Overview
overview
10Static
static
10[DemonArch...6d.exe
windows7-x64
10[DemonArch...87.exe
windows7-x64
10[DemonArch...4b.exe
windows7-x64
10[DemonArch...9e.exe
windows7-x64
10[DemonArch...ca.exe
windows7-x64
10[DemonArch...8c.exe
windows7-x64
10[DemonArch...1a.exe
windows7-x64
10[DemonArch...4c.exe
windows7-x64
10[DemonArch...c4.exe
windows7-x64
10[DemonArch...68.exe
windows7-x64
10[DemonArch...50.exe
windows7-x64
10[DemonArch...3e.exe
windows7-x64
10[DemonArch...8b.exe
windows7-x64
10[DemonArch...f0.exe
windows7-x64
10[DemonArch...e1.exe
windows7-x64
10[DemonArch...89.exe
windows7-x64
[DemonArch...e5.exe
windows7-x64
10[DemonArch...85.exe
windows7-x64
10[DemonArch...6b.exe
windows7-x64
10[DemonArch...d0.exe
windows7-x64
10[DemonArch...1e.exe
windows7-x64
10[DemonArch...25.exe
windows7-x64
[DemonArch...31.exe
windows7-x64
9[DemonArch...5f.exe
windows7-x64
10[DemonArch...d3.exe
windows7-x64
10[DemonArch...a5.exe
windows7-x64
10[DemonArch...bb.exe
windows7-x64
3[DemonArch...25.exe
windows7-x64
10[DemonArch...49.exe
windows7-x64
10[DemonArch...4c.exe
windows7-x64
10[DemonArch...ec.exe
windows7-x64
10[DemonArch...ae.exe
windows7-x64
10Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 17:15
Behavioral task
behavioral1
Sample
[DemonArchives]02602e9283805090b671a783870db86d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
[DemonArchives]0838231d7fbebe340c0ac71db0ef8c87.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
[DemonArchives]0ad8190f1160f00fc831fb329262724b.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
[DemonArchives]0bcfb8285b7397bcfc2ffb92a6c5ec9e.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
[DemonArchives]0dbf8f84a143e3e446242938dfd288ca.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe
Resource
win7-20240419-en
Behavioral task
behavioral7
Sample
[DemonArchives]1443a4458c2b4af35c618a327b7c411a.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
[DemonArchives]15282a5c1d8e03a448ebc0b70e702a4c.exe
Resource
win7-20240508-en
Behavioral task
behavioral9
Sample
[DemonArchives]156c78364b84a89c8e61f444c3c620c4.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
[DemonArchives]15ff3ff6cb29ac4c66a558d101e37068.exe
Resource
win7-20240419-en
Behavioral task
behavioral11
Sample
[DemonArchives]18227e20a5e842198e7271ae54397150.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
[DemonArchives]1d957e984fcd6327f30f7006e2d11f3e.exe
Resource
win7-20240419-en
Behavioral task
behavioral13
Sample
[DemonArchives]1e2c3685399d381aa04ba4d70651e38b.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
[DemonArchives]291b00fb921e80b1cf7e8154693947f0.exe
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
[DemonArchives]2b961a5aadff93e0d87b42e530d5a0e1.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
[DemonArchives]2be60b607087d60c5353062345f97789.exe
Resource
win7-20240611-en
Behavioral task
behavioral17
Sample
[DemonArchives]2e23d0d084cd18f08897dfe509bdd4e5.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
[DemonArchives]2edac22166e0d82bc1c652e331726c85.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
[DemonArchives]31c25cdf7b77267744cdc37912e48d6b.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe
Resource
win7-20240419-en
Behavioral task
behavioral21
Sample
[DemonArchives]34172ec379dab98d177ab7e31d517b1e.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
[DemonArchives]4cf4cbd1bc2ef0ddfe3530541ffdd925.exe
Resource
win7-20231129-en
Behavioral task
behavioral23
Sample
[DemonArchives]54b9e4e56454226484e80fd01ca03131.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
[DemonArchives]9a4605cedcda1924728fbe58d429915f.exe
Resource
win7-20240220-en
Behavioral task
behavioral25
Sample
[DemonArchives]a2113a088085d07d2d7688ab2b0914d3.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
[DemonArchives]aa18a0770ed7d03bddfb00e126fbbba5.exe
Resource
win7-20240611-en
Behavioral task
behavioral27
Sample
[DemonArchives]ac7cf64a560bda15c281c43780b8d5bb.exe
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
[DemonArchives]af6fb7fbf240ae2f6490766919b26325.exe
Resource
win7-20231129-en
Behavioral task
behavioral29
Sample
[DemonArchives]b09a0cd1c32edf39308043eed7889449.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
[DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
[DemonArchives]b3c170550a1efdf268632916e95ad1ec.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
[DemonArchives]b83b3408e6ade0a5c61c5870208000ae.exe
Resource
win7-20240221-en
General
-
Target
[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe
-
Size
398KB
-
MD5
13bba40208ea1f05d660ffad53c40c8c
-
SHA1
9673bf830c65e3c4de175b2900f219278747be0d
-
SHA256
e270f7d80f0999adf9faec7b4420296162720cbd4eaf1565469637b22449c2c0
-
SHA512
c6fdb3391488d0fe113dd7ec15b88dd403c6ba8f6d70ea93da12ef03a25403581a4ca5ed03d7533ae20685584c514cefeb12952546ffb9fa78b1a4fde1efb69c
-
SSDEEP
12288:UTz6t3XGCByvNv54B9f01ZmHByvNv5imipWf0Aq:Wz6t3XGpvr4B9f01ZmQvrimipWf0Aq
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Bhfagipa.exeMmahdggc.exeOmdneebf.exeAekodi32.exeEbjglbml.exeAdhlaggp.exeInqcif32.exeNpdjje32.exeOcnfbo32.exeObafnlpn.exeAhlgfdeq.exeDgodbh32.exeCdgneh32.exeEbbgid32.exePnlqnl32.exeDcadac32.exeEjhlgaeh.exeEgllae32.exeEchfaf32.exeBnefdp32.exeHkkalk32.exeIaeiieeb.exeMoiklogi.exeDjklnnaj.exeHpkjko32.exeNacgdhlp.exeOqmmpd32.exeDbbkja32.exeFbgmbg32.exeLdfgebbe.exeEgjpkffe.exeDnilobkm.exeHogmmjfo.exeKmaled32.exeNehmdhja.exeNaoniipe.exeBifgdk32.exeMkobnqan.exeNnennj32.exeHpmgqnfl.exeFaagpp32.exeOobjaqaj.exePfjbgnme.exeQpecfc32.exeBmmiij32.exeNqcagfim.exeIfcbodli.exeQcpofbjl.exeFeeiob32.exeQfokbnip.exeMmhodf32.exeMdkqqa32.exePaejki32.exeDlgldibq.exeEnhacojl.exeJkbcln32.exeIhoafpmp.exeLafndg32.exeBmpfojmp.exeDfoqmo32.exeHknach32.exeEffcma32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhfagipa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mmahdggc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Omdneebf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aekodi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebjglbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Adhlaggp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inqcif32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npdjje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ocnfbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Obafnlpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ahlgfdeq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgodbh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdgneh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebbgid32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnlqnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dcadac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ejhlgaeh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egllae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Echfaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bnefdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hkkalk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iaeiieeb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moiklogi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Djklnnaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hpkjko32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nacgdhlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oqmmpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dbbkja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fbgmbg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldfgebbe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egjpkffe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dnilobkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bhfagipa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hogmmjfo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmaled32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nehmdhja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Naoniipe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bifgdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mkobnqan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nnennj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hpmgqnfl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faagpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oobjaqaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfjbgnme.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpecfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmmiij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqcagfim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ifcbodli.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcpofbjl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feeiob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qfokbnip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mmhodf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mdkqqa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejhlgaeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Paejki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlgldibq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enhacojl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jkbcln32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihoafpmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lafndg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmpfojmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfoqmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hknach32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Effcma32.exe -
Executes dropped EXE 64 IoCs
Processes:
Mepnpj32.exeMkmfhacp.exeMohbip32.exeMagnek32.exeMhqfbebj.exeMkobnqan.exeNgfcca32.exeNnplpl32.exeNocemcbj.exeNhlifi32.exeNqcagfim.exeNbdnoo32.exeNohnhc32.exeOdegpj32.exeObigjnkf.exeOgfpbeim.exeObkdonic.exeOnbddoog.exeOgjimd32.exeOmgaek32.exeOcajbekl.exeOngnonkb.exePaejki32.exePfbccp32.exePipopl32.exePpjglfon.exePjpkjond.exePbkpna32.exePiehkkcl.exePfiidobe.exePigeqkai.exePpamme32.exePenfelgm.exeQjknnbed.exeQbbfopeg.exeQdccfh32.exeQljkhe32.exeQmlgonbe.exeAdeplhib.exeAfdlhchf.exeAajpelhl.exeAdhlaggp.exeAjbdna32.exeAalmklfi.exeApomfh32.exeAbmibdlh.exeAmbmpmln.exeApajlhka.exeAbpfhcje.exeAenbdoii.exeAmejeljk.exeApcfahio.exeAbbbnchb.exeAepojo32.exeAhokfj32.exeBoiccdnf.exeBebkpn32.exeBkodhe32.exeBeehencq.exeBhcdaibd.exeBkaqmeah.exeBommnc32.exeBegeknan.exeBhfagipa.exepid process 844 Mepnpj32.exe 2644 Mkmfhacp.exe 2688 Mohbip32.exe 2820 Magnek32.exe 2584 Mhqfbebj.exe 2612 Mkobnqan.exe 2456 Ngfcca32.exe 2780 Nnplpl32.exe 1800 Nocemcbj.exe 1812 Nhlifi32.exe 1664 Nqcagfim.exe 1764 Nbdnoo32.exe 1740 Nohnhc32.exe 1272 Odegpj32.exe 3044 Obigjnkf.exe 788 Ogfpbeim.exe 2480 Obkdonic.exe 1760 Onbddoog.exe 1628 Ogjimd32.exe 3036 Omgaek32.exe 684 Ocajbekl.exe 980 Ongnonkb.exe 3008 Paejki32.exe 2616 Pfbccp32.exe 2840 Pipopl32.exe 2680 Ppjglfon.exe 2816 Pjpkjond.exe 2588 Pbkpna32.exe 2032 Piehkkcl.exe 2548 Pfiidobe.exe 2408 Pigeqkai.exe 1704 Ppamme32.exe 2596 Penfelgm.exe 1732 Qjknnbed.exe 2752 Qbbfopeg.exe 332 Qdccfh32.exe 1852 Qljkhe32.exe 688 Qmlgonbe.exe 748 Adeplhib.exe 1804 Afdlhchf.exe 3056 Aajpelhl.exe 1404 Adhlaggp.exe 2964 Ajbdna32.exe 1612 Aalmklfi.exe 852 Apomfh32.exe 2260 Abmibdlh.exe 2800 Ambmpmln.exe 2392 Apajlhka.exe 2524 Abpfhcje.exe 2404 Aenbdoii.exe 2116 Amejeljk.exe 1988 Apcfahio.exe 2828 Abbbnchb.exe 1788 Aepojo32.exe 1880 Ahokfj32.exe 1980 Boiccdnf.exe 2108 Bebkpn32.exe 1056 Bkodhe32.exe 876 Beehencq.exe 2624 Bhcdaibd.exe 1624 Bkaqmeah.exe 2636 Bommnc32.exe 2120 Begeknan.exe 2748 Bhfagipa.exe -
Loads dropped DLL 64 IoCs
Processes:
[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exeMepnpj32.exeMkmfhacp.exeMohbip32.exeMagnek32.exeMhqfbebj.exeMkobnqan.exeNgfcca32.exeNnplpl32.exeNocemcbj.exeNhlifi32.exeNqcagfim.exeNbdnoo32.exeNohnhc32.exeOdegpj32.exeObigjnkf.exeOgfpbeim.exeObkdonic.exeOnbddoog.exeOgjimd32.exeOmgaek32.exeOcajbekl.exeOngnonkb.exePaejki32.exePfbccp32.exePipopl32.exePpjglfon.exePjpkjond.exePbkpna32.exePiehkkcl.exePfiidobe.exePigeqkai.exepid process 1728 [DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe 1728 [DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe 844 Mepnpj32.exe 844 Mepnpj32.exe 2644 Mkmfhacp.exe 2644 Mkmfhacp.exe 2688 Mohbip32.exe 2688 Mohbip32.exe 2820 Magnek32.exe 2820 Magnek32.exe 2584 Mhqfbebj.exe 2584 Mhqfbebj.exe 2612 Mkobnqan.exe 2612 Mkobnqan.exe 2456 Ngfcca32.exe 2456 Ngfcca32.exe 2780 Nnplpl32.exe 2780 Nnplpl32.exe 1800 Nocemcbj.exe 1800 Nocemcbj.exe 1812 Nhlifi32.exe 1812 Nhlifi32.exe 1664 Nqcagfim.exe 1664 Nqcagfim.exe 1764 Nbdnoo32.exe 1764 Nbdnoo32.exe 1740 Nohnhc32.exe 1740 Nohnhc32.exe 1272 Odegpj32.exe 1272 Odegpj32.exe 3044 Obigjnkf.exe 3044 Obigjnkf.exe 788 Ogfpbeim.exe 788 Ogfpbeim.exe 2480 Obkdonic.exe 2480 Obkdonic.exe 1760 Onbddoog.exe 1760 Onbddoog.exe 1628 Ogjimd32.exe 1628 Ogjimd32.exe 3036 Omgaek32.exe 3036 Omgaek32.exe 684 Ocajbekl.exe 684 Ocajbekl.exe 980 Ongnonkb.exe 980 Ongnonkb.exe 3008 Paejki32.exe 3008 Paejki32.exe 2616 Pfbccp32.exe 2616 Pfbccp32.exe 2840 Pipopl32.exe 2840 Pipopl32.exe 2680 Ppjglfon.exe 2680 Ppjglfon.exe 2816 Pjpkjond.exe 2816 Pjpkjond.exe 2588 Pbkpna32.exe 2588 Pbkpna32.exe 2032 Piehkkcl.exe 2032 Piehkkcl.exe 2548 Pfiidobe.exe 2548 Pfiidobe.exe 2408 Pigeqkai.exe 2408 Pigeqkai.exe -
Drops file in System32 directory 64 IoCs
Processes:
Faagpp32.exeOnmdoioa.exeOnhgbmfb.exeDolnad32.exePfbccp32.exeBommnc32.exeHlfdkoin.exeIkpjgkjq.exeNhiffc32.exeNpdjje32.exeCdgneh32.exeEdpmjj32.exePpjglfon.exeEgdilkbf.exeDqlafm32.exeFjgoce32.exeGmgdddmq.exeGhmiam32.exeLbcnhjnj.exeAenbdoii.exeBeehencq.exeLflmci32.exeOobjaqaj.exePjadmnic.exeQbcpbo32.exeBlbfjg32.exeBblogakg.exeEgamfkdh.exeFcmgfkeg.exeEmnndlod.exeIdceea32.exeBppoqeja.exeCclkfdnc.exeCpjiajeb.exeHkkalk32.exeLafndg32.exeObafnlpn.exePnomcl32.exeBmpfojmp.exeMhqfbebj.exeFphafl32.exeIhankokm.exePgbhabjp.exeQedhdjnh.exeEmieil32.exeChcqpmep.exeGonnhhln.exeIcmlam32.exeLojomkdn.exeNcjqhmkm.exeNpfgpe32.exeAlnqqd32.exeCgmkmecg.exeIoijbj32.exeBmmiij32.exeDfamcogo.exeEplkpgnh.exeFfkcbgek.exeAbmbhn32.exeIfnechbj.exeOcgpappk.exeEgafleqm.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Fdoclk32.exe Faagpp32.exe File created C:\Windows\SysWOW64\Olpdjf32.exe Onmdoioa.exe File created C:\Windows\SysWOW64\Obcccl32.exe Onhgbmfb.exe File created C:\Windows\SysWOW64\Dbkknojp.exe Dolnad32.exe File created C:\Windows\SysWOW64\Pipopl32.exe Pfbccp32.exe File created C:\Windows\SysWOW64\Begeknan.exe Bommnc32.exe File opened for modification C:\Windows\SysWOW64\Hodpgjha.exe Hlfdkoin.exe File created C:\Windows\SysWOW64\Iokfhi32.exe Ikpjgkjq.exe File created C:\Windows\SysWOW64\Gonahjjd.dll Nhiffc32.exe File created C:\Windows\SysWOW64\Ndpfkdmf.exe Npdjje32.exe File created C:\Windows\SysWOW64\Hdjlnm32.dll Cdgneh32.exe File opened for modification C:\Windows\SysWOW64\Eccmffjf.exe Edpmjj32.exe File created C:\Windows\SysWOW64\Kfammbdf.dll Ppjglfon.exe File created C:\Windows\SysWOW64\Ejbfhfaj.exe Egdilkbf.exe File opened for modification C:\Windows\SysWOW64\Dgfjbgmh.exe Dqlafm32.exe File created C:\Windows\SysWOW64\Ongbcmlc.dll Fjgoce32.exe File created C:\Windows\SysWOW64\Dbnkge32.dll Gmgdddmq.exe File opened for modification C:\Windows\SysWOW64\Gkkemh32.exe Ghmiam32.exe File created C:\Windows\SysWOW64\Lafndg32.exe Lbcnhjnj.exe File created C:\Windows\SysWOW64\Amejeljk.exe Aenbdoii.exe File created C:\Windows\SysWOW64\Bhcdaibd.exe Beehencq.exe File created C:\Windows\SysWOW64\Leonofpp.exe Lflmci32.exe File created C:\Windows\SysWOW64\Hgggfhdc.dll Oobjaqaj.exe File created C:\Windows\SysWOW64\Kolpjf32.dll Pjadmnic.exe File created C:\Windows\SysWOW64\Qfokbnip.exe Qbcpbo32.exe File created C:\Windows\SysWOW64\Boqbfb32.exe Blbfjg32.exe File created C:\Windows\SysWOW64\Fgpimg32.dll Bblogakg.exe File created C:\Windows\SysWOW64\Lpdhmlbj.dll Egamfkdh.exe File opened for modification C:\Windows\SysWOW64\Ffkcbgek.exe Fcmgfkeg.exe File opened for modification C:\Windows\SysWOW64\Eplkpgnh.exe Emnndlod.exe File created C:\Windows\SysWOW64\Amammd32.dll Idceea32.exe File created C:\Windows\SysWOW64\Bbokmqie.exe Bppoqeja.exe File opened for modification C:\Windows\SysWOW64\Cjfccn32.exe Cclkfdnc.exe File created C:\Windows\SysWOW64\Hkfmal32.dll Cpjiajeb.exe File created C:\Windows\SysWOW64\Ojhcelga.dll Hkkalk32.exe File created C:\Windows\SysWOW64\Leajdfnm.exe Lafndg32.exe File opened for modification C:\Windows\SysWOW64\Odobjg32.exe Obafnlpn.exe File created C:\Windows\SysWOW64\Lijfoo32.dll Pnomcl32.exe File created C:\Windows\SysWOW64\Fjhlioai.dll Bmpfojmp.exe File created C:\Windows\SysWOW64\Peegic32.dll Mhqfbebj.exe File opened for modification C:\Windows\SysWOW64\Fbgmbg32.exe Fphafl32.exe File created C:\Windows\SysWOW64\Pacmbbii.dll Ihankokm.exe File opened for modification C:\Windows\SysWOW64\Pkndaa32.exe Pgbhabjp.exe File opened for modification C:\Windows\SysWOW64\Aipddi32.exe Qedhdjnh.exe File opened for modification C:\Windows\SysWOW64\Edpmjj32.exe Emieil32.exe File created C:\Windows\SysWOW64\Cpjiajeb.exe Chcqpmep.exe File opened for modification C:\Windows\SysWOW64\Gegfdb32.exe Gonnhhln.exe File created C:\Windows\SysWOW64\Igihbknb.exe Icmlam32.exe File created C:\Windows\SysWOW64\Nbpiak32.dll Lojomkdn.exe File opened for modification C:\Windows\SysWOW64\Nehmdhja.exe Ncjqhmkm.exe File created C:\Windows\SysWOW64\Pgmkloid.dll Npfgpe32.exe File created C:\Windows\SysWOW64\Abjlmo32.dll Alnqqd32.exe File created C:\Windows\SysWOW64\Cjlgiqbk.exe Cgmkmecg.exe File created C:\Windows\SysWOW64\Jdnaob32.dll Ioijbj32.exe File created C:\Windows\SysWOW64\Bpleef32.exe Bmmiij32.exe File created C:\Windows\SysWOW64\Dhpiojfb.exe Dfamcogo.exe File created C:\Windows\SysWOW64\Najgne32.dll Eplkpgnh.exe File opened for modification C:\Windows\SysWOW64\Fjgoce32.exe Ffkcbgek.exe File opened for modification C:\Windows\SysWOW64\Aaobdjof.exe Abmbhn32.exe File created C:\Windows\SysWOW64\Ljdjcj32.dll Ifnechbj.exe File opened for modification C:\Windows\SysWOW64\Ogblbo32.exe Ocgpappk.exe File created C:\Windows\SysWOW64\Ippdhfji.dll Abmbhn32.exe File opened for modification C:\Windows\SysWOW64\Dbkknojp.exe Dolnad32.exe File opened for modification C:\Windows\SysWOW64\Ejobhppq.exe Egafleqm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 7128 6076 WerFault.exe Fkckeh32.exe -
Modifies registry class 64 IoCs
Processes:
Bnbjopoi.exeEmhlfmgj.exeGhkllmoi.exeHknach32.exeIfcbodli.exeIjeghgoh.exeMkobnqan.exePbkpna32.exePjenhm32.exeFmpkjkma.exeMpigfa32.exePgeefbhm.exeJonplmcb.exeCojema32.exeDolnad32.exeDkcofe32.exeGmgdddmq.exeIhoafpmp.exeFjlhneio.exeLfjqnjkh.exeBhndldcn.exeCgbdhd32.exeFejgko32.exeMdpjlajk.exePggbla32.exeCahail32.exeDbkknojp.exeIncpoe32.exeMgimmm32.exeGhoegl32.exeJokcgmee.exeLbcnhjnj.exeMgljbm32.exeNejiih32.exePfjbgnme.exeApomfh32.exeCgpgce32.exeAnojbobe.exePikkiijf.exeAnlmmp32.exeAibajhdn.exeBdbhke32.exeCoelaaoi.exeCclkfdnc.exeEgllae32.exeQmlgonbe.exeOikojfgk.exeQcpofbjl.exeBemgilhh.exe[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exeDjefobmk.exeFbgmbg32.exeGmjaic32.exeLlfifq32.exeLmolnh32.exeOqmmpd32.exeAhgnke32.exeBoiccdnf.exeDmoipopd.exeEffcma32.exeFphafl32.exeFeeiob32.exeFiaeoang.exeInqcif32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bnbjopoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Emhlfmgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ghkllmoi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hknach32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ifcbodli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ijeghgoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Peinaf32.dll" Mkobnqan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pbkpna32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pjenhm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fmpkjkma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mpigfa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pgeefbhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afldcl32.dll" Jonplmcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejmmiihp.dll" Cojema32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dolnad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dkcofe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbnkge32.dll" Gmgdddmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdpfph32.dll" Ihoafpmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghqknigk.dll" Fjlhneio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckqfeoma.dll" Lfjqnjkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geiiogja.dll" Bhndldcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cgbdhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Facklcaq.dll" Fejgko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgagbb32.dll" Mdpjlajk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pggbla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmnlfg32.dll" Cahail32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dbkknojp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Incpoe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mgimmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ghoegl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chgdod32.dll" Jokcgmee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmpipp32.dll" Lbcnhjnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mgljbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbnhbg32.dll" Nejiih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pfjbgnme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Apomfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cgpgce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Anojbobe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdmqokqf.dll" Pikkiijf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fehofegb.dll" Anlmmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aibajhdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bdbhke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Coelaaoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fahgfoih.dll" Cclkfdnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Egllae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qmlgonbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcaiqm32.dll" Oikojfgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qcpofbjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffdiejho.dll" Bemgilhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfmimf32.dll" [DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Djefobmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fbgmbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gmjaic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Llfifq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lmolnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oqmmpd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ahgnke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Boiccdnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lefmambf.dll" Dmoipopd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Effcma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfekgp32.dll" Fphafl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Feeiob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fiaeoang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Inqcif32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exeMepnpj32.exeMkmfhacp.exeMohbip32.exeMagnek32.exeMhqfbebj.exeMkobnqan.exeNgfcca32.exeNnplpl32.exeNocemcbj.exeNhlifi32.exeNqcagfim.exeNbdnoo32.exeNohnhc32.exeOdegpj32.exeObigjnkf.exedescription pid process target process PID 1728 wrote to memory of 844 1728 [DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe Mepnpj32.exe PID 1728 wrote to memory of 844 1728 [DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe Mepnpj32.exe PID 1728 wrote to memory of 844 1728 [DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe Mepnpj32.exe PID 1728 wrote to memory of 844 1728 [DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe Mepnpj32.exe PID 844 wrote to memory of 2644 844 Mepnpj32.exe Mkmfhacp.exe PID 844 wrote to memory of 2644 844 Mepnpj32.exe Mkmfhacp.exe PID 844 wrote to memory of 2644 844 Mepnpj32.exe Mkmfhacp.exe PID 844 wrote to memory of 2644 844 Mepnpj32.exe Mkmfhacp.exe PID 2644 wrote to memory of 2688 2644 Mkmfhacp.exe Mohbip32.exe PID 2644 wrote to memory of 2688 2644 Mkmfhacp.exe Mohbip32.exe PID 2644 wrote to memory of 2688 2644 Mkmfhacp.exe Mohbip32.exe PID 2644 wrote to memory of 2688 2644 Mkmfhacp.exe Mohbip32.exe PID 2688 wrote to memory of 2820 2688 Mohbip32.exe Magnek32.exe PID 2688 wrote to memory of 2820 2688 Mohbip32.exe Magnek32.exe PID 2688 wrote to memory of 2820 2688 Mohbip32.exe Magnek32.exe PID 2688 wrote to memory of 2820 2688 Mohbip32.exe Magnek32.exe PID 2820 wrote to memory of 2584 2820 Magnek32.exe Mhqfbebj.exe PID 2820 wrote to memory of 2584 2820 Magnek32.exe Mhqfbebj.exe PID 2820 wrote to memory of 2584 2820 Magnek32.exe Mhqfbebj.exe PID 2820 wrote to memory of 2584 2820 Magnek32.exe Mhqfbebj.exe PID 2584 wrote to memory of 2612 2584 Mhqfbebj.exe Mkobnqan.exe PID 2584 wrote to memory of 2612 2584 Mhqfbebj.exe Mkobnqan.exe PID 2584 wrote to memory of 2612 2584 Mhqfbebj.exe Mkobnqan.exe PID 2584 wrote to memory of 2612 2584 Mhqfbebj.exe Mkobnqan.exe PID 2612 wrote to memory of 2456 2612 Mkobnqan.exe Ngfcca32.exe PID 2612 wrote to memory of 2456 2612 Mkobnqan.exe Ngfcca32.exe PID 2612 wrote to memory of 2456 2612 Mkobnqan.exe Ngfcca32.exe PID 2612 wrote to memory of 2456 2612 Mkobnqan.exe Ngfcca32.exe PID 2456 wrote to memory of 2780 2456 Ngfcca32.exe Nnplpl32.exe PID 2456 wrote to memory of 2780 2456 Ngfcca32.exe Nnplpl32.exe PID 2456 wrote to memory of 2780 2456 Ngfcca32.exe Nnplpl32.exe PID 2456 wrote to memory of 2780 2456 Ngfcca32.exe Nnplpl32.exe PID 2780 wrote to memory of 1800 2780 Nnplpl32.exe Nocemcbj.exe PID 2780 wrote to memory of 1800 2780 Nnplpl32.exe Nocemcbj.exe PID 2780 wrote to memory of 1800 2780 Nnplpl32.exe Nocemcbj.exe PID 2780 wrote to memory of 1800 2780 Nnplpl32.exe Nocemcbj.exe PID 1800 wrote to memory of 1812 1800 Nocemcbj.exe Nhlifi32.exe PID 1800 wrote to memory of 1812 1800 Nocemcbj.exe Nhlifi32.exe PID 1800 wrote to memory of 1812 1800 Nocemcbj.exe Nhlifi32.exe PID 1800 wrote to memory of 1812 1800 Nocemcbj.exe Nhlifi32.exe PID 1812 wrote to memory of 1664 1812 Nhlifi32.exe Nqcagfim.exe PID 1812 wrote to memory of 1664 1812 Nhlifi32.exe Nqcagfim.exe PID 1812 wrote to memory of 1664 1812 Nhlifi32.exe Nqcagfim.exe PID 1812 wrote to memory of 1664 1812 Nhlifi32.exe Nqcagfim.exe PID 1664 wrote to memory of 1764 1664 Nqcagfim.exe Nbdnoo32.exe PID 1664 wrote to memory of 1764 1664 Nqcagfim.exe Nbdnoo32.exe PID 1664 wrote to memory of 1764 1664 Nqcagfim.exe Nbdnoo32.exe PID 1664 wrote to memory of 1764 1664 Nqcagfim.exe Nbdnoo32.exe PID 1764 wrote to memory of 1740 1764 Nbdnoo32.exe Nohnhc32.exe PID 1764 wrote to memory of 1740 1764 Nbdnoo32.exe Nohnhc32.exe PID 1764 wrote to memory of 1740 1764 Nbdnoo32.exe Nohnhc32.exe PID 1764 wrote to memory of 1740 1764 Nbdnoo32.exe Nohnhc32.exe PID 1740 wrote to memory of 1272 1740 Nohnhc32.exe Odegpj32.exe PID 1740 wrote to memory of 1272 1740 Nohnhc32.exe Odegpj32.exe PID 1740 wrote to memory of 1272 1740 Nohnhc32.exe Odegpj32.exe PID 1740 wrote to memory of 1272 1740 Nohnhc32.exe Odegpj32.exe PID 1272 wrote to memory of 3044 1272 Odegpj32.exe Obigjnkf.exe PID 1272 wrote to memory of 3044 1272 Odegpj32.exe Obigjnkf.exe PID 1272 wrote to memory of 3044 1272 Odegpj32.exe Obigjnkf.exe PID 1272 wrote to memory of 3044 1272 Odegpj32.exe Obigjnkf.exe PID 3044 wrote to memory of 788 3044 Obigjnkf.exe Ogfpbeim.exe PID 3044 wrote to memory of 788 3044 Obigjnkf.exe Ogfpbeim.exe PID 3044 wrote to memory of 788 3044 Obigjnkf.exe Ogfpbeim.exe PID 3044 wrote to memory of 788 3044 Obigjnkf.exe Ogfpbeim.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe"C:\Users\Admin\AppData\Local\Temp\[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\Mepnpj32.exeC:\Windows\system32\Mepnpj32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\Mkmfhacp.exeC:\Windows\system32\Mkmfhacp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Mohbip32.exeC:\Windows\system32\Mohbip32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Magnek32.exeC:\Windows\system32\Magnek32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Mhqfbebj.exeC:\Windows\system32\Mhqfbebj.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\Mkobnqan.exeC:\Windows\system32\Mkobnqan.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\Ngfcca32.exeC:\Windows\system32\Ngfcca32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\Nnplpl32.exeC:\Windows\system32\Nnplpl32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Nocemcbj.exeC:\Windows\system32\Nocemcbj.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\Nhlifi32.exeC:\Windows\system32\Nhlifi32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\Nqcagfim.exeC:\Windows\system32\Nqcagfim.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Nbdnoo32.exeC:\Windows\system32\Nbdnoo32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\Nohnhc32.exeC:\Windows\system32\Nohnhc32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\Odegpj32.exeC:\Windows\system32\Odegpj32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Obigjnkf.exeC:\Windows\system32\Obigjnkf.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Ogfpbeim.exeC:\Windows\system32\Ogfpbeim.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788 -
C:\Windows\SysWOW64\Obkdonic.exeC:\Windows\system32\Obkdonic.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2480 -
C:\Windows\SysWOW64\Onbddoog.exeC:\Windows\system32\Onbddoog.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Windows\SysWOW64\Ogjimd32.exeC:\Windows\system32\Ogjimd32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628 -
C:\Windows\SysWOW64\Omgaek32.exeC:\Windows\system32\Omgaek32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3036 -
C:\Windows\SysWOW64\Ocajbekl.exeC:\Windows\system32\Ocajbekl.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:684 -
C:\Windows\SysWOW64\Ongnonkb.exeC:\Windows\system32\Ongnonkb.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:980 -
C:\Windows\SysWOW64\Paejki32.exeC:\Windows\system32\Paejki32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3008 -
C:\Windows\SysWOW64\Pfbccp32.exeC:\Windows\system32\Pfbccp32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2616 -
C:\Windows\SysWOW64\Pipopl32.exeC:\Windows\system32\Pipopl32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Windows\SysWOW64\Ppjglfon.exeC:\Windows\system32\Ppjglfon.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\Pjpkjond.exeC:\Windows\system32\Pjpkjond.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816 -
C:\Windows\SysWOW64\Pbkpna32.exeC:\Windows\system32\Pbkpna32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\Piehkkcl.exeC:\Windows\system32\Piehkkcl.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Windows\SysWOW64\Pfiidobe.exeC:\Windows\system32\Pfiidobe.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2548 -
C:\Windows\SysWOW64\Pigeqkai.exeC:\Windows\system32\Pigeqkai.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408 -
C:\Windows\SysWOW64\Ppamme32.exeC:\Windows\system32\Ppamme32.exe33⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\SysWOW64\Penfelgm.exeC:\Windows\system32\Penfelgm.exe34⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\Qjknnbed.exeC:\Windows\system32\Qjknnbed.exe35⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Qbbfopeg.exeC:\Windows\system32\Qbbfopeg.exe36⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\SysWOW64\Qdccfh32.exeC:\Windows\system32\Qdccfh32.exe37⤵
- Executes dropped EXE
PID:332 -
C:\Windows\SysWOW64\Qljkhe32.exeC:\Windows\system32\Qljkhe32.exe38⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\Qmlgonbe.exeC:\Windows\system32\Qmlgonbe.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:688 -
C:\Windows\SysWOW64\Adeplhib.exeC:\Windows\system32\Adeplhib.exe40⤵
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\Afdlhchf.exeC:\Windows\system32\Afdlhchf.exe41⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Aajpelhl.exeC:\Windows\system32\Aajpelhl.exe42⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\Adhlaggp.exeC:\Windows\system32\Adhlaggp.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Ajbdna32.exeC:\Windows\system32\Ajbdna32.exe44⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\Aalmklfi.exeC:\Windows\system32\Aalmklfi.exe45⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Apomfh32.exeC:\Windows\system32\Apomfh32.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:852 -
C:\Windows\SysWOW64\Abmibdlh.exeC:\Windows\system32\Abmibdlh.exe47⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Ambmpmln.exeC:\Windows\system32\Ambmpmln.exe48⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Apajlhka.exeC:\Windows\system32\Apajlhka.exe49⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\Abpfhcje.exeC:\Windows\system32\Abpfhcje.exe50⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\Aenbdoii.exeC:\Windows\system32\Aenbdoii.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2404 -
C:\Windows\SysWOW64\Amejeljk.exeC:\Windows\system32\Amejeljk.exe52⤵
- Executes dropped EXE
PID:2116 -
C:\Windows\SysWOW64\Apcfahio.exeC:\Windows\system32\Apcfahio.exe53⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\Abbbnchb.exeC:\Windows\system32\Abbbnchb.exe54⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Aepojo32.exeC:\Windows\system32\Aepojo32.exe55⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\Ahokfj32.exeC:\Windows\system32\Ahokfj32.exe56⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\Boiccdnf.exeC:\Windows\system32\Boiccdnf.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:1980 -
C:\Windows\SysWOW64\Bebkpn32.exeC:\Windows\system32\Bebkpn32.exe58⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\Bkodhe32.exeC:\Windows\system32\Bkodhe32.exe59⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\Beehencq.exeC:\Windows\system32\Beehencq.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:876 -
C:\Windows\SysWOW64\Bhcdaibd.exeC:\Windows\system32\Bhcdaibd.exe61⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\Bkaqmeah.exeC:\Windows\system32\Bkaqmeah.exe62⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Bommnc32.exeC:\Windows\system32\Bommnc32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\Begeknan.exeC:\Windows\system32\Begeknan.exe64⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\Bhfagipa.exeC:\Windows\system32\Bhfagipa.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\Bghabf32.exeC:\Windows\system32\Bghabf32.exe66⤵PID:1720
-
C:\Windows\SysWOW64\Bnbjopoi.exeC:\Windows\system32\Bnbjopoi.exe67⤵
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\Bpafkknm.exeC:\Windows\system32\Bpafkknm.exe68⤵PID:1564
-
C:\Windows\SysWOW64\Bhhnli32.exeC:\Windows\system32\Bhhnli32.exe69⤵PID:3028
-
C:\Windows\SysWOW64\Bkfjhd32.exeC:\Windows\system32\Bkfjhd32.exe70⤵PID:2232
-
C:\Windows\SysWOW64\Bnefdp32.exeC:\Windows\system32\Bnefdp32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2184 -
C:\Windows\SysWOW64\Bdooajdc.exeC:\Windows\system32\Bdooajdc.exe72⤵PID:2836
-
C:\Windows\SysWOW64\Cgmkmecg.exeC:\Windows\system32\Cgmkmecg.exe73⤵
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\Cjlgiqbk.exeC:\Windows\system32\Cjlgiqbk.exe74⤵PID:2968
-
C:\Windows\SysWOW64\Cljcelan.exeC:\Windows\system32\Cljcelan.exe75⤵PID:1824
-
C:\Windows\SysWOW64\Cgpgce32.exeC:\Windows\system32\Cgpgce32.exe76⤵
- Modifies registry class
PID:2812 -
C:\Windows\SysWOW64\Cjndop32.exeC:\Windows\system32\Cjndop32.exe77⤵PID:2212
-
C:\Windows\SysWOW64\Cllpkl32.exeC:\Windows\system32\Cllpkl32.exe78⤵PID:1148
-
C:\Windows\SysWOW64\Coklgg32.exeC:\Windows\system32\Coklgg32.exe79⤵PID:1992
-
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe80⤵
- Modifies registry class
PID:1256 -
C:\Windows\SysWOW64\Chcqpmep.exeC:\Windows\system32\Chcqpmep.exe81⤵
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\Cpjiajeb.exeC:\Windows\system32\Cpjiajeb.exe82⤵
- Drops file in System32 directory
PID:1784 -
C:\Windows\SysWOW64\Comimg32.exeC:\Windows\system32\Comimg32.exe83⤵PID:2860
-
C:\Windows\SysWOW64\Cfgaiaci.exeC:\Windows\system32\Cfgaiaci.exe84⤵PID:2008
-
C:\Windows\SysWOW64\Cjbmjplb.exeC:\Windows\system32\Cjbmjplb.exe85⤵PID:1636
-
C:\Windows\SysWOW64\Claifkkf.exeC:\Windows\system32\Claifkkf.exe86⤵PID:308
-
C:\Windows\SysWOW64\Copfbfjj.exeC:\Windows\system32\Copfbfjj.exe87⤵PID:868
-
C:\Windows\SysWOW64\Cbnbobin.exeC:\Windows\system32\Cbnbobin.exe88⤵PID:1712
-
C:\Windows\SysWOW64\Cdlnkmha.exeC:\Windows\system32\Cdlnkmha.exe89⤵PID:2876
-
C:\Windows\SysWOW64\Clcflkic.exeC:\Windows\system32\Clcflkic.exe90⤵PID:2880
-
C:\Windows\SysWOW64\Cndbcc32.exeC:\Windows\system32\Cndbcc32.exe91⤵PID:2396
-
C:\Windows\SysWOW64\Dbpodagk.exeC:\Windows\system32\Dbpodagk.exe92⤵PID:668
-
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe93⤵PID:1660
-
C:\Windows\SysWOW64\Dgmglh32.exeC:\Windows\system32\Dgmglh32.exe94⤵PID:2716
-
C:\Windows\SysWOW64\Dngoibmo.exeC:\Windows\system32\Dngoibmo.exe95⤵PID:2604
-
C:\Windows\SysWOW64\Dbbkja32.exeC:\Windows\system32\Dbbkja32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2432 -
C:\Windows\SysWOW64\Dhmcfkme.exeC:\Windows\system32\Dhmcfkme.exe97⤵PID:1688
-
C:\Windows\SysWOW64\Dgodbh32.exeC:\Windows\system32\Dgodbh32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1820 -
C:\Windows\SysWOW64\Dnilobkm.exeC:\Windows\system32\Dnilobkm.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:284 -
C:\Windows\SysWOW64\Djpmccqq.exeC:\Windows\system32\Djpmccqq.exe100⤵PID:2012
-
C:\Windows\SysWOW64\Dmoipopd.exeC:\Windows\system32\Dmoipopd.exe101⤵
- Modifies registry class
PID:2552 -
C:\Windows\SysWOW64\Ddeaalpg.exeC:\Windows\system32\Ddeaalpg.exe102⤵PID:1556
-
C:\Windows\SysWOW64\Dgdmmgpj.exeC:\Windows\system32\Dgdmmgpj.exe103⤵PID:2648
-
C:\Windows\SysWOW64\Djbiicon.exeC:\Windows\system32\Djbiicon.exe104⤵PID:2724
-
C:\Windows\SysWOW64\Dmafennb.exeC:\Windows\system32\Dmafennb.exe105⤵PID:2668
-
C:\Windows\SysWOW64\Dqlafm32.exeC:\Windows\system32\Dqlafm32.exe106⤵
- Drops file in System32 directory
PID:692 -
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe107⤵PID:536
-
C:\Windows\SysWOW64\Djefobmk.exeC:\Windows\system32\Djefobmk.exe108⤵
- Modifies registry class
PID:380 -
C:\Windows\SysWOW64\Epaogi32.exeC:\Windows\system32\Epaogi32.exe109⤵PID:1996
-
C:\Windows\SysWOW64\Ejgcdb32.exeC:\Windows\system32\Ejgcdb32.exe110⤵PID:2520
-
C:\Windows\SysWOW64\Emeopn32.exeC:\Windows\system32\Emeopn32.exe111⤵PID:2224
-
C:\Windows\SysWOW64\Ebbgid32.exeC:\Windows\system32\Ebbgid32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2768 -
C:\Windows\SysWOW64\Eeqdep32.exeC:\Windows\system32\Eeqdep32.exe113⤵PID:300
-
C:\Windows\SysWOW64\Emhlfmgj.exeC:\Windows\system32\Emhlfmgj.exe114⤵
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Eiomkn32.exeC:\Windows\system32\Eiomkn32.exe115⤵PID:1200
-
C:\Windows\SysWOW64\Egamfkdh.exeC:\Windows\system32\Egamfkdh.exe116⤵
- Drops file in System32 directory
PID:2284 -
C:\Windows\SysWOW64\Epieghdk.exeC:\Windows\system32\Epieghdk.exe117⤵PID:2704
-
C:\Windows\SysWOW64\Ebgacddo.exeC:\Windows\system32\Ebgacddo.exe118⤵PID:2352
-
C:\Windows\SysWOW64\Eiaiqn32.exeC:\Windows\system32\Eiaiqn32.exe119⤵PID:2856
-
C:\Windows\SysWOW64\Egdilkbf.exeC:\Windows\system32\Egdilkbf.exe120⤵
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\Ejbfhfaj.exeC:\Windows\system32\Ejbfhfaj.exe121⤵PID:2336
-
C:\Windows\SysWOW64\Ebinic32.exeC:\Windows\system32\Ebinic32.exe122⤵PID:2568
-
C:\Windows\SysWOW64\Fckjalhj.exeC:\Windows\system32\Fckjalhj.exe123⤵PID:2384
-
C:\Windows\SysWOW64\Fhffaj32.exeC:\Windows\system32\Fhffaj32.exe124⤵PID:2452
-
C:\Windows\SysWOW64\Fnpnndgp.exeC:\Windows\system32\Fnpnndgp.exe125⤵PID:1620
-
C:\Windows\SysWOW64\Fejgko32.exeC:\Windows\system32\Fejgko32.exe126⤵
- Modifies registry class
PID:2928 -
C:\Windows\SysWOW64\Fcmgfkeg.exeC:\Windows\system32\Fcmgfkeg.exe127⤵
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\Ffkcbgek.exeC:\Windows\system32\Ffkcbgek.exe128⤵
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\Fjgoce32.exeC:\Windows\system32\Fjgoce32.exe129⤵
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Fmekoalh.exeC:\Windows\system32\Fmekoalh.exe130⤵PID:2240
-
C:\Windows\SysWOW64\Faagpp32.exeC:\Windows\system32\Faagpp32.exe131⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\Fdoclk32.exeC:\Windows\system32\Fdoclk32.exe132⤵PID:1900
-
C:\Windows\SysWOW64\Ffnphf32.exeC:\Windows\system32\Ffnphf32.exe133⤵PID:2564
-
C:\Windows\SysWOW64\Fjilieka.exeC:\Windows\system32\Fjilieka.exe134⤵PID:2896
-
C:\Windows\SysWOW64\Fmhheqje.exeC:\Windows\system32\Fmhheqje.exe135⤵PID:2248
-
C:\Windows\SysWOW64\Fpfdalii.exeC:\Windows\system32\Fpfdalii.exe136⤵PID:1808
-
C:\Windows\SysWOW64\Fbdqmghm.exeC:\Windows\system32\Fbdqmghm.exe137⤵PID:3108
-
C:\Windows\SysWOW64\Fjlhneio.exeC:\Windows\system32\Fjlhneio.exe138⤵
- Modifies registry class
PID:3152 -
C:\Windows\SysWOW64\Fioija32.exeC:\Windows\system32\Fioija32.exe139⤵PID:3192
-
C:\Windows\SysWOW64\Flmefm32.exeC:\Windows\system32\Flmefm32.exe140⤵PID:3232
-
C:\Windows\SysWOW64\Fphafl32.exeC:\Windows\system32\Fphafl32.exe141⤵
- Drops file in System32 directory
- Modifies registry class
PID:3272 -
C:\Windows\SysWOW64\Fbgmbg32.exeC:\Windows\system32\Fbgmbg32.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3312 -
C:\Windows\SysWOW64\Feeiob32.exeC:\Windows\system32\Feeiob32.exe143⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3352 -
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe144⤵
- Modifies registry class
PID:3392 -
C:\Windows\SysWOW64\Globlmmj.exeC:\Windows\system32\Globlmmj.exe145⤵PID:3432
-
C:\Windows\SysWOW64\Gonnhhln.exeC:\Windows\system32\Gonnhhln.exe146⤵
- Drops file in System32 directory
PID:3472 -
C:\Windows\SysWOW64\Gegfdb32.exeC:\Windows\system32\Gegfdb32.exe147⤵PID:3512
-
C:\Windows\SysWOW64\Ghfbqn32.exeC:\Windows\system32\Ghfbqn32.exe148⤵PID:3552
-
C:\Windows\SysWOW64\Glaoalkh.exeC:\Windows\system32\Glaoalkh.exe149⤵PID:3592
-
C:\Windows\SysWOW64\Gpmjak32.exeC:\Windows\system32\Gpmjak32.exe150⤵PID:3632
-
C:\Windows\SysWOW64\Gldkfl32.exeC:\Windows\system32\Gldkfl32.exe151⤵PID:3672
-
C:\Windows\SysWOW64\Gkgkbipp.exeC:\Windows\system32\Gkgkbipp.exe152⤵PID:3712
-
C:\Windows\SysWOW64\Gbnccfpb.exeC:\Windows\system32\Gbnccfpb.exe153⤵PID:3752
-
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe154⤵PID:3792
-
C:\Windows\SysWOW64\Ghkllmoi.exeC:\Windows\system32\Ghkllmoi.exe155⤵
- Modifies registry class
PID:3832 -
C:\Windows\SysWOW64\Gkihhhnm.exeC:\Windows\system32\Gkihhhnm.exe156⤵PID:3872
-
C:\Windows\SysWOW64\Gmgdddmq.exeC:\Windows\system32\Gmgdddmq.exe157⤵
- Drops file in System32 directory
- Modifies registry class
PID:3912 -
C:\Windows\SysWOW64\Geolea32.exeC:\Windows\system32\Geolea32.exe158⤵PID:3952
-
C:\Windows\SysWOW64\Gdamqndn.exeC:\Windows\system32\Gdamqndn.exe159⤵PID:3992
-
C:\Windows\SysWOW64\Ghmiam32.exeC:\Windows\system32\Ghmiam32.exe160⤵
- Drops file in System32 directory
PID:4032 -
C:\Windows\SysWOW64\Gkkemh32.exeC:\Windows\system32\Gkkemh32.exe161⤵PID:4072
-
C:\Windows\SysWOW64\Gmjaic32.exeC:\Windows\system32\Gmjaic32.exe162⤵
- Modifies registry class
PID:3096 -
C:\Windows\SysWOW64\Gphmeo32.exeC:\Windows\system32\Gphmeo32.exe163⤵PID:3160
-
C:\Windows\SysWOW64\Ghoegl32.exeC:\Windows\system32\Ghoegl32.exe164⤵
- Modifies registry class
PID:3216 -
C:\Windows\SysWOW64\Hknach32.exeC:\Windows\system32\Hknach32.exe165⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3268 -
C:\Windows\SysWOW64\Hahjpbad.exeC:\Windows\system32\Hahjpbad.exe166⤵PID:3328
-
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe167⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3384 -
C:\Windows\SysWOW64\Hcifgjgc.exeC:\Windows\system32\Hcifgjgc.exe168⤵PID:3444
-
C:\Windows\SysWOW64\Hgdbhi32.exeC:\Windows\system32\Hgdbhi32.exe169⤵PID:3496
-
C:\Windows\SysWOW64\Hicodd32.exeC:\Windows\system32\Hicodd32.exe170⤵PID:3536
-
C:\Windows\SysWOW64\Hlakpp32.exeC:\Windows\system32\Hlakpp32.exe171⤵PID:3600
-
C:\Windows\SysWOW64\Hpmgqnfl.exeC:\Windows\system32\Hpmgqnfl.exe172⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3648 -
C:\Windows\SysWOW64\Hckcmjep.exeC:\Windows\system32\Hckcmjep.exe173⤵PID:3680
-
C:\Windows\SysWOW64\Hggomh32.exeC:\Windows\system32\Hggomh32.exe174⤵PID:3724
-
C:\Windows\SysWOW64\Hejoiedd.exeC:\Windows\system32\Hejoiedd.exe175⤵PID:3768
-
C:\Windows\SysWOW64\Hnagjbdf.exeC:\Windows\system32\Hnagjbdf.exe176⤵PID:3824
-
C:\Windows\SysWOW64\Hlcgeo32.exeC:\Windows\system32\Hlcgeo32.exe177⤵PID:3884
-
C:\Windows\SysWOW64\Hobcak32.exeC:\Windows\system32\Hobcak32.exe178⤵PID:3940
-
C:\Windows\SysWOW64\Hcnpbi32.exeC:\Windows\system32\Hcnpbi32.exe179⤵PID:3988
-
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe180⤵PID:4048
-
C:\Windows\SysWOW64\Hhjhkq32.exeC:\Windows\system32\Hhjhkq32.exe181⤵PID:3084
-
C:\Windows\SysWOW64\Hlfdkoin.exeC:\Windows\system32\Hlfdkoin.exe182⤵
- Drops file in System32 directory
PID:3168 -
C:\Windows\SysWOW64\Hodpgjha.exeC:\Windows\system32\Hodpgjha.exe183⤵PID:3256
-
C:\Windows\SysWOW64\Henidd32.exeC:\Windows\system32\Henidd32.exe184⤵PID:3340
-
C:\Windows\SysWOW64\Hjjddchg.exeC:\Windows\system32\Hjjddchg.exe185⤵PID:3408
-
C:\Windows\SysWOW64\Hkkalk32.exeC:\Windows\system32\Hkkalk32.exe186⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3480 -
C:\Windows\SysWOW64\Hogmmjfo.exeC:\Windows\system32\Hogmmjfo.exe187⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3252 -
C:\Windows\SysWOW64\Iaeiieeb.exeC:\Windows\system32\Iaeiieeb.exe188⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3604 -
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe189⤵
- Drops file in System32 directory
PID:3492 -
C:\Windows\SysWOW64\Ihoafpmp.exeC:\Windows\system32\Ihoafpmp.exe190⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\Ilknfn32.exeC:\Windows\system32\Ilknfn32.exe191⤵PID:2976
-
C:\Windows\SysWOW64\Ioijbj32.exeC:\Windows\system32\Ioijbj32.exe192⤵
- Drops file in System32 directory
PID:3844 -
C:\Windows\SysWOW64\Inljnfkg.exeC:\Windows\system32\Inljnfkg.exe193⤵PID:3892
-
C:\Windows\SysWOW64\Ifcbodli.exeC:\Windows\system32\Ifcbodli.exe194⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3852 -
C:\Windows\SysWOW64\Ihankokm.exeC:\Windows\system32\Ihankokm.exe195⤵
- Drops file in System32 directory
PID:4040 -
C:\Windows\SysWOW64\Igdogl32.exeC:\Windows\system32\Igdogl32.exe196⤵PID:3104
-
C:\Windows\SysWOW64\Ikpjgkjq.exeC:\Windows\system32\Ikpjgkjq.exe197⤵
- Drops file in System32 directory
PID:3228 -
C:\Windows\SysWOW64\Iokfhi32.exeC:\Windows\system32\Iokfhi32.exe198⤵PID:3348
-
C:\Windows\SysWOW64\Iajcde32.exeC:\Windows\system32\Iajcde32.exe199⤵PID:3424
-
C:\Windows\SysWOW64\Iqmcpahh.exeC:\Windows\system32\Iqmcpahh.exe200⤵PID:3524
-
C:\Windows\SysWOW64\Ihdkao32.exeC:\Windows\system32\Ihdkao32.exe201⤵PID:3616
-
C:\Windows\SysWOW64\Iggkllpe.exeC:\Windows\system32\Iggkllpe.exe202⤵PID:3468
-
C:\Windows\SysWOW64\Ijeghgoh.exeC:\Windows\system32\Ijeghgoh.exe203⤵
- Modifies registry class
PID:3452 -
C:\Windows\SysWOW64\Inqcif32.exeC:\Windows\system32\Inqcif32.exe204⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3840 -
C:\Windows\SysWOW64\Iqopea32.exeC:\Windows\system32\Iqopea32.exe205⤵PID:3920
-
C:\Windows\SysWOW64\Idklfpon.exeC:\Windows\system32\Idklfpon.exe206⤵PID:4016
-
C:\Windows\SysWOW64\Icmlam32.exeC:\Windows\system32\Icmlam32.exe207⤵
- Drops file in System32 directory
PID:3132 -
C:\Windows\SysWOW64\Igihbknb.exeC:\Windows\system32\Igihbknb.exe208⤵PID:3300
-
C:\Windows\SysWOW64\Ijgdngmf.exeC:\Windows\system32\Ijgdngmf.exe209⤵PID:3420
-
C:\Windows\SysWOW64\Incpoe32.exeC:\Windows\system32\Incpoe32.exe210⤵
- Modifies registry class
PID:3772 -
C:\Windows\SysWOW64\Iqalka32.exeC:\Windows\system32\Iqalka32.exe211⤵PID:3572
-
C:\Windows\SysWOW64\Idmhkpml.exeC:\Windows\system32\Idmhkpml.exe212⤵PID:2296
-
C:\Windows\SysWOW64\Ifnechbj.exeC:\Windows\system32\Ifnechbj.exe213⤵
- Drops file in System32 directory
PID:3900 -
C:\Windows\SysWOW64\Jqdipqbp.exeC:\Windows\system32\Jqdipqbp.exe214⤵PID:4060
-
C:\Windows\SysWOW64\Jofiln32.exeC:\Windows\system32\Jofiln32.exe215⤵PID:3200
-
C:\Windows\SysWOW64\Jiondcpk.exeC:\Windows\system32\Jiondcpk.exe216⤵PID:3400
-
C:\Windows\SysWOW64\Jqfffqpm.exeC:\Windows\system32\Jqfffqpm.exe217⤵PID:3568
-
C:\Windows\SysWOW64\Jbgbni32.exeC:\Windows\system32\Jbgbni32.exe218⤵PID:3708
-
C:\Windows\SysWOW64\Jjojofgn.exeC:\Windows\system32\Jjojofgn.exe219⤵PID:3904
-
C:\Windows\SysWOW64\Jiakjb32.exeC:\Windows\system32\Jiakjb32.exe220⤵PID:3984
-
C:\Windows\SysWOW64\Jmmfkafa.exeC:\Windows\system32\Jmmfkafa.exe221⤵PID:4020
-
C:\Windows\SysWOW64\Jokcgmee.exeC:\Windows\system32\Jokcgmee.exe222⤵
- Modifies registry class
PID:3456 -
C:\Windows\SysWOW64\Jcgogk32.exeC:\Windows\system32\Jcgogk32.exe223⤵PID:1452
-
C:\Windows\SysWOW64\Jbjochdi.exeC:\Windows\system32\Jbjochdi.exe224⤵PID:3780
-
C:\Windows\SysWOW64\Jfekcg32.exeC:\Windows\system32\Jfekcg32.exe225⤵PID:3960
-
C:\Windows\SysWOW64\Jicgpb32.exeC:\Windows\system32\Jicgpb32.exe226⤵PID:3140
-
C:\Windows\SysWOW64\Jmocpado.exeC:\Windows\system32\Jmocpado.exe227⤵PID:4012
-
C:\Windows\SysWOW64\Jkbcln32.exeC:\Windows\system32\Jkbcln32.exe228⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3880 -
C:\Windows\SysWOW64\Jonplmcb.exeC:\Windows\system32\Jonplmcb.exe229⤵
- Modifies registry class
PID:3548 -
C:\Windows\SysWOW64\Kjjmbj32.exeC:\Windows\system32\Kjjmbj32.exe230⤵PID:4068
-
C:\Windows\SysWOW64\Kneicieh.exeC:\Windows\system32\Kneicieh.exe231⤵PID:3332
-
C:\Windows\SysWOW64\Kfgdhjmk.exeC:\Windows\system32\Kfgdhjmk.exe232⤵PID:3692
-
C:\Windows\SysWOW64\Kjcpii32.exeC:\Windows\system32\Kjcpii32.exe233⤵PID:3376
-
C:\Windows\SysWOW64\Kmaled32.exeC:\Windows\system32\Kmaled32.exe234⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3804 -
C:\Windows\SysWOW64\Lldlqakb.exeC:\Windows\system32\Lldlqakb.exe235⤵PID:3808
-
C:\Windows\SysWOW64\Lpphap32.exeC:\Windows\system32\Lpphap32.exe236⤵PID:3688
-
C:\Windows\SysWOW64\Lckdanld.exeC:\Windows\system32\Lckdanld.exe237⤵PID:3296
-
C:\Windows\SysWOW64\Lfjqnjkh.exeC:\Windows\system32\Lfjqnjkh.exe238⤵
- Modifies registry class
PID:1064 -
C:\Windows\SysWOW64\Lihmjejl.exeC:\Windows\system32\Lihmjejl.exe239⤵PID:3264
-
C:\Windows\SysWOW64\Lmcijcbe.exeC:\Windows\system32\Lmcijcbe.exe240⤵PID:3868
-
C:\Windows\SysWOW64\Llfifq32.exeC:\Windows\system32\Llfifq32.exe241⤵
- Modifies registry class
PID:3308 -