Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/12/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe
Resource
win10v2004-20241007-en
General
-
Target
29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe
-
Size
74KB
-
MD5
f9aa2d3d812b093f55774f1089b33f30
-
SHA1
1e46b011657a5e4e3f440db8d88b417173c2a955
-
SHA256
29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68ad
-
SHA512
4ce637c5480cd952c2501a0c24aec2ca9508d5e33a6dc9315592ba60937f9f0a4c720a4aa225f70105b36b1d04a6a26b539172660bd6c020d295ce21a280e9f3
-
SSDEEP
1536:7G7NVA3Vxi65ksJHkMHx7OmVozXAyfBHnOooDxHKsv3n:aw3Vxi65kEN7OpQlMY3n
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojljpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Abajahfg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbljmflj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgolnd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhioblgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lppgciga.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpgdmjpl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjjohe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmnnfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Keappapf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajcigf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmdkpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofnajk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjemfhgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Didnkogg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjbhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddlong32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Loeceeli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obbeimaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oqfblcgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfjqei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apndjm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amfooafm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmidknfh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dalfllhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mhbaijod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dancal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kojdig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pbbnpj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Banjkndi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfnhbngf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njnnnllj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pflmkimc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bffihe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bakmen32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcjide32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhldoifj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abajahfg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckfocc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lonndfba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njbgik32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbbnpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aihfhb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baiqpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nqhfkf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obphcm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbachf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmkaqnde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Khifln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kojdig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcjbkc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojecok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofbjdken.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnedfmlk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qiocbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Llpahkcm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqfblcgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ppmlcpil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdqpbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkdkeaoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lekbfpgk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppkonp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bdgmlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cikkeppa.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
pid Process 2564 Jpnagl32.exe 4112 Kaonodme.exe 2028 Khifln32.exe 3280 Kocnhhlo.exe 2160 Kaajdckb.exe 4012 Klgoalkh.exe 4336 Koeknh32.exe 2840 Kikokq32.exe 3320 Klikgl32.exe 2816 Kcccdfqb.exe 2344 Keappapf.exe 1504 Kpgdmjpl.exe 3936 Kojdig32.exe 2880 Kedlea32.exe 3240 Lajmkbcg.exe 1700 Llpahkcm.exe 1028 Lonndfba.exe 628 Lcjide32.exe 1812 Lehfqqjn.exe 2812 Llbnmk32.exe 1492 Loajjf32.exe 4864 Lekbfpgk.exe 4620 Lhioblgo.exe 4408 Lppgciga.exe 3252 Lcocpdfe.exe 744 Ljiklonb.exe 1236 Llgghjme.exe 4184 Loeceeli.exe 3752 Mcclkd32.exe 1976 Mllaci32.exe 4588 Mhbaijod.exe 3220 Mchffcnj.exe 2484 Mcjbkc32.exe 4876 Mlcgdhch.exe 5112 Mbppmoap.exe 4644 Nqqpjgio.exe 4648 Nbblbo32.exe 3404 Nfnhbngf.exe 2400 Nhldoifj.exe 4400 Nbdiho32.exe 1232 Nfpehmec.exe 4344 Nhnadidg.exe 3596 Nbfemnkg.exe 1708 Njnnnllj.exe 2576 Nqhfkf32.exe 408 Nicjph32.exe 2588 Nqjbqe32.exe 4028 Nfgkilok.exe 3516 Njbgik32.exe 3384 Ooopbb32.exe 3816 Ojecok32.exe 1068 Omcpkf32.exe 2876 Obphcm32.exe 2728 Oijqpg32.exe 1640 Oqaiad32.exe 844 Obbeimaj.exe 2272 Ofnajk32.exe 2412 Oilmfg32.exe 4436 Obdbolog.exe 4472 Ojljpi32.exe 4592 Oqfblcgf.exe 3620 Ofbjdken.exe 4880 Pmmcad32.exe 2004 Ppkonp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Njnnnllj.exe Nbfemnkg.exe File opened for modification C:\Windows\SysWOW64\Cdncliaj.exe Cmdkpo32.exe File opened for modification C:\Windows\SysWOW64\Cinhjp32.exe Cgolnd32.exe File created C:\Windows\SysWOW64\Cmkaqnde.exe Cipepo32.exe File created C:\Windows\SysWOW64\Klgoalkh.exe Kaajdckb.exe File created C:\Windows\SysWOW64\Hnjdme32.dll Kcccdfqb.exe File created C:\Windows\SysWOW64\Lcocpdfe.exe Lppgciga.exe File created C:\Windows\SysWOW64\Mllaci32.exe Mcclkd32.exe File opened for modification C:\Windows\SysWOW64\Njbgik32.exe Nfgkilok.exe File created C:\Windows\SysWOW64\Ofnajk32.exe Obbeimaj.exe File created C:\Windows\SysWOW64\Dapbnf32.dll Pmopgdjh.exe File opened for modification C:\Windows\SysWOW64\Cmnnfn32.exe Cibaeoij.exe File created C:\Windows\SysWOW64\Kocnhhlo.exe Khifln32.exe File opened for modification C:\Windows\SysWOW64\Mhbaijod.exe Mllaci32.exe File opened for modification C:\Windows\SysWOW64\Mchffcnj.exe Mhbaijod.exe File created C:\Windows\SysWOW64\Nhldoifj.exe Nfnhbngf.exe File opened for modification C:\Windows\SysWOW64\Nqjbqe32.exe Nicjph32.exe File created C:\Windows\SysWOW64\Gkbhpocn.dll Pmmcad32.exe File created C:\Windows\SysWOW64\Pamhmb32.exe Pfgdpj32.exe File opened for modification C:\Windows\SysWOW64\Cgaidd32.exe Cdclgh32.exe File created C:\Windows\SysWOW64\Cgeedfgk.dll Koeknh32.exe File created C:\Windows\SysWOW64\Kojdig32.exe Kpgdmjpl.exe File created C:\Windows\SysWOW64\Lajmkbcg.exe Kedlea32.exe File opened for modification C:\Windows\SysWOW64\Nqhfkf32.exe Njnnnllj.exe File opened for modification C:\Windows\SysWOW64\Cmidknfh.exe Cinhjp32.exe File created C:\Windows\SysWOW64\Aeinaj32.dll Kedlea32.exe File opened for modification C:\Windows\SysWOW64\Llbnmk32.exe Lehfqqjn.exe File opened for modification C:\Windows\SysWOW64\Pfjqei32.exe Pamhmb32.exe File opened for modification C:\Windows\SysWOW64\Ppbeno32.exe Pjemfhgo.exe File created C:\Windows\SysWOW64\Cinhjp32.exe Cgolnd32.exe File created C:\Windows\SysWOW64\Djilbf32.dll Kaajdckb.exe File opened for modification C:\Windows\SysWOW64\Kikokq32.exe Koeknh32.exe File created C:\Windows\SysWOW64\Mcclkd32.exe Loeceeli.exe File created C:\Windows\SysWOW64\Afcclh32.exe Qcdgom32.exe File created C:\Windows\SysWOW64\Binafnin.dll Nbdiho32.exe File opened for modification C:\Windows\SysWOW64\Nicjph32.exe Nqhfkf32.exe File created C:\Windows\SysWOW64\Oilmfg32.exe Ofnajk32.exe File created C:\Windows\SysWOW64\Ppbeno32.exe Pjemfhgo.exe File opened for modification C:\Windows\SysWOW64\Klgoalkh.exe Kaajdckb.exe File created C:\Windows\SysWOW64\Koeknh32.exe Klgoalkh.exe File created C:\Windows\SysWOW64\Bbikji32.dll Klgoalkh.exe File created C:\Windows\SysWOW64\Mlcgdhch.exe Mcjbkc32.exe File created C:\Windows\SysWOW64\Ckfocc32.exe Bdlfgicm.exe File created C:\Windows\SysWOW64\Cmdkpo32.exe Ckfocc32.exe File opened for modification C:\Windows\SysWOW64\Bdlfgicm.exe Banjkndi.exe File opened for modification C:\Windows\SysWOW64\Llgghjme.exe Ljiklonb.exe File opened for modification C:\Windows\SysWOW64\Pfgdpj32.exe Ppmlcpil.exe File created C:\Windows\SysWOW64\Bjjohe32.exe Abcgghde.exe File created C:\Windows\SysWOW64\Banjkndi.exe Bkcbnd32.exe File opened for modification C:\Windows\SysWOW64\Cipepo32.exe Cgaidd32.exe File created C:\Windows\SysWOW64\Cchiie32.exe Cmkaqnde.exe File opened for modification C:\Windows\SysWOW64\Didnkogg.exe Cmnnfn32.exe File opened for modification C:\Windows\SysWOW64\Loajjf32.exe Llbnmk32.exe File opened for modification C:\Windows\SysWOW64\Nfgkilok.exe Nqjbqe32.exe File created C:\Windows\SysWOW64\Hiodmnil.dll Obbeimaj.exe File opened for modification C:\Windows\SysWOW64\Pmmcad32.exe Ofbjdken.exe File created C:\Windows\SysWOW64\Kcccdfqb.exe Klikgl32.exe File opened for modification C:\Windows\SysWOW64\Ppkonp32.exe Pmmcad32.exe File opened for modification C:\Windows\SysWOW64\Qcbjjm32.exe Qadnna32.exe File created C:\Windows\SysWOW64\Gbgnlcdn.dll Bdgmlj32.exe File created C:\Windows\SysWOW64\Pjemfhgo.exe Pfjqei32.exe File created C:\Windows\SysWOW64\Ajhbbegj.exe Abajahfg.exe File created C:\Windows\SysWOW64\Cgaidd32.exe Cdclgh32.exe File created C:\Windows\SysWOW64\Dnedfmlk.exe Dkfgjamg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5628 5540 WerFault.exe 214 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kocnhhlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kaajdckb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baiqpo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mchffcnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqqpjgio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhldoifj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bafdjoja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbblbo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lonndfba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obbeimaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lekbfpgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lppgciga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oqaiad32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oilmfg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppkonp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qcbjjm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amaeca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aihfhb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kedlea32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofnajk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppmlcpil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfjqei32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keappapf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhbaijod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbfemnkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqhfkf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abajahfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbachf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klikgl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ooopbb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omcpkf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obdbolog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abcgghde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Didnkogg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkfgjamg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dalfllhi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfnhbngf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njbgik32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qiocbd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qcdgom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddolcgch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oqfblcgf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pbbnpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmidknfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klgoalkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Koeknh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llpahkcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfpehmec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afcclh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apkhdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkcbnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnedfmlk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcccdfqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ljiklonb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nicjph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmfegc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amfooafm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmnnfn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbppmoap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbdiho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajalaf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kikokq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lajmkbcg.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Llpahkcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnkjpp32.dll" Ppbeno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajhbbegj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Amfooafm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cmnnfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhdgbo32.dll" Kojdig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lajmkbcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Neelfb32.dll" Nfnhbngf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khjlnb32.dll" Qadnna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cphfbgja.dll" Afcclh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jckdih32.dll" Cmnnfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lehfqqjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmkjjl32.dll" Mbppmoap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljedqcfg.dll" Kikokq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lppgciga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gklhgk32.dll" Nbblbo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Njnnnllj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oijqpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajcigf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jpnagl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgeedfgk.dll" Koeknh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lcocpdfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgmihlci.dll" Obphcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cbachf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dalfllhi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kaajdckb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kojdig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nbfemnkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nqhfkf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Njbgik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Obdbolog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qcdgom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdebhm32.dll" Bjohcdab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lekbfpgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mcclkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lemgdggn.dll" Loeceeli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofbjdken.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hahdfe32.dll" Bjjohe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfgipmap.dll" Bmikdq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dancal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idelqf32.dll" Lajmkbcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eginhm32.dll" Lhioblgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abigbemk.dll" Njnnnllj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nfgkilok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajalaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggcdbcmg.dll" Baiqpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kojdig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nqqpjgio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ojljpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ppkonp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pmopgdjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klngce32.dll" Pamhmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bjjohe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cinhjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djilbf32.dll" Kaajdckb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nbfemnkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kaonodme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agbghi32.dll" Nbfemnkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oqaiad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mifceapa.dll" Ajhbbegj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bdgmlj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bakmen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbjanacc.dll" 29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adqinb32.dll" Jpnagl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 2564 5064 29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe 82 PID 5064 wrote to memory of 2564 5064 29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe 82 PID 5064 wrote to memory of 2564 5064 29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe 82 PID 2564 wrote to memory of 4112 2564 Jpnagl32.exe 83 PID 2564 wrote to memory of 4112 2564 Jpnagl32.exe 83 PID 2564 wrote to memory of 4112 2564 Jpnagl32.exe 83 PID 4112 wrote to memory of 2028 4112 Kaonodme.exe 84 PID 4112 wrote to memory of 2028 4112 Kaonodme.exe 84 PID 4112 wrote to memory of 2028 4112 Kaonodme.exe 84 PID 2028 wrote to memory of 3280 2028 Khifln32.exe 85 PID 2028 wrote to memory of 3280 2028 Khifln32.exe 85 PID 2028 wrote to memory of 3280 2028 Khifln32.exe 85 PID 3280 wrote to memory of 2160 3280 Kocnhhlo.exe 86 PID 3280 wrote to memory of 2160 3280 Kocnhhlo.exe 86 PID 3280 wrote to memory of 2160 3280 Kocnhhlo.exe 86 PID 2160 wrote to memory of 4012 2160 Kaajdckb.exe 87 PID 2160 wrote to memory of 4012 2160 Kaajdckb.exe 87 PID 2160 wrote to memory of 4012 2160 Kaajdckb.exe 87 PID 4012 wrote to memory of 4336 4012 Klgoalkh.exe 88 PID 4012 wrote to memory of 4336 4012 Klgoalkh.exe 88 PID 4012 wrote to memory of 4336 4012 Klgoalkh.exe 88 PID 4336 wrote to memory of 2840 4336 Koeknh32.exe 89 PID 4336 wrote to memory of 2840 4336 Koeknh32.exe 89 PID 4336 wrote to memory of 2840 4336 Koeknh32.exe 89 PID 2840 wrote to memory of 3320 2840 Kikokq32.exe 90 PID 2840 wrote to memory of 3320 2840 Kikokq32.exe 90 PID 2840 wrote to memory of 3320 2840 Kikokq32.exe 90 PID 3320 wrote to memory of 2816 3320 Klikgl32.exe 91 PID 3320 wrote to memory of 2816 3320 Klikgl32.exe 91 PID 3320 wrote to memory of 2816 3320 Klikgl32.exe 91 PID 2816 wrote to memory of 2344 2816 Kcccdfqb.exe 92 PID 2816 wrote to memory of 2344 2816 Kcccdfqb.exe 92 PID 2816 wrote to memory of 2344 2816 Kcccdfqb.exe 92 PID 2344 wrote to memory of 1504 2344 Keappapf.exe 93 PID 2344 wrote to memory of 1504 2344 Keappapf.exe 93 PID 2344 wrote to memory of 1504 2344 Keappapf.exe 93 PID 1504 wrote to memory of 3936 1504 Kpgdmjpl.exe 94 PID 1504 wrote to memory of 3936 1504 Kpgdmjpl.exe 94 PID 1504 wrote to memory of 3936 1504 Kpgdmjpl.exe 94 PID 3936 wrote to memory of 2880 3936 Kojdig32.exe 95 PID 3936 wrote to memory of 2880 3936 Kojdig32.exe 95 PID 3936 wrote to memory of 2880 3936 Kojdig32.exe 95 PID 2880 wrote to memory of 3240 2880 Kedlea32.exe 96 PID 2880 wrote to memory of 3240 2880 Kedlea32.exe 96 PID 2880 wrote to memory of 3240 2880 Kedlea32.exe 96 PID 3240 wrote to memory of 1700 3240 Lajmkbcg.exe 97 PID 3240 wrote to memory of 1700 3240 Lajmkbcg.exe 97 PID 3240 wrote to memory of 1700 3240 Lajmkbcg.exe 97 PID 1700 wrote to memory of 1028 1700 Llpahkcm.exe 98 PID 1700 wrote to memory of 1028 1700 Llpahkcm.exe 98 PID 1700 wrote to memory of 1028 1700 Llpahkcm.exe 98 PID 1028 wrote to memory of 628 1028 Lonndfba.exe 99 PID 1028 wrote to memory of 628 1028 Lonndfba.exe 99 PID 1028 wrote to memory of 628 1028 Lonndfba.exe 99 PID 628 wrote to memory of 1812 628 Lcjide32.exe 100 PID 628 wrote to memory of 1812 628 Lcjide32.exe 100 PID 628 wrote to memory of 1812 628 Lcjide32.exe 100 PID 1812 wrote to memory of 2812 1812 Lehfqqjn.exe 101 PID 1812 wrote to memory of 2812 1812 Lehfqqjn.exe 101 PID 1812 wrote to memory of 2812 1812 Lehfqqjn.exe 101 PID 2812 wrote to memory of 1492 2812 Llbnmk32.exe 102 PID 2812 wrote to memory of 1492 2812 Llbnmk32.exe 102 PID 2812 wrote to memory of 1492 2812 Llbnmk32.exe 102 PID 1492 wrote to memory of 4864 1492 Loajjf32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe"C:\Users\Admin\AppData\Local\Temp\29574850d388bf1f9357a1a9404bf81de615cb5c9c03f04d4db7f63afb3d68adN.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\Jpnagl32.exeC:\Windows\system32\Jpnagl32.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\Kaonodme.exeC:\Windows\system32\Kaonodme.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\Khifln32.exeC:\Windows\system32\Khifln32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Kocnhhlo.exeC:\Windows\system32\Kocnhhlo.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\Kaajdckb.exeC:\Windows\system32\Kaajdckb.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\Klgoalkh.exeC:\Windows\system32\Klgoalkh.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\Koeknh32.exeC:\Windows\system32\Koeknh32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\Kikokq32.exeC:\Windows\system32\Kikokq32.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Klikgl32.exeC:\Windows\system32\Klikgl32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\Kcccdfqb.exeC:\Windows\system32\Kcccdfqb.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Keappapf.exeC:\Windows\system32\Keappapf.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Kpgdmjpl.exeC:\Windows\system32\Kpgdmjpl.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\Kojdig32.exeC:\Windows\system32\Kojdig32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\Kedlea32.exeC:\Windows\system32\Kedlea32.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Lajmkbcg.exeC:\Windows\system32\Lajmkbcg.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\Llpahkcm.exeC:\Windows\system32\Llpahkcm.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\Lonndfba.exeC:\Windows\system32\Lonndfba.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\Lcjide32.exeC:\Windows\system32\Lcjide32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\Lehfqqjn.exeC:\Windows\system32\Lehfqqjn.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\Llbnmk32.exeC:\Windows\system32\Llbnmk32.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\Loajjf32.exeC:\Windows\system32\Loajjf32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\Lekbfpgk.exeC:\Windows\system32\Lekbfpgk.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4864 -
C:\Windows\SysWOW64\Lhioblgo.exeC:\Windows\system32\Lhioblgo.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4620 -
C:\Windows\SysWOW64\Lppgciga.exeC:\Windows\system32\Lppgciga.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4408 -
C:\Windows\SysWOW64\Lcocpdfe.exeC:\Windows\system32\Lcocpdfe.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\Ljiklonb.exeC:\Windows\system32\Ljiklonb.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:744 -
C:\Windows\SysWOW64\Llgghjme.exeC:\Windows\system32\Llgghjme.exe28⤵
- Executes dropped EXE
PID:1236 -
C:\Windows\SysWOW64\Loeceeli.exeC:\Windows\system32\Loeceeli.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4184 -
C:\Windows\SysWOW64\Mcclkd32.exeC:\Windows\system32\Mcclkd32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3752 -
C:\Windows\SysWOW64\Mllaci32.exeC:\Windows\system32\Mllaci32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1976 -
C:\Windows\SysWOW64\Mhbaijod.exeC:\Windows\system32\Mhbaijod.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4588 -
C:\Windows\SysWOW64\Mchffcnj.exeC:\Windows\system32\Mchffcnj.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Windows\SysWOW64\Mcjbkc32.exeC:\Windows\system32\Mcjbkc32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2484 -
C:\Windows\SysWOW64\Mlcgdhch.exeC:\Windows\system32\Mlcgdhch.exe35⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\Mbppmoap.exeC:\Windows\system32\Mbppmoap.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5112 -
C:\Windows\SysWOW64\Nqqpjgio.exeC:\Windows\system32\Nqqpjgio.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4644 -
C:\Windows\SysWOW64\Nbblbo32.exeC:\Windows\system32\Nbblbo32.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4648 -
C:\Windows\SysWOW64\Nfnhbngf.exeC:\Windows\system32\Nfnhbngf.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3404 -
C:\Windows\SysWOW64\Nhldoifj.exeC:\Windows\system32\Nhldoifj.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\Nbdiho32.exeC:\Windows\system32\Nbdiho32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4400 -
C:\Windows\SysWOW64\Nfpehmec.exeC:\Windows\system32\Nfpehmec.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1232 -
C:\Windows\SysWOW64\Nhnadidg.exeC:\Windows\system32\Nhnadidg.exe43⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\Nbfemnkg.exeC:\Windows\system32\Nbfemnkg.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3596 -
C:\Windows\SysWOW64\Njnnnllj.exeC:\Windows\system32\Njnnnllj.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Nqhfkf32.exeC:\Windows\system32\Nqhfkf32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Nicjph32.exeC:\Windows\system32\Nicjph32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\Nqjbqe32.exeC:\Windows\system32\Nqjbqe32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\Nfgkilok.exeC:\Windows\system32\Nfgkilok.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4028 -
C:\Windows\SysWOW64\Njbgik32.exeC:\Windows\system32\Njbgik32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3516 -
C:\Windows\SysWOW64\Ooopbb32.exeC:\Windows\system32\Ooopbb32.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Windows\SysWOW64\Ojecok32.exeC:\Windows\system32\Ojecok32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3816 -
C:\Windows\SysWOW64\Omcpkf32.exeC:\Windows\system32\Omcpkf32.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\Obphcm32.exeC:\Windows\system32\Obphcm32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\Oijqpg32.exeC:\Windows\system32\Oijqpg32.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:2728 -
C:\Windows\SysWOW64\Oqaiad32.exeC:\Windows\system32\Oqaiad32.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1640 -
C:\Windows\SysWOW64\Obbeimaj.exeC:\Windows\system32\Obbeimaj.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\Ofnajk32.exeC:\Windows\system32\Ofnajk32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\Oilmfg32.exeC:\Windows\system32\Oilmfg32.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\Obdbolog.exeC:\Windows\system32\Obdbolog.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4436 -
C:\Windows\SysWOW64\Ojljpi32.exeC:\Windows\system32\Ojljpi32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4472 -
C:\Windows\SysWOW64\Oqfblcgf.exeC:\Windows\system32\Oqfblcgf.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4592 -
C:\Windows\SysWOW64\Ofbjdken.exeC:\Windows\system32\Ofbjdken.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3620 -
C:\Windows\SysWOW64\Pmmcad32.exeC:\Windows\system32\Pmmcad32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4880 -
C:\Windows\SysWOW64\Ppkonp32.exeC:\Windows\system32\Ppkonp32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2004 -
C:\Windows\SysWOW64\Pjqckikd.exeC:\Windows\system32\Pjqckikd.exe66⤵PID:1056
-
C:\Windows\SysWOW64\Pmopgdjh.exeC:\Windows\system32\Pmopgdjh.exe67⤵
- Drops file in System32 directory
- Modifies registry class
PID:4380 -
C:\Windows\SysWOW64\Ppmlcpil.exeC:\Windows\system32\Ppmlcpil.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\Pfgdpj32.exeC:\Windows\system32\Pfgdpj32.exe69⤵
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\Pamhmb32.exeC:\Windows\system32\Pamhmb32.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:3036 -
C:\Windows\SysWOW64\Pfjqei32.exeC:\Windows\system32\Pfjqei32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\Pjemfhgo.exeC:\Windows\system32\Pjemfhgo.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:316 -
C:\Windows\SysWOW64\Ppbeno32.exeC:\Windows\system32\Ppbeno32.exe73⤵
- Modifies registry class
PID:4904 -
C:\Windows\SysWOW64\Pflmkimc.exeC:\Windows\system32\Pflmkimc.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4992 -
C:\Windows\SysWOW64\Pmfegc32.exeC:\Windows\system32\Pmfegc32.exe75⤵
- System Location Discovery: System Language Discovery
PID:5080 -
C:\Windows\SysWOW64\Pbbnpj32.exeC:\Windows\system32\Pbbnpj32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\Qadnna32.exeC:\Windows\system32\Qadnna32.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:4412 -
C:\Windows\SysWOW64\Qcbjjm32.exeC:\Windows\system32\Qcbjjm32.exe78⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\Qiocbd32.exeC:\Windows\system32\Qiocbd32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:688 -
C:\Windows\SysWOW64\Qcdgom32.exeC:\Windows\system32\Qcdgom32.exe80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3984 -
C:\Windows\SysWOW64\Afcclh32.exeC:\Windows\system32\Afcclh32.exe81⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4704 -
C:\Windows\SysWOW64\Apkhdn32.exeC:\Windows\system32\Apkhdn32.exe82⤵
- System Location Discovery: System Language Discovery
PID:3892 -
C:\Windows\SysWOW64\Ajalaf32.exeC:\Windows\system32\Ajalaf32.exe83⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4656 -
C:\Windows\SysWOW64\Apndjm32.exeC:\Windows\system32\Apndjm32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1984 -
C:\Windows\SysWOW64\Ajcigf32.exeC:\Windows\system32\Ajcigf32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4580 -
C:\Windows\SysWOW64\Amaeca32.exeC:\Windows\system32\Amaeca32.exe86⤵
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\Ajeemfil.exeC:\Windows\system32\Ajeemfil.exe87⤵PID:3856
-
C:\Windows\SysWOW64\Aihfhb32.exeC:\Windows\system32\Aihfhb32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:392 -
C:\Windows\SysWOW64\Abajahfg.exeC:\Windows\system32\Abajahfg.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\Ajhbbegj.exeC:\Windows\system32\Ajhbbegj.exe90⤵
- Modifies registry class
PID:708 -
C:\Windows\SysWOW64\Amfooafm.exeC:\Windows\system32\Amfooafm.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4540 -
C:\Windows\SysWOW64\Abcgghde.exeC:\Windows\system32\Abcgghde.exe92⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4396 -
C:\Windows\SysWOW64\Bjjohe32.exeC:\Windows\system32\Bjjohe32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4324 -
C:\Windows\SysWOW64\Bmikdq32.exeC:\Windows\system32\Bmikdq32.exe94⤵
- Modifies registry class
PID:612 -
C:\Windows\SysWOW64\Bbedlg32.exeC:\Windows\system32\Bbedlg32.exe95⤵PID:4452
-
C:\Windows\SysWOW64\Bjmlme32.exeC:\Windows\system32\Bjmlme32.exe96⤵PID:3336
-
C:\Windows\SysWOW64\Bafdjoja.exeC:\Windows\system32\Bafdjoja.exe97⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\Bdepfjie.exeC:\Windows\system32\Bdepfjie.exe98⤵PID:1444
-
C:\Windows\SysWOW64\Bjohcdab.exeC:\Windows\system32\Bjohcdab.exe99⤵
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\Baiqpo32.exeC:\Windows\system32\Baiqpo32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\Bdgmlj32.exeC:\Windows\system32\Bdgmlj32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\Bffihe32.exeC:\Windows\system32\Bffihe32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5048 -
C:\Windows\SysWOW64\Bakmen32.exeC:\Windows\system32\Bakmen32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1152 -
C:\Windows\SysWOW64\Bbljmflj.exeC:\Windows\system32\Bbljmflj.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1832 -
C:\Windows\SysWOW64\Bkcbnd32.exeC:\Windows\system32\Bkcbnd32.exe105⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\Banjkndi.exeC:\Windows\system32\Banjkndi.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1720 -
C:\Windows\SysWOW64\Bdlfgicm.exeC:\Windows\system32\Bdlfgicm.exe107⤵
- Drops file in System32 directory
PID:740 -
C:\Windows\SysWOW64\Ckfocc32.exeC:\Windows\system32\Ckfocc32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3756 -
C:\Windows\SysWOW64\Cmdkpo32.exeC:\Windows\system32\Cmdkpo32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4828 -
C:\Windows\SysWOW64\Cdncliaj.exeC:\Windows\system32\Cdncliaj.exe110⤵PID:1368
-
C:\Windows\SysWOW64\Cbachf32.exeC:\Windows\system32\Cbachf32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2396 -
C:\Windows\SysWOW64\Cikkeppa.exeC:\Windows\system32\Cikkeppa.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4248 -
C:\Windows\SysWOW64\Cdqpbi32.exeC:\Windows\system32\Cdqpbi32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:936 -
C:\Windows\SysWOW64\Cgolnd32.exeC:\Windows\system32\Cgolnd32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\Cinhjp32.exeC:\Windows\system32\Cinhjp32.exe115⤵
- Drops file in System32 directory
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\Cmidknfh.exeC:\Windows\system32\Cmidknfh.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\Cdclgh32.exeC:\Windows\system32\Cdclgh32.exe117⤵
- Drops file in System32 directory
PID:2188 -
C:\Windows\SysWOW64\Cgaidd32.exeC:\Windows\system32\Cgaidd32.exe118⤵
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Cipepo32.exeC:\Windows\system32\Cipepo32.exe119⤵
- Drops file in System32 directory
PID:540 -
C:\Windows\SysWOW64\Cmkaqnde.exeC:\Windows\system32\Cmkaqnde.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2204 -
C:\Windows\SysWOW64\Cchiie32.exeC:\Windows\system32\Cchiie32.exe121⤵PID:4276
-
C:\Windows\SysWOW64\Cibaeoij.exeC:\Windows\system32\Cibaeoij.exe122⤵
- Drops file in System32 directory
PID:3440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-