Analysis
-
max time kernel
110s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02.exe
Resource
win10v2004-20240802-en
General
-
Target
b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02.exe
-
Size
256KB
-
MD5
e4b5a3e807f52d915735677c354fbcef
-
SHA1
db07821e10bf2e0bf4218838ed234d4197f3f900
-
SHA256
b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02
-
SHA512
1e6b42320b1bd03b72a31069d33e1c8687c67b26f2081e77f1ee425ef0ea74d3409e53bc56810e550e70bff3e88b6f754191f246ac977bf3dfaa58c5b07ef710
-
SSDEEP
6144:nmzwc66pyNi/GOORjMmRUoooooooooooooooooooooooooy/G:nmIdi//OVLCoooooooooooooooooooof
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edinbofa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aqabmceo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncddjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okihmfcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqkjpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cjppblnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cajiof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ngmmkcea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nmiamm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cepdjo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dopfnjag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mpmehq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qddlgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mfnjoo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioabojea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aegogihl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fdkcnlel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbnbgjlq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfmpmeid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hmealgfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Likppach.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mmbllnac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Opaqog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liijehif.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogbfggge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eonboheg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goeagd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Knkbbcha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obcaip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Calede32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieeoki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojlbnm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lghacmle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbbdgcdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lejcjmkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pbamknoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gbfjhpnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifdlelfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jojeeimf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fmnhalmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gnenbk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kinkijcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdcbfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kfngbhpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ackeno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jbleaj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlklhm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngfpabng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ifaheeeh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqokdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekpiii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mekckaqa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhaoieno.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glgeki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmomic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibfleg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnobbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clomlo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmajoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ancfagfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npheconk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olchiiln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifaheeeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eobdpq32.exe -
Executes dropped EXE 64 IoCs
pid Process 4148 Kmgjdi32.exe 5788 Kpefpd32.exe 6120 Kfonmncp.exe 5504 Kinkijcc.exe 4988 Kagopg32.exe 1288 Kbhlgoga.exe 2244 Kibddi32.exe 5404 Kdhhaa32.exe 5648 Lkaqnlfa.exe 2192 Lpoifc32.exe 2024 Lghacmle.exe 5184 Laneqekk.exe 6096 Ldlamajo.exe 6056 Liijehif.exe 2960 Ldonbq32.exe 5892 Lkifokpi.exe 6008 Labole32.exe 2812 Lmipqfmj.exe 5820 Laelad32.exe 1200 Ldchmpdg.exe 1468 Mkmpjj32.exe 4620 Mpjhba32.exe 4880 Mdfdcpbd.exe 432 Mkpmpj32.exe 2012 Mpmehq32.exe 1720 Miejqf32.exe 3168 Mdjnno32.exe 5344 Mgkgpj32.exe 3300 Ndoginji.exe 5744 Ncddjk32.exe 5264 Npheconk.exe 4216 Nahanb32.exe 3644 Ngdjfi32.exe 2380 Nnobbc32.exe 5424 Ndhjombo.exe 5752 Nggfkhab.exe 924 Njebgdpf.exe 1800 Oqokdn32.exe 2488 Ogicahop.exe 3052 Oncknb32.exe 1556 Ocpdfied.exe 4616 Okglgfef.exe 4976 Onehcbdj.exe 5468 Odpppl32.exe 3852 Okihmfcc.exe 412 Obcaip32.exe 1672 Ogpiagih.exe 1540 Oklebf32.exe 1880 Obfnopin.exe 4308 Ogbfggge.exe 5572 Onmnda32.exe 2396 Pqkjpl32.exe 5476 Pgebmf32.exe 3452 Pjcoib32.exe 3516 Pqmgelkc.exe 3064 Pclcagkg.exe 5460 Pkckceki.exe 2788 Pnahopjm.exe 4756 Pcnpgghd.exe 1504 Pgjlhfam.exe 2608 Pbopeoqc.exe 5128 Pkgend32.exe 5200 Pbamknoq.exe 4788 Pepigjnd.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Onmnda32.exe Ogbfggge.exe File created C:\Windows\SysWOW64\Gheijfoh.dll Hoqjhl32.exe File created C:\Windows\SysWOW64\Ilpblijd.dll Jinqco32.exe File created C:\Windows\SysWOW64\Eobdpq32.exe Ehhlcgfi.exe File created C:\Windows\SysWOW64\Hoqjhl32.exe Hgibgo32.exe File created C:\Windows\SysWOW64\Bnlfnioe.dll Ibfleg32.exe File created C:\Windows\SysWOW64\Pcnpgghd.exe Pnahopjm.exe File created C:\Windows\SysWOW64\Pqmpkfhg.exe Pnndojic.exe File created C:\Windows\SysWOW64\Djlafehc.dll Gkdeqp32.exe File created C:\Windows\SysWOW64\Knkbbcha.exe Klmffhim.exe File created C:\Windows\SysWOW64\Dcamglhk.dll Bjbdan32.exe File created C:\Windows\SysWOW64\Jnhmaeal.dll Lmofpaai.exe File created C:\Windows\SysWOW64\Ocfclb32.exe Ophgpf32.exe File created C:\Windows\SysWOW64\Lejcjmkh.exe Lblgnale.exe File opened for modification C:\Windows\SysWOW64\Hdcbfi32.exe Hcafnq32.exe File created C:\Windows\SysWOW64\Niojnbgh.dll Daobjeak.exe File created C:\Windows\SysWOW64\Ibejfj32.dll Eamnkc32.exe File created C:\Windows\SysWOW64\Fccafe32.exe Fklieh32.exe File opened for modification C:\Windows\SysWOW64\Flpojjha.exe Fdigim32.exe File created C:\Windows\SysWOW64\Nmonleig.dll Hkjnmc32.exe File opened for modification C:\Windows\SysWOW64\Meigea32.exe Mdgjnimf.exe File created C:\Windows\SysWOW64\Gjnjbgni.dll Nnobbc32.exe File created C:\Windows\SysWOW64\Bhdcek32.dll Hkpdlo32.exe File created C:\Windows\SysWOW64\Gncaml32.exe Gkdeqp32.exe File created C:\Windows\SysWOW64\Pekilgfk.dll Feepcimh.exe File opened for modification C:\Windows\SysWOW64\Lejcjmkh.exe Lblgnale.exe File created C:\Windows\SysWOW64\Ejoqdb32.dll Coipmkho.exe File created C:\Windows\SysWOW64\Kghgok32.exe Keikco32.exe File created C:\Windows\SysWOW64\Jklndcne.dll Eeegll32.exe File created C:\Windows\SysWOW64\Lhcfki32.exe Leejon32.exe File created C:\Windows\SysWOW64\Pnphgc32.dll Qaigajaf.exe File opened for modification C:\Windows\SysWOW64\Acllhe32.exe Aanplj32.exe File opened for modification C:\Windows\SysWOW64\Ekpiii32.exe Ehbmmn32.exe File opened for modification C:\Windows\SysWOW64\Eamnkc32.exe Eonboheg.exe File created C:\Windows\SysWOW64\Gdpmil32.exe Gaaqmp32.exe File created C:\Windows\SysWOW64\Oelfqc32.dll Hoaqbc32.exe File opened for modification C:\Windows\SysWOW64\Jlmdiq32.exe Jeckmgco.exe File created C:\Windows\SysWOW64\Cengdopf.exe Cndohe32.exe File opened for modification C:\Windows\SysWOW64\Feepcimh.exe Fmnhalmf.exe File created C:\Windows\SysWOW64\Olchiiln.exe Oidlmnmk.exe File created C:\Windows\SysWOW64\Pepigjnd.exe Pbamknoq.exe File opened for modification C:\Windows\SysWOW64\Imcmme32.exe Ifieqk32.exe File created C:\Windows\SysWOW64\Deqmampq.exe Dofedb32.exe File opened for modification C:\Windows\SysWOW64\Eclkefln.exe Elbbil32.exe File created C:\Windows\SysWOW64\Bcehdn32.exe Bebhiajc.exe File created C:\Windows\SysWOW64\Ifdlelfa.exe Ikoghcfl.exe File created C:\Windows\SysWOW64\Anlpphmc.exe Qddlgc32.exe File created C:\Windows\SysWOW64\Hpndiimm.dll Dnpocc32.exe File opened for modification C:\Windows\SysWOW64\Elgldkpl.exe Eemcga32.exe File opened for modification C:\Windows\SysWOW64\Lemgjc32.exe Lbokng32.exe File created C:\Windows\SysWOW64\Onjhjajg.dll Dahepdiq.exe File opened for modification C:\Windows\SysWOW64\Fcenlecc.exe Flkeok32.exe File opened for modification C:\Windows\SysWOW64\Ibfleg32.exe Igqhgnmi.exe File created C:\Windows\SysWOW64\Bejedfgg.exe Bbkihk32.exe File created C:\Windows\SysWOW64\Qaigajaf.exe Qnkjeobb.exe File opened for modification C:\Windows\SysWOW64\Jkafjjck.exe Jegnmpkn.exe File created C:\Windows\SysWOW64\Jinqco32.exe Jbdhfe32.exe File created C:\Windows\SysWOW64\Llaoag32.exe Liccel32.exe File created C:\Windows\SysWOW64\Ekbfoi32.exe Edinbofa.exe File opened for modification C:\Windows\SysWOW64\Anlpphmc.exe Qddlgc32.exe File created C:\Windows\SysWOW64\Hknihnbn.dll Opaqog32.exe File opened for modification C:\Windows\SysWOW64\Hilbah32.exe Hfneem32.exe File created C:\Windows\SysWOW64\Mlbobkja.exe Meigea32.exe File opened for modification C:\Windows\SysWOW64\Mekckaqa.exe Mghcpd32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 11416 11872 WerFault.exe 615 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcboen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deldfm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Elgldkpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nplgdhfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikhjnaoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddlgljlc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Leejon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Laelad32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abhckmhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delkpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldinmk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjoqahhk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqdobbcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifkkldmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnkikf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kibddi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Liijehif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfpmnajf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kagopg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndhjombo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ogpiagih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndoginji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onmnda32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dlaibnbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doeoii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Elbbil32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odpppl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jciefmgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgehlpgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ibfleg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbcdigih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mipikq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqabmceo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npheconk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imaqhell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfnoljng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcbhllon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbokng32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnldcj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kelgho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmgjdi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alhnebia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jicahdgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kflkmh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eophja32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbbdgcdo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Feambq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hlqhah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hohgcb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Likppach.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifdekecf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igqhgnmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgmpjjdi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehbmmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghnepjhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iichag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajjgfh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deqmampq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgjcdj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lndehbpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dapheokm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbdhfe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kilmdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ogicahop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahqjooaf.dll" Dfomce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mekckaqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ogpiagih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Igqhgnmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cfaaagca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hdiiedfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dlaibnbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Imcmme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Begadp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oqeafcqa.dll" Hdpofcph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Llaoag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aanclfjl.dll" Ggblfpii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gnldcj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Igjknmdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Djdccefb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iniqmoae.dll" Jbdhfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kdhhaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kpdhkgel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gnhjhkdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aifjjg32.dll" Hgnkbool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Flkeok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngnbc32.dll" Gnhjhkdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pooofjja.dll" Eejgaaka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Adkbhbpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oeehacee.dll" Feoibk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fhaoieno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hnoqhj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ibmbeffg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aehedlqf.dll" Qgcond32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jnpbfebn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hlqhah32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ndcjjgbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Opejjgno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Baiphhcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cajiof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jeeahpmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maaopbdo.dll" Ihenmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgnlljco.dll" Pqkjpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mghcpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ophgpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ifdekecf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jehehf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnnage32.dll" Ieeoki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Igcdmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hggeaped.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggbkeekb.dll" Gdgcjkko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cekkopah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hbpmonfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Labole32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Elgldkpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lndqmb32.dll" Fdkcnlel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcoddmgf.dll" Bfahkibd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmbfhb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gacfhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkpjhe32.dll" Jeeahpmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcpibljp.dll" Opodjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdjnad32.dll" Obcaip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emdcaohh.dll" Ogpiagih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jgodil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Onjkdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bcehdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Leejon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Chamlj32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3696 wrote to memory of 4148 3696 b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02.exe 84 PID 3696 wrote to memory of 4148 3696 b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02.exe 84 PID 3696 wrote to memory of 4148 3696 b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02.exe 84 PID 4148 wrote to memory of 5788 4148 Kmgjdi32.exe 85 PID 4148 wrote to memory of 5788 4148 Kmgjdi32.exe 85 PID 4148 wrote to memory of 5788 4148 Kmgjdi32.exe 85 PID 5788 wrote to memory of 6120 5788 Kpefpd32.exe 86 PID 5788 wrote to memory of 6120 5788 Kpefpd32.exe 86 PID 5788 wrote to memory of 6120 5788 Kpefpd32.exe 86 PID 6120 wrote to memory of 5504 6120 Kfonmncp.exe 87 PID 6120 wrote to memory of 5504 6120 Kfonmncp.exe 87 PID 6120 wrote to memory of 5504 6120 Kfonmncp.exe 87 PID 5504 wrote to memory of 4988 5504 Kinkijcc.exe 88 PID 5504 wrote to memory of 4988 5504 Kinkijcc.exe 88 PID 5504 wrote to memory of 4988 5504 Kinkijcc.exe 88 PID 4988 wrote to memory of 1288 4988 Kagopg32.exe 89 PID 4988 wrote to memory of 1288 4988 Kagopg32.exe 89 PID 4988 wrote to memory of 1288 4988 Kagopg32.exe 89 PID 1288 wrote to memory of 2244 1288 Kbhlgoga.exe 90 PID 1288 wrote to memory of 2244 1288 Kbhlgoga.exe 90 PID 1288 wrote to memory of 2244 1288 Kbhlgoga.exe 90 PID 2244 wrote to memory of 5404 2244 Kibddi32.exe 91 PID 2244 wrote to memory of 5404 2244 Kibddi32.exe 91 PID 2244 wrote to memory of 5404 2244 Kibddi32.exe 91 PID 5404 wrote to memory of 5648 5404 Kdhhaa32.exe 92 PID 5404 wrote to memory of 5648 5404 Kdhhaa32.exe 92 PID 5404 wrote to memory of 5648 5404 Kdhhaa32.exe 92 PID 5648 wrote to memory of 2192 5648 Lkaqnlfa.exe 93 PID 5648 wrote to memory of 2192 5648 Lkaqnlfa.exe 93 PID 5648 wrote to memory of 2192 5648 Lkaqnlfa.exe 93 PID 2192 wrote to memory of 2024 2192 Lpoifc32.exe 94 PID 2192 wrote to memory of 2024 2192 Lpoifc32.exe 94 PID 2192 wrote to memory of 2024 2192 Lpoifc32.exe 94 PID 2024 wrote to memory of 5184 2024 Lghacmle.exe 95 PID 2024 wrote to memory of 5184 2024 Lghacmle.exe 95 PID 2024 wrote to memory of 5184 2024 Lghacmle.exe 95 PID 5184 wrote to memory of 6096 5184 Laneqekk.exe 96 PID 5184 wrote to memory of 6096 5184 Laneqekk.exe 96 PID 5184 wrote to memory of 6096 5184 Laneqekk.exe 96 PID 6096 wrote to memory of 6056 6096 Ldlamajo.exe 97 PID 6096 wrote to memory of 6056 6096 Ldlamajo.exe 97 PID 6096 wrote to memory of 6056 6096 Ldlamajo.exe 97 PID 6056 wrote to memory of 2960 6056 Liijehif.exe 98 PID 6056 wrote to memory of 2960 6056 Liijehif.exe 98 PID 6056 wrote to memory of 2960 6056 Liijehif.exe 98 PID 2960 wrote to memory of 5892 2960 Ldonbq32.exe 99 PID 2960 wrote to memory of 5892 2960 Ldonbq32.exe 99 PID 2960 wrote to memory of 5892 2960 Ldonbq32.exe 99 PID 5892 wrote to memory of 6008 5892 Lkifokpi.exe 100 PID 5892 wrote to memory of 6008 5892 Lkifokpi.exe 100 PID 5892 wrote to memory of 6008 5892 Lkifokpi.exe 100 PID 6008 wrote to memory of 2812 6008 Labole32.exe 101 PID 6008 wrote to memory of 2812 6008 Labole32.exe 101 PID 6008 wrote to memory of 2812 6008 Labole32.exe 101 PID 2812 wrote to memory of 5820 2812 Lmipqfmj.exe 102 PID 2812 wrote to memory of 5820 2812 Lmipqfmj.exe 102 PID 2812 wrote to memory of 5820 2812 Lmipqfmj.exe 102 PID 5820 wrote to memory of 1200 5820 Laelad32.exe 103 PID 5820 wrote to memory of 1200 5820 Laelad32.exe 103 PID 5820 wrote to memory of 1200 5820 Laelad32.exe 103 PID 1200 wrote to memory of 1468 1200 Ldchmpdg.exe 104 PID 1200 wrote to memory of 1468 1200 Ldchmpdg.exe 104 PID 1200 wrote to memory of 1468 1200 Ldchmpdg.exe 104 PID 1468 wrote to memory of 4620 1468 Mkmpjj32.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02.exe"C:\Users\Admin\AppData\Local\Temp\b3ee69f588e7f8f3383a510e3d51fe8ade98c77448323945ab3ff4f7e7814c02.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\Kmgjdi32.exeC:\Windows\system32\Kmgjdi32.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\Kpefpd32.exeC:\Windows\system32\Kpefpd32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5788 -
C:\Windows\SysWOW64\Kfonmncp.exeC:\Windows\system32\Kfonmncp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6120 -
C:\Windows\SysWOW64\Kinkijcc.exeC:\Windows\system32\Kinkijcc.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5504 -
C:\Windows\SysWOW64\Kagopg32.exeC:\Windows\system32\Kagopg32.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\Kbhlgoga.exeC:\Windows\system32\Kbhlgoga.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\Kibddi32.exeC:\Windows\system32\Kibddi32.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Kdhhaa32.exeC:\Windows\system32\Kdhhaa32.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5404 -
C:\Windows\SysWOW64\Lkaqnlfa.exeC:\Windows\system32\Lkaqnlfa.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5648 -
C:\Windows\SysWOW64\Lpoifc32.exeC:\Windows\system32\Lpoifc32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Lghacmle.exeC:\Windows\system32\Lghacmle.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\Laneqekk.exeC:\Windows\system32\Laneqekk.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5184 -
C:\Windows\SysWOW64\Ldlamajo.exeC:\Windows\system32\Ldlamajo.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6096 -
C:\Windows\SysWOW64\Liijehif.exeC:\Windows\system32\Liijehif.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6056 -
C:\Windows\SysWOW64\Ldonbq32.exeC:\Windows\system32\Ldonbq32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Lkifokpi.exeC:\Windows\system32\Lkifokpi.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5892 -
C:\Windows\SysWOW64\Labole32.exeC:\Windows\system32\Labole32.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:6008 -
C:\Windows\SysWOW64\Lmipqfmj.exeC:\Windows\system32\Lmipqfmj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\Laelad32.exeC:\Windows\system32\Laelad32.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5820 -
C:\Windows\SysWOW64\Ldchmpdg.exeC:\Windows\system32\Ldchmpdg.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Mkmpjj32.exeC:\Windows\system32\Mkmpjj32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\Mpjhba32.exeC:\Windows\system32\Mpjhba32.exe23⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\Mdfdcpbd.exeC:\Windows\system32\Mdfdcpbd.exe24⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\Mkpmpj32.exeC:\Windows\system32\Mkpmpj32.exe25⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\Mpmehq32.exeC:\Windows\system32\Mpmehq32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\Miejqf32.exeC:\Windows\system32\Miejqf32.exe27⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\Mdjnno32.exeC:\Windows\system32\Mdjnno32.exe28⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\Mgkgpj32.exeC:\Windows\system32\Mgkgpj32.exe29⤵
- Executes dropped EXE
PID:5344 -
C:\Windows\SysWOW64\Ndoginji.exeC:\Windows\system32\Ndoginji.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3300 -
C:\Windows\SysWOW64\Ncddjk32.exeC:\Windows\system32\Ncddjk32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5744 -
C:\Windows\SysWOW64\Npheconk.exeC:\Windows\system32\Npheconk.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5264 -
C:\Windows\SysWOW64\Nahanb32.exeC:\Windows\system32\Nahanb32.exe33⤵
- Executes dropped EXE
PID:4216 -
C:\Windows\SysWOW64\Ngdjfi32.exeC:\Windows\system32\Ngdjfi32.exe34⤵
- Executes dropped EXE
PID:3644 -
C:\Windows\SysWOW64\Nnobbc32.exeC:\Windows\system32\Nnobbc32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\Ndhjombo.exeC:\Windows\system32\Ndhjombo.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5424 -
C:\Windows\SysWOW64\Nggfkhab.exeC:\Windows\system32\Nggfkhab.exe37⤵
- Executes dropped EXE
PID:5752 -
C:\Windows\SysWOW64\Njebgdpf.exeC:\Windows\system32\Njebgdpf.exe38⤵
- Executes dropped EXE
PID:924 -
C:\Windows\SysWOW64\Oqokdn32.exeC:\Windows\system32\Oqokdn32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\Ogicahop.exeC:\Windows\system32\Ogicahop.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Oncknb32.exeC:\Windows\system32\Oncknb32.exe41⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\Ocpdfied.exeC:\Windows\system32\Ocpdfied.exe42⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\Okglgfef.exeC:\Windows\system32\Okglgfef.exe43⤵
- Executes dropped EXE
PID:4616 -
C:\Windows\SysWOW64\Onehcbdj.exeC:\Windows\system32\Onehcbdj.exe44⤵
- Executes dropped EXE
PID:4976 -
C:\Windows\SysWOW64\Odpppl32.exeC:\Windows\system32\Odpppl32.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5468 -
C:\Windows\SysWOW64\Okihmfcc.exeC:\Windows\system32\Okihmfcc.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\Obcaip32.exeC:\Windows\system32\Obcaip32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:412 -
C:\Windows\SysWOW64\Ogpiagih.exeC:\Windows\system32\Ogpiagih.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\Oklebf32.exeC:\Windows\system32\Oklebf32.exe49⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\Obfnopin.exeC:\Windows\system32\Obfnopin.exe50⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\Ogbfggge.exeC:\Windows\system32\Ogbfggge.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4308 -
C:\Windows\SysWOW64\Onmnda32.exeC:\Windows\system32\Onmnda32.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5572 -
C:\Windows\SysWOW64\Pqkjpl32.exeC:\Windows\system32\Pqkjpl32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2396 -
C:\Windows\SysWOW64\Pgebmf32.exeC:\Windows\system32\Pgebmf32.exe54⤵
- Executes dropped EXE
PID:5476 -
C:\Windows\SysWOW64\Pjcoib32.exeC:\Windows\system32\Pjcoib32.exe55⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\SysWOW64\Pqmgelkc.exeC:\Windows\system32\Pqmgelkc.exe56⤵
- Executes dropped EXE
PID:3516 -
C:\Windows\SysWOW64\Pclcagkg.exeC:\Windows\system32\Pclcagkg.exe57⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Pkckceki.exeC:\Windows\system32\Pkckceki.exe58⤵
- Executes dropped EXE
PID:5460 -
C:\Windows\SysWOW64\Pnahopjm.exeC:\Windows\system32\Pnahopjm.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2788 -
C:\Windows\SysWOW64\Pcnpgghd.exeC:\Windows\system32\Pcnpgghd.exe60⤵
- Executes dropped EXE
PID:4756 -
C:\Windows\SysWOW64\Pgjlhfam.exeC:\Windows\system32\Pgjlhfam.exe61⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\Pbopeoqc.exeC:\Windows\system32\Pbopeoqc.exe62⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\Pdnmajpg.exeC:\Windows\system32\Pdnmajpg.exe63⤵PID:5764
-
C:\Windows\SysWOW64\Pkgend32.exeC:\Windows\system32\Pkgend32.exe64⤵
- Executes dropped EXE
PID:5128 -
C:\Windows\SysWOW64\Pbamknoq.exeC:\Windows\system32\Pbamknoq.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5200 -
C:\Windows\SysWOW64\Pepigjnd.exeC:\Windows\system32\Pepigjnd.exe66⤵
- Executes dropped EXE
PID:4788 -
C:\Windows\SysWOW64\Pkjacdea.exeC:\Windows\system32\Pkjacdea.exe67⤵PID:4968
-
C:\Windows\SysWOW64\Pnhnpode.exeC:\Windows\system32\Pnhnpode.exe68⤵PID:2200
-
C:\Windows\SysWOW64\Qcefhfbl.exeC:\Windows\system32\Qcefhfbl.exe69⤵PID:5328
-
C:\Windows\SysWOW64\Qklniccn.exeC:\Windows\system32\Qklniccn.exe70⤵PID:2916
-
C:\Windows\SysWOW64\Qnkjeobb.exeC:\Windows\system32\Qnkjeobb.exe71⤵
- Drops file in System32 directory
PID:4324 -
C:\Windows\SysWOW64\Qaigajaf.exeC:\Windows\system32\Qaigajaf.exe72⤵
- Drops file in System32 directory
PID:2632 -
C:\Windows\SysWOW64\Qedbbi32.exeC:\Windows\system32\Qedbbi32.exe73⤵PID:5856
-
C:\Windows\SysWOW64\Qgcond32.exeC:\Windows\system32\Qgcond32.exe74⤵
- Modifies registry class
PID:5920 -
C:\Windows\SysWOW64\Qjakjphf.exeC:\Windows\system32\Qjakjphf.exe75⤵PID:5992
-
C:\Windows\SysWOW64\Abhckmhh.exeC:\Windows\system32\Abhckmhh.exe76⤵
- System Location Discovery: System Language Discovery
PID:5904 -
C:\Windows\SysWOW64\Aegogihl.exeC:\Windows\system32\Aegogihl.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3908 -
C:\Windows\SysWOW64\Akahdc32.exeC:\Windows\system32\Akahdc32.exe78⤵PID:2708
-
C:\Windows\SysWOW64\Anodpn32.exeC:\Windows\system32\Anodpn32.exe79⤵PID:2020
-
C:\Windows\SysWOW64\Aanplj32.exeC:\Windows\system32\Aanplj32.exe80⤵
- Drops file in System32 directory
PID:5048 -
C:\Windows\SysWOW64\Acllhe32.exeC:\Windows\system32\Acllhe32.exe81⤵PID:4004
-
C:\Windows\SysWOW64\Ajfdeoda.exeC:\Windows\system32\Ajfdeoda.exe82⤵PID:3804
-
C:\Windows\SysWOW64\Abmmfm32.exeC:\Windows\system32\Abmmfm32.exe83⤵PID:5612
-
C:\Windows\SysWOW64\Acoineja.exeC:\Windows\system32\Acoineja.exe84⤵PID:5368
-
C:\Windows\SysWOW64\Ajhako32.exeC:\Windows\system32\Ajhako32.exe85⤵PID:4016
-
C:\Windows\SysWOW64\Alhnebia.exeC:\Windows\system32\Alhnebia.exe86⤵
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\Aljjja32.exeC:\Windows\system32\Aljjja32.exe87⤵PID:4232
-
C:\Windows\SysWOW64\Bebocgmo.exeC:\Windows\system32\Bebocgmo.exe88⤵PID:1620
-
C:\Windows\SysWOW64\Baiphhcc.exeC:\Windows\system32\Baiphhcc.exe89⤵
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Bjbdan32.exeC:\Windows\system32\Bjbdan32.exe90⤵
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\Bbilbk32.exeC:\Windows\system32\Bbilbk32.exe91⤵PID:4296
-
C:\Windows\SysWOW64\Bhfdjb32.exeC:\Windows\system32\Bhfdjb32.exe92⤵PID:5088
-
C:\Windows\SysWOW64\Bjdafm32.exeC:\Windows\system32\Bjdafm32.exe93⤵PID:2652
-
C:\Windows\SysWOW64\Bbkihk32.exeC:\Windows\system32\Bbkihk32.exe94⤵
- Drops file in System32 directory
PID:756 -
C:\Windows\SysWOW64\Bejedfgg.exeC:\Windows\system32\Bejedfgg.exe95⤵PID:2456
-
C:\Windows\SysWOW64\Blcmqp32.exeC:\Windows\system32\Blcmqp32.exe96⤵PID:3248
-
C:\Windows\SysWOW64\Bjfnlmen.exeC:\Windows\system32\Bjfnlmen.exe97⤵PID:3488
-
C:\Windows\SysWOW64\Bbnemjfq.exeC:\Windows\system32\Bbnemjfq.exe98⤵PID:5580
-
C:\Windows\SysWOW64\Bdobeb32.exeC:\Windows\system32\Bdobeb32.exe99⤵PID:4460
-
C:\Windows\SysWOW64\Cjijamcl.exeC:\Windows\system32\Cjijamcl.exe100⤵PID:1684
-
C:\Windows\SysWOW64\Cacbng32.exeC:\Windows\system32\Cacbng32.exe101⤵PID:5772
-
C:\Windows\SysWOW64\Chmkka32.exeC:\Windows\system32\Chmkka32.exe102⤵PID:5156
-
C:\Windows\SysWOW64\Clhglpkn.exeC:\Windows\system32\Clhglpkn.exe103⤵PID:5556
-
C:\Windows\SysWOW64\Cbbohj32.exeC:\Windows\system32\Cbbohj32.exe104⤵PID:2600
-
C:\Windows\SysWOW64\Ceqkde32.exeC:\Windows\system32\Ceqkde32.exe105⤵PID:5964
-
C:\Windows\SysWOW64\Chogqq32.exeC:\Windows\system32\Chogqq32.exe106⤵PID:2288
-
C:\Windows\SysWOW64\Coipmkho.exeC:\Windows\system32\Coipmkho.exe107⤵
- Drops file in System32 directory
PID:1432 -
C:\Windows\SysWOW64\Cechje32.exeC:\Windows\system32\Cechje32.exe108⤵PID:5800
-
C:\Windows\SysWOW64\Chadfp32.exeC:\Windows\system32\Chadfp32.exe109⤵PID:3540
-
C:\Windows\SysWOW64\Cjppblnc.exeC:\Windows\system32\Cjppblnc.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2988 -
C:\Windows\SysWOW64\Cajiof32.exeC:\Windows\system32\Cajiof32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Cdheka32.exeC:\Windows\system32\Cdheka32.exe112⤵PID:5576
-
C:\Windows\SysWOW64\Clomlo32.exeC:\Windows\system32\Clomlo32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1364 -
C:\Windows\SysWOW64\Conihj32.exeC:\Windows\system32\Conihj32.exe114⤵PID:4444
-
C:\Windows\SysWOW64\Calede32.exeC:\Windows\system32\Calede32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3040 -
C:\Windows\SysWOW64\Dhfnapjk.exeC:\Windows\system32\Dhfnapjk.exe116⤵PID:3652
-
C:\Windows\SysWOW64\Dlaibnbc.exeC:\Windows\system32\Dlaibnbc.exe117⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5364 -
C:\Windows\SysWOW64\Dopfnjag.exeC:\Windows\system32\Dopfnjag.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4980 -
C:\Windows\SysWOW64\Daobjeak.exeC:\Windows\system32\Daobjeak.exe119⤵
- Drops file in System32 directory
PID:4176 -
C:\Windows\SysWOW64\Dldfgnqa.exeC:\Windows\system32\Dldfgnqa.exe120⤵PID:2528
-
C:\Windows\SysWOW64\Dbnodh32.exeC:\Windows\system32\Dbnodh32.exe121⤵PID:3456
-
C:\Windows\SysWOW64\Delkpc32.exeC:\Windows\system32\Delkpc32.exe122⤵
- System Location Discovery: System Language Discovery
PID:812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-