Analysis
-
max time kernel
134s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b.exe
Resource
win10v2004-20240709-en
General
-
Target
5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b.exe
-
Size
96KB
-
MD5
d6636b50cf5c24002090a68f91a61b80
-
SHA1
6261ddadd33b77191108440807b17ba3325fecf2
-
SHA256
5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b
-
SHA512
9bf5741c0fad8630ae7ffbdfd489c0effeb6cbb069f0b215118f98023e0a475f00f062996371287b66ff22f1d42538ec19454d0edc48925c070ff9d429b41efc
-
SSDEEP
1536:OlyQSZqG2YzDoYTPUd4FKCckn2Dp9ilkilRNDK+pwKl0BknaAjWbjtKBvU:OlyzRptwOFcDgm+tYknVwtCU
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dgfifjmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdadmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aaplij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dnjbllng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ippbfgfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fbbfofnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hblblcgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nckibjqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Canaae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfcnlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eocaln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Badnkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bnibkhho.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilkmfghl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgajjnio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddafipck.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcanen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bhofhqhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cnnkfg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfajminj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnhmgp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lchcfmqq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ojcnqblh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aohenmnd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aojbcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gnmqpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ielknndd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjflgh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjibcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dofkfica.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eklogn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jopocbag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iimqjlih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jliige32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dgbpkk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckbcjbgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fpcjckom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ojqakbnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mmlhkqmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onjpfahf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnibkhho.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Canaae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jejgpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Phkhef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ieohdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhmidepp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Filolqem.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmqmcn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgacal32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehhbemag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eocaln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enmgiinb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bomoim32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dofkfica.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdhdbalf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eoenbmkm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnnhce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dabjmddg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnhgdgce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmeaja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qmacckmi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhecbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ehhbemag.exe -
Executes dropped EXE 64 IoCs
pid Process 4676 Bdadmi32.exe 2208 Bogija32.exe 2032 Baeefmdc.exe 2988 Bhombg32.exe 4304 Boieoacm.exe 4532 Cfcnlk32.exe 2028 Clmfiebf.exe 4820 Cnnbqn32.exe 392 Cfejakhg.exe 4444 Ckbcjbgo.exe 2992 Cblkfl32.exe 632 Chfccfeh.exe 2268 Cncllmdp.exe 2212 Cfjdmj32.exe 3048 Cldlidlo.exe 916 Cbadakjf.exe 1060 Clfiodjl.exe 3852 Coeekpip.exe 3056 Ddamcfgg.exe 4524 Dhmidepp.exe 1732 Dklfpqod.exe 1280 Dogaqo32.exe 624 Dnjbllng.exe 1412 Dfajminj.exe 636 Dhpfienm.exe 3232 Dknbepma.exe 1172 Ddfgof32.exe 4736 Dmnopcdd.exe 724 Dffchi32.exe 4364 Ddicdeao.exe 4168 Dmplebaa.exe 3080 Dfhpnh32.exe 4600 Eboqci32.exe 2488 Emdepb32.exe 1484 Eocaln32.exe 5032 Ebamhi32.exe 2128 Emgafa32.exe 4144 Eoenbmkm.exe 3600 Ebdjnijq.exe 2164 Einbkb32.exe 868 Eklogn32.exe 3548 Efacdg32.exe 2332 Eknkmn32.exe 2976 Enmgiinb.exe 684 Eiblfbmh.exe 2892 Ekahbnll.exe 2804 Fbkpog32.exe 2380 Ffflofla.exe 3896 Flcegmji.exe 4792 Fnaadiim.exe 3064 Figeaa32.exe 3936 Fleamm32.exe 4516 Fenffbog.exe 3420 Fpcjckom.exe 544 Fbbfofnq.exe 4044 Filolqem.exe 4888 Fnhgdgce.exe 4544 Feboaa32.exe 2644 Glmgnlbo.exe 4472 Gfblkdbd.exe 1368 Giqhgp32.exe 4588 Gnmqpg32.exe 1500 Gegilagl.exe 4088 Glaaik32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Gbkieeef.exe Glaaik32.exe File created C:\Windows\SysWOW64\Pdaacjfl.dll Ioglmcib.exe File created C:\Windows\SysWOW64\Dgpcekbo.exe Ddafipck.exe File created C:\Windows\SysWOW64\Qdiokffi.exe Qmofnl32.exe File created C:\Windows\SysWOW64\Heocgcpe.dll Joblhaoe.exe File created C:\Windows\SysWOW64\Dahoqo32.dll Klehcd32.exe File opened for modification C:\Windows\SysWOW64\Ngalhimj.exe Mmlhkqmd.exe File opened for modification C:\Windows\SysWOW64\Ncmfhj32.exe Nmcnkp32.exe File opened for modification C:\Windows\SysWOW64\Oafplmim.exe Ojlhpc32.exe File created C:\Windows\SysWOW64\Ojcnqblh.exe Ojqakbnk.exe File created C:\Windows\SysWOW64\Bcbood32.dll Gnmqpg32.exe File created C:\Windows\SysWOW64\Gbpbqd32.exe Gpafdi32.exe File created C:\Windows\SysWOW64\Donaghmi.exe Dgfifjmg.exe File opened for modification C:\Windows\SysWOW64\Nmcnkp32.exe Nckibjqk.exe File created C:\Windows\SysWOW64\Phkhef32.exe Pdpldgnc.exe File created C:\Windows\SysWOW64\Bhecbb32.exe Bpnkaepm.exe File opened for modification C:\Windows\SysWOW64\Egpllidl.exe Edappn32.exe File created C:\Windows\SysWOW64\Cdkpihfd.dll Hokmaecp.exe File created C:\Windows\SysWOW64\Enabaf32.dll Hiodhn32.exe File created C:\Windows\SysWOW64\Bgpkafbe.dll Nnbjeb32.exe File created C:\Windows\SysWOW64\Phcgei32.dll Ckfejkom.exe File created C:\Windows\SysWOW64\Dodnqied.exe Cdojcpen.exe File created C:\Windows\SysWOW64\Dogaqo32.exe Dklfpqod.exe File created C:\Windows\SysWOW64\Fbbfofnq.exe Fpcjckom.exe File created C:\Windows\SysWOW64\Hmojdl32.exe Hegaco32.exe File created C:\Windows\SysWOW64\Jiajek32.exe Igcnip32.exe File created C:\Windows\SysWOW64\Dknbepma.exe Dhpfienm.exe File created C:\Windows\SysWOW64\Qpeaip32.dll Eocaln32.exe File created C:\Windows\SysWOW64\Lehilecg.dll Edocjn32.exe File created C:\Windows\SysWOW64\Hlhakn32.dll Bomoim32.exe File opened for modification C:\Windows\SysWOW64\Bdnambdq.exe Bmdipi32.exe File opened for modification C:\Windows\SysWOW64\Ckoojl32.exe Chacnq32.exe File created C:\Windows\SysWOW64\Gdhciaop.dll Dfajminj.exe File opened for modification C:\Windows\SysWOW64\Kgecem32.exe Knmolh32.exe File created C:\Windows\SysWOW64\Aghjbk32.dll Kjflgh32.exe File created C:\Windows\SysWOW64\Ddnpledi.dll Nmaafp32.exe File created C:\Windows\SysWOW64\Dibhhdgm.dll Ojqakbnk.exe File opened for modification C:\Windows\SysWOW64\Cncllmdp.exe Chfccfeh.exe File created C:\Windows\SysWOW64\Ebamhi32.exe Eocaln32.exe File created C:\Windows\SysWOW64\Nikjmfli.dll Agfgho32.exe File created C:\Windows\SysWOW64\Enggccnl.exe Egnofi32.exe File created C:\Windows\SysWOW64\Kcmmkl32.dll Bdcjhb32.exe File created C:\Windows\SysWOW64\Qdngkklj.dll Cldlidlo.exe File created C:\Windows\SysWOW64\Gegilagl.exe Gnmqpg32.exe File created C:\Windows\SysWOW64\Jgejnp32.exe Jonbmb32.exe File created C:\Windows\SysWOW64\Ngpphf32.dll Fenffbog.exe File created C:\Windows\SysWOW64\Hofcfe32.exe Hlhgjj32.exe File opened for modification C:\Windows\SysWOW64\Mjibcf32.exe Mgkfgj32.exe File created C:\Windows\SysWOW64\Ofbpccdp.dll Hbdlldmk.exe File opened for modification C:\Windows\SysWOW64\Nfnoje32.exe Nnbjeb32.exe File opened for modification C:\Windows\SysWOW64\Gpojoi32.exe Gmqmcn32.exe File created C:\Windows\SysWOW64\Hmqoji32.dll Gelbgp32.exe File created C:\Windows\SysWOW64\Mgdlkifp.dll Geiebqdj.exe File created C:\Windows\SysWOW64\Cdegmani.exe Cagkafoe.exe File created C:\Windows\SysWOW64\Eeklmjmc.dll Efacdg32.exe File created C:\Windows\SysWOW64\Cgeojn32.dll Mjdihffk.exe File created C:\Windows\SysWOW64\Lmliln32.dll Egpllidl.exe File created C:\Windows\SysWOW64\Ljiilhph.exe Kcoapn32.exe File opened for modification C:\Windows\SysWOW64\Qjecmpkc.exe Qdlkpe32.exe File opened for modification C:\Windows\SysWOW64\Cfjdmj32.exe Cncllmdp.exe File opened for modification C:\Windows\SysWOW64\Gbkieeef.exe Glaaik32.exe File created C:\Windows\SysWOW64\Gpafdi32.exe Gmcjhn32.exe File created C:\Windows\SysWOW64\Iimqjlih.exe Ioglmcib.exe File opened for modification C:\Windows\SysWOW64\Dgfifjmg.exe Dqmqip32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7552 8180 WerFault.exe 350 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfajminj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flcegmji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jejgpl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgacal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbadakjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coeekpip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ioiibcgp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ngalhimj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jglqoo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apibfecb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daegbd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckbcjbgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbnfke32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbiegc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aojbcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilkmfghl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jgejnp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmhpmmed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfejakhg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glmgnlbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hofcfe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hlkdoj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfhpnh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mqcjppib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bomoim32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onqffqbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cblkfl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Giqhgp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Geiebqdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmhccmod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emgafa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mohgalnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fnaadiim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hejninfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eoenbmkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mgmbmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aohenmnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dqmqip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogbeogog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdpldgnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cohoekpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhpfienm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enmgiinb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gegilagl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ioglmcib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dklfpqod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmeaja32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cneagf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdcjhb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chelipbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpojoi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmojdl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfpjai32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qjecmpkc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eocaln32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eklogn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgecem32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fbbfofnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phkhef32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Paheikig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dqomop32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddfgof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmplebaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loodknfe.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjjehg32.dll" Aabhoiam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kgecem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lchcfmqq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ddicdeao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bpnkaepm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qonjidoj.dll" Hblblcgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daegbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dagdhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Enggccnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddfgof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgdlkifp.dll" Geiebqdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ippbfgfm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Babafg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ebdjnijq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdodkl32.dll" Hbiegc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhhjjinc.dll" Ljmbgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibikekhk.dll" Nmcnkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Phkhef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjaoenni.dll" Bogija32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jiglpb32.dll" Eiblfbmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hionap32.dll" Nfnoje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pdpldgnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffffcnam.dll" Baeefmdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebmblpel.dll" Lnkknfbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgmpmdnf.dll" Ilipqhjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aohenmnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ekgnahak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Doofdejj.dll" Ekgnahak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnqpnf32.dll" Gpojoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmpifgio.dll" Hechhomo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eoenbmkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oojpbg32.dll" Eklogn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbidoqpa.dll" Iolfhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lqenob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Njbeid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Banhkhgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgmfohgk.dll" Dagdhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpipfp32.dll" Hlhgjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ebqfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diebpcao.dll" Eopnlgkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ogbeogog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hbbofdpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgebmd32.dll" Lgacal32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Phkhef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lcanen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qdiokffi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iiomol32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Klkfmeji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qmacckmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lljeojkf.dll" Bdnambdq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ckfejkom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jicgjkbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khkdbf32.dll" Klkfmeji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hechhomo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ipbokgdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ojcnqblh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdpldgnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Klkfmeji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Joiqbc32.dll" Dknbepma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mmlhkqmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dklfpqod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jonbmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qmofnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qmacckmi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3536 wrote to memory of 4676 3536 5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b.exe 84 PID 3536 wrote to memory of 4676 3536 5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b.exe 84 PID 3536 wrote to memory of 4676 3536 5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b.exe 84 PID 4676 wrote to memory of 2208 4676 Bdadmi32.exe 85 PID 4676 wrote to memory of 2208 4676 Bdadmi32.exe 85 PID 4676 wrote to memory of 2208 4676 Bdadmi32.exe 85 PID 2208 wrote to memory of 2032 2208 Bogija32.exe 86 PID 2208 wrote to memory of 2032 2208 Bogija32.exe 86 PID 2208 wrote to memory of 2032 2208 Bogija32.exe 86 PID 2032 wrote to memory of 2988 2032 Baeefmdc.exe 88 PID 2032 wrote to memory of 2988 2032 Baeefmdc.exe 88 PID 2032 wrote to memory of 2988 2032 Baeefmdc.exe 88 PID 2988 wrote to memory of 4304 2988 Bhombg32.exe 89 PID 2988 wrote to memory of 4304 2988 Bhombg32.exe 89 PID 2988 wrote to memory of 4304 2988 Bhombg32.exe 89 PID 4304 wrote to memory of 4532 4304 Boieoacm.exe 90 PID 4304 wrote to memory of 4532 4304 Boieoacm.exe 90 PID 4304 wrote to memory of 4532 4304 Boieoacm.exe 90 PID 4532 wrote to memory of 2028 4532 Cfcnlk32.exe 91 PID 4532 wrote to memory of 2028 4532 Cfcnlk32.exe 91 PID 4532 wrote to memory of 2028 4532 Cfcnlk32.exe 91 PID 2028 wrote to memory of 4820 2028 Clmfiebf.exe 92 PID 2028 wrote to memory of 4820 2028 Clmfiebf.exe 92 PID 2028 wrote to memory of 4820 2028 Clmfiebf.exe 92 PID 4820 wrote to memory of 392 4820 Cnnbqn32.exe 93 PID 4820 wrote to memory of 392 4820 Cnnbqn32.exe 93 PID 4820 wrote to memory of 392 4820 Cnnbqn32.exe 93 PID 392 wrote to memory of 4444 392 Cfejakhg.exe 94 PID 392 wrote to memory of 4444 392 Cfejakhg.exe 94 PID 392 wrote to memory of 4444 392 Cfejakhg.exe 94 PID 4444 wrote to memory of 2992 4444 Ckbcjbgo.exe 96 PID 4444 wrote to memory of 2992 4444 Ckbcjbgo.exe 96 PID 4444 wrote to memory of 2992 4444 Ckbcjbgo.exe 96 PID 2992 wrote to memory of 632 2992 Cblkfl32.exe 97 PID 2992 wrote to memory of 632 2992 Cblkfl32.exe 97 PID 2992 wrote to memory of 632 2992 Cblkfl32.exe 97 PID 632 wrote to memory of 2268 632 Chfccfeh.exe 98 PID 632 wrote to memory of 2268 632 Chfccfeh.exe 98 PID 632 wrote to memory of 2268 632 Chfccfeh.exe 98 PID 2268 wrote to memory of 2212 2268 Cncllmdp.exe 99 PID 2268 wrote to memory of 2212 2268 Cncllmdp.exe 99 PID 2268 wrote to memory of 2212 2268 Cncllmdp.exe 99 PID 2212 wrote to memory of 3048 2212 Cfjdmj32.exe 101 PID 2212 wrote to memory of 3048 2212 Cfjdmj32.exe 101 PID 2212 wrote to memory of 3048 2212 Cfjdmj32.exe 101 PID 3048 wrote to memory of 916 3048 Cldlidlo.exe 102 PID 3048 wrote to memory of 916 3048 Cldlidlo.exe 102 PID 3048 wrote to memory of 916 3048 Cldlidlo.exe 102 PID 916 wrote to memory of 1060 916 Cbadakjf.exe 103 PID 916 wrote to memory of 1060 916 Cbadakjf.exe 103 PID 916 wrote to memory of 1060 916 Cbadakjf.exe 103 PID 1060 wrote to memory of 3852 1060 Clfiodjl.exe 104 PID 1060 wrote to memory of 3852 1060 Clfiodjl.exe 104 PID 1060 wrote to memory of 3852 1060 Clfiodjl.exe 104 PID 3852 wrote to memory of 3056 3852 Coeekpip.exe 105 PID 3852 wrote to memory of 3056 3852 Coeekpip.exe 105 PID 3852 wrote to memory of 3056 3852 Coeekpip.exe 105 PID 3056 wrote to memory of 4524 3056 Ddamcfgg.exe 106 PID 3056 wrote to memory of 4524 3056 Ddamcfgg.exe 106 PID 3056 wrote to memory of 4524 3056 Ddamcfgg.exe 106 PID 4524 wrote to memory of 1732 4524 Dhmidepp.exe 107 PID 4524 wrote to memory of 1732 4524 Dhmidepp.exe 107 PID 4524 wrote to memory of 1732 4524 Dhmidepp.exe 107 PID 1732 wrote to memory of 1280 1732 Dklfpqod.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b.exe"C:\Users\Admin\AppData\Local\Temp\5b14a002bdb670136fcd33076420fc6be1105f232e92dbd6efe8f4027838952b.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\Bdadmi32.exeC:\Windows\system32\Bdadmi32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\Bogija32.exeC:\Windows\system32\Bogija32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\Baeefmdc.exeC:\Windows\system32\Baeefmdc.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\Bhombg32.exeC:\Windows\system32\Bhombg32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\Boieoacm.exeC:\Windows\system32\Boieoacm.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\Cfcnlk32.exeC:\Windows\system32\Cfcnlk32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\Clmfiebf.exeC:\Windows\system32\Clmfiebf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Cnnbqn32.exeC:\Windows\system32\Cnnbqn32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\Cfejakhg.exeC:\Windows\system32\Cfejakhg.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\Ckbcjbgo.exeC:\Windows\system32\Ckbcjbgo.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\Cblkfl32.exeC:\Windows\system32\Cblkfl32.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\Chfccfeh.exeC:\Windows\system32\Chfccfeh.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\Cncllmdp.exeC:\Windows\system32\Cncllmdp.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\Cfjdmj32.exeC:\Windows\system32\Cfjdmj32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\Cldlidlo.exeC:\Windows\system32\Cldlidlo.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Cbadakjf.exeC:\Windows\system32\Cbadakjf.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\Clfiodjl.exeC:\Windows\system32\Clfiodjl.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\Coeekpip.exeC:\Windows\system32\Coeekpip.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\Ddamcfgg.exeC:\Windows\system32\Ddamcfgg.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\Dhmidepp.exeC:\Windows\system32\Dhmidepp.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\Dklfpqod.exeC:\Windows\system32\Dklfpqod.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\Dogaqo32.exeC:\Windows\system32\Dogaqo32.exe23⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\Dnjbllng.exeC:\Windows\system32\Dnjbllng.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Dfajminj.exeC:\Windows\system32\Dfajminj.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Windows\SysWOW64\Dhpfienm.exeC:\Windows\system32\Dhpfienm.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:636 -
C:\Windows\SysWOW64\Dknbepma.exeC:\Windows\system32\Dknbepma.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\Ddfgof32.exeC:\Windows\system32\Ddfgof32.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1172 -
C:\Windows\SysWOW64\Dmnopcdd.exeC:\Windows\system32\Dmnopcdd.exe29⤵
- Executes dropped EXE
PID:4736 -
C:\Windows\SysWOW64\Dffchi32.exeC:\Windows\system32\Dffchi32.exe30⤵
- Executes dropped EXE
PID:724 -
C:\Windows\SysWOW64\Ddicdeao.exeC:\Windows\system32\Ddicdeao.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:4364 -
C:\Windows\SysWOW64\Dmplebaa.exeC:\Windows\system32\Dmplebaa.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4168 -
C:\Windows\SysWOW64\Dfhpnh32.exeC:\Windows\system32\Dfhpnh32.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3080 -
C:\Windows\SysWOW64\Eboqci32.exeC:\Windows\system32\Eboqci32.exe34⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\Emdepb32.exeC:\Windows\system32\Emdepb32.exe35⤵
- Executes dropped EXE
PID:2488 -
C:\Windows\SysWOW64\Eocaln32.exeC:\Windows\system32\Eocaln32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\Ebamhi32.exeC:\Windows\system32\Ebamhi32.exe37⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\SysWOW64\Emgafa32.exeC:\Windows\system32\Emgafa32.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\Eoenbmkm.exeC:\Windows\system32\Eoenbmkm.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4144 -
C:\Windows\SysWOW64\Ebdjnijq.exeC:\Windows\system32\Ebdjnijq.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:3600 -
C:\Windows\SysWOW64\Einbkb32.exeC:\Windows\system32\Einbkb32.exe41⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\Eklogn32.exeC:\Windows\system32\Eklogn32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:868 -
C:\Windows\SysWOW64\Efacdg32.exeC:\Windows\system32\Efacdg32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3548 -
C:\Windows\SysWOW64\Eknkmn32.exeC:\Windows\system32\Eknkmn32.exe44⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Enmgiinb.exeC:\Windows\system32\Enmgiinb.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\Eiblfbmh.exeC:\Windows\system32\Eiblfbmh.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:684 -
C:\Windows\SysWOW64\Ekahbnll.exeC:\Windows\system32\Ekahbnll.exe47⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\Fbkpog32.exeC:\Windows\system32\Fbkpog32.exe48⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\Ffflofla.exeC:\Windows\system32\Ffflofla.exe49⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Flcegmji.exeC:\Windows\system32\Flcegmji.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Windows\SysWOW64\Fnaadiim.exeC:\Windows\system32\Fnaadiim.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Windows\SysWOW64\Figeaa32.exeC:\Windows\system32\Figeaa32.exe52⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Fleamm32.exeC:\Windows\system32\Fleamm32.exe53⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\Fenffbog.exeC:\Windows\system32\Fenffbog.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4516 -
C:\Windows\SysWOW64\Fpcjckom.exeC:\Windows\system32\Fpcjckom.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3420 -
C:\Windows\SysWOW64\Fbbfofnq.exeC:\Windows\system32\Fbbfofnq.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:544 -
C:\Windows\SysWOW64\Filolqem.exeC:\Windows\system32\Filolqem.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\Fnhgdgce.exeC:\Windows\system32\Fnhgdgce.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4888 -
C:\Windows\SysWOW64\Feboaa32.exeC:\Windows\system32\Feboaa32.exe59⤵
- Executes dropped EXE
PID:4544 -
C:\Windows\SysWOW64\Glmgnlbo.exeC:\Windows\system32\Glmgnlbo.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\Gfblkdbd.exeC:\Windows\system32\Gfblkdbd.exe61⤵
- Executes dropped EXE
PID:4472 -
C:\Windows\SysWOW64\Giqhgp32.exeC:\Windows\system32\Giqhgp32.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\Gnmqpg32.exeC:\Windows\system32\Gnmqpg32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4588 -
C:\Windows\SysWOW64\Gegilagl.exeC:\Windows\system32\Gegilagl.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\SysWOW64\Glaaik32.exeC:\Windows\system32\Glaaik32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4088 -
C:\Windows\SysWOW64\Gbkieeef.exeC:\Windows\system32\Gbkieeef.exe66⤵PID:2372
-
C:\Windows\SysWOW64\Geiebqdj.exeC:\Windows\system32\Geiebqdj.exe67⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4020 -
C:\Windows\SysWOW64\Gmqmcn32.exeC:\Windows\system32\Gmqmcn32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4232 -
C:\Windows\SysWOW64\Gpojoi32.exeC:\Windows\system32\Gpojoi32.exe69⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1320 -
C:\Windows\SysWOW64\Gbnfke32.exeC:\Windows\system32\Gbnfke32.exe70⤵
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\SysWOW64\Gelbgp32.exeC:\Windows\system32\Gelbgp32.exe71⤵
- Drops file in System32 directory
PID:1520 -
C:\Windows\SysWOW64\Gmcjhn32.exeC:\Windows\system32\Gmcjhn32.exe72⤵
- Drops file in System32 directory
PID:4764 -
C:\Windows\SysWOW64\Gpafdi32.exeC:\Windows\system32\Gpafdi32.exe73⤵
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\Gbpbqd32.exeC:\Windows\system32\Gbpbqd32.exe74⤵PID:3592
-
C:\Windows\SysWOW64\Genomp32.exeC:\Windows\system32\Genomp32.exe75⤵PID:1080
-
C:\Windows\SysWOW64\Hmegnmaf.exeC:\Windows\system32\Hmegnmaf.exe76⤵PID:2860
-
C:\Windows\SysWOW64\Hlhgjj32.exeC:\Windows\system32\Hlhgjj32.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:364 -
C:\Windows\SysWOW64\Hofcfe32.exeC:\Windows\system32\Hofcfe32.exe78⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\Hbbofdpn.exeC:\Windows\system32\Hbbofdpn.exe79⤵
- Modifies registry class
PID:5036 -
C:\Windows\SysWOW64\Heqlbpoa.exeC:\Windows\system32\Heqlbpoa.exe80⤵PID:3860
-
C:\Windows\SysWOW64\Hmhccmod.exeC:\Windows\system32\Hmhccmod.exe81⤵
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\Hlkdoj32.exeC:\Windows\system32\Hlkdoj32.exe82⤵
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\SysWOW64\Hbdlldmk.exeC:\Windows\system32\Hbdlldmk.exe83⤵
- Drops file in System32 directory
PID:3328 -
C:\Windows\SysWOW64\Hechhomo.exeC:\Windows\system32\Hechhomo.exe84⤵
- Modifies registry class
PID:4236 -
C:\Windows\SysWOW64\Hiodhn32.exeC:\Windows\system32\Hiodhn32.exe85⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\Hlmqdi32.exeC:\Windows\system32\Hlmqdi32.exe86⤵PID:1340
-
C:\Windows\SysWOW64\Hokmaecp.exeC:\Windows\system32\Hokmaecp.exe87⤵
- Drops file in System32 directory
PID:676 -
C:\Windows\SysWOW64\Heeeno32.exeC:\Windows\system32\Heeeno32.exe88⤵PID:1512
-
C:\Windows\SysWOW64\Hmlmol32.exeC:\Windows\system32\Hmlmol32.exe89⤵PID:4640
-
C:\Windows\SysWOW64\Hbiegc32.exeC:\Windows\system32\Hbiegc32.exe90⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5156 -
C:\Windows\SysWOW64\Hegaco32.exeC:\Windows\system32\Hegaco32.exe91⤵
- Drops file in System32 directory
PID:5196 -
C:\Windows\SysWOW64\Hmojdl32.exeC:\Windows\system32\Hmojdl32.exe92⤵
- System Location Discovery: System Language Discovery
PID:5240 -
C:\Windows\SysWOW64\Hpmfpg32.exeC:\Windows\system32\Hpmfpg32.exe93⤵PID:5280
-
C:\Windows\SysWOW64\Hblblcgc.exeC:\Windows\system32\Hblblcgc.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5320 -
C:\Windows\SysWOW64\Hejninfg.exeC:\Windows\system32\Hejninfg.exe95⤵
- System Location Discovery: System Language Discovery
PID:5364 -
C:\Windows\SysWOW64\Imafjlgi.exeC:\Windows\system32\Imafjlgi.exe96⤵PID:5408
-
C:\Windows\SysWOW64\Ippbfgfm.exeC:\Windows\system32\Ippbfgfm.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5452 -
C:\Windows\SysWOW64\Ielknndd.exeC:\Windows\system32\Ielknndd.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5496 -
C:\Windows\SysWOW64\Imccokef.exeC:\Windows\system32\Imccokef.exe99⤵PID:5556
-
C:\Windows\SysWOW64\Ipbokgdj.exeC:\Windows\system32\Ipbokgdj.exe100⤵
- Modifies registry class
PID:5600 -
C:\Windows\SysWOW64\Ibplgb32.exeC:\Windows\system32\Ibplgb32.exe101⤵PID:5660
-
C:\Windows\SysWOW64\Ieohdn32.exeC:\Windows\system32\Ieohdn32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5716 -
C:\Windows\SysWOW64\Ilipqhjo.exeC:\Windows\system32\Ilipqhjo.exe103⤵
- Modifies registry class
PID:5776 -
C:\Windows\SysWOW64\Ioglmcib.exeC:\Windows\system32\Ioglmcib.exe104⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5828 -
C:\Windows\SysWOW64\Iimqjlih.exeC:\Windows\system32\Iimqjlih.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5876 -
C:\Windows\SysWOW64\Ilkmfghl.exeC:\Windows\system32\Ilkmfghl.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:5936 -
C:\Windows\SysWOW64\Ioiibcgp.exeC:\Windows\system32\Ioiibcgp.exe107⤵
- System Location Discovery: System Language Discovery
PID:6012 -
C:\Windows\SysWOW64\Igqacp32.exeC:\Windows\system32\Igqacp32.exe108⤵PID:6088
-
C:\Windows\SysWOW64\Iiomol32.exeC:\Windows\system32\Iiomol32.exe109⤵
- Modifies registry class
PID:6132 -
C:\Windows\SysWOW64\Ilmilg32.exeC:\Windows\system32\Ilmilg32.exe110⤵PID:5184
-
C:\Windows\SysWOW64\Iolfhb32.exeC:\Windows\system32\Iolfhb32.exe111⤵
- Modifies registry class
PID:5256 -
C:\Windows\SysWOW64\Igcnip32.exeC:\Windows\system32\Igcnip32.exe112⤵
- Drops file in System32 directory
PID:5336 -
C:\Windows\SysWOW64\Jiajek32.exeC:\Windows\system32\Jiajek32.exe113⤵PID:5420
-
C:\Windows\SysWOW64\Jlpfag32.exeC:\Windows\system32\Jlpfag32.exe114⤵PID:5492
-
C:\Windows\SysWOW64\Jonbmb32.exeC:\Windows\system32\Jonbmb32.exe115⤵
- Drops file in System32 directory
- Modifies registry class
PID:5584 -
C:\Windows\SysWOW64\Jgejnp32.exeC:\Windows\system32\Jgejnp32.exe116⤵
- System Location Discovery: System Language Discovery
PID:5668 -
C:\Windows\SysWOW64\Jicgjkbp.exeC:\Windows\system32\Jicgjkbp.exe117⤵
- Modifies registry class
PID:5748 -
C:\Windows\SysWOW64\Jlbcgfad.exeC:\Windows\system32\Jlbcgfad.exe118⤵PID:5840
-
C:\Windows\SysWOW64\Jopocbag.exeC:\Windows\system32\Jopocbag.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5928 -
C:\Windows\SysWOW64\Jejgpl32.exeC:\Windows\system32\Jejgpl32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:6032 -
C:\Windows\SysWOW64\Joblhaoe.exeC:\Windows\system32\Joblhaoe.exe121⤵
- Drops file in System32 directory
PID:6120 -
C:\Windows\SysWOW64\Jndlfigd.exeC:\Windows\system32\Jndlfigd.exe122⤵PID:5236
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-