Analysis
-
max time kernel
75s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:34
Static task
static1
Behavioral task
behavioral1
Sample
b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe
Resource
win10v2004-20220812-en
General
-
Target
b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe
-
Size
56KB
-
MD5
dc0b1b232b2c594cc5d41fb362875281
-
SHA1
89e5c7ca66415d79c153684fd76cb3b2f721c2bb
-
SHA256
b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464
-
SHA512
52d50d9791d829463f4e7c910565c78b4d00c8491234b1b6b988238c38bdbc3304cc63d2ec30aefd1dc167d11e28791f9e3ebb2102da28004b9baa951559e975
-
SSDEEP
1536:hjGGBFId/9zA8lcYMsBLn7qTCzZ2bi1lovlPp:hJFIfiYrBrutbiYvlh
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Afmnoa32.exeEkaede32.exeGgjklmcj.exeEmbqni32.exePkbkdgkq.exeQjidkcnf.exeCndijilf.exeEiklpakd.exeAleloe32.exeBklefa32.exeIdjing32.exeNjiloeap.exeBjcmcdcf.exeDlgohj32.exeBcodlomm.exeHgogpefi.exeEmbneqgc.exeQcbkmalj.exeAhodeh32.exeEhmeahnc.exeFcqmjbno.exeBfghpf32.exeMmhnef32.exeGgbnageg.exePfcnmk32.exeBkobkq32.exeHgacfddf.exeAokfoi32.exeLglphbhe.exeHpocgnhk.exeGcfkfb32.exeKdfnlh32.exeJeggjf32.exePpjepaaf.exeEcmikcfd.exeFgpoco32.exeJihgag32.exeJkicipjb.exeObefoaim.exeFnpnodla.exeGlqjlo32.exeIegkkc32.exeLnkkckfl.exeAajecnop.exeAgffanik.exeEalpih32.exeDecgqe32.exeEgnfolol.exeOllnbg32.exeEafpdchp.exeDaadpkfn.exeFlbgpkop.exeFaimjcfm.exePmilnfde.exeBcaqao32.exeKlfplf32.exeDjmlifng.exeEdjjmkqb.exeIebapdpj.exeNqkijcbm.exeQledbool.exeAhanboak.exeNpbqhf32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afmnoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekaede32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggjklmcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Embqni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkbkdgkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjidkcnf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cndijilf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eiklpakd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aleloe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bklefa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idjing32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njiloeap.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjcmcdcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlgohj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcodlomm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgogpefi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Embneqgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcbkmalj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahodeh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehmeahnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcqmjbno.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfghpf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmhnef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggbnageg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfcnmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkobkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgacfddf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aokfoi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lglphbhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpocgnhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcfkfb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdfnlh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jeggjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppjepaaf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecmikcfd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgpoco32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jihgag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkicipjb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obefoaim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnpnodla.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glqjlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iegkkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnkkckfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aajecnop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agffanik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ealpih32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Decgqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egnfolol.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ollnbg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eafpdchp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daadpkfn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flbgpkop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Faimjcfm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmilnfde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcaqao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klfplf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djmlifng.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edjjmkqb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iebapdpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqkijcbm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppjepaaf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qledbool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahanboak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npbqhf32.exe -
Executes dropped EXE 64 IoCs
Processes:
Enmoqlfp.exeFgjmdaik.exeFcqmjbno.exeFognoc32.exeFipbghkd.exeGibomh32.exeGkchoc32.exeGpaaea32.exeGiiengbi.exeGepfbhhm.exeHagggi32.exeHpldie32.exeIbafeple.exeIbfpqo32.exeIdjing32.exeKmpimkad.exeLmgpnj32.exeMcjnih32.exeNnmaoeoa.exeNpmnih32.exeNjfoje32.exeNjiloeap.exeNfoldf32.exeOmlagp32.exeOlanhlaf.exeOcmcjffp.exeOabpkbkh.exePaemqbie.exePoimjfho.exePebfgqol.exePhabclnp.exePnnjkcmg.exePkbkdgkq.exePpocmnjh.exeQledbool.exeQjidkcnf.exeQofmcjlm.exeQjlaac32.exeAcdfjhbc.exeAhanboak.exeAokfoi32.exeAhckgo32.exeAnpcpf32.exeAiehmo32.exeAoppjidb.exeAgkdnkan.exeAbpikd32.exeBkimdihd.exeBqefmpfk.exeBjnjefml.exeBpkbnmkc.exeBfghpf32.exeCndijilf.exeChojhnpd.exeCjpcjime.exeCfgdojci.exeCdkdhnab.exeDigmqepj.exeDdmann32.exeDlhfbp32.exeDbbnojdh.exeDmhblcdn.exeDecgqe32.exeDlmompif.exepid process 1160 Enmoqlfp.exe 984 Fgjmdaik.exe 1152 Fcqmjbno.exe 456 Fognoc32.exe 524 Fipbghkd.exe 1708 Gibomh32.exe 584 Gkchoc32.exe 552 Gpaaea32.exe 1456 Giiengbi.exe 928 Gepfbhhm.exe 1048 Hagggi32.exe 1032 Hpldie32.exe 992 Ibafeple.exe 1956 Ibfpqo32.exe 1640 Idjing32.exe 740 Kmpimkad.exe 1824 Lmgpnj32.exe 1168 Mcjnih32.exe 1268 Nnmaoeoa.exe 1328 Npmnih32.exe 1508 Njfoje32.exe 1668 Njiloeap.exe 1288 Nfoldf32.exe 944 Omlagp32.exe 884 Olanhlaf.exe 1932 Ocmcjffp.exe 764 Oabpkbkh.exe 560 Paemqbie.exe 1768 Poimjfho.exe 1564 Pebfgqol.exe 1212 Phabclnp.exe 548 Pnnjkcmg.exe 1524 Pkbkdgkq.exe 1556 Ppocmnjh.exe 1800 Qledbool.exe 1324 Qjidkcnf.exe 1628 Qofmcjlm.exe 1676 Qjlaac32.exe 1012 Acdfjhbc.exe 948 Ahanboak.exe 1208 Aokfoi32.exe 1492 Ahckgo32.exe 1072 Anpcpf32.exe 1984 Aiehmo32.exe 1504 Aoppjidb.exe 1988 Agkdnkan.exe 1552 Abpikd32.exe 1084 Bkimdihd.exe 1464 Bqefmpfk.exe 2024 Bjnjefml.exe 1392 Bpkbnmkc.exe 1000 Bfghpf32.exe 1020 Cndijilf.exe 1372 Chojhnpd.exe 1148 Cjpcjime.exe 1952 Cfgdojci.exe 1572 Cdkdhnab.exe 856 Digmqepj.exe 1304 Ddmann32.exe 1728 Dlhfbp32.exe 1624 Dbbnojdh.exe 1928 Dmhblcdn.exe 828 Decgqe32.exe 996 Dlmompif.exe -
Loads dropped DLL 64 IoCs
Processes:
b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exeEnmoqlfp.exeFgjmdaik.exeFcqmjbno.exeFognoc32.exeFipbghkd.exeGibomh32.exeGkchoc32.exeGpaaea32.exeGiiengbi.exeGepfbhhm.exeHagggi32.exeHpldie32.exeIbafeple.exeIbfpqo32.exeIdjing32.exeKmpimkad.exeLmgpnj32.exeMcjnih32.exeNnmaoeoa.exeNpmnih32.exeNjfoje32.exeNjiloeap.exeNfoldf32.exeOmlagp32.exeOlanhlaf.exeOcmcjffp.exeOabpkbkh.exePaemqbie.exePoimjfho.exePebfgqol.exePhabclnp.exepid process 1128 b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe 1128 b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe 1160 Enmoqlfp.exe 1160 Enmoqlfp.exe 984 Fgjmdaik.exe 984 Fgjmdaik.exe 1152 Fcqmjbno.exe 1152 Fcqmjbno.exe 456 Fognoc32.exe 456 Fognoc32.exe 524 Fipbghkd.exe 524 Fipbghkd.exe 1708 Gibomh32.exe 1708 Gibomh32.exe 584 Gkchoc32.exe 584 Gkchoc32.exe 552 Gpaaea32.exe 552 Gpaaea32.exe 1456 Giiengbi.exe 1456 Giiengbi.exe 928 Gepfbhhm.exe 928 Gepfbhhm.exe 1048 Hagggi32.exe 1048 Hagggi32.exe 1032 Hpldie32.exe 1032 Hpldie32.exe 992 Ibafeple.exe 992 Ibafeple.exe 1956 Ibfpqo32.exe 1956 Ibfpqo32.exe 1640 Idjing32.exe 1640 Idjing32.exe 740 Kmpimkad.exe 740 Kmpimkad.exe 1824 Lmgpnj32.exe 1824 Lmgpnj32.exe 1168 Mcjnih32.exe 1168 Mcjnih32.exe 1268 Nnmaoeoa.exe 1268 Nnmaoeoa.exe 1328 Npmnih32.exe 1328 Npmnih32.exe 1508 Njfoje32.exe 1508 Njfoje32.exe 1668 Njiloeap.exe 1668 Njiloeap.exe 1288 Nfoldf32.exe 1288 Nfoldf32.exe 944 Omlagp32.exe 944 Omlagp32.exe 884 Olanhlaf.exe 884 Olanhlaf.exe 1932 Ocmcjffp.exe 1932 Ocmcjffp.exe 764 Oabpkbkh.exe 764 Oabpkbkh.exe 560 Paemqbie.exe 560 Paemqbie.exe 1768 Poimjfho.exe 1768 Poimjfho.exe 1564 Pebfgqol.exe 1564 Pebfgqol.exe 1212 Phabclnp.exe 1212 Phabclnp.exe -
Drops file in System32 directory 64 IoCs
Processes:
Lqokfh32.exeFipbghkd.exeBjnjefml.exeLckdbnpe.exeAhodeh32.exeFpppfief.exeKdnjfl32.exeDccfeeno.exeEphgma32.exeAiehmo32.exeNnjnoo32.exeBdbkpn32.exeIcggfj32.exeQjlaac32.exeInpodibe.exeLoanmi32.exeIbfpqo32.exeNpmnih32.exeChojhnpd.exeAoqimhob.exeGcfinjbn.exeGgbnageg.exeIbdgma32.exeFgmlcinl.exeHgaaml32.exeLfniji32.exeOkchic32.exeOdklahje.exeQemapn32.exeDmckjl32.exeObheminn.exeMempkj32.exeEkaede32.exeGoofhkeo.exeFaalna32.exeAdgjecjh.exeOlanhlaf.exeAokfoi32.exeQhknlj32.exeKpjkqc32.exeKojgljhf.exeNeoipm32.exeEhnlln32.exeApflff32.exeMpkmkppa.exeMldjepcc.exeObclbj32.exeIgpgai32.exeEmpapa32.exeHgodgl32.exeCijppj32.exeHhagjnoe.exeIgoafp32.exeLcmqhnnc.exeQmecdknc.exeGdkhfk32.exePlqfebgj.exeGglagfml.exeJkicipjb.exeKlkigean.exeGddbelfc.exePfodalmh.exeFhakjfgq.exedescription ioc process File created C:\Windows\SysWOW64\Lhfcgf32.exe Lqokfh32.exe File created C:\Windows\SysWOW64\Gibomh32.exe Fipbghkd.exe File created C:\Windows\SysWOW64\Bpkbnmkc.exe Bjnjefml.exe File created C:\Windows\SysWOW64\Nfcbflca.dll Lckdbnpe.exe File created C:\Windows\SysWOW64\Apflff32.exe Ahodeh32.exe File created C:\Windows\SysWOW64\Faalna32.exe Fpppfief.exe File opened for modification C:\Windows\SysWOW64\Kikboc32.exe Kdnjfl32.exe File opened for modification C:\Windows\SysWOW64\Dcebjd32.exe Dccfeeno.exe File created C:\Windows\SysWOW64\Fnlhffbd.exe Ephgma32.exe File created C:\Windows\SysWOW64\Kpcbik32.dll Aiehmo32.exe File opened for modification C:\Windows\SysWOW64\Ncgfgf32.exe Nnjnoo32.exe File created C:\Windows\SysWOW64\Gijmccpd.dll Bdbkpn32.exe File created C:\Windows\SysWOW64\Ilblkl32.exe Icggfj32.exe File created C:\Windows\SysWOW64\Acdfjhbc.exe Qjlaac32.exe File created C:\Windows\SysWOW64\Opfgooqo.dll Inpodibe.exe File created C:\Windows\SysWOW64\Ldnfep32.exe Loanmi32.exe File opened for modification C:\Windows\SysWOW64\Idjing32.exe Ibfpqo32.exe File created C:\Windows\SysWOW64\Ecajcpdg.dll Npmnih32.exe File created C:\Windows\SysWOW64\Cjpcjime.exe Chojhnpd.exe File opened for modification C:\Windows\SysWOW64\Ajfmjqoh.exe Aoqimhob.exe File created C:\Windows\SysWOW64\Llkbhf32.dll Gcfinjbn.exe File created C:\Windows\SysWOW64\Gnlfna32.exe Ggbnageg.exe File created C:\Windows\SysWOW64\Djkcbgbk.dll Ibdgma32.exe File created C:\Windows\SysWOW64\Ffplof32.exe Fgmlcinl.exe File opened for modification C:\Windows\SysWOW64\Hnkjjfdo.exe Hgaaml32.exe File created C:\Windows\SysWOW64\Lkkbbp32.exe Lfniji32.exe File created C:\Windows\SysWOW64\Omaden32.exe Okchic32.exe File opened for modification C:\Windows\SysWOW64\Ooaqoa32.exe Odklahje.exe File created C:\Windows\SysWOW64\Qhknlj32.exe Qemapn32.exe File opened for modification C:\Windows\SysWOW64\Dcmcffgd.exe Dmckjl32.exe File created C:\Windows\SysWOW64\Mmcmjl32.dll Obheminn.exe File created C:\Windows\SysWOW64\Mbaqen32.exe Mempkj32.exe File created C:\Windows\SysWOW64\Empapa32.exe Ekaede32.exe File created C:\Windows\SysWOW64\Gdlopacg.exe Goofhkeo.exe File opened for modification C:\Windows\SysWOW64\Flfqkj32.exe Faalna32.exe File created C:\Windows\SysWOW64\Lnilbjnk.dll Adgjecjh.exe File created C:\Windows\SysWOW64\Ocmcjffp.exe Olanhlaf.exe File created C:\Windows\SysWOW64\Ahckgo32.exe Aokfoi32.exe File created C:\Windows\SysWOW64\Nkdphk32.dll Qhknlj32.exe File created C:\Windows\SysWOW64\Difmim32.dll Kpjkqc32.exe File opened for modification C:\Windows\SysWOW64\Kahdhegj.exe Kojgljhf.exe File created C:\Windows\SysWOW64\Npemmflk.exe Neoipm32.exe File created C:\Windows\SysWOW64\Eohdhhil.exe Ehnlln32.exe File opened for modification C:\Windows\SysWOW64\Aaghnnab.exe Apflff32.exe File opened for modification C:\Windows\SysWOW64\Mfhecfni.exe Mpkmkppa.exe File created C:\Windows\SysWOW64\Mnfgmh32.exe Mldjepcc.exe File created C:\Windows\SysWOW64\Oklpkpid.exe Obclbj32.exe File opened for modification C:\Windows\SysWOW64\Immojpjj.exe Igpgai32.exe File opened for modification C:\Windows\SysWOW64\Edjjmkqb.exe Empapa32.exe File created C:\Windows\SysWOW64\Hnimdffb.exe Hgodgl32.exe File opened for modification C:\Windows\SysWOW64\Codhmd32.exe Cijppj32.exe File opened for modification C:\Windows\SysWOW64\Hkpcfini.exe Hhagjnoe.exe File created C:\Windows\SysWOW64\Aibhbcno.dll Igoafp32.exe File created C:\Windows\SysWOW64\Fmmamime.dll Lcmqhnnc.exe File opened for modification C:\Windows\SysWOW64\Qcbkmalj.exe Qmecdknc.exe File created C:\Windows\SysWOW64\Ggidbfoo.exe Gdkhfk32.exe File opened for modification C:\Windows\SysWOW64\Pbjnbl32.exe Plqfebgj.exe File created C:\Windows\SysWOW64\Hjpkmmfb.dll Gglagfml.exe File created C:\Windows\SysWOW64\Ffnobq32.dll Loanmi32.exe File created C:\Windows\SysWOW64\Jhmdbdil.exe Jkicipjb.exe File opened for modification C:\Windows\SysWOW64\Kahapl32.exe Klkigean.exe File created C:\Windows\SysWOW64\Iepfedda.dll Gddbelfc.exe File created C:\Windows\SysWOW64\Pmilnfde.exe Pfodalmh.exe File created C:\Windows\SysWOW64\Fjogfbfd.exe Fhakjfgq.exe -
Modifies registry class 64 IoCs
Processes:
Hpldie32.exeJaheqimj.exeLdmdlgia.exeGlqjlo32.exeIchnap32.exeDficmb32.exeHhmnoo32.exeOlanhlaf.exeDkblnl32.exeEilnij32.exeGcfkfb32.exeDlmompif.exeAfhddbib.exeFkfknh32.exeKogkgj32.exeCqemjf32.exeMbcmjn32.exeMdjmkdjd.exeInhbicea.exeGdonoj32.exeFhhelc32.exeJiipdfod.exeJedcjqmg.exePjhcmk32.exeAlboje32.exeEcmikcfd.exeJmofejcn.exeOoaqoa32.exeBmicak32.exeGjpajd32.exeBhkcag32.exeDccfeeno.exeAhodeh32.exeEjekmd32.exeNddheb32.exeIcpafk32.exePmfpif32.exeAkmignfj.exeFkijlqni.exeIjgfbomb.exeIfnghp32.exeOcmcjffp.exeLnclpm32.exeQkjjhe32.exeMdhpfd32.exeMpkmkppa.exePchocd32.exeKbnmli32.exeQofmcjlm.exeCodhmd32.exeCajnol32.exeEjghbd32.exeIjafnjlo.exeLakqneeg.exeFgmlcinl.exeFlidkplc.exeMldjepcc.exeIbdgma32.exeFipbghkd.exeJkqjio32.exeDaadpkfn.exeEacmdn32.exeLdnfep32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpldie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epgaom32.dll" Jaheqimj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihnonm32.dll" Ldmdlgia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmblfg32.dll" Glqjlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijajpmbn.dll" Ichnap32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dficmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agnqlcgo.dll" Hhmnoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgjdml32.dll" Olanhlaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdejgdod.dll" Dkblnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eilnij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcfkfb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlmompif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcmlcj32.dll" Afhddbib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkfknh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kogkgj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cqemjf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbcmjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgifhe32.dll" Mdjmkdjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Inhbicea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlahbm32.dll" Gdonoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fhhelc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pihogqeh.dll" Jiipdfod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jedcjqmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckmkgg32.dll" Pjhcmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjlpfcka.dll" Alboje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bncgkn32.dll" Ecmikcfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jmofejcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ooaqoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmicak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjpajd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhkcag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dccfeeno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahodeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejekmd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nddheb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppidamaj.dll" Gjpajd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Icpafk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmfpif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akmignfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkijlqni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijgfbomb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpilqibf.dll" Ifnghp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocmcjffp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnclpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mghgfl32.dll" Qkjjhe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdhpfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpkmkppa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlgjhfgm.dll" Pchocd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbnmli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qofmcjlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Codhmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cajnol32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejghbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijafnjlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lakqneeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndaneokc.dll" Fgmlcinl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lejcckjb.dll" Flidkplc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Libnpd32.dll" Mldjepcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djkcbgbk.dll" Ibdgma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fipbghkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pejkhpmd.dll" Jkqjio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhdhffio.dll" Daadpkfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cljbkp32.dll" Eacmdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldnfep32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exeEnmoqlfp.exeFgjmdaik.exeFcqmjbno.exeFognoc32.exeFipbghkd.exeGibomh32.exeGkchoc32.exeGpaaea32.exeGiiengbi.exeGepfbhhm.exeHagggi32.exeHpldie32.exeIbafeple.exeIbfpqo32.exeIdjing32.exedescription pid process target process PID 1128 wrote to memory of 1160 1128 b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe Enmoqlfp.exe PID 1128 wrote to memory of 1160 1128 b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe Enmoqlfp.exe PID 1128 wrote to memory of 1160 1128 b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe Enmoqlfp.exe PID 1128 wrote to memory of 1160 1128 b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe Enmoqlfp.exe PID 1160 wrote to memory of 984 1160 Enmoqlfp.exe Fgjmdaik.exe PID 1160 wrote to memory of 984 1160 Enmoqlfp.exe Fgjmdaik.exe PID 1160 wrote to memory of 984 1160 Enmoqlfp.exe Fgjmdaik.exe PID 1160 wrote to memory of 984 1160 Enmoqlfp.exe Fgjmdaik.exe PID 984 wrote to memory of 1152 984 Fgjmdaik.exe Fcqmjbno.exe PID 984 wrote to memory of 1152 984 Fgjmdaik.exe Fcqmjbno.exe PID 984 wrote to memory of 1152 984 Fgjmdaik.exe Fcqmjbno.exe PID 984 wrote to memory of 1152 984 Fgjmdaik.exe Fcqmjbno.exe PID 1152 wrote to memory of 456 1152 Fcqmjbno.exe Fognoc32.exe PID 1152 wrote to memory of 456 1152 Fcqmjbno.exe Fognoc32.exe PID 1152 wrote to memory of 456 1152 Fcqmjbno.exe Fognoc32.exe PID 1152 wrote to memory of 456 1152 Fcqmjbno.exe Fognoc32.exe PID 456 wrote to memory of 524 456 Fognoc32.exe Fipbghkd.exe PID 456 wrote to memory of 524 456 Fognoc32.exe Fipbghkd.exe PID 456 wrote to memory of 524 456 Fognoc32.exe Fipbghkd.exe PID 456 wrote to memory of 524 456 Fognoc32.exe Fipbghkd.exe PID 524 wrote to memory of 1708 524 Fipbghkd.exe Gibomh32.exe PID 524 wrote to memory of 1708 524 Fipbghkd.exe Gibomh32.exe PID 524 wrote to memory of 1708 524 Fipbghkd.exe Gibomh32.exe PID 524 wrote to memory of 1708 524 Fipbghkd.exe Gibomh32.exe PID 1708 wrote to memory of 584 1708 Gibomh32.exe Gkchoc32.exe PID 1708 wrote to memory of 584 1708 Gibomh32.exe Gkchoc32.exe PID 1708 wrote to memory of 584 1708 Gibomh32.exe Gkchoc32.exe PID 1708 wrote to memory of 584 1708 Gibomh32.exe Gkchoc32.exe PID 584 wrote to memory of 552 584 Gkchoc32.exe Gpaaea32.exe PID 584 wrote to memory of 552 584 Gkchoc32.exe Gpaaea32.exe PID 584 wrote to memory of 552 584 Gkchoc32.exe Gpaaea32.exe PID 584 wrote to memory of 552 584 Gkchoc32.exe Gpaaea32.exe PID 552 wrote to memory of 1456 552 Gpaaea32.exe Giiengbi.exe PID 552 wrote to memory of 1456 552 Gpaaea32.exe Giiengbi.exe PID 552 wrote to memory of 1456 552 Gpaaea32.exe Giiengbi.exe PID 552 wrote to memory of 1456 552 Gpaaea32.exe Giiengbi.exe PID 1456 wrote to memory of 928 1456 Giiengbi.exe Gepfbhhm.exe PID 1456 wrote to memory of 928 1456 Giiengbi.exe Gepfbhhm.exe PID 1456 wrote to memory of 928 1456 Giiengbi.exe Gepfbhhm.exe PID 1456 wrote to memory of 928 1456 Giiengbi.exe Gepfbhhm.exe PID 928 wrote to memory of 1048 928 Gepfbhhm.exe Hagggi32.exe PID 928 wrote to memory of 1048 928 Gepfbhhm.exe Hagggi32.exe PID 928 wrote to memory of 1048 928 Gepfbhhm.exe Hagggi32.exe PID 928 wrote to memory of 1048 928 Gepfbhhm.exe Hagggi32.exe PID 1048 wrote to memory of 1032 1048 Hagggi32.exe Hpldie32.exe PID 1048 wrote to memory of 1032 1048 Hagggi32.exe Hpldie32.exe PID 1048 wrote to memory of 1032 1048 Hagggi32.exe Hpldie32.exe PID 1048 wrote to memory of 1032 1048 Hagggi32.exe Hpldie32.exe PID 1032 wrote to memory of 992 1032 Hpldie32.exe Ibafeple.exe PID 1032 wrote to memory of 992 1032 Hpldie32.exe Ibafeple.exe PID 1032 wrote to memory of 992 1032 Hpldie32.exe Ibafeple.exe PID 1032 wrote to memory of 992 1032 Hpldie32.exe Ibafeple.exe PID 992 wrote to memory of 1956 992 Ibafeple.exe Ibfpqo32.exe PID 992 wrote to memory of 1956 992 Ibafeple.exe Ibfpqo32.exe PID 992 wrote to memory of 1956 992 Ibafeple.exe Ibfpqo32.exe PID 992 wrote to memory of 1956 992 Ibafeple.exe Ibfpqo32.exe PID 1956 wrote to memory of 1640 1956 Ibfpqo32.exe Idjing32.exe PID 1956 wrote to memory of 1640 1956 Ibfpqo32.exe Idjing32.exe PID 1956 wrote to memory of 1640 1956 Ibfpqo32.exe Idjing32.exe PID 1956 wrote to memory of 1640 1956 Ibfpqo32.exe Idjing32.exe PID 1640 wrote to memory of 740 1640 Idjing32.exe Kmpimkad.exe PID 1640 wrote to memory of 740 1640 Idjing32.exe Kmpimkad.exe PID 1640 wrote to memory of 740 1640 Idjing32.exe Kmpimkad.exe PID 1640 wrote to memory of 740 1640 Idjing32.exe Kmpimkad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe"C:\Users\Admin\AppData\Local\Temp\b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\Enmoqlfp.exeC:\Windows\system32\Enmoqlfp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\Fgjmdaik.exeC:\Windows\system32\Fgjmdaik.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\Fcqmjbno.exeC:\Windows\system32\Fcqmjbno.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\Fognoc32.exeC:\Windows\system32\Fognoc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Fipbghkd.exeC:\Windows\system32\Fipbghkd.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\Gibomh32.exeC:\Windows\system32\Gibomh32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\Gkchoc32.exeC:\Windows\system32\Gkchoc32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\Gpaaea32.exeC:\Windows\system32\Gpaaea32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\Giiengbi.exeC:\Windows\system32\Giiengbi.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\Gepfbhhm.exeC:\Windows\system32\Gepfbhhm.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\Hagggi32.exeC:\Windows\system32\Hagggi32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\Hpldie32.exeC:\Windows\system32\Hpldie32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\Ibafeple.exeC:\Windows\system32\Ibafeple.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\Ibfpqo32.exeC:\Windows\system32\Ibfpqo32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Idjing32.exeC:\Windows\system32\Idjing32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Kmpimkad.exeC:\Windows\system32\Kmpimkad.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:740 -
C:\Windows\SysWOW64\Lmgpnj32.exeC:\Windows\system32\Lmgpnj32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824 -
C:\Windows\SysWOW64\Mcjnih32.exeC:\Windows\system32\Mcjnih32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1168 -
C:\Windows\SysWOW64\Nnmaoeoa.exeC:\Windows\system32\Nnmaoeoa.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1268 -
C:\Windows\SysWOW64\Npmnih32.exeC:\Windows\system32\Npmnih32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\Njfoje32.exeC:\Windows\system32\Njfoje32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Windows\SysWOW64\Njiloeap.exeC:\Windows\system32\Njiloeap.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Windows\SysWOW64\Nfoldf32.exeC:\Windows\system32\Nfoldf32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288 -
C:\Windows\SysWOW64\Omlagp32.exeC:\Windows\system32\Omlagp32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:944 -
C:\Windows\SysWOW64\Olanhlaf.exeC:\Windows\system32\Olanhlaf.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:884
-
C:\Windows\SysWOW64\Ocmcjffp.exeC:\Windows\system32\Ocmcjffp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1932 -
C:\Windows\SysWOW64\Oabpkbkh.exeC:\Windows\system32\Oabpkbkh.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:764 -
C:\Windows\SysWOW64\Paemqbie.exeC:\Windows\system32\Paemqbie.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560 -
C:\Windows\SysWOW64\Poimjfho.exeC:\Windows\system32\Poimjfho.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1768 -
C:\Windows\SysWOW64\Pebfgqol.exeC:\Windows\system32\Pebfgqol.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1564 -
C:\Windows\SysWOW64\Phabclnp.exeC:\Windows\system32\Phabclnp.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212 -
C:\Windows\SysWOW64\Pnnjkcmg.exeC:\Windows\system32\Pnnjkcmg.exe7⤵
- Executes dropped EXE
PID:548 -
C:\Windows\SysWOW64\Pkbkdgkq.exeC:\Windows\system32\Pkbkdgkq.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\Ppocmnjh.exeC:\Windows\system32\Ppocmnjh.exe9⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\Qledbool.exeC:\Windows\system32\Qledbool.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\Qjidkcnf.exeC:\Windows\system32\Qjidkcnf.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1324 -
C:\Windows\SysWOW64\Qofmcjlm.exeC:\Windows\system32\Qofmcjlm.exe12⤵
- Executes dropped EXE
- Modifies registry class
PID:1628 -
C:\Windows\SysWOW64\Qjlaac32.exeC:\Windows\system32\Qjlaac32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1676 -
C:\Windows\SysWOW64\Acdfjhbc.exeC:\Windows\system32\Acdfjhbc.exe14⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\Ahanboak.exeC:\Windows\system32\Ahanboak.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\Aokfoi32.exeC:\Windows\system32\Aokfoi32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1208 -
C:\Windows\SysWOW64\Ahckgo32.exeC:\Windows\system32\Ahckgo32.exe17⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\Anpcpf32.exeC:\Windows\system32\Anpcpf32.exe18⤵
- Executes dropped EXE
PID:1072 -
C:\Windows\SysWOW64\Aiehmo32.exeC:\Windows\system32\Aiehmo32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\Aoppjidb.exeC:\Windows\system32\Aoppjidb.exe20⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\Agkdnkan.exeC:\Windows\system32\Agkdnkan.exe21⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\Abpikd32.exeC:\Windows\system32\Abpikd32.exe22⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\Bkimdihd.exeC:\Windows\system32\Bkimdihd.exe23⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\Bqefmpfk.exeC:\Windows\system32\Bqefmpfk.exe24⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\SysWOW64\Bjnjefml.exeC:\Windows\system32\Bjnjefml.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\Bpkbnmkc.exeC:\Windows\system32\Bpkbnmkc.exe26⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\Bfghpf32.exeC:\Windows\system32\Bfghpf32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1000 -
C:\Windows\SysWOW64\Cndijilf.exeC:\Windows\system32\Cndijilf.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\Chojhnpd.exeC:\Windows\system32\Chojhnpd.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1372 -
C:\Windows\SysWOW64\Cjpcjime.exeC:\Windows\system32\Cjpcjime.exe30⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Cfgdojci.exeC:\Windows\system32\Cfgdojci.exe31⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Cdkdhnab.exeC:\Windows\system32\Cdkdhnab.exe32⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\Digmqepj.exeC:\Windows\system32\Digmqepj.exe33⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\Ddmann32.exeC:\Windows\system32\Ddmann32.exe34⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\Dlhfbp32.exeC:\Windows\system32\Dlhfbp32.exe35⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\Dbbnojdh.exeC:\Windows\system32\Dbbnojdh.exe36⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Dmhblcdn.exeC:\Windows\system32\Dmhblcdn.exe37⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\Decgqe32.exeC:\Windows\system32\Decgqe32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:828 -
C:\Windows\SysWOW64\Dlmompif.exeC:\Windows\system32\Dlmompif.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\Dajhefgm.exeC:\Windows\system32\Dajhefgm.exe40⤵PID:1748
-
C:\Windows\SysWOW64\Dhcpbq32.exeC:\Windows\system32\Dhcpbq32.exe41⤵PID:1960
-
C:\Windows\SysWOW64\Dkblnl32.exeC:\Windows\system32\Dkblnl32.exe42⤵
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Eopedj32.exeC:\Windows\system32\Eopedj32.exe43⤵PID:1532
-
C:\Windows\SysWOW64\Edmmma32.exeC:\Windows\system32\Edmmma32.exe44⤵PID:2028
-
C:\Windows\SysWOW64\Ekgeikjh.exeC:\Windows\system32\Ekgeikjh.exe45⤵PID:1416
-
C:\Windows\SysWOW64\Enebegil.exeC:\Windows\system32\Enebegil.exe46⤵PID:1560
-
C:\Windows\SysWOW64\Egnfolol.exeC:\Windows\system32\Egnfolol.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1776 -
C:\Windows\SysWOW64\Engokf32.exeC:\Windows\system32\Engokf32.exe48⤵PID:836
-
C:\Windows\SysWOW64\Ecdgcm32.exeC:\Windows\system32\Ecdgcm32.exe49⤵PID:1992
-
C:\Windows\SysWOW64\Ekkodk32.exeC:\Windows\system32\Ekkodk32.exe50⤵PID:616
-
C:\Windows\SysWOW64\Ephgma32.exeC:\Windows\system32\Ephgma32.exe51⤵
- Drops file in System32 directory
PID:676 -
C:\Windows\SysWOW64\Fnlhffbd.exeC:\Windows\system32\Fnlhffbd.exe52⤵PID:1880
-
C:\Windows\SysWOW64\Fciqomak.exeC:\Windows\system32\Fciqomak.exe53⤵PID:900
-
C:\Windows\SysWOW64\Fjcikg32.exeC:\Windows\system32\Fjcikg32.exe54⤵PID:432
-
C:\Windows\SysWOW64\Fopacn32.exeC:\Windows\system32\Fopacn32.exe55⤵PID:1384
-
C:\Windows\SysWOW64\Ffjiph32.exeC:\Windows\system32\Ffjiph32.exe56⤵PID:1316
-
C:\Windows\SysWOW64\Fhhelc32.exeC:\Windows\system32\Fhhelc32.exe57⤵
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Fobnimdm.exeC:\Windows\system32\Fobnimdm.exe58⤵PID:2060
-
C:\Windows\SysWOW64\Fflffg32.exeC:\Windows\system32\Fflffg32.exe59⤵PID:2068
-
C:\Windows\SysWOW64\Fodkombj.exeC:\Windows\system32\Fodkombj.exe60⤵PID:2076
-
C:\Windows\SysWOW64\Fbcgkhan.exeC:\Windows\system32\Fbcgkhan.exe61⤵PID:2084
-
C:\Windows\SysWOW64\Fgpoco32.exeC:\Windows\system32\Fgpoco32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2396 -
C:\Windows\SysWOW64\Hblfpj32.exeC:\Windows\system32\Hblfpj32.exe63⤵PID:2404
-
C:\Windows\SysWOW64\Hncfekac.exeC:\Windows\system32\Hncfekac.exe64⤵PID:2412
-
C:\Windows\SysWOW64\Haacagqf.exeC:\Windows\system32\Haacagqf.exe65⤵PID:2420
-
C:\Windows\SysWOW64\Ibiein32.exeC:\Windows\system32\Ibiein32.exe66⤵PID:2428
-
C:\Windows\SysWOW64\Jihgag32.exeC:\Windows\system32\Jihgag32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2436 -
C:\Windows\SysWOW64\Jkicipjb.exeC:\Windows\system32\Jkicipjb.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\Jhmdbdil.exeC:\Windows\system32\Jhmdbdil.exe69⤵PID:2452
-
C:\Windows\SysWOW64\Jmjmjk32.exeC:\Windows\system32\Jmjmjk32.exe70⤵PID:2460
-
C:\Windows\SysWOW64\Jgbacpmd.exeC:\Windows\system32\Jgbacpmd.exe71⤵PID:2468
-
C:\Windows\SysWOW64\Jaheqimj.exeC:\Windows\system32\Jaheqimj.exe72⤵
- Modifies registry class
PID:2476 -
C:\Windows\SysWOW64\Jkqjio32.exeC:\Windows\system32\Jkqjio32.exe73⤵
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\Jmofejcn.exeC:\Windows\system32\Jmofejcn.exe74⤵
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\Jkcfonah.exeC:\Windows\system32\Jkcfonah.exe75⤵PID:2500
-
C:\Windows\SysWOW64\Kmabkjal.exeC:\Windows\system32\Kmabkjal.exe76⤵PID:2508
-
C:\Windows\SysWOW64\Kgigdo32.exeC:\Windows\system32\Kgigdo32.exe77⤵PID:2516
-
C:\Windows\SysWOW64\Klfplf32.exeC:\Windows\system32\Klfplf32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2524 -
C:\Windows\SysWOW64\Kcphip32.exeC:\Windows\system32\Kcphip32.exe79⤵PID:2536
-
C:\Windows\SysWOW64\Kijpfjdm.exeC:\Windows\system32\Kijpfjdm.exe80⤵PID:2568
-
C:\Windows\SysWOW64\Klilbfca.exeC:\Windows\system32\Klilbfca.exe81⤵PID:2584
-
C:\Windows\SysWOW64\Kaeejmbh.exeC:\Windows\system32\Kaeejmbh.exe82⤵PID:2608
-
C:\Windows\SysWOW64\Klkigean.exeC:\Windows\system32\Klkigean.exe83⤵
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\Kahapl32.exeC:\Windows\system32\Kahapl32.exe84⤵PID:2652
-
C:\Windows\SysWOW64\Kdfnlh32.exeC:\Windows\system32\Kdfnlh32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2668 -
C:\Windows\SysWOW64\Kkpfhbff.exeC:\Windows\system32\Kkpfhbff.exe86⤵PID:2688
-
C:\Windows\SysWOW64\Knobdmej.exeC:\Windows\system32\Knobdmej.exe87⤵PID:2696
-
C:\Windows\SysWOW64\Kajnel32.exeC:\Windows\system32\Kajnel32.exe88⤵PID:2712
-
C:\Windows\SysWOW64\Lgggmc32.exeC:\Windows\system32\Lgggmc32.exe89⤵PID:2732
-
C:\Windows\SysWOW64\Lnaojmcg.exeC:\Windows\system32\Lnaojmcg.exe90⤵PID:2748
-
C:\Windows\SysWOW64\Lqokfh32.exeC:\Windows\system32\Lqokfh32.exe91⤵
- Drops file in System32 directory
PID:2768 -
C:\Windows\SysWOW64\Lhfcgf32.exeC:\Windows\system32\Lhfcgf32.exe92⤵PID:2792
-
C:\Windows\SysWOW64\Lnclpm32.exeC:\Windows\system32\Lnclpm32.exe93⤵
- Modifies registry class
PID:2828 -
C:\Windows\SysWOW64\Ldmdlgia.exeC:\Windows\system32\Ldmdlgia.exe94⤵
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\Lglphbhe.exeC:\Windows\system32\Lglphbhe.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2876 -
C:\Windows\SysWOW64\Lmhiaifl.exeC:\Windows\system32\Lmhiaifl.exe96⤵PID:2900
-
C:\Windows\SysWOW64\Ldpqbf32.exeC:\Windows\system32\Ldpqbf32.exe97⤵PID:2920
-
C:\Windows\SysWOW64\Ljlijm32.exeC:\Windows\system32\Ljlijm32.exe98⤵PID:2944
-
C:\Windows\SysWOW64\Lqfagglc.exeC:\Windows\system32\Lqfagglc.exe99⤵PID:2960
-
C:\Windows\SysWOW64\Lgpica32.exeC:\Windows\system32\Lgpica32.exe100⤵PID:2980
-
C:\Windows\SysWOW64\Liafkjjn.exeC:\Windows\system32\Liafkjjn.exe101⤵PID:2996
-
C:\Windows\SysWOW64\Molnhd32.exeC:\Windows\system32\Molnhd32.exe102⤵PID:3012
-
C:\Windows\SysWOW64\Mcgjib32.exeC:\Windows\system32\Mcgjib32.exe103⤵PID:3032
-
C:\Windows\SysWOW64\Mfefen32.exeC:\Windows\system32\Mfefen32.exe104⤵PID:3048
-
C:\Windows\SysWOW64\Midcai32.exeC:\Windows\system32\Midcai32.exe105⤵PID:3068
-
C:\Windows\SysWOW64\Mcignb32.exeC:\Windows\system32\Mcignb32.exe106⤵PID:2100
-
C:\Windows\SysWOW64\Mifpfi32.exeC:\Windows\system32\Mifpfi32.exe107⤵PID:2108
-
C:\Windows\SysWOW64\Mnchop32.exeC:\Windows\system32\Mnchop32.exe108⤵PID:2116
-
C:\Windows\SysWOW64\Mempkj32.exeC:\Windows\system32\Mempkj32.exe109⤵
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\Mbaqen32.exeC:\Windows\system32\Mbaqen32.exe110⤵PID:2132
-
C:\Windows\SysWOW64\Mepmaj32.exeC:\Windows\system32\Mepmaj32.exe111⤵PID:2140
-
C:\Windows\SysWOW64\Mgnime32.exeC:\Windows\system32\Mgnime32.exe112⤵PID:2148
-
C:\Windows\SysWOW64\Mbcmjn32.exeC:\Windows\system32\Mbcmjn32.exe113⤵
- Modifies registry class
PID:2156 -
C:\Windows\SysWOW64\Ngpfbefk.exeC:\Windows\system32\Ngpfbefk.exe114⤵PID:2164
-
C:\Windows\SysWOW64\Nnjnoo32.exeC:\Windows\system32\Nnjnoo32.exe115⤵
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\Ncgfgf32.exeC:\Windows\system32\Ncgfgf32.exe116⤵PID:2180
-
C:\Windows\SysWOW64\Nnlkeo32.exeC:\Windows\system32\Nnlkeo32.exe117⤵PID:2188
-
C:\Windows\SysWOW64\Ncicme32.exeC:\Windows\system32\Ncicme32.exe118⤵PID:2196
-
C:\Windows\SysWOW64\Niflelhd.exeC:\Windows\system32\Niflelhd.exe119⤵PID:2204
-
C:\Windows\SysWOW64\Namdfjif.exeC:\Windows\system32\Namdfjif.exe120⤵PID:2212
-
C:\Windows\SysWOW64\Nfjloqgn.exeC:\Windows\system32\Nfjloqgn.exe121⤵PID:2220
-
C:\Windows\SysWOW64\Nmddlk32.exeC:\Windows\system32\Nmddlk32.exe122⤵PID:2232
-
C:\Windows\SysWOW64\Npbqhf32.exeC:\Windows\system32\Npbqhf32.exe123⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2240 -
C:\Windows\SysWOW64\Neoipm32.exeC:\Windows\system32\Neoipm32.exe124⤵
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\Npemmflk.exeC:\Windows\system32\Npemmflk.exe125⤵PID:2256
-
C:\Windows\SysWOW64\Oimbfk32.exeC:\Windows\system32\Oimbfk32.exe126⤵PID:2264
-
C:\Windows\SysWOW64\Ollnbg32.exeC:\Windows\system32\Ollnbg32.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2272 -
C:\Windows\SysWOW64\Obefoaim.exeC:\Windows\system32\Obefoaim.exe128⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2280 -
C:\Windows\SysWOW64\Oipolkpi.exeC:\Windows\system32\Oipolkpi.exe129⤵PID:2288
-
C:\Windows\SysWOW64\Ojqkcc32.exeC:\Windows\system32\Ojqkcc32.exe130⤵PID:2296
-
C:\Windows\SysWOW64\Oakcpmmd.exeC:\Windows\system32\Oakcpmmd.exe131⤵PID:2304
-
C:\Windows\SysWOW64\Odiplimh.exeC:\Windows\system32\Odiplimh.exe132⤵PID:2312
-
C:\Windows\SysWOW64\Okchic32.exeC:\Windows\system32\Okchic32.exe133⤵
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\Omaden32.exeC:\Windows\system32\Omaden32.exe134⤵PID:2328
-
C:\Windows\SysWOW64\Odklahje.exeC:\Windows\system32\Odklahje.exe135⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\Ooaqoa32.exeC:\Windows\system32\Ooaqoa32.exe136⤵
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Opbmgipj.exeC:\Windows\system32\Opbmgipj.exe137⤵PID:2352
-
C:\Windows\SysWOW64\Pkhadbpp.exeC:\Windows\system32\Pkhadbpp.exe138⤵PID:2360
-
C:\Windows\SysWOW64\Ppdjling.exeC:\Windows\system32\Ppdjling.exe139⤵PID:2372
-
C:\Windows\SysWOW64\Pdpemh32.exeC:\Windows\system32\Pdpemh32.exe140⤵PID:2388
-
C:\Windows\SysWOW64\Pimneodg.exeC:\Windows\system32\Pimneodg.exe141⤵PID:2548
-
C:\Windows\SysWOW64\Pmhjem32.exeC:\Windows\system32\Pmhjem32.exe142⤵PID:2564
-
C:\Windows\SysWOW64\Pdbbbgdm.exeC:\Windows\system32\Pdbbbgdm.exe143⤵PID:2620
-
C:\Windows\SysWOW64\Pmkgkm32.exeC:\Windows\system32\Pmkgkm32.exe144⤵PID:2664
-
C:\Windows\SysWOW64\Pchocd32.exeC:\Windows\system32\Pchocd32.exe145⤵
- Modifies registry class
PID:2708 -
C:\Windows\SysWOW64\Peflpo32.exeC:\Windows\system32\Peflpo32.exe146⤵PID:2756
-
C:\Windows\SysWOW64\Pplpmhho.exeC:\Windows\system32\Pplpmhho.exe147⤵PID:2784
-
C:\Windows\SysWOW64\Pamldp32.exeC:\Windows\system32\Pamldp32.exe148⤵PID:2804
-
C:\Windows\SysWOW64\Phgdajej.exeC:\Windows\system32\Phgdajej.exe149⤵PID:2840
-
C:\Windows\SysWOW64\Poqmnd32.exeC:\Windows\system32\Poqmnd32.exe150⤵PID:2860
-
C:\Windows\SysWOW64\Qaoijp32.exeC:\Windows\system32\Qaoijp32.exe151⤵PID:2912
-
C:\Windows\SysWOW64\Qkgmcebk.exeC:\Windows\system32\Qkgmcebk.exe152⤵PID:2972
-
C:\Windows\SysWOW64\Qemapn32.exeC:\Windows\system32\Qemapn32.exe153⤵
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\Qhknlj32.exeC:\Windows\system32\Qhknlj32.exe154⤵
- Drops file in System32 directory
PID:3024 -
C:\Windows\SysWOW64\Qkjjhe32.exeC:\Windows\system32\Qkjjhe32.exe155⤵
- Modifies registry class
PID:2368 -
C:\Windows\SysWOW64\Aadbeohe.exeC:\Windows\system32\Aadbeohe.exe156⤵PID:2544
-
C:\Windows\SysWOW64\Ahnkbi32.exeC:\Windows\system32\Ahnkbi32.exe157⤵PID:2592
-
C:\Windows\SysWOW64\Ankcjpni.exeC:\Windows\system32\Ankcjpni.exe158⤵PID:2644
-
C:\Windows\SysWOW64\Addkgj32.exeC:\Windows\system32\Addkgj32.exe159⤵PID:2740
-
C:\Windows\SysWOW64\Agcgcf32.exeC:\Windows\system32\Agcgcf32.exe160⤵PID:2808
-
C:\Windows\SysWOW64\Ajadoa32.exeC:\Windows\system32\Ajadoa32.exe161⤵PID:2872
-
C:\Windows\SysWOW64\Acjhhgjn.exeC:\Windows\system32\Acjhhgjn.exe162⤵PID:2892
-
C:\Windows\SysWOW64\Afhddbib.exeC:\Windows\system32\Afhddbib.exe163⤵
- Modifies registry class
PID:2992 -
C:\Windows\SysWOW64\Aoqimhob.exeC:\Windows\system32\Aoqimhob.exe164⤵
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\Ajfmjqoh.exeC:\Windows\system32\Ajfmjqoh.exe165⤵PID:2560
-
C:\Windows\SysWOW64\Aqpegk32.exeC:\Windows\system32\Aqpegk32.exe166⤵PID:2632
-
C:\Windows\SysWOW64\Afmnoa32.exeC:\Windows\system32\Afmnoa32.exe167⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2728 -
C:\Windows\SysWOW64\Bhkjkm32.exeC:\Windows\system32\Bhkjkm32.exe168⤵PID:2824
-
C:\Windows\SysWOW64\Bkjfgh32.exeC:\Windows\system32\Bkjfgh32.exe169⤵PID:2888
-
C:\Windows\SysWOW64\Bcanifcf.exeC:\Windows\system32\Bcanifcf.exe170⤵PID:2952
-
C:\Windows\SysWOW64\Bdbkpn32.exeC:\Windows\system32\Bdbkpn32.exe171⤵
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\Bmicak32.exeC:\Windows\system32\Bmicak32.exe172⤵
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\Bnjoicpe.exeC:\Windows\system32\Bnjoicpe.exe173⤵PID:2788
-
C:\Windows\SysWOW64\Bipcflpk.exeC:\Windows\system32\Bipcflpk.exe174⤵PID:2928
-
C:\Windows\SysWOW64\Bbhhobfk.exeC:\Windows\system32\Bbhhobfk.exe175⤵PID:2940
-
C:\Windows\SysWOW64\Bdgdkmeo.exeC:\Windows\system32\Bdgdkmeo.exe176⤵PID:2956
-
C:\Windows\SysWOW64\Bjcmcdcf.exeC:\Windows\system32\Bjcmcdcf.exe177⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3028 -
C:\Windows\SysWOW64\Beiaamcl.exeC:\Windows\system32\Beiaamcl.exe178⤵PID:3060
-
C:\Windows\SysWOW64\Bjfiidad.exeC:\Windows\system32\Bjfiidad.exe179⤵PID:2600
-
C:\Windows\SysWOW64\Ceknfm32.exeC:\Windows\system32\Ceknfm32.exe180⤵PID:2684
-
C:\Windows\SysWOW64\Cjhfoc32.exeC:\Windows\system32\Cjhfoc32.exe181⤵PID:2724
-
C:\Windows\SysWOW64\Dengkpbb.exeC:\Windows\system32\Dengkpbb.exe182⤵PID:2780
-
C:\Windows\SysWOW64\Dlgohj32.exeC:\Windows\system32\Dlgohj32.exe183⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2884 -
C:\Windows\SysWOW64\Depcqopp.exeC:\Windows\system32\Depcqopp.exe184⤵PID:3076
-
C:\Windows\SysWOW64\Djmlifng.exeC:\Windows\system32\Djmlifng.exe185⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3084 -
C:\Windows\SysWOW64\Dpidamlo.exeC:\Windows\system32\Dpidamlo.exe186⤵PID:3092
-
C:\Windows\SysWOW64\Djoinf32.exeC:\Windows\system32\Djoinf32.exe187⤵PID:3100
-
C:\Windows\SysWOW64\Dmneja32.exeC:\Windows\system32\Dmneja32.exe188⤵PID:3108
-
C:\Windows\SysWOW64\Ddgmgkbe.exeC:\Windows\system32\Ddgmgkbe.exe189⤵PID:3116
-
C:\Windows\SysWOW64\Ekaede32.exeC:\Windows\system32\Ekaede32.exe190⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3124 -
C:\Windows\SysWOW64\Empapa32.exeC:\Windows\system32\Empapa32.exe191⤵
- Drops file in System32 directory
PID:3132 -
C:\Windows\SysWOW64\Edjjmkqb.exeC:\Windows\system32\Edjjmkqb.exe192⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3140 -
C:\Windows\SysWOW64\Eifbeb32.exeC:\Windows\system32\Eifbeb32.exe193⤵PID:3148
-
C:\Windows\SysWOW64\Embneqgc.exeC:\Windows\system32\Embneqgc.exe194⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3156 -
C:\Windows\SysWOW64\Eockmi32.exeC:\Windows\system32\Eockmi32.exe195⤵PID:3172
-
C:\Windows\SysWOW64\Eemcjcdn.exeC:\Windows\system32\Eemcjcdn.exe196⤵PID:3180
-
C:\Windows\SysWOW64\Elgkgm32.exeC:\Windows\system32\Elgkgm32.exe197⤵PID:3196
-
C:\Windows\SysWOW64\Eofgch32.exeC:\Windows\system32\Eofgch32.exe198⤵PID:3208
-
C:\Windows\SysWOW64\Eiklpakd.exeC:\Windows\system32\Eiklpakd.exe199⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3228 -
C:\Windows\SysWOW64\Ehnlln32.exeC:\Windows\system32\Ehnlln32.exe200⤵
- Drops file in System32 directory
PID:3240 -
C:\Windows\SysWOW64\Eohdhhil.exeC:\Windows\system32\Eohdhhil.exe201⤵PID:3256
-
C:\Windows\SysWOW64\Eafpdchp.exeC:\Windows\system32\Eafpdchp.exe202⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3272 -
C:\Windows\SysWOW64\Ehqian32.exeC:\Windows\system32\Ehqian32.exe203⤵PID:3300
-
C:\Windows\SysWOW64\Eojanhgi.exeC:\Windows\system32\Eojanhgi.exe204⤵PID:3312
-
C:\Windows\SysWOW64\Faimjcfm.exeC:\Windows\system32\Faimjcfm.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3324 -
C:\Windows\SysWOW64\Fhcegn32.exeC:\Windows\system32\Fhcegn32.exe206⤵PID:3348
-
C:\Windows\SysWOW64\Fgeebjdd.exeC:\Windows\system32\Fgeebjdd.exe207⤵PID:3360
-
C:\Windows\SysWOW64\Fnpnodla.exeC:\Windows\system32\Fnpnodla.exe208⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3380 -
C:\Windows\SysWOW64\Fpnjkpke.exeC:\Windows\system32\Fpnjkpke.exe209⤵PID:3400
-
C:\Windows\SysWOW64\Fheblmkg.exeC:\Windows\system32\Fheblmkg.exe210⤵PID:3416
-
C:\Windows\SysWOW64\Fjfode32.exeC:\Windows\system32\Fjfode32.exe211⤵PID:3432
-
C:\Windows\SysWOW64\Fcocmkhf.exeC:\Windows\system32\Fcocmkhf.exe212⤵PID:3448
-
C:\Windows\SysWOW64\Fkfknh32.exeC:\Windows\system32\Fkfknh32.exe213⤵
- Modifies registry class
PID:3464 -
C:\Windows\SysWOW64\Fpbcfo32.exeC:\Windows\system32\Fpbcfo32.exe214⤵PID:3476
-
C:\Windows\SysWOW64\Fgmlcinl.exeC:\Windows\system32\Fgmlcinl.exe215⤵
- Drops file in System32 directory
- Modifies registry class
PID:3488 -
C:\Windows\SysWOW64\Ffplof32.exeC:\Windows\system32\Ffplof32.exe216⤵PID:3508
-
C:\Windows\SysWOW64\Fjkhodmp.exeC:\Windows\system32\Fjkhodmp.exe217⤵PID:3524
-
C:\Windows\SysWOW64\Flidkplc.exeC:\Windows\system32\Flidkplc.exe218⤵
- Modifies registry class
PID:3540 -
C:\Windows\SysWOW64\Fohqglkg.exeC:\Windows\system32\Fohqglkg.exe219⤵PID:3556
-
C:\Windows\SysWOW64\Fgohhilj.exeC:\Windows\system32\Fgohhilj.exe220⤵PID:3572
-
C:\Windows\SysWOW64\Ghpepa32.exeC:\Windows\system32\Ghpepa32.exe221⤵PID:3588
-
C:\Windows\SysWOW64\Gcfinjbn.exeC:\Windows\system32\Gcfinjbn.exe222⤵
- Drops file in System32 directory
PID:3600 -
C:\Windows\SysWOW64\Gjpajd32.exeC:\Windows\system32\Gjpajd32.exe223⤵
- Modifies registry class
PID:3616 -
C:\Windows\SysWOW64\Glnnfp32.exeC:\Windows\system32\Glnnfp32.exe224⤵PID:3624
-
C:\Windows\SysWOW64\Gchfcjpk.exeC:\Windows\system32\Gchfcjpk.exe225⤵PID:3632
-
C:\Windows\SysWOW64\Glqjlo32.exeC:\Windows\system32\Glqjlo32.exe226⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3640 -
C:\Windows\SysWOW64\Goofhkeo.exeC:\Windows\system32\Goofhkeo.exe227⤵
- Drops file in System32 directory
PID:3648 -
C:\Windows\SysWOW64\Gdlopacg.exeC:\Windows\system32\Gdlopacg.exe228⤵PID:3656
-
C:\Windows\SysWOW64\Ggjklmcj.exeC:\Windows\system32\Ggjklmcj.exe229⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3664 -
C:\Windows\SysWOW64\Gbppjfbp.exeC:\Windows\system32\Gbppjfbp.exe230⤵PID:3672
-
C:\Windows\SysWOW64\Gglhbmqh.exeC:\Windows\system32\Gglhbmqh.exe231⤵PID:3680
-
C:\Windows\SysWOW64\Gbbloe32.exeC:\Windows\system32\Gbbloe32.exe232⤵PID:3688
-
C:\Windows\SysWOW64\Hgodgl32.exeC:\Windows\system32\Hgodgl32.exe233⤵
- Drops file in System32 directory
PID:3696 -
C:\Windows\SysWOW64\Hnimdffb.exeC:\Windows\system32\Hnimdffb.exe234⤵PID:3704
-
C:\Windows\SysWOW64\Hqgipbee.exeC:\Windows\system32\Hqgipbee.exe235⤵PID:3712
-
C:\Windows\SysWOW64\Hgaaml32.exeC:\Windows\system32\Hgaaml32.exe236⤵
- Drops file in System32 directory
PID:3720 -
C:\Windows\SysWOW64\Hnkjjfdo.exeC:\Windows\system32\Hnkjjfdo.exe237⤵PID:3728
-
C:\Windows\SysWOW64\Hqiffa32.exeC:\Windows\system32\Hqiffa32.exe238⤵PID:3736
-
C:\Windows\SysWOW64\Hgcnblkp.exeC:\Windows\system32\Hgcnblkp.exe239⤵PID:3744
-
C:\Windows\SysWOW64\Hiekjd32.exeC:\Windows\system32\Hiekjd32.exe240⤵PID:3752
-
C:\Windows\SysWOW64\Hpocgnhk.exeC:\Windows\system32\Hpocgnhk.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3760 -