Analysis
-
max time kernel
110s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
49aa580cf1270223b7753d31baebbfc6cb4303ac4c8327b39bdfa2ffb25898feN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
49aa580cf1270223b7753d31baebbfc6cb4303ac4c8327b39bdfa2ffb25898feN.exe
Resource
win10v2004-20240802-en
General
-
Target
49aa580cf1270223b7753d31baebbfc6cb4303ac4c8327b39bdfa2ffb25898feN.exe
-
Size
52KB
-
MD5
246f14d9f15811636e8edbd416a410b0
-
SHA1
72bfc6a994f7bd8293d9c4bee76eb8ab349bd6f9
-
SHA256
49aa580cf1270223b7753d31baebbfc6cb4303ac4c8327b39bdfa2ffb25898fe
-
SHA512
88fa07301bc2409c46383779fdbc80ca7b9361442159fadb9e14699a8ef9a7ab66cbbb92171e3a3a67c3ef030d3f7eca21ac8687df4bda201d7e97a7144dca8e
-
SSDEEP
768:lw86GBGUNDY5sqOZHoN40KjKi29I4U0sOq4/1H5F/soMABvKWe:n0UNkdOpuKGicW+xMAdKZ
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Likppach.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjlkdjhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehafbhma.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpllacfk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddmnfqpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiedgg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgejjk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jombkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feffmpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Leaqebil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igjknmdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhpinldm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ollkohcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koooph32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnpkmc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbmcpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkokoc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coklcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcpfbq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjldkhjm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emeeknda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hglomo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddmnfqpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcbbhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deigpneh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcdompoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibpokede.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jinqco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhakobmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkqbpgan.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kioqdcme.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bebocgmo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eldonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hoodmc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjafmehe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmghjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcmnilei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcgcmfqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aegogihl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eandfm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhdloell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jildmojo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpaflb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qqfcad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmdcnbaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hilbah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bedenqhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lldcamfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adkbhbpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnhicddc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eejpgkgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acllhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blodeaci.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieobag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agelcdgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gacfhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Haabjgqe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnfppfji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liepjl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcmnilei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdcbfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfomce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fliiikni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehafbhma.exe -
Executes dropped EXE 64 IoCs
pid Process 2340 Kabfegeh.exe 5916 Kdqbacdl.exe 5172 Kinkijcc.exe 5488 Kadbjgcf.exe 3944 Kbfobo32.exe 1384 Kkmgcm32.exe 3144 Kpjpkchn.exe 4860 Kfdhhn32.exe 4832 Kibddi32.exe 5964 Kpllacfk.exe 5584 Kbjhmoeo.exe 2088 Lidqji32.exe 5996 Lpoifc32.exe 6104 Lkdmdl32.exe 6068 Lpaflb32.exe 5804 Lgknimib.exe 5944 Lapbfeih.exe 6116 Lilgjh32.exe 5868 Ldakhq32.exe 5492 Laelad32.exe 4544 Mippegbn.exe 4620 Mdfdcpbd.exe 3964 Mibmkfql.exe 4512 Mdhahppa.exe 5048 Miejqf32.exe 3008 Mcmnilei.exe 1812 Mkdfkiel.exe 2664 Manngc32.exe 5608 Mcpkolcg.exe 5372 Mgkgpj32.exe 656 Maqkmckf.exe 4016 Ngncejim.exe 3164 Nnglbd32.exe 5424 Nachbbic.exe 5320 Ndadonhg.exe 1300 Ngppkigk.exe 5432 Naedhb32.exe 2736 Ncgapjmo.exe 1556 Npkaiolh.exe 4636 Ncinejkl.exe 4480 Njcfbd32.exe 4508 Ndhjombo.exe 1048 Nkbblg32.exe 1588 Nalkiaah.exe 5732 Oncknb32.exe 1380 Odmcjl32.exe 556 Okglgfef.exe 5704 Ocbqkica.exe 2260 Onheiabg.exe 3388 Oklebf32.exe 916 Oddjkkha.exe 3488 Pdffqk32.exe 2936 Pgebmf32.exe 2780 Pbjgjo32.exe 2740 Pggobf32.exe 4580 Pjflna32.exe 5780 Pbmcpo32.exe 5040 Pdkplj32.exe 3984 Pgjlhfam.exe 5200 Pkehhd32.exe 2644 Pbopeoqc.exe 636 Pdnmajpg.exe 5272 Pcqmmg32.exe 5420 Pkgend32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Maqkmckf.exe Mgkgpj32.exe File opened for modification C:\Windows\SysWOW64\Jmajoc32.exe Jejame32.exe File opened for modification C:\Windows\SysWOW64\Gdflpdhc.exe Gnldcj32.exe File created C:\Windows\SysWOW64\Blqjhfme.dll Jfgjgbbq.exe File created C:\Windows\SysWOW64\Cnkehdba.exe Cceakkbk.exe File opened for modification C:\Windows\SysWOW64\Liafolgg.exe Kbgnbb32.exe File created C:\Windows\SysWOW64\Dlkggk32.dll Feffmpad.exe File created C:\Windows\SysWOW64\Nekobedl.dll Eandfm32.exe File opened for modification C:\Windows\SysWOW64\Idgefb32.exe Ibhijf32.exe File created C:\Windows\SysWOW64\Pipefi32.dll Odmcjl32.exe File created C:\Windows\SysWOW64\Bjhahmgk.dll Kioqdcme.exe File created C:\Windows\SysWOW64\Pgjlhfam.exe Pdkplj32.exe File opened for modification C:\Windows\SysWOW64\Bnbiml32.exe Bdmeoc32.exe File created C:\Windows\SysWOW64\Mnkgejkj.dll Npgnii32.exe File opened for modification C:\Windows\SysWOW64\Knfigd32.exe Kpdhkgel.exe File opened for modification C:\Windows\SysWOW64\Npkaiolh.exe Ncgapjmo.exe File created C:\Windows\SysWOW64\Eafneoie.dll Gejini32.exe File opened for modification C:\Windows\SysWOW64\Aegogihl.exe Abhckmhh.exe File created C:\Windows\SysWOW64\Abkpamff.exe Ajdhppfc.exe File opened for modification C:\Windows\SysWOW64\Dkdjmk32.exe Cdkaqa32.exe File created C:\Windows\SysWOW64\Jbeoqkdk.exe Jlkgda32.exe File created C:\Windows\SysWOW64\Cageopcg.exe Cnhicddc.exe File opened for modification C:\Windows\SysWOW64\Bbdbglnk.exe Bjmkfnni.exe File opened for modification C:\Windows\SysWOW64\Fkqbpgan.exe Fhbfdlbk.exe File created C:\Windows\SysWOW64\Jhcldp32.dll Npjkohhm.exe File created C:\Windows\SysWOW64\Cpgmeihm.dll Fahnga32.exe File created C:\Windows\SysWOW64\Jbbbkl32.exe Ipdfop32.exe File created C:\Windows\SysWOW64\Cabldq32.exe Cjhcgfpp.exe File opened for modification C:\Windows\SysWOW64\Hfokpf32.exe Hoecclon.exe File created C:\Windows\SysWOW64\Dbpkjhfk.exe Dkichj32.exe File created C:\Windows\SysWOW64\Npeaci32.exe Nmgegn32.exe File opened for modification C:\Windows\SysWOW64\Ibpokede.exe Ioabojea.exe File created C:\Windows\SysWOW64\Blgncc32.dll Eaokac32.exe File created C:\Windows\SysWOW64\Fblplajo.dll Fccafe32.exe File opened for modification C:\Windows\SysWOW64\Emnoko32.exe Ehafbhma.exe File opened for modification C:\Windows\SysWOW64\Lnpkmc32.exe Llaoag32.exe File created C:\Windows\SysWOW64\Jbbpmk32.dll Oddjkkha.exe File opened for modification C:\Windows\SysWOW64\Eehjlbmd.exe Eonboheg.exe File opened for modification C:\Windows\SysWOW64\Llpifn32.exe Kmmijacl.exe File opened for modification C:\Windows\SysWOW64\Kpfeag32.exe Kilmdm32.exe File created C:\Windows\SysWOW64\Mgffjdli.exe Mbjkif32.exe File created C:\Windows\SysWOW64\Npcqaq32.dll Qjlkdjhp.exe File created C:\Windows\SysWOW64\Enfjmjbm.dll Adfhmb32.exe File opened for modification C:\Windows\SysWOW64\Igjknmdo.exe Idkoaaek.exe File created C:\Windows\SysWOW64\Hilbah32.exe Hfneem32.exe File created C:\Windows\SysWOW64\Imcmme32.exe Ielelhig.exe File created C:\Windows\SysWOW64\Eencemmo.dll Iflbfkpi.exe File created C:\Windows\SysWOW64\Oighiijb.dll Mgffjdli.exe File opened for modification C:\Windows\SysWOW64\Gopaaoaf.exe Gkdeqp32.exe File created C:\Windows\SysWOW64\Klmffhim.exe Kiojjmii.exe File opened for modification C:\Windows\SysWOW64\Ndadonhg.exe Nachbbic.exe File created C:\Windows\SysWOW64\Bchldcbg.exe Baiphhcc.exe File created C:\Windows\SysWOW64\Hbkcco32.exe Gchchbcn.exe File created C:\Windows\SysWOW64\Klmiqg32.dll Dfajhe32.exe File created C:\Windows\SysWOW64\Kddbijce.dll Lapbfeih.exe File opened for modification C:\Windows\SysWOW64\Acafcdho.exe Abpill32.exe File opened for modification C:\Windows\SysWOW64\Blmgpa32.exe Bhakobmb.exe File created C:\Windows\SysWOW64\Eiaehf32.dll Ifboplhd.exe File created C:\Windows\SysWOW64\Fmgblo32.dll Jiadce32.exe File created C:\Windows\SysWOW64\Jejame32.exe Jciefmgh.exe File opened for modification C:\Windows\SysWOW64\Ollkohcc.exe Ocdffbmc.exe File created C:\Windows\SysWOW64\Goanahgp.dll Idnkga32.exe File created C:\Windows\SysWOW64\Icmejoaf.exe Imcmme32.exe File created C:\Windows\SysWOW64\Bjbdan32.exe Blodeaci.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 12780 12704 WerFault.exe 638 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmcbodb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gocdae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlghmk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkfpei32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efipidog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jegnmpkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pggobf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fccafe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlkgda32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adfhmb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lnpkmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oddjkkha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kflkmh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bqflhb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnkehdba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjafmehe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iffaqe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jombkh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lelqom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adkbhbpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmpbiqgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfomce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgbbpbgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhfdjb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fojakf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfngbhpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmofpaai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbkcco32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inafeg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kghgok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npjkohhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Feepcimh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igcdmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihenmp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkmmoj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfegiq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbjhmoeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lppoal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocdffbmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnlgik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fodaeqlc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gopaaoaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbgnbb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Liccel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdnmajpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmmijacl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Leaqebil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccgnqk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjmkfnni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmdcnbaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccqhpl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eajafcgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfencg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlbobkja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkbhkqkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbdamb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cogchkjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjncml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmhpob32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldinmk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mgffjdli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mcpkolcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acafcdho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glnkkhla.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Feffmpad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fkcoeg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Opodjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqcfle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blodeaci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aapmbikn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cckaahen.dll" Qqhpgdnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hglomo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mibmkfql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djijga32.dll" Ddddgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibpokede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idnkga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdckpbhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Feeenlen.dll" Dklpnjcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlghmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Manngc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhghfipb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fclcld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egkmoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbpbcjdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhqhfehd.dll" Agoojcoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kaajfm32.dll" Eejpgkgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhaoieno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcmnilei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daaopeoh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daehkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkiclobj.dll" Hilbah32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iffaqe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffejpdnl.dll" Blodeaci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdnikjeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Falphk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndadonhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acglcpmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amgffg32.dll" Naedhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lldhlc32.dll" Kflkmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdedalmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdmcdbef.dll" Olhadh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Coklcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eoqoeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emlbeoml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdheka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oighiijb.dll" Mgffjdli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibpokede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eehpfk32.dll" Jfbhgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qiblij32.dll" Bbdbglnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgejjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgeldpdd.dll" Afehokla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmpibc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfmpmeid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbpaia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbckbi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nccmpd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qjlkdjhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qcaifnfm.dll" Fahgmk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iojmnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alkojehl.dll" Ibhijf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkhlej32.dll" Eajafcgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibnipljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmgblo32.dll" Jiadce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eajafcgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hgehlpgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkcabnmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpckol32.dll" Lkdmdl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdedalmk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2340 1276 49aa580cf1270223b7753d31baebbfc6cb4303ac4c8327b39bdfa2ffb25898feN.exe 84 PID 1276 wrote to memory of 2340 1276 49aa580cf1270223b7753d31baebbfc6cb4303ac4c8327b39bdfa2ffb25898feN.exe 84 PID 1276 wrote to memory of 2340 1276 49aa580cf1270223b7753d31baebbfc6cb4303ac4c8327b39bdfa2ffb25898feN.exe 84 PID 2340 wrote to memory of 5916 2340 Kabfegeh.exe 85 PID 2340 wrote to memory of 5916 2340 Kabfegeh.exe 85 PID 2340 wrote to memory of 5916 2340 Kabfegeh.exe 85 PID 5916 wrote to memory of 5172 5916 Kdqbacdl.exe 86 PID 5916 wrote to memory of 5172 5916 Kdqbacdl.exe 86 PID 5916 wrote to memory of 5172 5916 Kdqbacdl.exe 86 PID 5172 wrote to memory of 5488 5172 Kinkijcc.exe 87 PID 5172 wrote to memory of 5488 5172 Kinkijcc.exe 87 PID 5172 wrote to memory of 5488 5172 Kinkijcc.exe 87 PID 5488 wrote to memory of 3944 5488 Kadbjgcf.exe 88 PID 5488 wrote to memory of 3944 5488 Kadbjgcf.exe 88 PID 5488 wrote to memory of 3944 5488 Kadbjgcf.exe 88 PID 3944 wrote to memory of 1384 3944 Kbfobo32.exe 89 PID 3944 wrote to memory of 1384 3944 Kbfobo32.exe 89 PID 3944 wrote to memory of 1384 3944 Kbfobo32.exe 89 PID 1384 wrote to memory of 3144 1384 Kkmgcm32.exe 90 PID 1384 wrote to memory of 3144 1384 Kkmgcm32.exe 90 PID 1384 wrote to memory of 3144 1384 Kkmgcm32.exe 90 PID 3144 wrote to memory of 4860 3144 Kpjpkchn.exe 91 PID 3144 wrote to memory of 4860 3144 Kpjpkchn.exe 91 PID 3144 wrote to memory of 4860 3144 Kpjpkchn.exe 91 PID 4860 wrote to memory of 4832 4860 Kfdhhn32.exe 92 PID 4860 wrote to memory of 4832 4860 Kfdhhn32.exe 92 PID 4860 wrote to memory of 4832 4860 Kfdhhn32.exe 92 PID 4832 wrote to memory of 5964 4832 Kibddi32.exe 93 PID 4832 wrote to memory of 5964 4832 Kibddi32.exe 93 PID 4832 wrote to memory of 5964 4832 Kibddi32.exe 93 PID 5964 wrote to memory of 5584 5964 Kpllacfk.exe 94 PID 5964 wrote to memory of 5584 5964 Kpllacfk.exe 94 PID 5964 wrote to memory of 5584 5964 Kpllacfk.exe 94 PID 5584 wrote to memory of 2088 5584 Kbjhmoeo.exe 95 PID 5584 wrote to memory of 2088 5584 Kbjhmoeo.exe 95 PID 5584 wrote to memory of 2088 5584 Kbjhmoeo.exe 95 PID 2088 wrote to memory of 5996 2088 Lidqji32.exe 96 PID 2088 wrote to memory of 5996 2088 Lidqji32.exe 96 PID 2088 wrote to memory of 5996 2088 Lidqji32.exe 96 PID 5996 wrote to memory of 6104 5996 Lpoifc32.exe 97 PID 5996 wrote to memory of 6104 5996 Lpoifc32.exe 97 PID 5996 wrote to memory of 6104 5996 Lpoifc32.exe 97 PID 6104 wrote to memory of 6068 6104 Lkdmdl32.exe 98 PID 6104 wrote to memory of 6068 6104 Lkdmdl32.exe 98 PID 6104 wrote to memory of 6068 6104 Lkdmdl32.exe 98 PID 6068 wrote to memory of 5804 6068 Lpaflb32.exe 99 PID 6068 wrote to memory of 5804 6068 Lpaflb32.exe 99 PID 6068 wrote to memory of 5804 6068 Lpaflb32.exe 99 PID 5804 wrote to memory of 5944 5804 Lgknimib.exe 100 PID 5804 wrote to memory of 5944 5804 Lgknimib.exe 100 PID 5804 wrote to memory of 5944 5804 Lgknimib.exe 100 PID 5944 wrote to memory of 6116 5944 Lapbfeih.exe 101 PID 5944 wrote to memory of 6116 5944 Lapbfeih.exe 101 PID 5944 wrote to memory of 6116 5944 Lapbfeih.exe 101 PID 6116 wrote to memory of 5868 6116 Lilgjh32.exe 102 PID 6116 wrote to memory of 5868 6116 Lilgjh32.exe 102 PID 6116 wrote to memory of 5868 6116 Lilgjh32.exe 102 PID 5868 wrote to memory of 5492 5868 Ldakhq32.exe 103 PID 5868 wrote to memory of 5492 5868 Ldakhq32.exe 103 PID 5868 wrote to memory of 5492 5868 Ldakhq32.exe 103 PID 5492 wrote to memory of 4544 5492 Laelad32.exe 104 PID 5492 wrote to memory of 4544 5492 Laelad32.exe 104 PID 5492 wrote to memory of 4544 5492 Laelad32.exe 104 PID 4544 wrote to memory of 4620 4544 Mippegbn.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\49aa580cf1270223b7753d31baebbfc6cb4303ac4c8327b39bdfa2ffb25898feN.exe"C:\Users\Admin\AppData\Local\Temp\49aa580cf1270223b7753d31baebbfc6cb4303ac4c8327b39bdfa2ffb25898feN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\Kabfegeh.exeC:\Windows\system32\Kabfegeh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\Kdqbacdl.exeC:\Windows\system32\Kdqbacdl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5916 -
C:\Windows\SysWOW64\Kinkijcc.exeC:\Windows\system32\Kinkijcc.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5172 -
C:\Windows\SysWOW64\Kadbjgcf.exeC:\Windows\system32\Kadbjgcf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\Windows\SysWOW64\Kbfobo32.exeC:\Windows\system32\Kbfobo32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\Kkmgcm32.exeC:\Windows\system32\Kkmgcm32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Kpjpkchn.exeC:\Windows\system32\Kpjpkchn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\Kfdhhn32.exeC:\Windows\system32\Kfdhhn32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\Kibddi32.exeC:\Windows\system32\Kibddi32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\Kpllacfk.exeC:\Windows\system32\Kpllacfk.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5964 -
C:\Windows\SysWOW64\Kbjhmoeo.exeC:\Windows\system32\Kbjhmoeo.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5584 -
C:\Windows\SysWOW64\Lidqji32.exeC:\Windows\system32\Lidqji32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Lpoifc32.exeC:\Windows\system32\Lpoifc32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5996 -
C:\Windows\SysWOW64\Lkdmdl32.exeC:\Windows\system32\Lkdmdl32.exe15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:6104 -
C:\Windows\SysWOW64\Lpaflb32.exeC:\Windows\system32\Lpaflb32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6068 -
C:\Windows\SysWOW64\Lgknimib.exeC:\Windows\system32\Lgknimib.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5804 -
C:\Windows\SysWOW64\Lapbfeih.exeC:\Windows\system32\Lapbfeih.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5944 -
C:\Windows\SysWOW64\Lilgjh32.exeC:\Windows\system32\Lilgjh32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6116 -
C:\Windows\SysWOW64\Ldakhq32.exeC:\Windows\system32\Ldakhq32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5868 -
C:\Windows\SysWOW64\Laelad32.exeC:\Windows\system32\Laelad32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5492 -
C:\Windows\SysWOW64\Mippegbn.exeC:\Windows\system32\Mippegbn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\Mdfdcpbd.exeC:\Windows\system32\Mdfdcpbd.exe23⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\Mibmkfql.exeC:\Windows\system32\Mibmkfql.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:3964 -
C:\Windows\SysWOW64\Mdhahppa.exeC:\Windows\system32\Mdhahppa.exe25⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\SysWOW64\Miejqf32.exeC:\Windows\system32\Miejqf32.exe26⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\SysWOW64\Mcmnilei.exeC:\Windows\system32\Mcmnilei.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3008 -
C:\Windows\SysWOW64\Mkdfkiel.exeC:\Windows\system32\Mkdfkiel.exe28⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\Manngc32.exeC:\Windows\system32\Manngc32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Mcpkolcg.exeC:\Windows\system32\Mcpkolcg.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5608 -
C:\Windows\SysWOW64\Mgkgpj32.exeC:\Windows\system32\Mgkgpj32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5372 -
C:\Windows\SysWOW64\Maqkmckf.exeC:\Windows\system32\Maqkmckf.exe32⤵
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\Ngncejim.exeC:\Windows\system32\Ngncejim.exe33⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\SysWOW64\Nnglbd32.exeC:\Windows\system32\Nnglbd32.exe34⤵
- Executes dropped EXE
PID:3164 -
C:\Windows\SysWOW64\Nachbbic.exeC:\Windows\system32\Nachbbic.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5424 -
C:\Windows\SysWOW64\Ndadonhg.exeC:\Windows\system32\Ndadonhg.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:5320 -
C:\Windows\SysWOW64\Ngppkigk.exeC:\Windows\system32\Ngppkigk.exe37⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\Naedhb32.exeC:\Windows\system32\Naedhb32.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:5432 -
C:\Windows\SysWOW64\Ncgapjmo.exeC:\Windows\system32\Ncgapjmo.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\Npkaiolh.exeC:\Windows\system32\Npkaiolh.exe40⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\Ncinejkl.exeC:\Windows\system32\Ncinejkl.exe41⤵
- Executes dropped EXE
PID:4636 -
C:\Windows\SysWOW64\Njcfbd32.exeC:\Windows\system32\Njcfbd32.exe42⤵
- Executes dropped EXE
PID:4480 -
C:\Windows\SysWOW64\Ndhjombo.exeC:\Windows\system32\Ndhjombo.exe43⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\Nkbblg32.exeC:\Windows\system32\Nkbblg32.exe44⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\SysWOW64\Nalkiaah.exeC:\Windows\system32\Nalkiaah.exe45⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\Oncknb32.exeC:\Windows\system32\Oncknb32.exe46⤵
- Executes dropped EXE
PID:5732 -
C:\Windows\SysWOW64\Odmcjl32.exeC:\Windows\system32\Odmcjl32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1380 -
C:\Windows\SysWOW64\Okglgfef.exeC:\Windows\system32\Okglgfef.exe48⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\Ocbqkica.exeC:\Windows\system32\Ocbqkica.exe49⤵
- Executes dropped EXE
PID:5704 -
C:\Windows\SysWOW64\Onheiabg.exeC:\Windows\system32\Onheiabg.exe50⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Oklebf32.exeC:\Windows\system32\Oklebf32.exe51⤵
- Executes dropped EXE
PID:3388 -
C:\Windows\SysWOW64\Oddjkkha.exeC:\Windows\system32\Oddjkkha.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:916 -
C:\Windows\SysWOW64\Pdffqk32.exeC:\Windows\system32\Pdffqk32.exe53⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\Pgebmf32.exeC:\Windows\system32\Pgebmf32.exe54⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\Pbjgjo32.exeC:\Windows\system32\Pbjgjo32.exe55⤵
- Executes dropped EXE
PID:2780 -
C:\Windows\SysWOW64\Pggobf32.exeC:\Windows\system32\Pggobf32.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\Pjflna32.exeC:\Windows\system32\Pjflna32.exe57⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\Pbmcpo32.exeC:\Windows\system32\Pbmcpo32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5780 -
C:\Windows\SysWOW64\Pdkplj32.exeC:\Windows\system32\Pdkplj32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5040 -
C:\Windows\SysWOW64\Pgjlhfam.exeC:\Windows\system32\Pgjlhfam.exe60⤵
- Executes dropped EXE
PID:3984 -
C:\Windows\SysWOW64\Pkehhd32.exeC:\Windows\system32\Pkehhd32.exe61⤵
- Executes dropped EXE
PID:5200 -
C:\Windows\SysWOW64\Pbopeoqc.exeC:\Windows\system32\Pbopeoqc.exe62⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\Pdnmajpg.exeC:\Windows\system32\Pdnmajpg.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:636 -
C:\Windows\SysWOW64\Pcqmmg32.exeC:\Windows\system32\Pcqmmg32.exe64⤵
- Executes dropped EXE
PID:5272 -
C:\Windows\SysWOW64\Pkgend32.exeC:\Windows\system32\Pkgend32.exe65⤵
- Executes dropped EXE
PID:5420 -
C:\Windows\SysWOW64\Pnfajp32.exeC:\Windows\system32\Pnfajp32.exe66⤵PID:5656
-
C:\Windows\SysWOW64\Pccibf32.exeC:\Windows\system32\Pccibf32.exe67⤵PID:1788
-
C:\Windows\SysWOW64\Pgnecemh.exeC:\Windows\system32\Pgnecemh.exe68⤵PID:4316
-
C:\Windows\SysWOW64\Pnhnpode.exeC:\Windows\system32\Pnhnpode.exe69⤵PID:1952
-
C:\Windows\SysWOW64\Qgqbhe32.exeC:\Windows\system32\Qgqbhe32.exe70⤵PID:5860
-
C:\Windows\SysWOW64\Qbfffn32.exeC:\Windows\system32\Qbfffn32.exe71⤵PID:5932
-
C:\Windows\SysWOW64\Qedbbi32.exeC:\Windows\system32\Qedbbi32.exe72⤵PID:6008
-
C:\Windows\SysWOW64\Qcgcmfqi.exeC:\Windows\system32\Qcgcmfqi.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2516 -
C:\Windows\SysWOW64\Qkokoc32.exeC:\Windows\system32\Qkokoc32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5824 -
C:\Windows\SysWOW64\Abhckmhh.exeC:\Windows\system32\Abhckmhh.exe75⤵
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\Aegogihl.exeC:\Windows\system32\Aegogihl.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3380 -
C:\Windows\SysWOW64\Agelcdgp.exeC:\Windows\system32\Agelcdgp.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:432 -
C:\Windows\SysWOW64\Ajdhppfc.exeC:\Windows\system32\Ajdhppfc.exe78⤵
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\Abkpamff.exeC:\Windows\system32\Abkpamff.exe79⤵PID:4692
-
C:\Windows\SysWOW64\Acllhe32.exeC:\Windows\system32\Acllhe32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2392 -
C:\Windows\SysWOW64\Aghhidem.exeC:\Windows\system32\Aghhidem.exe81⤵PID:3956
-
C:\Windows\SysWOW64\Anaqfnlj.exeC:\Windows\system32\Anaqfnlj.exe82⤵PID:5276
-
C:\Windows\SysWOW64\Aapmbikn.exeC:\Windows\system32\Aapmbikn.exe83⤵
- Modifies registry class
PID:5736 -
C:\Windows\SysWOW64\Agjeoc32.exeC:\Windows\system32\Agjeoc32.exe84⤵PID:3344
-
C:\Windows\SysWOW64\Ajhako32.exeC:\Windows\system32\Ajhako32.exe85⤵PID:4448
-
C:\Windows\SysWOW64\Abpill32.exeC:\Windows\system32\Abpill32.exe86⤵
- Drops file in System32 directory
PID:760 -
C:\Windows\SysWOW64\Acafcdho.exeC:\Windows\system32\Acafcdho.exe87⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\Alhnebia.exeC:\Windows\system32\Alhnebia.exe88⤵PID:652
-
C:\Windows\SysWOW64\Anfjamhe.exeC:\Windows\system32\Anfjamhe.exe89⤵PID:4616
-
C:\Windows\SysWOW64\Aaefmi32.exeC:\Windows\system32\Aaefmi32.exe90⤵PID:4628
-
C:\Windows\SysWOW64\Agoojcoe.exeC:\Windows\system32\Agoojcoe.exe91⤵
- Modifies registry class
PID:4824 -
C:\Windows\SysWOW64\Bjmkfnni.exeC:\Windows\system32\Bjmkfnni.exe92⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\Bbdbglnk.exeC:\Windows\system32\Bbdbglnk.exe93⤵
- Modifies registry class
PID:3608 -
C:\Windows\SysWOW64\Bebocgmo.exeC:\Windows\system32\Bebocgmo.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1232 -
C:\Windows\SysWOW64\Bhakobmb.exeC:\Windows\system32\Bhakobmb.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2940 -
C:\Windows\SysWOW64\Blmgpa32.exeC:\Windows\system32\Blmgpa32.exe96⤵PID:3592
-
C:\Windows\SysWOW64\Bnkclm32.exeC:\Windows\system32\Bnkclm32.exe97⤵PID:5016
-
C:\Windows\SysWOW64\Bbfomklh.exeC:\Windows\system32\Bbfomklh.exe98⤵PID:1684
-
C:\Windows\SysWOW64\Baiphhcc.exeC:\Windows\system32\Baiphhcc.exe99⤵
- Drops file in System32 directory
PID:4732 -
C:\Windows\SysWOW64\Bchldcbg.exeC:\Windows\system32\Bchldcbg.exe100⤵PID:6128
-
C:\Windows\SysWOW64\Blodeaci.exeC:\Windows\system32\Blodeaci.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5524 -
C:\Windows\SysWOW64\Bjbdan32.exeC:\Windows\system32\Bjbdan32.exe102⤵PID:2096
-
C:\Windows\SysWOW64\Bbilbk32.exeC:\Windows\system32\Bbilbk32.exe103⤵PID:2288
-
C:\Windows\SysWOW64\Ballnhaq.exeC:\Windows\system32\Ballnhaq.exe104⤵PID:5124
-
C:\Windows\SysWOW64\Beghnf32.exeC:\Windows\system32\Beghnf32.exe105⤵PID:5012
-
C:\Windows\SysWOW64\Bhfdjb32.exeC:\Windows\system32\Bhfdjb32.exe106⤵
- System Location Discovery: System Language Discovery
PID:5828 -
C:\Windows\SysWOW64\Bjdafm32.exeC:\Windows\system32\Bjdafm32.exe107⤵PID:1548
-
C:\Windows\SysWOW64\Bbkihk32.exeC:\Windows\system32\Bbkihk32.exe108⤵PID:3848
-
C:\Windows\SysWOW64\Banicgon.exeC:\Windows\system32\Banicgon.exe109⤵PID:3180
-
C:\Windows\SysWOW64\Bdmeoc32.exeC:\Windows\system32\Bdmeoc32.exe110⤵
- Drops file in System32 directory
PID:1028 -
C:\Windows\SysWOW64\Bnbiml32.exeC:\Windows\system32\Bnbiml32.exe111⤵PID:5308
-
C:\Windows\SysWOW64\Cbpbcjdn.exeC:\Windows\system32\Cbpbcjdn.exe112⤵
- Modifies registry class
PID:1364 -
C:\Windows\SysWOW64\Cdaojb32.exeC:\Windows\system32\Cdaojb32.exe113⤵PID:4816
-
C:\Windows\SysWOW64\Cogchkjb.exeC:\Windows\system32\Cogchkjb.exe114⤵
- System Location Discovery: System Language Discovery
PID:4232 -
C:\Windows\SysWOW64\Cdckpbhi.exeC:\Windows\system32\Cdckpbhi.exe115⤵
- Modifies registry class
PID:5336 -
C:\Windows\SysWOW64\Cjncml32.exeC:\Windows\system32\Cjncml32.exe116⤵
- System Location Discovery: System Language Discovery
PID:5364 -
C:\Windows\SysWOW64\Cbdlni32.exeC:\Windows\system32\Cbdlni32.exe117⤵PID:4804
-
C:\Windows\SysWOW64\Cechje32.exeC:\Windows\system32\Cechje32.exe118⤵PID:2896
-
C:\Windows\SysWOW64\Clmpgo32.exeC:\Windows\system32\Clmpgo32.exe119⤵PID:1544
-
C:\Windows\SysWOW64\Coklcj32.exeC:\Windows\system32\Coklcj32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3228 -
C:\Windows\SysWOW64\Cajiof32.exeC:\Windows\system32\Cajiof32.exe121⤵PID:4700
-
C:\Windows\SysWOW64\Cdheka32.exeC:\Windows\system32\Cdheka32.exe122⤵
- Modifies registry class
PID:4360
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-