Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:01
Static task
static1
Behavioral task
behavioral1
Sample
213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631.exe
Resource
win10v2004-20240730-en
General
-
Target
213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631.exe
-
Size
93KB
-
MD5
a1ce73cdab67a387afdaa5a096d203eb
-
SHA1
c189066059e57d823d0c6e0fe79f6c3af47830c7
-
SHA256
213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631
-
SHA512
b99d80aed9b8236ddc9379a8dcc3916a622883804b98932f57e98eba4b7ddc9cd7efa508e8fbf3bae7541da5cc8d4763c7e18e66e100ea46fcd26250a943620d
-
SSDEEP
1536:k4c73PraAqisg8dYQKH4oDRaB6UOyPWj8noXzmHvs74T4jiwg58:hZAqisgvPL8noX8vu4cY58
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmcceolb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ldfjbkbg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdchho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gapdkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ihfejdgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ljffjh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjkppc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amcdoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fpjaplgd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhamdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ikfgaipa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipjlca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikamfi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbfhkfib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ljhcpgpe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cccdii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efbjlbih.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jphieo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nhqoqbik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nlohgqpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aijedi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fibfiame.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hneaam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jjogbk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Affomo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfieil32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmklmb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emflia32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Palife32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahekijbj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjopiihp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bjdjodgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fddffd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oihopa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocemdfdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mlofji32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckmmgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glgake32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hdqoip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plmdhoca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgkpne32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdopgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kqflqc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbbmga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gkhhdc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olfebf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fbejlado.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kneldaab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jkbfmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Peehadjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Giiljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iagcbjcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Legala32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jgdngi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jkbmhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mhamdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mjlepqid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndjlkcml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oabfpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phlibkje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhpgqboa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfbaed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fpndae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mahkbjnn.exe -
Executes dropped EXE 64 IoCs
pid Process 2132 Niaipbhe.exe 4524 Nlpelmgi.exe 4576 Ncjnhg32.exe 1268 Nehjdc32.exe 760 Nhffqnlm.exe 3412 Ncljnglc.exe 1036 Nifbka32.exe 1980 Oockch32.exe 1160 Ocogcgjp.exe 4516 Oihopa32.exe 3180 Olglllqq.exe 4184 Ocadif32.exe 552 Oeopeb32.exe 1288 Oiklfqpj.exe 180 Olihblon.exe 3400 Occqof32.exe 3092 Oeamka32.exe 212 Olleglmk.exe 3484 Ocemdfdh.exe 380 Ogaied32.exe 3424 Olnbmk32.exe 2276 Ochjjebe.exe 2140 Phdbblpm.exe 2876 Pcjgoe32.exe 2992 Pfhckq32.exe 3192 Ppngii32.exe 4036 Pcmcee32.exe 4948 Philml32.exe 1504 Pfmlfpka.exe 2528 Phlibkje.exe 4752 Ppcqdikg.exe 3704 Poeaoe32.exe 4512 Pjkemn32.exe 4348 Pljaij32.exe 940 Pohnee32.exe 4600 Pgoefbpa.exe 2156 Qfbfao32.exe 3108 Qhpbnk32.exe 5064 Qqgjoh32.exe 4312 Qcffkc32.exe 1864 Qfdbgo32.exe 8 Qhbocj32.exe 3880 Qqjgdh32.exe 3700 Qchcqc32.exe 3812 Affomo32.exe 3096 Ahekijbj.exe 1960 Aqlcjgbl.exe 2268 Agflga32.exe 2532 Afilbnad.exe 228 Amcdoh32.exe 3120 Acmllbpm.exe 1936 Aijedi32.exe 1468 Ameadhfn.exe 3476 Aocmqcea.exe 1452 Ajianleg.exe 5008 Ailaii32.exe 436 Aofjfcco.exe 3196 Afpbcm32.exe 2732 Aqefpfkb.exe 4316 Bgpomp32.exe 3916 Bjnkik32.exe 4360 Bmlgeg32.exe 2128 Bfeknmgf.exe 3644 Bichjhfj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Pacfaj32.exe Pkindqem.exe File opened for modification C:\Windows\SysWOW64\Ajkgiepi.exe Afokhg32.exe File opened for modification C:\Windows\SysWOW64\Bkopfmce.exe Bllpkq32.exe File opened for modification C:\Windows\SysWOW64\Fbejlado.exe Fpfnpfek.exe File created C:\Windows\SysWOW64\Kkgphfbo.exe Kcphgi32.exe File created C:\Windows\SysWOW64\Fcbhjlif.dll Mekmdhpo.exe File created C:\Windows\SysWOW64\Beaacp32.exe Bnjibc32.exe File opened for modification C:\Windows\SysWOW64\Pljaij32.exe Pjkemn32.exe File created C:\Windows\SysWOW64\Doppdj32.dll Kglkbn32.exe File created C:\Windows\SysWOW64\Dmqbmn32.exe Djbfqb32.exe File created C:\Windows\SysWOW64\Mjimchca.dll Aajegccf.exe File created C:\Windows\SysWOW64\Akgckhfa.exe Ahhgomgm.exe File created C:\Windows\SysWOW64\Ooajlenp.dll Cahlmc32.exe File opened for modification C:\Windows\SysWOW64\Nlhhqhie.exe Nijldmja.exe File created C:\Windows\SysWOW64\Lnbifmbc.dll Neglpf32.exe File created C:\Windows\SysWOW64\Meibcipd.dll Pohnee32.exe File opened for modification C:\Windows\SysWOW64\Nlakgfaj.exe Nicokkbf.exe File created C:\Windows\SysWOW64\Oelmeleh.exe Obnpiqfd.exe File created C:\Windows\SysWOW64\Agflga32.exe Aqlcjgbl.exe File created C:\Windows\SysWOW64\Okghhcfb.exe Ohhllhgo.exe File created C:\Windows\SysWOW64\Bfkkde32.exe Boabgkef.exe File created C:\Windows\SysWOW64\Lkdjpi32.dll Efbjlbih.exe File opened for modification C:\Windows\SysWOW64\Gbcfno32.exe Gikbej32.exe File created C:\Windows\SysWOW64\Dodoeond.dll Hmpqlgam.exe File created C:\Windows\SysWOW64\Bokhcg32.dll Kmepjojp.exe File created C:\Windows\SysWOW64\Imijde32.dll Nabmiifc.exe File created C:\Windows\SysWOW64\Ogaied32.exe Ocemdfdh.exe File opened for modification C:\Windows\SysWOW64\Bqoifd32.exe Bihaeg32.exe File opened for modification C:\Windows\SysWOW64\Jbjiohco.exe Jjcqnjbm.exe File created C:\Windows\SysWOW64\Nicokkbf.exe Nalginad.exe File created C:\Windows\SysWOW64\Pacfaj32.exe Pkindqem.exe File opened for modification C:\Windows\SysWOW64\Odnffb32.exe Oapjjg32.exe File created C:\Windows\SysWOW64\Egddmpgp.dll Olhkmo32.exe File created C:\Windows\SysWOW64\Kmffmj32.dll Hgkidbjf.exe File opened for modification C:\Windows\SysWOW64\Inndgk32.exe Ikpgkp32.exe File opened for modification C:\Windows\SysWOW64\Iibalfmd.exe Igcdpknp.exe File created C:\Windows\SysWOW64\Blhmkkqm.dll Ighnkj32.exe File created C:\Windows\SysWOW64\Hcppmo32.dll Bichjhfj.exe File opened for modification C:\Windows\SysWOW64\Cmgpfo32.exe Cilcfpjd.exe File created C:\Windows\SysWOW64\Pedoen32.dll Gbnmbpld.exe File created C:\Windows\SysWOW64\Ffdhhebe.dll Ijgjgf32.exe File created C:\Windows\SysWOW64\Delbpa32.dll Kneldaab.exe File opened for modification C:\Windows\SysWOW64\Pommjj32.exe Phcempie.exe File created C:\Windows\SysWOW64\Pboanh32.dll Nagnno32.exe File created C:\Windows\SysWOW64\Hicoglhe.dll Lckgcggo.exe File created C:\Windows\SysWOW64\Onodknjp.dll Ciogff32.exe File created C:\Windows\SysWOW64\Efhjag32.exe Eakaiq32.exe File opened for modification C:\Windows\SysWOW64\Najjdncg.exe Nhafkimf.exe File opened for modification C:\Windows\SysWOW64\Pclmjn32.exe Pkedia32.exe File created C:\Windows\SysWOW64\Cihcee32.dll Cfdnjd32.exe File created C:\Windows\SysWOW64\Ikbjod32.dll Giokpimi.exe File opened for modification C:\Windows\SysWOW64\Oilbajjl.exe Oeafpk32.exe File opened for modification C:\Windows\SysWOW64\Bjmdoe32.exe Bbflmhmd.exe File opened for modification C:\Windows\SysWOW64\Dfigecac.exe Doooii32.exe File created C:\Windows\SysWOW64\Mklbjcpf.exe Mebjni32.exe File opened for modification C:\Windows\SysWOW64\Boqlmebj.exe Bhfcpk32.exe File created C:\Windows\SysWOW64\Aenpoiia.dll Kngijaop.exe File created C:\Windows\SysWOW64\Cfkiohie.dll Peehadjb.exe File created C:\Windows\SysWOW64\Qkkdojpo.exe Qhmgcnak.exe File created C:\Windows\SysWOW64\Lnfmcbdo.dll Nofemc32.exe File created C:\Windows\SysWOW64\Lkjddfli.dll Gbhpiodj.exe File created C:\Windows\SysWOW64\Jibmmmoe.dll Boqlmebj.exe File opened for modification C:\Windows\SysWOW64\Oijekjlo.exe Oacmjm32.exe File created C:\Windows\SysWOW64\Gikbej32.exe Gflein32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 12936 12492 WerFault.exe 699 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdaagl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Penkgc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qaelld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beaacp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ekjlbejp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjdleo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oelmeleh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcfeajig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihfejdgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajadcghd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fpfnpfek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbcfno32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mgbcod32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nepfog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdfhec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Legala32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlabpi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlflkhkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbhpiodj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qchcqc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cahlmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iagcbjcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beodnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhompl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbjiohco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emakcklp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njokmnho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kknfie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phlibkje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cakibchj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmbfkpfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hhmbdeof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgipie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlgafaei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mankhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Epkndg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Biedpg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bijnkgpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gdammiep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Akqdeo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idloeo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emflia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnbdlm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oodana32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ameadhfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Labkla32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpmfbkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfjdjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Najjdncg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emfeok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhqoqbik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmokgk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fibfiame.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Megjcohp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgpmcg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qklkjpcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glpdad32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aajegccf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikpgkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ailaii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daaocb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmbkeoai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnbkadln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aaofmi32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ikdafofp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajfnnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cmgpfo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mnadgn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jdfakm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ppcqdikg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikdnfiag.dll" Hacjgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Akqdeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hanbif32.dll" Glgake32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcoofe32.dll" Lneekp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Meibcipd.dll" Pohnee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mlofji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bgpomp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bajnna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daaocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pmnqpg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Occqof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hacjgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mclpje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhompl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lbkafe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abejnn32.dll" Mmkbllhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jbmedgal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lbahfdod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bkcjam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ldfjbkbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nlgafaei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Icfljmhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gneafcnc.dll" Kgigbhlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Palife32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jqpfpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imiaalih.dll" Mnbkadln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cccdii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pklimnpi.dll" Dmqbmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Acobgljo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dfigecac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpbmij32.dll" Kmmekndg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Blmffj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecbihqfa.dll" Gibopo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ikgnlo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pcipeolg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kdmnfb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ckafbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hikklg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oapjjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Phcempie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Philml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hqknhdjo.dll" Doooii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igidni32.dll" Inkpge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Beodnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oeipja32.dll" Aijedi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajianleg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nagnno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jlgcia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndlgej32.dll" Lnqkppge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkmfkc32.dll" Ladhba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jdahpneo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mjaokp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngfcfho.dll" Cfnndkol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fibfiame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gajkdgog.dll" Hgilocli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eckcpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mebjni32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 2132 4788 213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631.exe 83 PID 4788 wrote to memory of 2132 4788 213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631.exe 83 PID 4788 wrote to memory of 2132 4788 213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631.exe 83 PID 2132 wrote to memory of 4524 2132 Niaipbhe.exe 85 PID 2132 wrote to memory of 4524 2132 Niaipbhe.exe 85 PID 2132 wrote to memory of 4524 2132 Niaipbhe.exe 85 PID 4524 wrote to memory of 4576 4524 Nlpelmgi.exe 86 PID 4524 wrote to memory of 4576 4524 Nlpelmgi.exe 86 PID 4524 wrote to memory of 4576 4524 Nlpelmgi.exe 86 PID 4576 wrote to memory of 1268 4576 Ncjnhg32.exe 87 PID 4576 wrote to memory of 1268 4576 Ncjnhg32.exe 87 PID 4576 wrote to memory of 1268 4576 Ncjnhg32.exe 87 PID 1268 wrote to memory of 760 1268 Nehjdc32.exe 88 PID 1268 wrote to memory of 760 1268 Nehjdc32.exe 88 PID 1268 wrote to memory of 760 1268 Nehjdc32.exe 88 PID 760 wrote to memory of 3412 760 Nhffqnlm.exe 89 PID 760 wrote to memory of 3412 760 Nhffqnlm.exe 89 PID 760 wrote to memory of 3412 760 Nhffqnlm.exe 89 PID 3412 wrote to memory of 1036 3412 Ncljnglc.exe 91 PID 3412 wrote to memory of 1036 3412 Ncljnglc.exe 91 PID 3412 wrote to memory of 1036 3412 Ncljnglc.exe 91 PID 1036 wrote to memory of 1980 1036 Nifbka32.exe 92 PID 1036 wrote to memory of 1980 1036 Nifbka32.exe 92 PID 1036 wrote to memory of 1980 1036 Nifbka32.exe 92 PID 1980 wrote to memory of 1160 1980 Oockch32.exe 93 PID 1980 wrote to memory of 1160 1980 Oockch32.exe 93 PID 1980 wrote to memory of 1160 1980 Oockch32.exe 93 PID 1160 wrote to memory of 4516 1160 Ocogcgjp.exe 94 PID 1160 wrote to memory of 4516 1160 Ocogcgjp.exe 94 PID 1160 wrote to memory of 4516 1160 Ocogcgjp.exe 94 PID 4516 wrote to memory of 3180 4516 Oihopa32.exe 95 PID 4516 wrote to memory of 3180 4516 Oihopa32.exe 95 PID 4516 wrote to memory of 3180 4516 Oihopa32.exe 95 PID 3180 wrote to memory of 4184 3180 Olglllqq.exe 96 PID 3180 wrote to memory of 4184 3180 Olglllqq.exe 96 PID 3180 wrote to memory of 4184 3180 Olglllqq.exe 96 PID 4184 wrote to memory of 552 4184 Ocadif32.exe 97 PID 4184 wrote to memory of 552 4184 Ocadif32.exe 97 PID 4184 wrote to memory of 552 4184 Ocadif32.exe 97 PID 552 wrote to memory of 1288 552 Oeopeb32.exe 98 PID 552 wrote to memory of 1288 552 Oeopeb32.exe 98 PID 552 wrote to memory of 1288 552 Oeopeb32.exe 98 PID 1288 wrote to memory of 180 1288 Oiklfqpj.exe 99 PID 1288 wrote to memory of 180 1288 Oiklfqpj.exe 99 PID 1288 wrote to memory of 180 1288 Oiklfqpj.exe 99 PID 180 wrote to memory of 3400 180 Olihblon.exe 100 PID 180 wrote to memory of 3400 180 Olihblon.exe 100 PID 180 wrote to memory of 3400 180 Olihblon.exe 100 PID 3400 wrote to memory of 3092 3400 Occqof32.exe 101 PID 3400 wrote to memory of 3092 3400 Occqof32.exe 101 PID 3400 wrote to memory of 3092 3400 Occqof32.exe 101 PID 3092 wrote to memory of 212 3092 Oeamka32.exe 102 PID 3092 wrote to memory of 212 3092 Oeamka32.exe 102 PID 3092 wrote to memory of 212 3092 Oeamka32.exe 102 PID 212 wrote to memory of 3484 212 Olleglmk.exe 103 PID 212 wrote to memory of 3484 212 Olleglmk.exe 103 PID 212 wrote to memory of 3484 212 Olleglmk.exe 103 PID 3484 wrote to memory of 380 3484 Ocemdfdh.exe 104 PID 3484 wrote to memory of 380 3484 Ocemdfdh.exe 104 PID 3484 wrote to memory of 380 3484 Ocemdfdh.exe 104 PID 380 wrote to memory of 3424 380 Ogaied32.exe 105 PID 380 wrote to memory of 3424 380 Ogaied32.exe 105 PID 380 wrote to memory of 3424 380 Ogaied32.exe 105 PID 3424 wrote to memory of 2276 3424 Olnbmk32.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631.exe"C:\Users\Admin\AppData\Local\Temp\213df9dfc0a1f092e0b1c31287139ac8f6a95e88796640d9693d6bcda0b37631.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Niaipbhe.exeC:\Windows\system32\Niaipbhe.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Nlpelmgi.exeC:\Windows\system32\Nlpelmgi.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\Ncjnhg32.exeC:\Windows\system32\Ncjnhg32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\Nehjdc32.exeC:\Windows\system32\Nehjdc32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Nhffqnlm.exeC:\Windows\system32\Nhffqnlm.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\Ncljnglc.exeC:\Windows\system32\Ncljnglc.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\Nifbka32.exeC:\Windows\system32\Nifbka32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\Oockch32.exeC:\Windows\system32\Oockch32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\Ocogcgjp.exeC:\Windows\system32\Ocogcgjp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\Oihopa32.exeC:\Windows\system32\Oihopa32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\Olglllqq.exeC:\Windows\system32\Olglllqq.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\Ocadif32.exeC:\Windows\system32\Ocadif32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Oeopeb32.exeC:\Windows\system32\Oeopeb32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\Oiklfqpj.exeC:\Windows\system32\Oiklfqpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\Olihblon.exeC:\Windows\system32\Olihblon.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Windows\SysWOW64\Occqof32.exeC:\Windows\system32\Occqof32.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\Oeamka32.exeC:\Windows\system32\Oeamka32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\Olleglmk.exeC:\Windows\system32\Olleglmk.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\Ocemdfdh.exeC:\Windows\system32\Ocemdfdh.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\Ogaied32.exeC:\Windows\system32\Ogaied32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\Olnbmk32.exeC:\Windows\system32\Olnbmk32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\Ochjjebe.exeC:\Windows\system32\Ochjjebe.exe23⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\Phdbblpm.exeC:\Windows\system32\Phdbblpm.exe24⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\Pcjgoe32.exeC:\Windows\system32\Pcjgoe32.exe25⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\SysWOW64\Pfhckq32.exeC:\Windows\system32\Pfhckq32.exe26⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\Ppngii32.exeC:\Windows\system32\Ppngii32.exe27⤵
- Executes dropped EXE
PID:3192 -
C:\Windows\SysWOW64\Pcmcee32.exeC:\Windows\system32\Pcmcee32.exe28⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\Philml32.exeC:\Windows\system32\Philml32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Windows\SysWOW64\Pfmlfpka.exeC:\Windows\system32\Pfmlfpka.exe30⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\Phlibkje.exeC:\Windows\system32\Phlibkje.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\Ppcqdikg.exeC:\Windows\system32\Ppcqdikg.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:4752 -
C:\Windows\SysWOW64\Poeaoe32.exeC:\Windows\system32\Poeaoe32.exe33⤵
- Executes dropped EXE
PID:3704 -
C:\Windows\SysWOW64\Pjkemn32.exeC:\Windows\system32\Pjkemn32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4512 -
C:\Windows\SysWOW64\Pljaij32.exeC:\Windows\system32\Pljaij32.exe35⤵
- Executes dropped EXE
PID:4348 -
C:\Windows\SysWOW64\Pohnee32.exeC:\Windows\system32\Pohnee32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Pgoefbpa.exeC:\Windows\system32\Pgoefbpa.exe37⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\Qfbfao32.exeC:\Windows\system32\Qfbfao32.exe38⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\Qhpbnk32.exeC:\Windows\system32\Qhpbnk32.exe39⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\SysWOW64\Qqgjoh32.exeC:\Windows\system32\Qqgjoh32.exe40⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\Qcffkc32.exeC:\Windows\system32\Qcffkc32.exe41⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\SysWOW64\Qfdbgo32.exeC:\Windows\system32\Qfdbgo32.exe42⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\Qhbocj32.exeC:\Windows\system32\Qhbocj32.exe43⤵
- Executes dropped EXE
PID:8 -
C:\Windows\SysWOW64\Qqjgdh32.exeC:\Windows\system32\Qqjgdh32.exe44⤵
- Executes dropped EXE
PID:3880 -
C:\Windows\SysWOW64\Qchcqc32.exeC:\Windows\system32\Qchcqc32.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3700 -
C:\Windows\SysWOW64\Affomo32.exeC:\Windows\system32\Affomo32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\Ahekijbj.exeC:\Windows\system32\Ahekijbj.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\Aqlcjgbl.exeC:\Windows\system32\Aqlcjgbl.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\Agflga32.exeC:\Windows\system32\Agflga32.exe49⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\Afilbnad.exeC:\Windows\system32\Afilbnad.exe50⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\Amcdoh32.exeC:\Windows\system32\Amcdoh32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\Acmllbpm.exeC:\Windows\system32\Acmllbpm.exe52⤵
- Executes dropped EXE
PID:3120 -
C:\Windows\SysWOW64\Aijedi32.exeC:\Windows\system32\Aijedi32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1936 -
C:\Windows\SysWOW64\Ameadhfn.exeC:\Windows\system32\Ameadhfn.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\Aocmqcea.exeC:\Windows\system32\Aocmqcea.exe55⤵
- Executes dropped EXE
PID:3476 -
C:\Windows\SysWOW64\Ajianleg.exeC:\Windows\system32\Ajianleg.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:1452 -
C:\Windows\SysWOW64\Ailaii32.exeC:\Windows\system32\Ailaii32.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\Aofjfcco.exeC:\Windows\system32\Aofjfcco.exe58⤵
- Executes dropped EXE
PID:436 -
C:\Windows\SysWOW64\Afpbcm32.exeC:\Windows\system32\Afpbcm32.exe59⤵
- Executes dropped EXE
PID:3196 -
C:\Windows\SysWOW64\Aqefpfkb.exeC:\Windows\system32\Aqefpfkb.exe60⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\Bgpomp32.exeC:\Windows\system32\Bgpomp32.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:4316 -
C:\Windows\SysWOW64\Bjnkik32.exeC:\Windows\system32\Bjnkik32.exe62⤵
- Executes dropped EXE
PID:3916 -
C:\Windows\SysWOW64\Bmlgeg32.exeC:\Windows\system32\Bmlgeg32.exe63⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\Bfeknmgf.exeC:\Windows\system32\Bfeknmgf.exe64⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\Bichjhfj.exeC:\Windows\system32\Bichjhfj.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3644 -
C:\Windows\SysWOW64\Bompgbmg.exeC:\Windows\system32\Bompgbmg.exe66⤵PID:4384
-
C:\Windows\SysWOW64\Biedpg32.exeC:\Windows\system32\Biedpg32.exe67⤵
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Windows\SysWOW64\Boomlakd.exeC:\Windows\system32\Boomlakd.exe68⤵PID:3652
-
C:\Windows\SysWOW64\Bfieil32.exeC:\Windows\system32\Bfieil32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1444 -
C:\Windows\SysWOW64\Bihaeg32.exeC:\Windows\system32\Bihaeg32.exe70⤵
- Drops file in System32 directory
PID:1248 -
C:\Windows\SysWOW64\Bqoifd32.exeC:\Windows\system32\Bqoifd32.exe71⤵PID:3884
-
C:\Windows\SysWOW64\Bcmebpak.exeC:\Windows\system32\Bcmebpak.exe72⤵PID:4248
-
C:\Windows\SysWOW64\Bijnkgpb.exeC:\Windows\system32\Bijnkgpb.exe73⤵
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\Ccpbhpph.exeC:\Windows\system32\Ccpbhpph.exe74⤵PID:3464
-
C:\Windows\SysWOW64\Cfnndkol.exeC:\Windows\system32\Cfnndkol.exe75⤵
- Modifies registry class
PID:2668 -
C:\Windows\SysWOW64\Cacbadnb.exeC:\Windows\system32\Cacbadnb.exe76⤵PID:1500
-
C:\Windows\SysWOW64\Ccbono32.exeC:\Windows\system32\Ccbono32.exe77⤵PID:2040
-
C:\Windows\SysWOW64\Ciogff32.exeC:\Windows\system32\Ciogff32.exe78⤵
- Drops file in System32 directory
PID:4796 -
C:\Windows\SysWOW64\Ccdkco32.exeC:\Windows\system32\Ccdkco32.exe79⤵PID:4292
-
C:\Windows\SysWOW64\Cfchoj32.exeC:\Windows\system32\Cfchoj32.exe80⤵PID:3536
-
C:\Windows\SysWOW64\Cahlmc32.exeC:\Windows\system32\Cahlmc32.exe81⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4976 -
C:\Windows\SysWOW64\Cjqqei32.exeC:\Windows\system32\Cjqqei32.exe82⤵PID:1156
-
C:\Windows\SysWOW64\Cakibchj.exeC:\Windows\system32\Cakibchj.exe83⤵
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Windows\SysWOW64\Cfgajjfa.exeC:\Windows\system32\Cfgajjfa.exe84⤵PID:3504
-
C:\Windows\SysWOW64\Cifmfeee.exeC:\Windows\system32\Cifmfeee.exe85⤵PID:1640
-
C:\Windows\SysWOW64\Dppeco32.exeC:\Windows\system32\Dppeco32.exe86⤵PID:2764
-
C:\Windows\SysWOW64\Dihjle32.exeC:\Windows\system32\Dihjle32.exe87⤵PID:4560
-
C:\Windows\SysWOW64\Dcnnin32.exeC:\Windows\system32\Dcnnin32.exe88⤵PID:2408
-
C:\Windows\SysWOW64\Dflkei32.exeC:\Windows\system32\Dflkei32.exe89⤵PID:3320
-
C:\Windows\SysWOW64\Daaocb32.exeC:\Windows\system32\Daaocb32.exe90⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3780 -
C:\Windows\SysWOW64\Dcpkom32.exeC:\Windows\system32\Dcpkom32.exe91⤵PID:2996
-
C:\Windows\SysWOW64\Djjclgib.exeC:\Windows\system32\Djjclgib.exe92⤵PID:1968
-
C:\Windows\SysWOW64\Dpgldn32.exeC:\Windows\system32\Dpgldn32.exe93⤵PID:1548
-
C:\Windows\SysWOW64\Dfadqhnf.exeC:\Windows\system32\Dfadqhnf.exe94⤵PID:3808
-
C:\Windows\SysWOW64\Diopmdnj.exeC:\Windows\system32\Diopmdnj.exe95⤵PID:2892
-
C:\Windows\SysWOW64\Dmklmb32.exeC:\Windows\system32\Dmklmb32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1672 -
C:\Windows\SysWOW64\Ddedjmmp.exeC:\Windows\system32\Ddedjmmp.exe97⤵PID:1136
-
C:\Windows\SysWOW64\Dfcqfhld.exeC:\Windows\system32\Dfcqfhld.exe98⤵PID:3972
-
C:\Windows\SysWOW64\Eaieca32.exeC:\Windows\system32\Eaieca32.exe99⤵PID:1004
-
C:\Windows\SysWOW64\Edgapl32.exeC:\Windows\system32\Edgapl32.exe100⤵PID:4400
-
C:\Windows\SysWOW64\Efemlh32.exeC:\Windows\system32\Efemlh32.exe101⤵PID:3876
-
C:\Windows\SysWOW64\Eakaiq32.exeC:\Windows\system32\Eakaiq32.exe102⤵
- Drops file in System32 directory
PID:5052 -
C:\Windows\SysWOW64\Efhjag32.exeC:\Windows\system32\Efhjag32.exe103⤵PID:2684
-
C:\Windows\SysWOW64\Embbnapk.exeC:\Windows\system32\Embbnapk.exe104⤵PID:2840
-
C:\Windows\SysWOW64\Edlkklgh.exeC:\Windows\system32\Edlkklgh.exe105⤵PID:1232
-
C:\Windows\SysWOW64\Ehjcaj32.exeC:\Windows\system32\Ehjcaj32.exe106⤵PID:4580
-
C:\Windows\SysWOW64\Emflia32.exeC:\Windows\system32\Emflia32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\Ekjlbejp.exeC:\Windows\system32\Ekjlbejp.exe108⤵
- System Location Discovery: System Language Discovery
PID:116 -
C:\Windows\SysWOW64\Fmihoqjc.exeC:\Windows\system32\Fmihoqjc.exe109⤵PID:724
-
C:\Windows\SysWOW64\Fhnmliii.exeC:\Windows\system32\Fhnmliii.exe110⤵PID:1552
-
C:\Windows\SysWOW64\Fmkedpgq.exeC:\Windows\system32\Fmkedpgq.exe111⤵PID:5144
-
C:\Windows\SysWOW64\Fpjaplgd.exeC:\Windows\system32\Fpjaplgd.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5180 -
C:\Windows\SysWOW64\Fgcjmfna.exeC:\Windows\system32\Fgcjmfna.exe113⤵PID:5224
-
C:\Windows\SysWOW64\Fibfiame.exeC:\Windows\system32\Fibfiame.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5268 -
C:\Windows\SysWOW64\Fainjong.exeC:\Windows\system32\Fainjong.exe115⤵PID:5308
-
C:\Windows\SysWOW64\Fdgjfjmk.exeC:\Windows\system32\Fdgjfjmk.exe116⤵PID:5352
-
C:\Windows\SysWOW64\Fgffbelo.exeC:\Windows\system32\Fgffbelo.exe117⤵PID:5396
-
C:\Windows\SysWOW64\Fidboakb.exeC:\Windows\system32\Fidboakb.exe118⤵PID:5440
-
C:\Windows\SysWOW64\Fakkpnld.exeC:\Windows\system32\Fakkpnld.exe119⤵PID:5472
-
C:\Windows\SysWOW64\Fdjgljkh.exeC:\Windows\system32\Fdjgljkh.exe120⤵PID:5524
-
C:\Windows\SysWOW64\Fghche32.exeC:\Windows\system32\Fghche32.exe121⤵PID:5568
-
C:\Windows\SysWOW64\Fmbkeoai.exeC:\Windows\system32\Fmbkeoai.exe122⤵
- System Location Discovery: System Language Discovery
PID:5612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-