Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe
Resource
win10v2004-20241007-en
General
-
Target
eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe
-
Size
81KB
-
MD5
65b4b4144bcedd363d9fd4831a5aa7e0
-
SHA1
66b3854048c96f1439317f8a8f57783c88a319ac
-
SHA256
eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6
-
SHA512
0ad77e397384922c8a52412192147d1050e69cae46ddfed677e3ef1bdd61bccb0a16027cac2e060e13e427e749fa7881349b502419179d9419609b281e0a61d4
-
SSDEEP
1536:Bo7oc1K9MM0QEsxaYKigWm9cPdh7H7m4LO++/+1m6KadhYxU33HX0D:q7ojpjKigWm2F1H/LrCimBaH8UH30D
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djdmffnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djgjlelk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amgapeea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beglgani.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmbplc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfbkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmkjkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfdodjhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgcknmop.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfiafg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qnhahj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ambgef32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qnjnnj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bchomn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfhhoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjjhbl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajkaii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmpcfdmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceqnmpfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Calhnpgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmfhig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgnilpah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aqppkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Accfbokl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgcknmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmgjgcgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfpnph32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pflplnlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qdbiedpa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afhohlbj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anadoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjmnoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beihma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daconoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qddfkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnmcjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfknkg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qgqeappe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qddfkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qffbbldm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agglboim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmfhig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqppkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agoabn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfdodjhm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjfaeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfmajipb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beglgani.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjfaeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfmajipb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caebma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqdqof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnhjohkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnkgeg32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
pid Process 3292 Pcncpbmd.exe 3552 Pflplnlg.exe 448 Pmfhig32.exe 2116 Pcppfaka.exe 952 Pjjhbl32.exe 3512 Pqdqof32.exe 2100 Pdpmpdbd.exe 532 Pgnilpah.exe 1408 Qnhahj32.exe 3772 Qdbiedpa.exe 4972 Qgqeappe.exe 2912 Qnjnnj32.exe 4648 Qddfkd32.exe 4900 Qffbbldm.exe 3152 Ajanck32.exe 3628 Adgbpc32.exe 3324 Afhohlbj.exe 3620 Ambgef32.exe 1296 Aeiofcji.exe 1696 Agglboim.exe 2416 Anadoi32.exe 2816 Aqppkd32.exe 4116 Afmhck32.exe 4344 Amgapeea.exe 3812 Acqimo32.exe 4396 Ajkaii32.exe 2528 Aadifclh.exe 916 Accfbokl.exe 4788 Agoabn32.exe 4548 Bjmnoi32.exe 920 Bnhjohkb.exe 4292 Bmkjkd32.exe 3460 Bcebhoii.exe 2532 Bfdodjhm.exe 2940 Bnkgeg32.exe 2316 Bchomn32.exe 392 Bgcknmop.exe 4000 Bnmcjg32.exe 4980 Bmpcfdmg.exe 1360 Beglgani.exe 4372 Bfhhoi32.exe 2476 Bmbplc32.exe 5108 Beihma32.exe 2956 Bjfaeh32.exe 5104 Bapiabak.exe 4496 Cfmajipb.exe 1300 Cmgjgcgo.exe 1128 Cdabcm32.exe 3540 Cfpnph32.exe 624 Caebma32.exe 2740 Ceqnmpfo.exe 3704 Cfbkeh32.exe 5080 Cmlcbbcj.exe 2676 Chagok32.exe 4432 Cjpckf32.exe 1804 Cmnpgb32.exe 4852 Ceehho32.exe 2608 Cjbpaf32.exe 2332 Calhnpgn.exe 4808 Dfiafg32.exe 4912 Djdmffnn.exe 5064 Danecp32.exe 452 Dfknkg32.exe 5100 Djgjlelk.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kbejge32.dll Bnkgeg32.exe File created C:\Windows\SysWOW64\Beglgani.exe Bmpcfdmg.exe File opened for modification C:\Windows\SysWOW64\Cmnpgb32.exe Cjpckf32.exe File opened for modification C:\Windows\SysWOW64\Pdpmpdbd.exe Pqdqof32.exe File opened for modification C:\Windows\SysWOW64\Aqppkd32.exe Anadoi32.exe File created C:\Windows\SysWOW64\Ambgef32.exe Afhohlbj.exe File opened for modification C:\Windows\SysWOW64\Caebma32.exe Cfpnph32.exe File created C:\Windows\SysWOW64\Amfoeb32.dll Daconoae.exe File created C:\Windows\SysWOW64\Lommhphi.dll Bjmnoi32.exe File opened for modification C:\Windows\SysWOW64\Danecp32.exe Djdmffnn.exe File created C:\Windows\SysWOW64\Pflplnlg.exe Pcncpbmd.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dkkcge32.exe File opened for modification C:\Windows\SysWOW64\Pmfhig32.exe Pflplnlg.exe File created C:\Windows\SysWOW64\Adgbpc32.exe Ajanck32.exe File opened for modification C:\Windows\SysWOW64\Beihma32.exe Bmbplc32.exe File created C:\Windows\SysWOW64\Fnmnbf32.dll Ddonekbl.exe File opened for modification C:\Windows\SysWOW64\Pjjhbl32.exe Pcppfaka.exe File opened for modification C:\Windows\SysWOW64\Bnhjohkb.exe Bjmnoi32.exe File opened for modification C:\Windows\SysWOW64\Beglgani.exe Bmpcfdmg.exe File opened for modification C:\Windows\SysWOW64\Dodbbdbb.exe Ddonekbl.exe File created C:\Windows\SysWOW64\Papbpdoi.dll Qgqeappe.exe File created C:\Windows\SysWOW64\Jpcnha32.dll Bfhhoi32.exe File opened for modification C:\Windows\SysWOW64\Cfmajipb.exe Bapiabak.exe File created C:\Windows\SysWOW64\Jgilhm32.dll Ceehho32.exe File created C:\Windows\SysWOW64\Danecp32.exe Djdmffnn.exe File created C:\Windows\SysWOW64\Pcncpbmd.exe eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe File opened for modification C:\Windows\SysWOW64\Pcncpbmd.exe eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe File opened for modification C:\Windows\SysWOW64\Accfbokl.exe Aadifclh.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Kboeke32.dll Adgbpc32.exe File created C:\Windows\SysWOW64\Anadoi32.exe Agglboim.exe File opened for modification C:\Windows\SysWOW64\Bchomn32.exe Bnkgeg32.exe File created C:\Windows\SysWOW64\Bgcknmop.exe Bchomn32.exe File created C:\Windows\SysWOW64\Kdqjac32.dll Caebma32.exe File opened for modification C:\Windows\SysWOW64\Bgcknmop.exe Bchomn32.exe File created C:\Windows\SysWOW64\Beihma32.exe Bmbplc32.exe File opened for modification C:\Windows\SysWOW64\Dfiafg32.exe Calhnpgn.exe File created C:\Windows\SysWOW64\Deokon32.exe Daconoae.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File created C:\Windows\SysWOW64\Ffpmlcim.dll Cjpckf32.exe File created C:\Windows\SysWOW64\Pcppfaka.exe Pmfhig32.exe File created C:\Windows\SysWOW64\Mgbpghdn.dll Aadifclh.exe File created C:\Windows\SysWOW64\Flgehc32.dll Cdabcm32.exe File created C:\Windows\SysWOW64\Bnmcjg32.exe Bgcknmop.exe File opened for modification C:\Windows\SysWOW64\Djgjlelk.exe Dfknkg32.exe File opened for modification C:\Windows\SysWOW64\Bmkjkd32.exe Bnhjohkb.exe File created C:\Windows\SysWOW64\Eeiakn32.dll Bmkjkd32.exe File created C:\Windows\SysWOW64\Cmlcbbcj.exe Cfbkeh32.exe File created C:\Windows\SysWOW64\Chagok32.exe Cmlcbbcj.exe File opened for modification C:\Windows\SysWOW64\Dfknkg32.exe Danecp32.exe File created C:\Windows\SysWOW64\Kgldjcmk.dll Qnhahj32.exe File created C:\Windows\SysWOW64\Glbandkm.dll Bcebhoii.exe File created C:\Windows\SysWOW64\Naeheh32.dll Cjbpaf32.exe File opened for modification C:\Windows\SysWOW64\Calhnpgn.exe Cjbpaf32.exe File created C:\Windows\SysWOW64\Hpoddikd.dll Aqppkd32.exe File opened for modification C:\Windows\SysWOW64\Bnmcjg32.exe Bgcknmop.exe File created C:\Windows\SysWOW64\Imbajm32.dll Bapiabak.exe File opened for modification C:\Windows\SysWOW64\Agglboim.exe Aeiofcji.exe File created C:\Windows\SysWOW64\Akmfnc32.dll Bnhjohkb.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Gbmhofmq.dll Pcncpbmd.exe File created C:\Windows\SysWOW64\Ccdlci32.dll Pdpmpdbd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2296 4824 WerFault.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfhhoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfbkeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmkjkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aadifclh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjmnoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfdodjhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfpnph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcncpbmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Danecp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmgjgcgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjfaeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmnpgb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Accfbokl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdpmpdbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ambgef32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfmajipb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjjhbl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgnilpah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anadoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afmhck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pflplnlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqppkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmpcfdmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qgqeappe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amgapeea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmlcbbcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Calhnpgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qffbbldm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acqimo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajkaii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjbpaf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djdmffnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfknkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeiofcji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bchomn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgcknmop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qddfkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnjnnj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beihma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bapiabak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceehho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqdqof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qdbiedpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afhohlbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beglgani.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmbplc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddonekbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnhahj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnhjohkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bcebhoii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chagok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adgbpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcppfaka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agoabn32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odaoecld.dll" Pcppfaka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ochpdn32.dll" Pjjhbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adgbpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Danecp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjjhbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgnilpah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Calhnpgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afmhck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amgapeea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dqfhilhd.dll" Accfbokl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqdqof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qdbiedpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Baacma32.dll" Ajanck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldfgeigq.dll" Agoabn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjmnoi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnhjohkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnkgeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afhohlbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afmhck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjelcfha.dll" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnmnbf32.dll" Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agoabn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmkjkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qnjnnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajanck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhbffb32.dll" Bjfaeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bapiabak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmgjgcgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qddfkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfdodjhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olfdahne.dll" Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agjbpg32.dll" Djdmffnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnhjohkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgcknmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Danecp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfhhoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjfhhm32.dll" Cfmajipb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdabcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoqimi32.dll" Qddfkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmpcfdmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aeiofcji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdqjac32.dll" Caebma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdhpgj32.dll" Dfiafg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmbplc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdabcm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beihma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfbkeh32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3292 4764 eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe 83 PID 4764 wrote to memory of 3292 4764 eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe 83 PID 4764 wrote to memory of 3292 4764 eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe 83 PID 3292 wrote to memory of 3552 3292 Pcncpbmd.exe 84 PID 3292 wrote to memory of 3552 3292 Pcncpbmd.exe 84 PID 3292 wrote to memory of 3552 3292 Pcncpbmd.exe 84 PID 3552 wrote to memory of 448 3552 Pflplnlg.exe 85 PID 3552 wrote to memory of 448 3552 Pflplnlg.exe 85 PID 3552 wrote to memory of 448 3552 Pflplnlg.exe 85 PID 448 wrote to memory of 2116 448 Pmfhig32.exe 86 PID 448 wrote to memory of 2116 448 Pmfhig32.exe 86 PID 448 wrote to memory of 2116 448 Pmfhig32.exe 86 PID 2116 wrote to memory of 952 2116 Pcppfaka.exe 87 PID 2116 wrote to memory of 952 2116 Pcppfaka.exe 87 PID 2116 wrote to memory of 952 2116 Pcppfaka.exe 87 PID 952 wrote to memory of 3512 952 Pjjhbl32.exe 88 PID 952 wrote to memory of 3512 952 Pjjhbl32.exe 88 PID 952 wrote to memory of 3512 952 Pjjhbl32.exe 88 PID 3512 wrote to memory of 2100 3512 Pqdqof32.exe 89 PID 3512 wrote to memory of 2100 3512 Pqdqof32.exe 89 PID 3512 wrote to memory of 2100 3512 Pqdqof32.exe 89 PID 2100 wrote to memory of 532 2100 Pdpmpdbd.exe 90 PID 2100 wrote to memory of 532 2100 Pdpmpdbd.exe 90 PID 2100 wrote to memory of 532 2100 Pdpmpdbd.exe 90 PID 532 wrote to memory of 1408 532 Pgnilpah.exe 91 PID 532 wrote to memory of 1408 532 Pgnilpah.exe 91 PID 532 wrote to memory of 1408 532 Pgnilpah.exe 91 PID 1408 wrote to memory of 3772 1408 Qnhahj32.exe 92 PID 1408 wrote to memory of 3772 1408 Qnhahj32.exe 92 PID 1408 wrote to memory of 3772 1408 Qnhahj32.exe 92 PID 3772 wrote to memory of 4972 3772 Qdbiedpa.exe 93 PID 3772 wrote to memory of 4972 3772 Qdbiedpa.exe 93 PID 3772 wrote to memory of 4972 3772 Qdbiedpa.exe 93 PID 4972 wrote to memory of 2912 4972 Qgqeappe.exe 94 PID 4972 wrote to memory of 2912 4972 Qgqeappe.exe 94 PID 4972 wrote to memory of 2912 4972 Qgqeappe.exe 94 PID 2912 wrote to memory of 4648 2912 Qnjnnj32.exe 95 PID 2912 wrote to memory of 4648 2912 Qnjnnj32.exe 95 PID 2912 wrote to memory of 4648 2912 Qnjnnj32.exe 95 PID 4648 wrote to memory of 4900 4648 Qddfkd32.exe 96 PID 4648 wrote to memory of 4900 4648 Qddfkd32.exe 96 PID 4648 wrote to memory of 4900 4648 Qddfkd32.exe 96 PID 4900 wrote to memory of 3152 4900 Qffbbldm.exe 97 PID 4900 wrote to memory of 3152 4900 Qffbbldm.exe 97 PID 4900 wrote to memory of 3152 4900 Qffbbldm.exe 97 PID 3152 wrote to memory of 3628 3152 Ajanck32.exe 98 PID 3152 wrote to memory of 3628 3152 Ajanck32.exe 98 PID 3152 wrote to memory of 3628 3152 Ajanck32.exe 98 PID 3628 wrote to memory of 3324 3628 Adgbpc32.exe 99 PID 3628 wrote to memory of 3324 3628 Adgbpc32.exe 99 PID 3628 wrote to memory of 3324 3628 Adgbpc32.exe 99 PID 3324 wrote to memory of 3620 3324 Afhohlbj.exe 100 PID 3324 wrote to memory of 3620 3324 Afhohlbj.exe 100 PID 3324 wrote to memory of 3620 3324 Afhohlbj.exe 100 PID 3620 wrote to memory of 1296 3620 Ambgef32.exe 101 PID 3620 wrote to memory of 1296 3620 Ambgef32.exe 101 PID 3620 wrote to memory of 1296 3620 Ambgef32.exe 101 PID 1296 wrote to memory of 1696 1296 Aeiofcji.exe 102 PID 1296 wrote to memory of 1696 1296 Aeiofcji.exe 102 PID 1296 wrote to memory of 1696 1296 Aeiofcji.exe 102 PID 1696 wrote to memory of 2416 1696 Agglboim.exe 103 PID 1696 wrote to memory of 2416 1696 Agglboim.exe 103 PID 1696 wrote to memory of 2416 1696 Agglboim.exe 103 PID 2416 wrote to memory of 2816 2416 Anadoi32.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe"C:\Users\Admin\AppData\Local\Temp\eb58081103538a96b6ec7ef2078130ca1e29ee8e12496eed51f07830104562c6N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\Pcncpbmd.exeC:\Windows\system32\Pcncpbmd.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\Pflplnlg.exeC:\Windows\system32\Pflplnlg.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\Pmfhig32.exeC:\Windows\system32\Pmfhig32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\Pcppfaka.exeC:\Windows\system32\Pcppfaka.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\Pjjhbl32.exeC:\Windows\system32\Pjjhbl32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\Pqdqof32.exeC:\Windows\system32\Pqdqof32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\Pdpmpdbd.exeC:\Windows\system32\Pdpmpdbd.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\Pgnilpah.exeC:\Windows\system32\Pgnilpah.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\Qnhahj32.exeC:\Windows\system32\Qnhahj32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\Qdbiedpa.exeC:\Windows\system32\Qdbiedpa.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\Qgqeappe.exeC:\Windows\system32\Qgqeappe.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\Qnjnnj32.exeC:\Windows\system32\Qnjnnj32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Qddfkd32.exeC:\Windows\system32\Qddfkd32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\Qffbbldm.exeC:\Windows\system32\Qffbbldm.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\Ajanck32.exeC:\Windows\system32\Ajanck32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\Adgbpc32.exeC:\Windows\system32\Adgbpc32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\Afhohlbj.exeC:\Windows\system32\Afhohlbj.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\Ambgef32.exeC:\Windows\system32\Ambgef32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\Aeiofcji.exeC:\Windows\system32\Aeiofcji.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\Agglboim.exeC:\Windows\system32\Agglboim.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\Anadoi32.exeC:\Windows\system32\Anadoi32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\Aqppkd32.exeC:\Windows\system32\Aqppkd32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\Afmhck32.exeC:\Windows\system32\Afmhck32.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4116 -
C:\Windows\SysWOW64\Amgapeea.exeC:\Windows\system32\Amgapeea.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4344 -
C:\Windows\SysWOW64\Acqimo32.exeC:\Windows\system32\Acqimo32.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3812 -
C:\Windows\SysWOW64\Ajkaii32.exeC:\Windows\system32\Ajkaii32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4396 -
C:\Windows\SysWOW64\Aadifclh.exeC:\Windows\system32\Aadifclh.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\Accfbokl.exeC:\Windows\system32\Accfbokl.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:916 -
C:\Windows\SysWOW64\Agoabn32.exeC:\Windows\system32\Agoabn32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4788 -
C:\Windows\SysWOW64\Bjmnoi32.exeC:\Windows\system32\Bjmnoi32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4548 -
C:\Windows\SysWOW64\Bnhjohkb.exeC:\Windows\system32\Bnhjohkb.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:920 -
C:\Windows\SysWOW64\Bmkjkd32.exeC:\Windows\system32\Bmkjkd32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4292 -
C:\Windows\SysWOW64\Bcebhoii.exeC:\Windows\system32\Bcebhoii.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Windows\SysWOW64\Bfdodjhm.exeC:\Windows\system32\Bfdodjhm.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Bnkgeg32.exeC:\Windows\system32\Bnkgeg32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2940 -
C:\Windows\SysWOW64\Bchomn32.exeC:\Windows\system32\Bchomn32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\Bgcknmop.exeC:\Windows\system32\Bgcknmop.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:392 -
C:\Windows\SysWOW64\Bnmcjg32.exeC:\Windows\system32\Bnmcjg32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4000 -
C:\Windows\SysWOW64\Bmpcfdmg.exeC:\Windows\system32\Bmpcfdmg.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4980 -
C:\Windows\SysWOW64\Beglgani.exeC:\Windows\system32\Beglgani.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\SysWOW64\Bfhhoi32.exeC:\Windows\system32\Bfhhoi32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4372 -
C:\Windows\SysWOW64\Bmbplc32.exeC:\Windows\system32\Bmbplc32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2476 -
C:\Windows\SysWOW64\Beihma32.exeC:\Windows\system32\Beihma32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5108 -
C:\Windows\SysWOW64\Bjfaeh32.exeC:\Windows\system32\Bjfaeh32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2956 -
C:\Windows\SysWOW64\Bapiabak.exeC:\Windows\system32\Bapiabak.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5104 -
C:\Windows\SysWOW64\Cfmajipb.exeC:\Windows\system32\Cfmajipb.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4496 -
C:\Windows\SysWOW64\Cmgjgcgo.exeC:\Windows\system32\Cmgjgcgo.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1300 -
C:\Windows\SysWOW64\Cdabcm32.exeC:\Windows\system32\Cdabcm32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1128 -
C:\Windows\SysWOW64\Cfpnph32.exeC:\Windows\system32\Cfpnph32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3540 -
C:\Windows\SysWOW64\Caebma32.exeC:\Windows\system32\Caebma32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:624 -
C:\Windows\SysWOW64\Ceqnmpfo.exeC:\Windows\system32\Ceqnmpfo.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2740 -
C:\Windows\SysWOW64\Cfbkeh32.exeC:\Windows\system32\Cfbkeh32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3704 -
C:\Windows\SysWOW64\Cmlcbbcj.exeC:\Windows\system32\Cmlcbbcj.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5080 -
C:\Windows\SysWOW64\Chagok32.exeC:\Windows\system32\Chagok32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\Cjpckf32.exeC:\Windows\system32\Cjpckf32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4432 -
C:\Windows\SysWOW64\Cmnpgb32.exeC:\Windows\system32\Cmnpgb32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\Ceehho32.exeC:\Windows\system32\Ceehho32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4852 -
C:\Windows\SysWOW64\Cjbpaf32.exeC:\Windows\system32\Cjbpaf32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2608 -
C:\Windows\SysWOW64\Calhnpgn.exeC:\Windows\system32\Calhnpgn.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Dfiafg32.exeC:\Windows\system32\Dfiafg32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4808 -
C:\Windows\SysWOW64\Djdmffnn.exeC:\Windows\system32\Djdmffnn.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4912 -
C:\Windows\SysWOW64\Danecp32.exeC:\Windows\system32\Danecp32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\Dfknkg32.exeC:\Windows\system32\Dfknkg32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:452 -
C:\Windows\SysWOW64\Djgjlelk.exeC:\Windows\system32\Djgjlelk.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5100 -
C:\Windows\SysWOW64\Ddonekbl.exeC:\Windows\system32\Ddonekbl.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4040 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe67⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2384 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4632 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4960 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe70⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1260 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe71⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3724 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1852 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4236 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4916 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe75⤵
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 40876⤵
- Program crash
PID:2296
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4824 -ip 48241⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD50dd45c5e44a2887a23127bb5dca3403c
SHA1cbb36759209d42184718ed5abc7923fdb1ba185b
SHA25650a1de1b9a81f2bf74a14c0ad165030037ddb4189e2053ed715c9d98dc4a46a5
SHA512e2f63ed4dff962d4d35994ab2c6c1e2e83632057f150e26aff904a7559b45ae4d27f3b1531c049ccf02040385b013bdcd126e4aec7068dc8da50260040e610ce
-
Filesize
81KB
MD5fb8b9c4f482f912cb9c8797184740775
SHA1a5cc298dde81055112401b194cc7baf60d043d9e
SHA256da2605c6627357863eeb8801f960a8e0b16c9093539369329e78ae8996ad6ff2
SHA5124efbcf6f55037a68ffc3ccd9c8fc8720641f488f449fbb706243dabc455e36a388dc12237624eb18419b44099bab5d4e45f49f6bd712e4095a45e3583377c2fb
-
Filesize
81KB
MD55c3f0bd38c8b2d9570631e2c872ab945
SHA11fefb87adffcea0371274524484d9f636ec5cf7d
SHA25611677e96bcc09d1045b9fc1872a91ac0ff2700d07fa7ff3be3651465d0d6cbd0
SHA512e831963f4877a9f6aa6ae0bba08db3551bfc685ea5eb3cf6c57087a871b7c38eb5f2b9bc0b390de9d9935f58037ff6d4e63e2b9d2592099c4a74d90f5b9ba119
-
Filesize
81KB
MD5a118a0c8516ebdaa04a875eda8cd68d7
SHA15fcaee20dd71b530d885b041ff56d5c3b15fc357
SHA256d55a543041d38bbe17d4b76bab123ab17551ec352ed9b86c3d687733b1765fb4
SHA51205cfffc269c72be6a71c3fc24e03436af7fcd5c6dfc36a62dd0bd9a24f9b8aa779c3c9c84bbf4758ddac58b8e3d1f9a12cc06710a3ebccbe0ecadc51329ac013
-
Filesize
81KB
MD525accbc91207510e87b5b42be88ea0e6
SHA161fa3972bf8626f12faf8cab5a7b997e4e421d5d
SHA2563519b864d436c8d254bf512c1a564921bbe67595515c1539fa72fa6140ee0968
SHA51263f69a99bbaed75d041c18e1ef50a4934e1b38e271d38ff65700fa291cb13c72f4e72fc91b4e5fec5d2aae9dafde494c42efcd1eae1d12ced8bc879eb026d544
-
Filesize
81KB
MD532e5f60155a9efd4a5c67936594ea281
SHA18f7a3b092c1a388c3fe3826a4989dba74a1efd0e
SHA2563c4a011cff64b6005cca8d9d0cd2d29755c3862fdbe23d8f826d6b9d0a6f3775
SHA512036595f40a5331004e8e4712c80018555363bd9e4e52517eac0eeca201754498c06d4542de35d1f30d5a3fb39383ca8f7227d6acf8af974329e6bd633cf11975
-
Filesize
81KB
MD5a526633476a89c39759d2e7cb5246ff3
SHA1e8984fde8a96005a617fd558c237e6a7754c2d38
SHA256f5a2e8a456112688d756d241ac941e9cb3b325c0f8b1fa3a2bc119dbf74d56a4
SHA5129e21eb3e25a4e36c8def5a9822116dfb8fc1659912a7866999902bb8235f0daffa42c955635e540e856019f0d23a6b2d111aefb93d8e4d3bc9d190f70622aee4
-
Filesize
81KB
MD5cf2813d8bfada21e6e0c097f556ab024
SHA17b4697d53abba4456faffbb8709c6bbfec16e95c
SHA2565dad5f85d1fcd6faf4602e6535e95336022e3211738db21e369eaa1e9675fbbb
SHA512cbacc0e52d2e0a0cc74892998279f43e67364f352496cfb50bdc083dc8ff2bf509fe731b34c9950b146c44a008a7693b61d49e63e6b8de71953f3399406fe2b5
-
Filesize
81KB
MD534949d2010e922cd161d20b95184b569
SHA1c209831ab686130652fb4c7725ae571e4197cb2a
SHA256de428d968d1d2724dc9f03114f2800e456e93c983d178950615c04e8b6707e35
SHA512e54eaffc02cf623a8d06f6722618b548cf3f326659134e54260b46b5650c96b26d80018dfc0ef473b59ecd89465edc2e5c422192bc379403b0930e57be328aa9
-
Filesize
81KB
MD552faf3a28407e3b1209f0ee079f796f5
SHA16d56d322c020dd28ac4f346f8572b637ae0965f4
SHA256fe1a26a2aa336740cc7fda9f3b11374d29fec32c17cf4a350f4be8b33c7a77ee
SHA51216dd35095968c54181d1060e9bd2630187ed9bf2c1921f553b84c8eaa080c9f4f53212e313948139e8ff581e2267d9725c52d8fc330cbfe128bd0595201dc9dd
-
Filesize
81KB
MD570839f41abc51d7992584196c3a97f81
SHA139b5169711ac2f19f5758344b2f341ed48fbe5e0
SHA256f108edb295e71b5805a8be1db2d48af174296f8141149e1a2616f5f698cac909
SHA51254ddad3c7a9dbd22781f5c76c22bc6536963981c5eaa7ba73eb92d0c6bef0a1fc5f376c9bad3471f719b0becb5b3d6450c023dda9f8a24f2103fbc593c6964aa
-
Filesize
81KB
MD515721a2eb691dc9088a10af4bc6afb6b
SHA1952d6b1d0c987faef55d339a709a1c13c216f567
SHA2566d918abd0cb63f12815db92cf65ba6352980ecc3a32c2903e64d8897658e0acc
SHA5127093a3781a6f9d34e2b7e919f1babf33f2f5d285822e5a425ee6afb8a3ee3ca4c4ed8ab05d423e5fd88a2004bb0fe4167a06fee9a46896369e65a4bf87298fa1
-
Filesize
81KB
MD50c7f0d33b7d244f09779da373039698f
SHA1616a23549880c99c349171163764ec1a3f718620
SHA2567ca904df05b911e7727afe439fff10b171b688d7630b7f111434118b78f5a6bf
SHA512b5e18c594f982bd717b9115f44768d789fa08ecb1bfe18c033d1444001dcef34fe52c3a04f86c50968bf9d74878f93a4efb0c70a1bc2e42d79d089107b699cbf
-
Filesize
81KB
MD5e7931f9517ff84b38adbee1d760e2227
SHA17ce5586852bb02072ec1856a5778c19258cacdbc
SHA256ce764ee51915e6914a57d74b4f677e13201cd9de6d2ef9955e1e6aaea820fe84
SHA5120b84c2e5dec1e754935407ab48633b73b9a77921c9b90d9ba57377369683f5f892554684566de1f696e262382eaabed7aac270c4ffa3fccd5982cdca079bfe09
-
Filesize
81KB
MD568f394dd222d7fa36dfa2caee0eb52b5
SHA13f34a8e169cc2bf9916a8b8240bd5e29861bd9e6
SHA256d46bd4e3ad52b65b6d40c1e1f76bc39f28716fb45dca7ef4e8247913845ebd78
SHA512c23f297c24ce9171273eb5638b80361f9f125cbe0fc491b5c8d6100f1a9f84aa5a3699ff1252724c54d786ff8489ea5502b475ddfc284910854f24fff82637e4
-
Filesize
81KB
MD5ff6135473fea30f2cb1befe50b75ac98
SHA1f0ce7d543a1c4904c2b9f627a9f8f7c9b3462a50
SHA2563739fec247b74576c6ae2dafa20465df318c202fbe3181901c6a4d91e172bae1
SHA512c32af4b800423732f16f5e22a14821ac9c5162ffb99484b6f8a57b64a65eb15347d16656c18250d7650950d3add65ac84054dea327b7656a0b9eefb9539ff444
-
Filesize
81KB
MD57628fd800730b21bb59b2d3e97069952
SHA133af7b114a3b19211fe5914932181ad3228f5f2c
SHA256229e8bde4f85529379f5344b2ac5ec9eeab2fe6d4e987a2b34aaef9b5807cd1f
SHA512d73b21243eb0cc3e13467e080b7b5aef325020406d33707ee1cf1347d3d27a7469056180231e7ee00bbbaf6c3cc3ab8711c72a229528d8a9c40ad5e992be6cd2
-
Filesize
81KB
MD50decd80734cc1aa6b14588aa3fbed11e
SHA19a961e7356a45cce44250fbec952fc0f5824468c
SHA256ba4684582f43b267dc56187b79a2ae5b442760c3883f632981294696edf54163
SHA5128332f30ba4a8ed3da58651fb4df49fbf9452a4ab72e40144ddeda0fd0351aa4a4e93898ba847eabaacc79ad8c18996f5c5b99120a7fa335cdad38ea2d3f6a9d0
-
Filesize
81KB
MD5ad222eefbc2ca0bee14d282f5adbc1dc
SHA1df3288b592a1a33d840b85bf7f7852801f5b155d
SHA256b38ff3c7bff6058e65f67e9952d2bf3832240a50a2f908d79e6f54a056560e29
SHA512dbec7a52dce30f32f8a9e5086cc2cb7d30eba55221d3ad5366972bc49a1604760fd76d564a6b6cecd5f2acdae33a9da1b817b5b557afbef6d97d9eac317d7e51
-
Filesize
81KB
MD5ed9b39ace4889ffa21fb639d2b48217c
SHA1102f2338f261ac49e31b7fe31af5817745dfe416
SHA25653cad9cccb228a2fa8ee33c5ba9772c7177057c985400897e13286b48d8aa180
SHA51231bdd355d992ed8e415d41921c8004307830c7911c352c886a6cf6e6ee7072ee39b7788d873cd620448ac61a969b1ace85c2b86f12d0a3ba445db6c6714fdf8f
-
Filesize
81KB
MD51bb16a6055d8a945d35a94c22ef69db9
SHA19f84cb06f14d875b280369b28a0b51ccfbd6bb5b
SHA25640a20a17f39e397247edb4b0a9c31f190ebeabcbf60c8ea45cecb413fa3b59ec
SHA512ca9a58e72f3f8eac1ca8b575279d42d2757248b3f9b81d7eae0421af1898fbdc666dcf844de849b524f62397a4fef5d37f4572ef101949a417c70f1ea0d3f512
-
Filesize
81KB
MD567431fdac3403a1fff3b116939e59ae4
SHA10b05d23a47915c94678f70dd44b3100b0defee21
SHA25617e3d2fb7a0b134fe1271040b797c6680217244d410f3da3028b4ee090ef5b75
SHA5128c8d8ba48d8b74a110c63a74d4389067d53679e74f6bd7705fbc8d13ebcde44c2365ca330aeddd7f12de2964f6c585e84aeb64a55a04389e2fcf37ef5d603291
-
Filesize
81KB
MD543d8040ecaddc1947ab8b3081ab1e5d7
SHA1b92bea451888445724b5f9d364abea581ab0525c
SHA25615a9052881f573ad2c9f889b79610bc9beaf2588b549fd6ee829bf063d1e3499
SHA512c0937d6518e44cacdf2a64609f5657495693231b09e3e95d138a5e854e12a1aef84327f8d8854d8430e4f208b0c899785c567269eb75075646d4585ed3c567ce
-
Filesize
81KB
MD54389f61a485938fdad4973235d471d7b
SHA1305fe518752502fe365615efb54d782c3686eae7
SHA256e54576a70c1b2bf4888e5a515ec96f59f108c1cc0d3f694eee9d4cc559f746b8
SHA5123240294620081bcf1d175d120847d949ffec6d6907a984b51814b7cd73b5134043c9df520d410489f937fccbebf5b0944d4b390b71adae84f2b7ac9050d11cad
-
Filesize
81KB
MD52bbbe34ff22ae2eed2ad4f7757bcef73
SHA166b0fcaf95a631daccf03e022ebfec4bd35a1137
SHA256e64da484ebba6c081afa21fa924b48cec3734aa292c0da8af1e8e57f43dc8ee5
SHA512f86d53a5140e7af74d212719666292e4c104d11c7f3e3efd0126eae26a459ead4bb9885c25f7851bfd62f4bcec6294064afa18b63b02098645350dfc4fb2271e
-
Filesize
81KB
MD5558c2af5b978727c983f503decd7330b
SHA151206cda3c80c256472101316290eda41198aa03
SHA25603d71d442f3383a4cecc40ac66fe03108c25dd753ab549770897be0792483e74
SHA512db3f9d21364382f567429a33476bfa62e7a516c7f3246adf16365ed3ea23dbcf9e6bdcf39227b3c30944d73f77614f47b788608c838493186ffdda5a029fd827
-
Filesize
81KB
MD5dd77d01b7987c88315fc164d8fe6d4f1
SHA139afc299f468c22ed2e56a81fb440405b5ddc9b8
SHA256cdb4218eafdf9ffa6c8c9b5889f9c0aca0cf80b0c199b9a44129b0617fd7ab1a
SHA512a5e45fe1311883369880d81b2a1d06b62ddce8b99903e2cad7eb2f560136e26e834a72f0c2adede5b41f7200fab2879d14dbcf67327a08c095ce72cf35358cb1
-
Filesize
81KB
MD5cc584ed7141f5d5d637b4cd5192c25f9
SHA161170d7da23016e0ad82388757cd3bcdaec9ae9d
SHA2568e5e2f67f56ddce06ebbfdee5553594587b45384b41752e462c386b2ba3a46e9
SHA512ef1d52dc2c3c20095344d656dd147d3bfdb31d0b37b4f5dd3add9544c504013d0f88aa2a4886700a5b590c77e3779a54f7bff0e409d9ab2b3e11c5872c67dfdd
-
Filesize
81KB
MD58d73d59855e8a41d3faec15fc3ce4d45
SHA1d2def1755b6d90c7c7eaf7022513c73fce9d0153
SHA256a0c9b195732c3e900f9d7fbb1433c800cf21a8ee308e3d6ece3c8abc209b5ebe
SHA5128933af22f80061adbb0d2163ccadd40d723bbd2e776b0daded48dc8545b72d8ff287337b3375fe818f0a8dbfd06dcae7beb1cd55a01f9c228694e18a4ab5ed12
-
Filesize
81KB
MD562948bd33fd438f640f73941b39ab6b8
SHA19658c0644b05c54dd5fcad788e45518ff315ec44
SHA25689463af1adfc83b693e57be774c09949d2d94bf8c649794f7b2bedb23f46c446
SHA512d555f333950898652ce9f294064c2744dbfb71a5438e6ce068744ac222ceaa253f5ba341e98aae01aeb31cd7833465ffe7ee8f742e94ff5a6e3feeae8dec5050
-
Filesize
64KB
MD5dcd5d21fb351861146495dcf11e45b75
SHA1a17965add2555e00742df6ed70b8a0328445d6aa
SHA256d375fb7023763dcd84108714ba21edb0b5d471f7f1abe05fafae9f33dbc1a4d1
SHA5129ec43a4d747068a231c8f6510c869c33174d2ca6f3a6f417adf992d8e124039386da2efb212dd2f70d3442c54be5b627a98dec01ca73257a01635773d9331d4a
-
Filesize
81KB
MD5517ed3ab233599d2bb2ffd28ee23915e
SHA1371d388cbdc1fdf75c0df53b9d81dd1dbf18e5a0
SHA25611a7f283d6cb1e5887e5a414c8f6e34d0df32851e7609d16a34a0be60a626b7f
SHA512c906f83e3b293d59c2ef0c8f6bdf26e0fec9a134cb0ec6de76a49903c6c37b6c3c3d3061ea0d5e5629b9b052fa46e89066477ce99c048b58d2f3bf17d9bb10ca
-
Filesize
81KB
MD5595b05f60dca2cc8726937ba145de733
SHA1ef3418ac8bfab8aa081b79b438aadca2c67b5024
SHA256048df7dae90fc3bf4114fa7acf8cb089b42d354be45a4c8c4f88558f4366c599
SHA512a6c1d2fe12c4d1c89fdaed081b3b7fcd0ca53b7a65e9d3a2e27b37954fe83fab428b700e1383eadbb285cc70f22a078e7adaf06b81bc9aac3312512c5490e076
-
Filesize
81KB
MD57f26bf17f017560213c8b6eb3a0ae6aa
SHA199eb4c427463e6da747fe8dd178c896e65aaa4d2
SHA256a3919f4de6850caa7ff29814966fedc4fd198fbe62bf78e520e249650d6756e3
SHA51271c0e9a659a8981d4a566538323a4cff54dd9be546ffb1945371f609162d42601bd08c4f9eab6b955425caff378502968ac609f7edae304f2e3f2e1619763dad
-
Filesize
81KB
MD5d36a23fc82860e85d996851837e1ba29
SHA14fb1e24fc3c0c1890d803ba454a1248206387f86
SHA256ddaecb91530bf995550d86f1201a8e73e3c1c2af14e047934feaff4f07e7ba98
SHA512ec9131aa7f675d9e0ab3c6d59fe83b0ca694ece4942a71fd100e89dd89a8adacec2482b3a8d2c6886c5965a7bc5c0c996b864053d89d1055153955019c39ef2a
-
Filesize
81KB
MD51e57f3aca632c14f4048768fc637298b
SHA13a015953e6283dca0f53fe36eb13c1d7119be6c8
SHA2569c0a0e25c279a857631a873ab49064859c6676e9dc86b8e9e7fec04c7d854bca
SHA51226a674217c1ab607e73e5a149f763b1732207e2dd32c6d140eaf6fef5b3784a061ecbbbf1610af32072723b602c56690834c0fa4bcfcf0a82bd0890a40b9fb62
-
Filesize
81KB
MD598f406759623153e2e07cbd8bce30726
SHA1c7ff97fab9bf3ec6682090491fada3b66d96b693
SHA25659c239f3a97f53afb5d17b60f39e920abecf492e5e572d168b94508ab215e522
SHA5124ee7db0540f44437eb56ed3e4c0db846f7d20fb6b409d363dad410700176d590b064f7845530dcc44fc0431f2d49e62691c34381666923405772d6752781c36f
-
Filesize
81KB
MD5c8455eaa88eeadccc2a25c2290a50ea8
SHA15c413a41c2bfb3c3496f5ddac381cf6b32226eaf
SHA256a0a1c1673cd05de1619c1faabca7b7de3d27f989ca98261d0891c3e052053e64
SHA512dada11f980d577133582039de5cdf5e98c8cd493de3a0962479c29f29adea583d57cea9fc57113ffd92527f3df89065e4df1c7403a27fa719af745c8736a3186
-
Filesize
81KB
MD5a13e24c31c5f367cb31d29d7cfaed929
SHA1d6df14530d8f16d5e15502dc8edf33b9c8dc9509
SHA2566d83c17b4b1d63cc8b423b712e0fc90bf7520a68bf22b66bc75933ebefed2ad3
SHA5126ebd9bb949383d4405b296f942239df66640b7051d53a5e9db28ce9f5230fd9d40526c8825b141012a8ed4bb719ef08e409985f3795fa44f47af3ebae52707a6
-
Filesize
81KB
MD57c81c1e888e570f709c08e31ea9b5c3c
SHA12f94d1fa3a22a0b30651658a512c00a05fec33cc
SHA256899cad094ff5fde61751db8a3f4863276f9107698e2c0454346cc0136400befe
SHA51222dca7eb743a144ae6bb7d2fdbbf55be69b5a0cf9be1affa17c65dec958cfa54f8cb6eda5c88ab94d2d0d556035d6ca3ee0339784f42726f4991fd2ebcc52a6a