Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
Backdoor.Win32.Padodor.SK.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Backdoor.Win32.Padodor.SK.exe
Resource
win10v2004-20240802-en
General
-
Target
Backdoor.Win32.Padodor.SK.exe
-
Size
72KB
-
MD5
61efc1759901f3fa0dbd30e0111fbd40
-
SHA1
7f6b7749faa432e03c546598bff80f909da777e2
-
SHA256
d89a3588929ff18e99268bd23bebdfb5bedbf9010707c5d11175e0bf03ab286e
-
SHA512
64e350b6fdb5c42da191921ec9d66758c04e0086bae3580dea409e7ebdcdbc2c5c24030dce2f4732cab1e96a646297eccb0faeb97ec83f377d980e7dc416ac4e
-
SSDEEP
1536:viC+RNoEVpAbeq8UFZ/ges4rr+gJ6GhuyKS:0uFu74rCg5kfS
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Efnbachd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgdele32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pegekmed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cchgnk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gacpej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dcfcoiak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mggedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nikkiinl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgibjfil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Igjdkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lacgkqbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Enpaga32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aonfeqoe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hncpklnd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdajqn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enpaga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ogikad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qoimja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnjmdnfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqkiij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pldjmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aihcmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iamkbfcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nbcpbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aicjbiok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mdflbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mgibjfil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Amflcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jdcnpplf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mbofgohb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmgbgpnd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kodahgao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpphka32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Docank32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kobechda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpldao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfajogpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gjjgipbk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jadacemb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jkapgjpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kandiceg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okbjlcee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhnjpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgacbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjjgipbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jplkjapg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oekoeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmkbhf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afenfnpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ihpnoaqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iooofjdf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkioof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdflbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aobopp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nefejiok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bekdnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dnbefcil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfgnop32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egdleg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpdclgbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lnpejc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nefejiok.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oapcdjcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cjpbeefk.exe -
Executes dropped EXE 64 IoCs
pid Process 688 Oeqojnkl.exe 2312 Onicccam.exe 4148 Ofpldabo.exe 2740 Omjdak32.exe 3784 Obglib32.exe 4184 Oiqdflop.exe 2224 Ponmnc32.exe 2024 Pegekmed.exe 728 Plangg32.exe 2336 Pejbqmca.exe 2316 Pldjmg32.exe 3044 Pbnbja32.exe 3312 Pbpooq32.exe 2928 Pildaj32.exe 4892 Qoimja32.exe 800 Qioagj32.exe 4716 Qolipa32.exe 2252 Qeealk32.exe 2504 Alpjiepa.exe 3516 Aonfeqoe.exe 2728 Afenfnpg.exe 988 Aicjbiok.exe 180 Apmboc32.exe 1816 Aggklnnd.exe 2512 Amachhea.exe 3856 Aobopp32.exe 64 Abnkqoci.exe 1108 Aihcmi32.exe 2020 Aoelfp32.exe 4416 Aeodbjqj.exe 4124 Amflcg32.exe 1104 Bceaan32.exe 3000 Bpibkblj.exe 1112 Bonoln32.exe 1328 Bnoojfia.exe 2604 Bekdnh32.exe 1016 Bpphka32.exe 4036 Bemqdh32.exe 3788 Cpbeaq32.exe 388 Cfomigbg.exe 4072 Cpeafpbm.exe 2724 Cfajogpd.exe 1596 Cpgnlppj.exe 392 Cgafijgg.exe 540 Cjpbeefk.exe 4508 Cchgnk32.exe 3744 Cnmkkd32.exe 2980 Ccjdck32.exe 4000 Dnphqcko.exe 2936 Dqndmojb.exe 1684 Dghmii32.exe 3720 Dnbefcil.exe 1416 Docank32.exe 2692 Dgjioi32.exe 3024 Dmgbgpnd.exe 4088 Dcajdj32.exe 3528 Dmjomoka.exe 5044 Dccgii32.exe 2092 Dnikgbbd.exe 3400 Dcfcoiak.exe 1932 Emnhho32.exe 4164 Egdleg32.exe 2408 Efgladnl.exe 1976 Eooajjdm.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Pldjmg32.exe Pejbqmca.exe File created C:\Windows\SysWOW64\Klncib32.dll Aobopp32.exe File created C:\Windows\SysWOW64\Fckfafoc.exe Fmandl32.exe File created C:\Windows\SysWOW64\Iojpbedc.dll Kdajqn32.exe File created C:\Windows\SysWOW64\Kkamaanb.dll Gpdclgbe.exe File created C:\Windows\SysWOW64\Iafebg32.exe Hpgihdbp.exe File created C:\Windows\SysWOW64\Lgiich32.exe Lhfiglpd.exe File created C:\Windows\SysWOW64\Nqmfojep.exe Nbjfcm32.exe File created C:\Windows\SysWOW64\Pkplof32.dll Aihcmi32.exe File opened for modification C:\Windows\SysWOW64\Dgjioi32.exe Docank32.exe File created C:\Windows\SysWOW64\Dcajdj32.exe Dmgbgpnd.exe File opened for modification C:\Windows\SysWOW64\Iamkbfcj.exe Iooofjdf.exe File created C:\Windows\SysWOW64\Ooifdfhb.dll Mkpepeek.exe File created C:\Windows\SysWOW64\Onicccam.exe Oeqojnkl.exe File created C:\Windows\SysWOW64\Jknehf32.dll Gacpej32.exe File created C:\Windows\SysWOW64\Gipdgc32.dll Gnljjm32.exe File created C:\Windows\SysWOW64\Bigfff32.dll Kgdphikd.exe File created C:\Windows\SysWOW64\Njpopa32.dll Oapcdjcm.exe File opened for modification C:\Windows\SysWOW64\Jkmflj32.exe Jhnjpo32.exe File opened for modification C:\Windows\SysWOW64\Oeqojnkl.exe Backdoor.Win32.Padodor.SK.exe File created C:\Windows\SysWOW64\Cadjng32.dll Aonfeqoe.exe File created C:\Windows\SysWOW64\Dnegeifb.dll Aoelfp32.exe File created C:\Windows\SysWOW64\Ckajma32.dll Aeodbjqj.exe File opened for modification C:\Windows\SysWOW64\Dnphqcko.exe Ccjdck32.exe File created C:\Windows\SysWOW64\Gpdclgbe.exe Gmfgpkca.exe File created C:\Windows\SysWOW64\Gfcecpel.exe Gpimgf32.exe File created C:\Windows\SysWOW64\Egbfbp32.dll Nbjfcm32.exe File created C:\Windows\SysWOW64\Eodjei32.exe Enbnma32.exe File created C:\Windows\SysWOW64\Aalhoq32.dll Epfgji32.exe File created C:\Windows\SysWOW64\Cmfmhd32.dll Fckfafoc.exe File created C:\Windows\SysWOW64\Eldjon32.dll Igmqql32.exe File created C:\Windows\SysWOW64\Lnenebli.exe Lkfbigme.exe File opened for modification C:\Windows\SysWOW64\Nikkiinl.exe Ndooij32.exe File created C:\Windows\SysWOW64\Cchgnk32.exe Cjpbeefk.exe File opened for modification C:\Windows\SysWOW64\Ffeibb32.exe Fqhpjk32.exe File created C:\Windows\SysWOW64\Aagdji32.dll Fpmmkhhm.exe File created C:\Windows\SysWOW64\Iopjjnnh.dll Obglib32.exe File created C:\Windows\SysWOW64\Jplkjapg.exe Jaiknd32.exe File created C:\Windows\SysWOW64\Mholnjhj.exe Mbecapqm.exe File created C:\Windows\SysWOW64\Iaofoffi.dll Ponmnc32.exe File created C:\Windows\SysWOW64\Khhjob32.dll Pejbqmca.exe File created C:\Windows\SysWOW64\Pejbqmca.exe Plangg32.exe File opened for modification C:\Windows\SysWOW64\Enpaga32.exe Efiifd32.exe File created C:\Windows\SysWOW64\Igjdkm32.exe Iamkbfcj.exe File opened for modification C:\Windows\SysWOW64\Mholnjhj.exe Mbecapqm.exe File created C:\Windows\SysWOW64\Nkigedmp.exe Nikkiinl.exe File created C:\Windows\SysWOW64\Oopcdf32.dll Ofpldabo.exe File created C:\Windows\SysWOW64\Cfajogpd.exe Cpeafpbm.exe File created C:\Windows\SysWOW64\Knobfkmp.dll Gcmbffmq.exe File opened for modification C:\Windows\SysWOW64\Hncpklnd.exe Hjcjonjp.exe File created C:\Windows\SysWOW64\Lgpodgag.exe Lacgkqbp.exe File created C:\Windows\SysWOW64\Lmchff32.dll Lgpodgag.exe File opened for modification C:\Windows\SysWOW64\Nqmfojep.exe Nbjfcm32.exe File created C:\Windows\SysWOW64\Hpimlpgk.dll Dmgbgpnd.exe File created C:\Windows\SysWOW64\Cnicik32.dll Gjgkcpdm.exe File opened for modification C:\Windows\SysWOW64\Iaibgf32.exe Iojfkk32.exe File opened for modification C:\Windows\SysWOW64\Bonoln32.exe Bpibkblj.exe File created C:\Windows\SysWOW64\Icdeopdg.dll Dgjioi32.exe File created C:\Windows\SysWOW64\Dcfcoiak.exe Dnikgbbd.exe File created C:\Windows\SysWOW64\Afenfnpg.exe Aonfeqoe.exe File created C:\Windows\SysWOW64\Ccjdck32.exe Cnmkkd32.exe File created C:\Windows\SysWOW64\Dgjioi32.exe Docank32.exe File opened for modification C:\Windows\SysWOW64\Fngghpfd.exe Ffpogcfa.exe File created C:\Windows\SysWOW64\Mkpepeek.exe Mdflbk32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7404 7308 WerFault.exe 289 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcfcoiak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gcmbffmq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iaphhe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obglib32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pegekmed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnbefcil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffpogcfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcdpqg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ffibmang.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imdlhgio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jaiknd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdjdpo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnoojfia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmkbhf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lqanlnmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nipedh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqkiij32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igjdkm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmfimfgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkpepeek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhdeijdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nkgkpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpeafpbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqmfojep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pbnbja32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aoelfp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpjgko32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lanmpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jdcnpplf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oabpjiaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emnhho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enbnma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mknhjfgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjomoka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iaibgf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkfbigme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mbecapqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bceaan32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bekdnh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdflbk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhfbni32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nbjfcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofpldabo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccjdck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihegjp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lnenebli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpphka32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hpgihdbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oekoeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oiigkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pildaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeodbjqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Docank32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dccgii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gjjgipbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihpnoaqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkmflj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onicccam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcajdj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfomigbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lnpejc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lqcjankm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnikgbbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eghepgcl.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aoelfp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bceaan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Imdlhgio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oniobdjc.dll" Khhmfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpkpig32.dll" Kgmjgjal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bnoojfia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gpdclgbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cpgnlppj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjoinf32.dll" Jmfimfgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lpldao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mbjmlp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cchgnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dopqhejm.dll" Jkmflj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kdajqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nbcpbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apcbhq32.dll" Bpibkblj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gmjqkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lpldao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nkigedmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oapcdjcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dgjioi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elecphbo.dll" Egdleg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fngghpfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fmoaolii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lnnhec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geebddaf.dll" Nknaqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Plangg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bpphka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omgdoi32.dll" Iaibgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pplehglo.dll" Oeqojnkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dnphqcko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lgpodgag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ffibmang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ffibmang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gfqhnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lacgkqbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pejbqmca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dnikgbbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odaeqq32.dll" Hpgihdbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpqgod32.dll" Iamkbfcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jdqajq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jdcnpplf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dapmjg32.dll" Bekdnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oofajpik.dll" Bemqdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njpopa32.dll" Oapcdjcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pbnbja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Abnkqoci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ihpnoaqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mknhjfgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eeehkbog.dll" Mggedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nqmfojep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Okbjlcee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bekdnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Docank32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jmfimfgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kpjgko32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mkpepeek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pegekmed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ffpogcfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmchff32.dll" Lgpodgag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nefejiok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmdfehlb.dll" Aggklnnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Efgladnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Igmqql32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 688 2488 Backdoor.Win32.Padodor.SK.exe 89 PID 2488 wrote to memory of 688 2488 Backdoor.Win32.Padodor.SK.exe 89 PID 2488 wrote to memory of 688 2488 Backdoor.Win32.Padodor.SK.exe 89 PID 688 wrote to memory of 2312 688 Oeqojnkl.exe 90 PID 688 wrote to memory of 2312 688 Oeqojnkl.exe 90 PID 688 wrote to memory of 2312 688 Oeqojnkl.exe 90 PID 2312 wrote to memory of 4148 2312 Onicccam.exe 91 PID 2312 wrote to memory of 4148 2312 Onicccam.exe 91 PID 2312 wrote to memory of 4148 2312 Onicccam.exe 91 PID 4148 wrote to memory of 2740 4148 Ofpldabo.exe 92 PID 4148 wrote to memory of 2740 4148 Ofpldabo.exe 92 PID 4148 wrote to memory of 2740 4148 Ofpldabo.exe 92 PID 2740 wrote to memory of 3784 2740 Omjdak32.exe 93 PID 2740 wrote to memory of 3784 2740 Omjdak32.exe 93 PID 2740 wrote to memory of 3784 2740 Omjdak32.exe 93 PID 3784 wrote to memory of 4184 3784 Obglib32.exe 94 PID 3784 wrote to memory of 4184 3784 Obglib32.exe 94 PID 3784 wrote to memory of 4184 3784 Obglib32.exe 94 PID 4184 wrote to memory of 2224 4184 Oiqdflop.exe 95 PID 4184 wrote to memory of 2224 4184 Oiqdflop.exe 95 PID 4184 wrote to memory of 2224 4184 Oiqdflop.exe 95 PID 2224 wrote to memory of 2024 2224 Ponmnc32.exe 96 PID 2224 wrote to memory of 2024 2224 Ponmnc32.exe 96 PID 2224 wrote to memory of 2024 2224 Ponmnc32.exe 96 PID 2024 wrote to memory of 728 2024 Pegekmed.exe 97 PID 2024 wrote to memory of 728 2024 Pegekmed.exe 97 PID 2024 wrote to memory of 728 2024 Pegekmed.exe 97 PID 728 wrote to memory of 2336 728 Plangg32.exe 98 PID 728 wrote to memory of 2336 728 Plangg32.exe 98 PID 728 wrote to memory of 2336 728 Plangg32.exe 98 PID 2336 wrote to memory of 2316 2336 Pejbqmca.exe 99 PID 2336 wrote to memory of 2316 2336 Pejbqmca.exe 99 PID 2336 wrote to memory of 2316 2336 Pejbqmca.exe 99 PID 2316 wrote to memory of 3044 2316 Pldjmg32.exe 100 PID 2316 wrote to memory of 3044 2316 Pldjmg32.exe 100 PID 2316 wrote to memory of 3044 2316 Pldjmg32.exe 100 PID 3044 wrote to memory of 3312 3044 Pbnbja32.exe 101 PID 3044 wrote to memory of 3312 3044 Pbnbja32.exe 101 PID 3044 wrote to memory of 3312 3044 Pbnbja32.exe 101 PID 3312 wrote to memory of 2928 3312 Pbpooq32.exe 102 PID 3312 wrote to memory of 2928 3312 Pbpooq32.exe 102 PID 3312 wrote to memory of 2928 3312 Pbpooq32.exe 102 PID 2928 wrote to memory of 4892 2928 Pildaj32.exe 103 PID 2928 wrote to memory of 4892 2928 Pildaj32.exe 103 PID 2928 wrote to memory of 4892 2928 Pildaj32.exe 103 PID 4892 wrote to memory of 800 4892 Qoimja32.exe 104 PID 4892 wrote to memory of 800 4892 Qoimja32.exe 104 PID 4892 wrote to memory of 800 4892 Qoimja32.exe 104 PID 800 wrote to memory of 4716 800 Qioagj32.exe 105 PID 800 wrote to memory of 4716 800 Qioagj32.exe 105 PID 800 wrote to memory of 4716 800 Qioagj32.exe 105 PID 4716 wrote to memory of 2252 4716 Qolipa32.exe 106 PID 4716 wrote to memory of 2252 4716 Qolipa32.exe 106 PID 4716 wrote to memory of 2252 4716 Qolipa32.exe 106 PID 2252 wrote to memory of 2504 2252 Qeealk32.exe 107 PID 2252 wrote to memory of 2504 2252 Qeealk32.exe 107 PID 2252 wrote to memory of 2504 2252 Qeealk32.exe 107 PID 2504 wrote to memory of 3516 2504 Alpjiepa.exe 108 PID 2504 wrote to memory of 3516 2504 Alpjiepa.exe 108 PID 2504 wrote to memory of 3516 2504 Alpjiepa.exe 108 PID 3516 wrote to memory of 2728 3516 Aonfeqoe.exe 109 PID 3516 wrote to memory of 2728 3516 Aonfeqoe.exe 109 PID 3516 wrote to memory of 2728 3516 Aonfeqoe.exe 109 PID 2728 wrote to memory of 988 2728 Afenfnpg.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Padodor.SK.exe"C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Padodor.SK.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\Oeqojnkl.exeC:\Windows\system32\Oeqojnkl.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\Onicccam.exeC:\Windows\system32\Onicccam.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\Ofpldabo.exeC:\Windows\system32\Ofpldabo.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\Omjdak32.exeC:\Windows\system32\Omjdak32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Obglib32.exeC:\Windows\system32\Obglib32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\Oiqdflop.exeC:\Windows\system32\Oiqdflop.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Ponmnc32.exeC:\Windows\system32\Ponmnc32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\Pegekmed.exeC:\Windows\system32\Pegekmed.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\Plangg32.exeC:\Windows\system32\Plangg32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\Pejbqmca.exeC:\Windows\system32\Pejbqmca.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\Pldjmg32.exeC:\Windows\system32\Pldjmg32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\Pbnbja32.exeC:\Windows\system32\Pbnbja32.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Pbpooq32.exeC:\Windows\system32\Pbpooq32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\Pildaj32.exeC:\Windows\system32\Pildaj32.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\Qoimja32.exeC:\Windows\system32\Qoimja32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\Qioagj32.exeC:\Windows\system32\Qioagj32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\Qolipa32.exeC:\Windows\system32\Qolipa32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\Qeealk32.exeC:\Windows\system32\Qeealk32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Alpjiepa.exeC:\Windows\system32\Alpjiepa.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\Aonfeqoe.exeC:\Windows\system32\Aonfeqoe.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\Afenfnpg.exeC:\Windows\system32\Afenfnpg.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Aicjbiok.exeC:\Windows\system32\Aicjbiok.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:988 -
C:\Windows\SysWOW64\Apmboc32.exeC:\Windows\system32\Apmboc32.exe24⤵
- Executes dropped EXE
PID:180 -
C:\Windows\SysWOW64\Aggklnnd.exeC:\Windows\system32\Aggklnnd.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:1816 -
C:\Windows\SysWOW64\Amachhea.exeC:\Windows\system32\Amachhea.exe26⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\Aobopp32.exeC:\Windows\system32\Aobopp32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3856 -
C:\Windows\SysWOW64\Abnkqoci.exeC:\Windows\system32\Abnkqoci.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:64 -
C:\Windows\SysWOW64\Aihcmi32.exeC:\Windows\system32\Aihcmi32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1108 -
C:\Windows\SysWOW64\Aoelfp32.exeC:\Windows\system32\Aoelfp32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2020 -
C:\Windows\SysWOW64\Aeodbjqj.exeC:\Windows\system32\Aeodbjqj.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Windows\SysWOW64\Amflcg32.exeC:\Windows\system32\Amflcg32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4124 -
C:\Windows\SysWOW64\Bceaan32.exeC:\Windows\system32\Bceaan32.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1104 -
C:\Windows\SysWOW64\Bpibkblj.exeC:\Windows\system32\Bpibkblj.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3000 -
C:\Windows\SysWOW64\Bonoln32.exeC:\Windows\system32\Bonoln32.exe35⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\Bnoojfia.exeC:\Windows\system32\Bnoojfia.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1328 -
C:\Windows\SysWOW64\Bekdnh32.exeC:\Windows\system32\Bekdnh32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2604 -
C:\Windows\SysWOW64\Bpphka32.exeC:\Windows\system32\Bpphka32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1016 -
C:\Windows\SysWOW64\Bemqdh32.exeC:\Windows\system32\Bemqdh32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:4036 -
C:\Windows\SysWOW64\Cpbeaq32.exeC:\Windows\system32\Cpbeaq32.exe40⤵
- Executes dropped EXE
PID:3788 -
C:\Windows\SysWOW64\Cfomigbg.exeC:\Windows\system32\Cfomigbg.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:388 -
C:\Windows\SysWOW64\Cpeafpbm.exeC:\Windows\system32\Cpeafpbm.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\Cfajogpd.exeC:\Windows\system32\Cfajogpd.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\Cpgnlppj.exeC:\Windows\system32\Cpgnlppj.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Cgafijgg.exeC:\Windows\system32\Cgafijgg.exe45⤵
- Executes dropped EXE
PID:392 -
C:\Windows\SysWOW64\Cjpbeefk.exeC:\Windows\system32\Cjpbeefk.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:540 -
C:\Windows\SysWOW64\Cchgnk32.exeC:\Windows\system32\Cchgnk32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4508 -
C:\Windows\SysWOW64\Cnmkkd32.exeC:\Windows\system32\Cnmkkd32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3744 -
C:\Windows\SysWOW64\Ccjdck32.exeC:\Windows\system32\Ccjdck32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\Dnphqcko.exeC:\Windows\system32\Dnphqcko.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:4000 -
C:\Windows\SysWOW64\Dqndmojb.exeC:\Windows\system32\Dqndmojb.exe51⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\Dghmii32.exeC:\Windows\system32\Dghmii32.exe52⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\Dnbefcil.exeC:\Windows\system32\Dnbefcil.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3720 -
C:\Windows\SysWOW64\Docank32.exeC:\Windows\system32\Docank32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1416 -
C:\Windows\SysWOW64\Dgjioi32.exeC:\Windows\system32\Dgjioi32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2692 -
C:\Windows\SysWOW64\Dmgbgpnd.exeC:\Windows\system32\Dmgbgpnd.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3024 -
C:\Windows\SysWOW64\Dcajdj32.exeC:\Windows\system32\Dcajdj32.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\SysWOW64\Dmjomoka.exeC:\Windows\system32\Dmjomoka.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3528 -
C:\Windows\SysWOW64\Dccgii32.exeC:\Windows\system32\Dccgii32.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5044 -
C:\Windows\SysWOW64\Dnikgbbd.exeC:\Windows\system32\Dnikgbbd.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2092 -
C:\Windows\SysWOW64\Dcfcoiak.exeC:\Windows\system32\Dcfcoiak.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3400 -
C:\Windows\SysWOW64\Emnhho32.exeC:\Windows\system32\Emnhho32.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\Egdleg32.exeC:\Windows\system32\Egdleg32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4164 -
C:\Windows\SysWOW64\Efgladnl.exeC:\Windows\system32\Efgladnl.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:2408 -
C:\Windows\SysWOW64\Eooajjdm.exeC:\Windows\system32\Eooajjdm.exe65⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\Efiifd32.exeC:\Windows\system32\Efiifd32.exe66⤵
- Drops file in System32 directory
PID:1208 -
C:\Windows\SysWOW64\Enpaga32.exeC:\Windows\system32\Enpaga32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4660 -
C:\Windows\SysWOW64\Eghepgcl.exeC:\Windows\system32\Eghepgcl.exe68⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\Enbnma32.exeC:\Windows\system32\Enbnma32.exe69⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\Eodjei32.exeC:\Windows\system32\Eodjei32.exe70⤵PID:2088
-
C:\Windows\SysWOW64\Efnbachd.exeC:\Windows\system32\Efnbachd.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2268 -
C:\Windows\SysWOW64\Epfgji32.exeC:\Windows\system32\Epfgji32.exe72⤵
- Drops file in System32 directory
PID:4852 -
C:\Windows\SysWOW64\Ffpogcfa.exeC:\Windows\system32\Ffpogcfa.exe73⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4564 -
C:\Windows\SysWOW64\Fngghpfd.exeC:\Windows\system32\Fngghpfd.exe74⤵
- Modifies registry class
PID:1588 -
C:\Windows\SysWOW64\Fcdpqg32.exeC:\Windows\system32\Fcdpqg32.exe75⤵
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Windows\SysWOW64\Fjnhmalh.exeC:\Windows\system32\Fjnhmalh.exe76⤵PID:4848
-
C:\Windows\SysWOW64\Fqhpjk32.exeC:\Windows\system32\Fqhpjk32.exe77⤵
- Drops file in System32 directory
PID:3076 -
C:\Windows\SysWOW64\Ffeibb32.exeC:\Windows\system32\Ffeibb32.exe78⤵PID:4712
-
C:\Windows\SysWOW64\Fmoaolii.exeC:\Windows\system32\Fmoaolii.exe79⤵
- Modifies registry class
PID:3380 -
C:\Windows\SysWOW64\Fpmmkhhm.exeC:\Windows\system32\Fpmmkhhm.exe80⤵
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Fgdele32.exeC:\Windows\system32\Fgdele32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5164 -
C:\Windows\SysWOW64\Fmandl32.exeC:\Windows\system32\Fmandl32.exe82⤵
- Drops file in System32 directory
PID:5224 -
C:\Windows\SysWOW64\Fckfafoc.exeC:\Windows\system32\Fckfafoc.exe83⤵
- Drops file in System32 directory
PID:5280 -
C:\Windows\SysWOW64\Ffibmang.exeC:\Windows\system32\Ffibmang.exe84⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5328 -
C:\Windows\SysWOW64\Faofjjnm.exeC:\Windows\system32\Faofjjnm.exe85⤵PID:5420
-
C:\Windows\SysWOW64\Gcmbffmq.exeC:\Windows\system32\Gcmbffmq.exe86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5492 -
C:\Windows\SysWOW64\Gjgkcpdm.exeC:\Windows\system32\Gjgkcpdm.exe87⤵
- Drops file in System32 directory
PID:5552 -
C:\Windows\SysWOW64\Gmfgpkca.exeC:\Windows\system32\Gmfgpkca.exe88⤵
- Drops file in System32 directory
PID:5608 -
C:\Windows\SysWOW64\Gpdclgbe.exeC:\Windows\system32\Gpdclgbe.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5652 -
C:\Windows\SysWOW64\Gjjgipbk.exeC:\Windows\system32\Gjjgipbk.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:5700 -
C:\Windows\SysWOW64\Gmhcekao.exeC:\Windows\system32\Gmhcekao.exe91⤵PID:5744
-
C:\Windows\SysWOW64\Gacpej32.exeC:\Windows\system32\Gacpej32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5792 -
C:\Windows\SysWOW64\Gcblae32.exeC:\Windows\system32\Gcblae32.exe93⤵PID:5840
-
C:\Windows\SysWOW64\Gfqhnq32.exeC:\Windows\system32\Gfqhnq32.exe94⤵
- Modifies registry class
PID:5896 -
C:\Windows\SysWOW64\Gmjqkk32.exeC:\Windows\system32\Gmjqkk32.exe95⤵
- Modifies registry class
PID:5940 -
C:\Windows\SysWOW64\Gpimgf32.exeC:\Windows\system32\Gpimgf32.exe96⤵
- Drops file in System32 directory
PID:5976 -
C:\Windows\SysWOW64\Gfcecpel.exeC:\Windows\system32\Gfcecpel.exe97⤵PID:6028
-
C:\Windows\SysWOW64\Gnjmdnfo.exeC:\Windows\system32\Gnjmdnfo.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6072 -
C:\Windows\SysWOW64\Gnljjm32.exeC:\Windows\system32\Gnljjm32.exe99⤵
- Drops file in System32 directory
PID:6116 -
C:\Windows\SysWOW64\Hfgnop32.exeC:\Windows\system32\Hfgnop32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5144 -
C:\Windows\SysWOW64\Hjcjonjp.exeC:\Windows\system32\Hjcjonjp.exe101⤵
- Drops file in System32 directory
PID:5248 -
C:\Windows\SysWOW64\Hncpklnd.exeC:\Windows\system32\Hncpklnd.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5296 -
C:\Windows\SysWOW64\Hfodooko.exeC:\Windows\system32\Hfodooko.exe103⤵PID:5500
-
C:\Windows\SysWOW64\Hpgihdbp.exeC:\Windows\system32\Hpgihdbp.exe104⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5600 -
C:\Windows\SysWOW64\Iafebg32.exeC:\Windows\system32\Iafebg32.exe105⤵PID:5660
-
C:\Windows\SysWOW64\Ihpnoaqo.exeC:\Windows\system32\Ihpnoaqo.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5716 -
C:\Windows\SysWOW64\Iojfkk32.exeC:\Windows\system32\Iojfkk32.exe107⤵
- Drops file in System32 directory
PID:5784 -
C:\Windows\SysWOW64\Iaibgf32.exeC:\Windows\system32\Iaibgf32.exe108⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5868 -
C:\Windows\SysWOW64\Ihbjdq32.exeC:\Windows\system32\Ihbjdq32.exe109⤵PID:5932
-
C:\Windows\SysWOW64\Impcmg32.exeC:\Windows\system32\Impcmg32.exe110⤵PID:6012
-
C:\Windows\SysWOW64\Ihegjp32.exeC:\Windows\system32\Ihegjp32.exe111⤵
- System Location Discovery: System Language Discovery
PID:6084 -
C:\Windows\SysWOW64\Iooofjdf.exeC:\Windows\system32\Iooofjdf.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5152 -
C:\Windows\SysWOW64\Iamkbfcj.exeC:\Windows\system32\Iamkbfcj.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5236 -
C:\Windows\SysWOW64\Igjdkm32.exeC:\Windows\system32\Igjdkm32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:5460 -
C:\Windows\SysWOW64\Imdlhgio.exeC:\Windows\system32\Imdlhgio.exe115⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5596 -
C:\Windows\SysWOW64\Iaphhe32.exeC:\Windows\system32\Iaphhe32.exe116⤵
- System Location Discovery: System Language Discovery
PID:5708 -
C:\Windows\SysWOW64\Igmqql32.exeC:\Windows\system32\Igmqql32.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:5848 -
C:\Windows\SysWOW64\Jmfimfgl.exeC:\Windows\system32\Jmfimfgl.exe118⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5964 -
C:\Windows\SysWOW64\Jdqajq32.exeC:\Windows\system32\Jdqajq32.exe119⤵
- Modifies registry class
PID:6080 -
C:\Windows\SysWOW64\Jkjifk32.exeC:\Windows\system32\Jkjifk32.exe120⤵PID:5220
-
C:\Windows\SysWOW64\Jadacemb.exeC:\Windows\system32\Jadacemb.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5464 -
C:\Windows\SysWOW64\Jdcnpplf.exeC:\Windows\system32\Jdcnpplf.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5712
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-