c60d6
-
Filesize
296KB
MD5e2f678ffeab230c66cce8a37100846a5
SHA188701caf58a1a564401e2d5e4baec07fda3ec28b
SHA256093e0ad9c5c77fec9b0db880f0114191d0ad0d0f787035a1a065af31a13d4ee0
SHA512412c0ca649ad49a192921ca5bf75941fa59621f2d2aefd61304042d34302cd9699104a7c55eda94c39c32d39e4f8c869ac0395c9bcf3a4d36276b29e9d7f88b6
-
Filesize
296KB
MD5697f6b470de26d3233b6aadc20b85f77
SHA19f2cadec2882b83e07337866a4fc396d81a70d82
SHA256d1345f524366365af11ebb996ecb1dfc2b9ce2e6e96b963e454d5b2935098eec
SHA5121c11a7d3fa32a222c2c7e15e2a715984ca04b1c2d2909a4d72a223649ac9f6ec400e322470cf64769b729ac5114462d11bd45aa93f7335034d1cfc52025c70fc
-
Filesize
296KB
MD5bf6ceb76f97b8ca84858256c351453ed
SHA183b69bcb7b8f54a719638a178d3acbfc458d3e1e
SHA2568bec6d6c2c3fc14a682ccbaf8afccc82577252c0f17e533ee11b5cdc5068b097
SHA5129124792b8a8d1efacb8ec246245114cce3ce0fbead128a01f32f9c45c0e70e5db0bb2dd2ca220fbcf145c4c3e9628ec971f34a95897ac6207b12a72a86e4e80b
-
Filesize
192KB
MD5ad27ee51bfe86e9295c50a74df40610e
SHA17f01e98580d18171ac45949b89d3ba046028bd9e
SHA2566d3acb66e505d1e8df0aa8deabc1fa5583c15810da119aaf4ec66a0d7afbcc84
SHA51257a0150dc72be1df8b4bec263f0a3af336502bfdbf2b1ee5860132b96e2b46657da978d50028410283fcedf905d8482ca518ebb92ffd56c78a47864ec10e16f4
-
Filesize
296KB
MD5c7ed76d4805c4a6c87b130b6d25550e0
SHA10046e0460dc0e711d487273bf6d19242ffd421b7
SHA2567dab8b1b8f02aed6b091e9f2c42d297c6797dfc8f454e87b74997286c615e78e
SHA512cd9f9d3b9d6cca74fd45fdf7dd1dba20778195d20fa34623bf07d0cb5bd59396ce81af0773ad6ff0a20543dc249ab222f72ed4b495712de1388400ce7a4b82fe
-
Filesize
296KB
MD5c934b8a4a0657942bced4059e7f1319f
SHA1cf585b3b3ea109f7f28c32c5ae3c19ca4619c8d9
SHA256f669fca1836cf212138e214c8edb8b5ef727effcdc686b9b2087ea791df9b38c
SHA5127fe0a168e90cb41f4eb735e03e5a7478389e9d4a5e5932be1ca130a21e4948c92ca95af8e6a21688ea90c5fe38a3b77ef0d07af43b10d7667a46fcc5362f23b5
-
Filesize
296KB
MD557e34bc9fb9ca92b507030feeba4bb13
SHA18b0e07caf929ffd687642570422f45187f2062a3
SHA256407c4aac9ffa79838d3dc59f120183152a1ebbd508f11a5deb912922dd6d490c
SHA5120515b96fb92a0a3ad8667854936390634f16eea8e4cff720a696cedff34a35d8cc81313fb872ca6903d739d3f1550d8c7468ed7fc78597fa3d717ee7933d51e3
-
Filesize
296KB
MD535a4f6d416d411b69cfbdcb5d62eae2e
SHA1e4e804ef9c914db1a9f719aac81227cefe2a17c5
SHA25656908da7bf2d80c38ebe31c227fb7ecdfa4bad3e1cc32677fdf688565b6614fe
SHA512806fdd6866112f4bc4ab3d8bae36f4e4d48989244c82ee7340512321f4f313ee5c4a96517c0ba5bd080f282935240f7ad86263bbd4a9c643d77a6910a1d368f6
-
Filesize
296KB
MD54320275b0fbfab6a980e7fd651bdd50f
SHA1daa31a4b1879c029173e02c3e977d1271298a450
SHA2567c6324beba7e578e90254e62e763c4ebd716d8fc791a30fd437854d1f7856735
SHA512912489d9d45c689a37ed854af6122dc70367535b6c18df9178648ea114cc6e82907e7be1787b1ed289c5d3c51c41448dcb882f35749c2df1646239df64003807
-
Filesize
296KB
MD5fd6cb5a159de4c85101d1f2557beabe5
SHA1ea3b76fb1588517a8357cf86738823b142371064
SHA25636b3f35e43bf842df43463db082fb98ffa67f5468dfdf9efa159bf66ce9e9191
SHA512c614cfeb68ddd2ce0393266c7d6882b1bdcacb6eac533bf51e47d773f26f48fc04416edd0ca7235b9c8f46aa77fbdff21ddab83f9e2f01bb3d502994dc048ca2
-
Filesize
7KB
MD5b6432211abe4e47fda0db2d773bf964c
SHA1d360ac1396a10f8e76944da34edd3928e94a00b6
SHA2564fe155d835e2f1ef997cb1c824c4435c97d01d4503813c5e0ea9e437adc54638
SHA512bfec2c09eb7e3d1640de01c91db717efb69bccf85d54a77f613c9ea3ca86b8ab77eac869bbd0e27e393452fd995eadbce79d0dd2ec22bef991dd84f71334e54f
-
Filesize
296KB
MD59551b7f6fd21d27b9e303b3ac75a43c4
SHA15e2230d8966c10da26c8ec5ced9c73503a670da7
SHA256937f1912ad064b6b308ab8e0b6e88a146ba991f06e09564c1aea28762447de0e
SHA51213054e21fe69542a120d884621910357c2dd8357279d10ae365598f62f16eadda164f2c77cd94f664264c334dfe69dfabb3ae2757ccbc04dcb8d4ab312aa0687
-
Filesize
296KB
MD54418ca634aa9017b2315cb78f2fc4d92
SHA1058e1d451572628c397e7f72f74197611fcb1929
SHA25628a9708c02984a8a54c10e5ac9b37d9bc4a761fea55e1fc3e8ea4a8ed9777986
SHA512eb78ff538505223e51bab203f4e60352088fe32338fb4abf95391f51b5590d8428e20050dea9ba8673faaf8af34c35435d11eb4395f95f102d0ace94a5629d21
-
Filesize
296KB
MD5671da1249126b4ea43d0568329c19f00
SHA1971990fbbae9f29362cdea06f93f920e01ee22f2
SHA256c812c332ad29a2b3c4b180c37a0d72f0b7b8dd2e7a797b5d5b802d737c659e84
SHA512004805c89712fedd0f832484e0066fc96503b32e89859e6918971d60110df8bbbddbea3b1922c338d6164f09ba065a0d53b01542490b08fabd8f638b7738a8c8
-
Filesize
296KB
MD58df6a0feadf3a8ec777219855a9b950f
SHA16cce82124ef7e1a3c2827e7dfd5bcb13771ffb61
SHA256f1fc76c1a3ac611bf2f53125b26881e5dff99ea992a4e28dc747de50dd24717f
SHA512018d3103117873094be1daa9a2ffc8ee2148a1a0c7ef16612f5b4a3d8e22f133d37769543fffdf3baad4de1b30ebb9bbb65128ab202261e772f09aaf262ab43a
-
Filesize
296KB
MD5b94dbf1637f4f8a8f4f1e730469a2bd7
SHA1a1f3d16cf3b00a567f08cd03890022e8975da249
SHA25654ef23c5df0ebf776425213d77165da38a98765eb0e678833e7ea96a78dc53b4
SHA512ba3d4805b3559ba137bb83b5a050f255097d33b3be8ba38cde1ea6d4627ea6174246e1d2582920f91a3194c11ff39f2d45d3715f173fa857d160333efe745e66
-
Filesize
296KB
MD582703dde36cdd1c705e8ea2c3c7d8c56
SHA145718560dae6a5fe31bb144d03cb1107ae3b64c0
SHA256a1ffbdf0679386346ffca9eed4338d714a34bd3e26abfbbe3e3870f83bcbb7cc
SHA5124a86acfce0d139ce07a8c10ac9e3b02747a5b24c17e19114d64df4a2abda91348fe1adf654a8b9f18d35d5ab2be190a18aca4ff22bc2425288192f6a73fd95c0
-
Filesize
296KB
MD5307b4314cd2b0267c942224c764f4b6d
SHA1225f97df9a3839e23d2c63b2230a18a8db7c69a6
SHA25624d455e88f72299f314e8e1e0b796ff99470bba55dd7d5980939746ca783c9f9
SHA5127516ed1822e128f5ce11caadce66f9ba914aa40cc9f57d030f6525626098272cfc02a658907f4dfea4ce64fde6ef8ad994e64e2564b114ef5d92cf03427de2b3
-
Filesize
296KB
MD59f4fe660c14b6f774ccb292e320d4924
SHA15da786beb3472f3cd9c3811e05f2d483b6972695
SHA256ab7135136ceb5ff48e5a1743be1b5d9aeb89f1e5a6bf9666bac7600e6ade506f
SHA512b9f4fdae50fef1b40ca336d475d6febf049475eb9da594a18af3ac4d2273f1d5a74c2b0c3d53ea7beacc0664b30b66e4513b8e3ad61bf6de8bdc415797c9969e
-
Filesize
296KB
MD522e6868f47e0d1b5d6bd80beb8d9f2de
SHA1f2d3e4578af62effe9dd014a74c6c70efe5b970d
SHA2565fd3649700ace8f0894a6034269ab8f3538839758acdde91a570545ae013dc75
SHA512d0f159942a648900fc93d503b722c1e66400b252a5f5106df90efe889d9ce3d8972dd41e3aaf6565f5c7b19407861a4d6858841e4e9276536a8bde697a329c7d
-
Filesize
296KB
MD5382ad68a83867e1aec58f2cfcd8f36e7
SHA17df4a34d4303d973994bb5ff60c16dde9fe67ca3
SHA256b29db350cc53cc52b5bd05d37931f97e7c5f024a2a635f96a7e1bd00966fb7a1
SHA512286950701f7e5dc86f39623d78af8cc918962137b4c2a1dc3000f155e4b10385e8b97e898ccace69ce78662342b19dbc7ec390d89db1805e82855c7e7856df14
-
Filesize
296KB
MD5f9bf127f2aa86ddebb10da8cdce1b63a
SHA130b1233eb0c5c1852625cce802aea0a69ca3cb93
SHA256aa3657c13dc9733339d7a974a806c898f60b1b65edac517c5d31962ee2c8b10f
SHA51293cd171e1de8382621c737830aceef8a1cc7bf0ec3290764fb5dba5964baa41c624793121ac5670c201e72266889662cc1f9c9bfb67a6e0ebab0127d052dc2b7
-
Filesize
296KB
MD558b9e2f007236f951920e52a57ade3dd
SHA1fe6b080752242ea22790444abd2e4e17824f8e3b
SHA256b25c59af4fd27323a8747bd47711f7f1f45af6a9297bb1118240f61c1442fb9d
SHA5121ed67fe5df88833380e6c873f3cf6a8f544fd815c85c32c57e218873e5c0dbc5ef2e329a1386a0f3e3161b18bff396768509916cc39750c69ce63d2e42d00c7e
-
Filesize
296KB
MD5d2ccb44176051be76d328560e3ece2a3
SHA19ed6d15ca9ac5eac0cc677202d35f14c700a2921
SHA256b03aa294d86e235400503498c03441362885b1b25400353765680ffc7d4b507a
SHA51204dc1ed26eeaab804a522eae10fa95f414193bf7a8f826d58116da9b3488a3d3d68912789f4b59f189bbcb4c08c2b7543c99b013b5a48d4404c152516302c0b3
-
Filesize
296KB
MD59b1963edaac936a4bc3eafa41ad37a23
SHA122993cf2393c12326a06d3a92bc1d04dade01838
SHA2563c03131877147d5dbefd684ba7d028759109a6e29a66f4f8ea9f19070c046ca4
SHA51215e860c59531e0a0415b932e64730534c0e68ff80a3699c1d37215fc206b105a5d77b1b3cb3810679b04974e00d9aea1df80997b158353e010b0271b8b11f2c1
-
Filesize
296KB
MD5357eb6101c102c58d92c5694c0cb2a33
SHA15d86f1d0dd74883cba3ceeb6f7de028e1775d38b
SHA25601e0b8c6e4d752bbaa9ecc68ad838bc52a1d5490890258906c6c1b3ab57b842f
SHA5124c1babc4d82e575c04f12208d4723ec50282a80e71a426e16f6bc9d4e15ea0f11eb6ff8bb0ca2c76243c369dc1600067c4cf40760e3d8d796c34c6b57581a7d3
-
Filesize
296KB
MD5c03643965c3e4062a53c1e4689ab52a2
SHA139b56ea657c5e4b157730527ecaea0249276e870
SHA2564f77c34f703e1738e621099b3e1fb8d9bdd3d245c32683352e734e03b273f5af
SHA51247aea8efa4468d3bc0e82b5870c5a14e8c6237dd09df91a06a238c236ca13407639e8ef15f7c1048293eb709c03c309291c904f90ef7c19871466a8a54eea68b
-
Filesize
296KB
MD53e2cc4d88bfa8f54925f7e42f22e407f
SHA1255b21f1f6cd87a2a56a10b0225b260462e6bc51
SHA2562547ae25402b0a2a17bdf4a63c394126926e9426bb499c41b5c679db1f90b70b
SHA512a8695c3e4a6f2b70666bf2ccd91410d54548f03161cd7cc5619155e9884019f0d84b8bade0948601eef8a2a17418a536c9d1e3a7a893100b15d2df64a3cdadd9
-
Filesize
296KB
MD55bbb9ca072d2690da3d4b14921f58f7c
SHA1b223891fe00b212bc504d6cf208a343a6aaaf6c1
SHA2562d8b1ced5f0efb397262db7855768e2e0dd6261be302c49c795162d40b4f4f4a
SHA51238d8fcfbb8c2464f38790fe23d0309f6e74fab20cba5c1165f2e7af4b9448b5e9d53ca35ee3a8c1fa437ae8adb2d153b4744f518f875e0bb886353832c08ec33
-
Filesize
296KB
MD5563cfec6b4a3208d632dca2da15b5710
SHA184cfc4cbcaabe22af22a309a97dff927f6c93528
SHA25663bb78c314fbed5bd12f1c48abd2a6d2a69fe21e5c23149284cd4488be0b00ce
SHA51279e9f341e99a93301632176ded24ecc88b1b7d9f1a23eb95282227d21580bf09ebada25686d4d779599be17f3ea5baee59dbaf807677d851a86061d6151dfaca
-
Filesize
296KB
MD5f12eeda6a85c27a3ed7540cc5786911a
SHA1cffad59b0f8927829496395441bd09d5a1b1b2b3
SHA2564b8b9993c7bca798eda61aa83a711205610e3a39f9115d3642bf6fb13e91e28b
SHA512e95201d1127c0698512d586bb3f6d0e865efff0b288815b6ed5822bc9591a2596814d24a7828ad602b6c3ab55cbe3b67d1b3bb597b10f04efdc676c819d9f61f
-
Filesize
296KB
MD539bfd106b1d65499ba66ffcaba80f3f8
SHA1c595f49f68aea1541e7ee6ec9141b4ed58b0f3a5
SHA256e8736b14fffa4ab2d380a00a631819cb7700dfd2c8e864d02ea26f59ff855040
SHA51278b7a73e5a63acbc286355a7acf5ef35438bd66f40b517e0ea0271e5b11dc8140435dbe7ca150efc8d1a6775ce641c3f92dd6fbb8c7bbdaa56845f4fa9f39717
-
Filesize
296KB
MD5046127ada4ff76c91f9119b88cc6c70f
SHA1d59cdea6060e8d0af213653153ada98be107811d
SHA256c245d0c16055b9186909dc007895fa9437ba9a7cc1ae9d9880b17179125beed9
SHA512eee773a9e43a0f2c09331feb33ad0948e09561d3e8cbca7bf90b320485d15af3d106bc217b8440964c4c096512ec342c4296adb983d622f2b032473dc03cc5e5
-
Filesize
296KB
MD59b924207ee5219f4747e47bf1fb4b7bb
SHA1090943a85e30f2b03ba07a3cd558d3c2f57636bb
SHA256067f662624f962ef361486bfa57adde759b631ecca1d140b438335701bac46de
SHA5122daff62e0b1dcd00be3035e5d3b1d73bca929fc96d173105beb349b51ec80d48472d047ef62e50630617891251141a0565b5c5d174d0ff8d6dfc8577834ef8d3
-
Filesize
296KB
MD5e45fb301f0ceb964e79260a96be336fc
SHA1bfc5a022b8eccbba854a75bbd17b2f0ef1569aa5
SHA256a1e56339112f49a64ff47c55c20ddbe33940ad6af30deb5f89a3a2026fb9be82
SHA5126608e433bebc4ec7f478d37835c84610fb6fa097920fd47aac605bc869dd69b2530b64e8d8f49b7c513c1dc598a67740662c267535dcc6ef24c75a35ed62770a