Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4.exe
Resource
win10v2004-20240508-en
General
-
Target
0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4.exe
-
Size
163KB
-
MD5
4e435d2876c587413e0b0ef801cac057
-
SHA1
f8aa67217862fe4d1b95436e47bf40c7872ceaef
-
SHA256
0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4
-
SHA512
13763aef1ddac4865ca63643471a5df5b258f37a09b71c0cd50c999aa1a6e292aa8b6267da81442f09bf724160512ccdb3d74f09348eee44e158ef8d2e2d9ca8
-
SSDEEP
1536:PY7Mv3FsqJNvVliJTqvU1Xr8xRoKlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:Q4v6q7vVliJqvU1YYKltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jgpmmp32.exeLjaoeini.exeDoqpak32.exeGkoiefmj.exeDfknkg32.exeAmfjeobf.exeCmcolgbj.exeDjmibn32.exeFhdohp32.exeBjagjhnc.exeQqhcpo32.exeMngegmbc.exeMicoed32.exeBblnindg.exeQachgk32.exeDhidjpqc.exeCadlbk32.exeAeaanjkl.exePcjapi32.exeHkfoeega.exeOadfkdgd.exeHbhijepa.exeBajjli32.exeDojcgi32.exeGlhonj32.exeEgdqae32.exeKnlleepl.exeLhfmdj32.exeKiejmi32.exeMlcifmbl.exeBiadeoce.exePloknb32.exeEhcfaboo.exeJjamia32.exeLqkgbcff.exePdkcde32.exeNlglfe32.exeEocenh32.exeJlnnmb32.exeFkkeclfh.exeAjneip32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgpmmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljaoeini.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doqpak32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkoiefmj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfknkg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amfjeobf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmcolgbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djmibn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhdohp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjagjhnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qqhcpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mngegmbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Micoed32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bblnindg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qachgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhidjpqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cadlbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aeaanjkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcjapi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkfoeega.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oadfkdgd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbhijepa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mngegmbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bajjli32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dojcgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glhonj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egdqae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knlleepl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhfmdj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kiejmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlcifmbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Biadeoce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ploknb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehcfaboo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjamia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lqkgbcff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdkcde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlglfe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eocenh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlnnmb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkkeclfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajneip32.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Njogjfoj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nqiogp32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2132-21-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncgkcl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nbhkac32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncihikcg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnolfdcn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncldnkae.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnaikd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncnadk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ondeac32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ocqnij32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Onfbfc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Occkojkm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Onholckc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oqgkhnjf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ojopad32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ocgdji32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Okolkg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pcjapi32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3208-152-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pnpemb32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2204-165-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pbkamqmd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Peimil32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pghieg32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2044-184-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Peljol32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1480-192-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pkfblfab.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2528-200-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pengdk32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4684-208-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pbbgnpgl.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3404-216-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pgopffec.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4620-223-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pbddcoei.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2156-232-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qkmhlekj.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4552-240-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qbgqio32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qbimoo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Abkjdnoa.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2148-313-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdainc32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1192-517-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1944-536-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4304-555-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dohfbj32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4576-610-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eapedd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ecandfpd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hkikkeeo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hmhhehlb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iicbehnq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jplfcpin.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kmdqgd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lbjlfi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mgddhf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Menjdbgj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Olhlhjpd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ofcmfodb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pnlaml32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Njogjfoj.exe UPX C:\Windows\SysWOW64\Nqiogp32.exe UPX behavioral2/memory/2132-21-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ncgkcl32.exe UPX C:\Windows\SysWOW64\Nbhkac32.exe UPX C:\Windows\SysWOW64\Ncihikcg.exe UPX C:\Windows\SysWOW64\Nnolfdcn.exe UPX C:\Windows\SysWOW64\Ncldnkae.exe UPX C:\Windows\SysWOW64\Nnaikd32.exe UPX C:\Windows\SysWOW64\Ncnadk32.exe UPX C:\Windows\SysWOW64\Ondeac32.exe UPX C:\Windows\SysWOW64\Ocqnij32.exe UPX C:\Windows\SysWOW64\Onfbfc32.exe UPX C:\Windows\SysWOW64\Occkojkm.exe UPX C:\Windows\SysWOW64\Onholckc.exe UPX behavioral2/memory/4148-117-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Oqgkhnjf.exe UPX behavioral2/memory/1576-129-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ojopad32.exe UPX C:\Windows\SysWOW64\Ocgdji32.exe UPX behavioral2/memory/3516-137-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Okolkg32.exe UPX behavioral2/memory/4960-144-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pcjapi32.exe UPX behavioral2/memory/3208-152-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pnpemb32.exe UPX behavioral2/memory/2204-165-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pbkamqmd.exe UPX behavioral2/memory/4408-173-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Peimil32.exe UPX C:\Windows\SysWOW64\Pghieg32.exe UPX behavioral2/memory/2044-184-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Peljol32.exe UPX behavioral2/memory/1480-192-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pkfblfab.exe UPX behavioral2/memory/2528-200-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pengdk32.exe UPX behavioral2/memory/4684-208-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pbbgnpgl.exe UPX behavioral2/memory/3404-216-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pgopffec.exe UPX behavioral2/memory/4620-223-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pbddcoei.exe UPX behavioral2/memory/2156-232-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Qkmhlekj.exe UPX behavioral2/memory/4552-240-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Qbgqio32.exe UPX C:\Windows\SysWOW64\Qbimoo32.exe UPX C:\Windows\SysWOW64\Abkjdnoa.exe UPX behavioral2/memory/2148-313-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3104-391-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4084-402-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Cdainc32.exe UPX behavioral2/memory/3288-495-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4592-505-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1192-517-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Dohfbj32.exe UPX behavioral2/memory/4576-610-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Eapedd32.exe UPX C:\Windows\SysWOW64\Ecandfpd.exe UPX C:\Windows\SysWOW64\Hkikkeeo.exe UPX C:\Windows\SysWOW64\Hmhhehlb.exe UPX C:\Windows\SysWOW64\Iicbehnq.exe UPX C:\Windows\SysWOW64\Jplfcpin.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Njogjfoj.exeNqiogp32.exeNcgkcl32.exeNbhkac32.exeNcihikcg.exeNnolfdcn.exeNcldnkae.exeNnaikd32.exeNcnadk32.exeOndeac32.exeOcqnij32.exeOnfbfc32.exeOcckojkm.exeOnholckc.exeOqgkhnjf.exeOjopad32.exeOcgdji32.exeOkolkg32.exePcjapi32.exePnpemb32.exePbkamqmd.exePeimil32.exePghieg32.exePeljol32.exePkfblfab.exePengdk32.exePbbgnpgl.exePgopffec.exePbddcoei.exeQkmhlekj.exeQbgqio32.exeQbimoo32.exeAegikj32.exeAlabgd32.exeAbkjdnoa.exeAcmflf32.exeAjfoiqll.exeAelcfilb.exeAhkobekf.exeAjiknpjj.exeAbpcon32.exeAacckjaf.exeAlhhhcal.exeAjkhdp32.exeAaepqjpd.exeAhoimd32.exeAjneip32.exeBahmfj32.exeBdfibe32.exeBnlnon32.exeBajjli32.exeBdhfhe32.exeBlpnib32.exeBbifelba.exeBehbag32.exeBhfonc32.exeBjdkjo32.exeBblckl32.exeBejogg32.exeBjghpn32.exeBbnpqk32.exeBdolhc32.exeCbqlfkmi.exeCdainc32.exepid process 8 Njogjfoj.exe 2132 Nqiogp32.exe 2712 Ncgkcl32.exe 3328 Nbhkac32.exe 3772 Ncihikcg.exe 2736 Nnolfdcn.exe 1484 Ncldnkae.exe 2428 Nnaikd32.exe 1360 Ncnadk32.exe 4576 Ondeac32.exe 4852 Ocqnij32.exe 3760 Onfbfc32.exe 520 Occkojkm.exe 4148 Onholckc.exe 1036 Oqgkhnjf.exe 1576 Ojopad32.exe 3516 Ocgdji32.exe 4960 Okolkg32.exe 3208 Pcjapi32.exe 2204 Pnpemb32.exe 4408 Pbkamqmd.exe 2396 Peimil32.exe 2044 Pghieg32.exe 1480 Peljol32.exe 2528 Pkfblfab.exe 4684 Pengdk32.exe 3404 Pbbgnpgl.exe 4620 Pgopffec.exe 2156 Pbddcoei.exe 4552 Qkmhlekj.exe 4920 Qbgqio32.exe 4120 Qbimoo32.exe 5040 Aegikj32.exe 2544 Alabgd32.exe 4540 Abkjdnoa.exe 3344 Acmflf32.exe 4480 Ajfoiqll.exe 3284 Aelcfilb.exe 1804 Ahkobekf.exe 5024 Ajiknpjj.exe 2148 Abpcon32.exe 2556 Aacckjaf.exe 5060 Alhhhcal.exe 1060 Ajkhdp32.exe 4420 Aaepqjpd.exe 2708 Ahoimd32.exe 4236 Ajneip32.exe 804 Bahmfj32.exe 4676 Bdfibe32.exe 3764 Bnlnon32.exe 1528 Bajjli32.exe 2484 Bdhfhe32.exe 4392 Blpnib32.exe 800 Bbifelba.exe 3104 Behbag32.exe 4084 Bhfonc32.exe 2004 Bjdkjo32.exe 1188 Bblckl32.exe 3196 Bejogg32.exe 3016 Bjghpn32.exe 4228 Bbnpqk32.exe 2800 Bdolhc32.exe 2164 Cbqlfkmi.exe 4512 Cdainc32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Opakbi32.exeJfpojead.exeFbjmhh32.exeLepncd32.exeKfcdfbqo.exeOeicejia.exeDcigeooj.exeLqpamb32.exeDboigi32.exeAjkaii32.exeLjaoeini.exeKiejmi32.exeOlbdhn32.exeJbgoof32.exeIdbodn32.exeAfkknogn.exeEjfeng32.exeKpgodhkd.exeHbhijepa.exePoimpapp.exeAhoimd32.exeAclpap32.exeEaindh32.exeQkmhlekj.exeCdkldb32.exeIicbehnq.exePldcjeia.exeLgmngglp.exeCimcan32.exeJjamia32.exeJkaicd32.exeJjoiil32.exeAnclbkbp.exeJgonlm32.exeLbnngbbn.exeLpekef32.exeOljaccjf.exeNlfelogp.exeLdipha32.exeOfcmfodb.exeBggnof32.exeGgnedlao.exeBjnmpl32.exeBheffh32.exePdfehh32.exePonfka32.exeAolblopj.exeOkolkg32.exeNcdgcf32.exeDmglcj32.exeOhkbbn32.exeHgkkkcbc.exeNhahaiec.exeAfjeceml.exedescription ioc process File created C:\Windows\SysWOW64\Oneklm32.exe Opakbi32.exe File created C:\Windows\SysWOW64\Jgakbm32.exe Jfpojead.exe File opened for modification C:\Windows\SysWOW64\Fideeaco.exe Fbjmhh32.exe File created C:\Windows\SysWOW64\Lbdolh32.exe Lepncd32.exe File created C:\Windows\SysWOW64\Kiaqcnpb.exe Kfcdfbqo.exe File opened for modification C:\Windows\SysWOW64\Olckbd32.exe Oeicejia.exe File opened for modification C:\Windows\SysWOW64\Dblgpl32.exe Dcigeooj.exe File created C:\Windows\SysWOW64\Lcnmin32.exe Lqpamb32.exe File created C:\Windows\SysWOW64\Dlgmpogj.exe Dboigi32.exe File created C:\Windows\SysWOW64\Aepefb32.exe Ajkaii32.exe File opened for modification C:\Windows\SysWOW64\Lqkgbcff.exe Ljaoeini.exe File created C:\Windows\SysWOW64\Bhkfkmmg.exe File created C:\Windows\SysWOW64\Kjffdalb.exe Kiejmi32.exe File opened for modification C:\Windows\SysWOW64\Oblmdhdo.exe Olbdhn32.exe File opened for modification C:\Windows\SysWOW64\Igajal32.exe File opened for modification C:\Windows\SysWOW64\Jiaglp32.exe Jbgoof32.exe File opened for modification C:\Windows\SysWOW64\Iklgah32.exe Idbodn32.exe File created C:\Windows\SysWOW64\Iahqoq32.dll Afkknogn.exe File opened for modification C:\Windows\SysWOW64\Emdajb32.exe Ejfeng32.exe File opened for modification C:\Windows\SysWOW64\Kbekqdjh.exe Kpgodhkd.exe File opened for modification C:\Windows\SysWOW64\Hkpqkcpd.exe Hbhijepa.exe File opened for modification C:\Windows\SysWOW64\Pecellgl.exe Poimpapp.exe File opened for modification C:\Windows\SysWOW64\Ajneip32.exe Ahoimd32.exe File opened for modification C:\Windows\SysWOW64\Ajfhnjhq.exe Aclpap32.exe File created C:\Windows\SysWOW64\Kgffoo32.dll File created C:\Windows\SysWOW64\Idcondbo.dll Eaindh32.exe File opened for modification C:\Windows\SysWOW64\Ocohmc32.exe File created C:\Windows\SysWOW64\Fbjieo32.dll File opened for modification C:\Windows\SysWOW64\Qbgqio32.exe Qkmhlekj.exe File opened for modification C:\Windows\SysWOW64\Clbceo32.exe Cdkldb32.exe File opened for modification C:\Windows\SysWOW64\Iejcji32.exe Iicbehnq.exe File created C:\Windows\SysWOW64\Dfoomidj.dll Pldcjeia.exe File opened for modification C:\Windows\SysWOW64\Jcdjbk32.exe File created C:\Windows\SysWOW64\Pnifekmd.exe File opened for modification C:\Windows\SysWOW64\Lepncd32.exe Lgmngglp.exe File created C:\Windows\SysWOW64\Iamfph32.dll Cimcan32.exe File created C:\Windows\SysWOW64\Jbiejoaj.exe Jjamia32.exe File created C:\Windows\SysWOW64\Jbkbpoog.exe Jkaicd32.exe File created C:\Windows\SysWOW64\Jqhafffk.exe Jjoiil32.exe File created C:\Windows\SysWOW64\Aaohcj32.exe Anclbkbp.exe File created C:\Windows\SysWOW64\Jnifigpa.exe Jgonlm32.exe File opened for modification C:\Windows\SysWOW64\Lemkcnaa.exe Lbnngbbn.exe File created C:\Windows\SysWOW64\Lfodbqfa.exe Lpekef32.exe File created C:\Windows\SysWOW64\Nagbfo32.dll Oljaccjf.exe File created C:\Windows\SysWOW64\Nacmdf32.exe Nlfelogp.exe File created C:\Windows\SysWOW64\Lggldm32.exe Ldipha32.exe File opened for modification C:\Windows\SysWOW64\Ofeilobp.exe Ofcmfodb.exe File opened for modification C:\Windows\SysWOW64\Bfjnjcni.exe Bggnof32.exe File created C:\Windows\SysWOW64\Epaobqhf.dll Ggnedlao.exe File opened for modification C:\Windows\SysWOW64\Aaohcj32.exe Anclbkbp.exe File opened for modification C:\Windows\SysWOW64\Klahfp32.exe File created C:\Windows\SysWOW64\Liaolo32.dll Bjnmpl32.exe File created C:\Windows\SysWOW64\Bkdcbd32.exe Bheffh32.exe File created C:\Windows\SysWOW64\Ogacbllg.dll Pdfehh32.exe File created C:\Windows\SysWOW64\Hhbdbmfg.dll Ponfka32.exe File created C:\Windows\SysWOW64\Leifdf32.dll Aolblopj.exe File created C:\Windows\SysWOW64\Flkdfh32.exe File created C:\Windows\SysWOW64\Pcjapi32.exe Okolkg32.exe File created C:\Windows\SysWOW64\Nnjlpo32.exe Ncdgcf32.exe File created C:\Windows\SysWOW64\Dpehof32.exe Dmglcj32.exe File created C:\Windows\SysWOW64\Ooejohhq.exe Ohkbbn32.exe File created C:\Windows\SysWOW64\Hkfglb32.exe Hgkkkcbc.exe File created C:\Windows\SysWOW64\Njpdnedf.exe Nhahaiec.exe File created C:\Windows\SysWOW64\Amcmpodi.exe Afjeceml.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 11956 10680 -
Modifies registry class 64 IoCs
Processes:
Gkaejf32.exeKkgiimng.exePefabkej.exeFajgkfio.exePidabppl.exeMgobel32.exeNghekkmn.exeKechmoil.exeHheoid32.exeLoeolc32.exeEdemkd32.exeInomhbeq.exeOhkbbn32.exeMimpolee.exePkcadhgm.exeNabfjpak.exeDohfbj32.exeAclpap32.exeKpdboimg.exeNgdfdmdi.exeDjdflp32.exeIemppiab.exeQljjjqlc.exeLqikmc32.exeQklmpalf.exeHoadkn32.exeLhfmdj32.exeCflkpblf.exeMglfplgk.exeBhfonc32.exeNpedmdab.exeJkaqnk32.exeAmhfkopc.exeIqpfjnba.exeEdihepnm.exeBgcknmop.exeIgcoqocb.exeKhmknk32.exePlmmif32.exeCocacl32.exeIdahjg32.exeMkohaj32.exeDadeieea.exeHihbijhn.exeCimcan32.exeCadlbk32.exeBbnpqk32.exeMgddhf32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbbhclmi.dll" Gkaejf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfllfd32.dll" Kkgiimng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbnnhndk.dll" Pefabkej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fajgkfio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pidabppl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obnbpa32.dll" Mgobel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqnpfi32.dll" Nghekkmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kechmoil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmkdjo32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebhcbe32.dll" Hheoid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Loeolc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlacji32.dll" Edemkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Inomhbeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohkbbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikaqhj32.dll" Mimpolee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pkcadhgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hehkga32.dll" Nabfjpak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dohfbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aclpap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkankndb.dll" Kpdboimg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngdfdmdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jghdlf32.dll" Djdflp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iemppiab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qljjjqlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lqikmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qklmpalf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgeaknci.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hoadkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhfmdj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cflkpblf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mglfplgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhfonc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnkhbo32.dll" Npedmdab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajihlijd.dll" Mglfplgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkaqnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amhfkopc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iqpfjnba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edihepnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eflgme32.dll" Bgcknmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igcoqocb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khmknk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igpoaebh.dll" Plmmif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkhpjc32.dll" Cocacl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idahjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkohaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbandhne.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dadeieea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijlbqboa.dll" Hihbijhn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cimcan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cadlbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbnpqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgddhf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4.exeNjogjfoj.exeNqiogp32.exeNcgkcl32.exeNbhkac32.exeNcihikcg.exeNnolfdcn.exeNcldnkae.exeNnaikd32.exeNcnadk32.exeOndeac32.exeOcqnij32.exeOnfbfc32.exeOcckojkm.exeOnholckc.exeOqgkhnjf.exeOjopad32.exeOcgdji32.exeOkolkg32.exePcjapi32.exePnpemb32.exePbkamqmd.exedescription pid process target process PID 4712 wrote to memory of 8 4712 0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4.exe Njogjfoj.exe PID 4712 wrote to memory of 8 4712 0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4.exe Njogjfoj.exe PID 4712 wrote to memory of 8 4712 0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4.exe Njogjfoj.exe PID 8 wrote to memory of 2132 8 Njogjfoj.exe Nqiogp32.exe PID 8 wrote to memory of 2132 8 Njogjfoj.exe Nqiogp32.exe PID 8 wrote to memory of 2132 8 Njogjfoj.exe Nqiogp32.exe PID 2132 wrote to memory of 2712 2132 Nqiogp32.exe Ncgkcl32.exe PID 2132 wrote to memory of 2712 2132 Nqiogp32.exe Ncgkcl32.exe PID 2132 wrote to memory of 2712 2132 Nqiogp32.exe Ncgkcl32.exe PID 2712 wrote to memory of 3328 2712 Ncgkcl32.exe Nbhkac32.exe PID 2712 wrote to memory of 3328 2712 Ncgkcl32.exe Nbhkac32.exe PID 2712 wrote to memory of 3328 2712 Ncgkcl32.exe Nbhkac32.exe PID 3328 wrote to memory of 3772 3328 Nbhkac32.exe Ncihikcg.exe PID 3328 wrote to memory of 3772 3328 Nbhkac32.exe Ncihikcg.exe PID 3328 wrote to memory of 3772 3328 Nbhkac32.exe Ncihikcg.exe PID 3772 wrote to memory of 2736 3772 Ncihikcg.exe Nnolfdcn.exe PID 3772 wrote to memory of 2736 3772 Ncihikcg.exe Nnolfdcn.exe PID 3772 wrote to memory of 2736 3772 Ncihikcg.exe Nnolfdcn.exe PID 2736 wrote to memory of 1484 2736 Nnolfdcn.exe Ncldnkae.exe PID 2736 wrote to memory of 1484 2736 Nnolfdcn.exe Ncldnkae.exe PID 2736 wrote to memory of 1484 2736 Nnolfdcn.exe Ncldnkae.exe PID 1484 wrote to memory of 2428 1484 Ncldnkae.exe Nnaikd32.exe PID 1484 wrote to memory of 2428 1484 Ncldnkae.exe Nnaikd32.exe PID 1484 wrote to memory of 2428 1484 Ncldnkae.exe Nnaikd32.exe PID 2428 wrote to memory of 1360 2428 Nnaikd32.exe Ncnadk32.exe PID 2428 wrote to memory of 1360 2428 Nnaikd32.exe Ncnadk32.exe PID 2428 wrote to memory of 1360 2428 Nnaikd32.exe Ncnadk32.exe PID 1360 wrote to memory of 4576 1360 Ncnadk32.exe Ondeac32.exe PID 1360 wrote to memory of 4576 1360 Ncnadk32.exe Ondeac32.exe PID 1360 wrote to memory of 4576 1360 Ncnadk32.exe Ondeac32.exe PID 4576 wrote to memory of 4852 4576 Ondeac32.exe Ocqnij32.exe PID 4576 wrote to memory of 4852 4576 Ondeac32.exe Ocqnij32.exe PID 4576 wrote to memory of 4852 4576 Ondeac32.exe Ocqnij32.exe PID 4852 wrote to memory of 3760 4852 Ocqnij32.exe Onfbfc32.exe PID 4852 wrote to memory of 3760 4852 Ocqnij32.exe Onfbfc32.exe PID 4852 wrote to memory of 3760 4852 Ocqnij32.exe Onfbfc32.exe PID 3760 wrote to memory of 520 3760 Onfbfc32.exe Occkojkm.exe PID 3760 wrote to memory of 520 3760 Onfbfc32.exe Occkojkm.exe PID 3760 wrote to memory of 520 3760 Onfbfc32.exe Occkojkm.exe PID 520 wrote to memory of 4148 520 Occkojkm.exe Onholckc.exe PID 520 wrote to memory of 4148 520 Occkojkm.exe Onholckc.exe PID 520 wrote to memory of 4148 520 Occkojkm.exe Onholckc.exe PID 4148 wrote to memory of 1036 4148 Onholckc.exe Oqgkhnjf.exe PID 4148 wrote to memory of 1036 4148 Onholckc.exe Oqgkhnjf.exe PID 4148 wrote to memory of 1036 4148 Onholckc.exe Oqgkhnjf.exe PID 1036 wrote to memory of 1576 1036 Oqgkhnjf.exe Ojopad32.exe PID 1036 wrote to memory of 1576 1036 Oqgkhnjf.exe Ojopad32.exe PID 1036 wrote to memory of 1576 1036 Oqgkhnjf.exe Ojopad32.exe PID 1576 wrote to memory of 3516 1576 Ojopad32.exe Ocgdji32.exe PID 1576 wrote to memory of 3516 1576 Ojopad32.exe Ocgdji32.exe PID 1576 wrote to memory of 3516 1576 Ojopad32.exe Ocgdji32.exe PID 3516 wrote to memory of 4960 3516 Ocgdji32.exe Okolkg32.exe PID 3516 wrote to memory of 4960 3516 Ocgdji32.exe Okolkg32.exe PID 3516 wrote to memory of 4960 3516 Ocgdji32.exe Okolkg32.exe PID 4960 wrote to memory of 3208 4960 Okolkg32.exe Pcjapi32.exe PID 4960 wrote to memory of 3208 4960 Okolkg32.exe Pcjapi32.exe PID 4960 wrote to memory of 3208 4960 Okolkg32.exe Pcjapi32.exe PID 3208 wrote to memory of 2204 3208 Pcjapi32.exe Pnpemb32.exe PID 3208 wrote to memory of 2204 3208 Pcjapi32.exe Pnpemb32.exe PID 3208 wrote to memory of 2204 3208 Pcjapi32.exe Pnpemb32.exe PID 2204 wrote to memory of 4408 2204 Pnpemb32.exe Pbkamqmd.exe PID 2204 wrote to memory of 4408 2204 Pnpemb32.exe Pbkamqmd.exe PID 2204 wrote to memory of 4408 2204 Pnpemb32.exe Pbkamqmd.exe PID 4408 wrote to memory of 2396 4408 Pbkamqmd.exe Peimil32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4.exe"C:\Users\Admin\AppData\Local\Temp\0b9b1f5f497c43b9a4d92e8572505d43963cbc5389e0bdff2b02490aadc9cad4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\Nnaikd32.exeC:\Windows\system32\Nnaikd32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\Ncnadk32.exeC:\Windows\system32\Ncnadk32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\Ondeac32.exeC:\Windows\system32\Ondeac32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\Ocqnij32.exeC:\Windows\system32\Ocqnij32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\Onfbfc32.exeC:\Windows\system32\Onfbfc32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\Occkojkm.exeC:\Windows\system32\Occkojkm.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\Onholckc.exeC:\Windows\system32\Onholckc.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\Oqgkhnjf.exeC:\Windows\system32\Oqgkhnjf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\Ojopad32.exeC:\Windows\system32\Ojopad32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\Ocgdji32.exeC:\Windows\system32\Ocgdji32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\Okolkg32.exeC:\Windows\system32\Okolkg32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Pcjapi32.exeC:\Windows\system32\Pcjapi32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\Pnpemb32.exeC:\Windows\system32\Pnpemb32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\Pbkamqmd.exeC:\Windows\system32\Pbkamqmd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\Peimil32.exeC:\Windows\system32\Peimil32.exe23⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\Pghieg32.exeC:\Windows\system32\Pghieg32.exe24⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Peljol32.exeC:\Windows\system32\Peljol32.exe25⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\Pkfblfab.exeC:\Windows\system32\Pkfblfab.exe26⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\Pengdk32.exeC:\Windows\system32\Pengdk32.exe27⤵
- Executes dropped EXE
PID:4684 -
C:\Windows\SysWOW64\Pbbgnpgl.exeC:\Windows\system32\Pbbgnpgl.exe28⤵
- Executes dropped EXE
PID:3404 -
C:\Windows\SysWOW64\Pgopffec.exeC:\Windows\system32\Pgopffec.exe29⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\Pbddcoei.exeC:\Windows\system32\Pbddcoei.exe30⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\Qkmhlekj.exeC:\Windows\system32\Qkmhlekj.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4552 -
C:\Windows\SysWOW64\Qbgqio32.exeC:\Windows\system32\Qbgqio32.exe32⤵
- Executes dropped EXE
PID:4920 -
C:\Windows\SysWOW64\Qbimoo32.exeC:\Windows\system32\Qbimoo32.exe33⤵
- Executes dropped EXE
PID:4120 -
C:\Windows\SysWOW64\Aegikj32.exeC:\Windows\system32\Aegikj32.exe34⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\SysWOW64\Alabgd32.exeC:\Windows\system32\Alabgd32.exe35⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\Abkjdnoa.exeC:\Windows\system32\Abkjdnoa.exe36⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\Acmflf32.exeC:\Windows\system32\Acmflf32.exe37⤵
- Executes dropped EXE
PID:3344 -
C:\Windows\SysWOW64\Ajfoiqll.exeC:\Windows\system32\Ajfoiqll.exe38⤵
- Executes dropped EXE
PID:4480 -
C:\Windows\SysWOW64\Aelcfilb.exeC:\Windows\system32\Aelcfilb.exe39⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\Ahkobekf.exeC:\Windows\system32\Ahkobekf.exe40⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Ajiknpjj.exeC:\Windows\system32\Ajiknpjj.exe41⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\Abpcon32.exeC:\Windows\system32\Abpcon32.exe42⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\Aacckjaf.exeC:\Windows\system32\Aacckjaf.exe43⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\Alhhhcal.exeC:\Windows\system32\Alhhhcal.exe44⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\Ajkhdp32.exeC:\Windows\system32\Ajkhdp32.exe45⤵
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\Aaepqjpd.exeC:\Windows\system32\Aaepqjpd.exe46⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\Ahoimd32.exeC:\Windows\system32\Ahoimd32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\Ajneip32.exeC:\Windows\system32\Ajneip32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\Bahmfj32.exeC:\Windows\system32\Bahmfj32.exe49⤵
- Executes dropped EXE
PID:804 -
C:\Windows\SysWOW64\Bdfibe32.exeC:\Windows\system32\Bdfibe32.exe50⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\SysWOW64\Bnlnon32.exeC:\Windows\system32\Bnlnon32.exe51⤵
- Executes dropped EXE
PID:3764 -
C:\Windows\SysWOW64\Bajjli32.exeC:\Windows\system32\Bajjli32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\Bdhfhe32.exeC:\Windows\system32\Bdhfhe32.exe53⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\Blpnib32.exeC:\Windows\system32\Blpnib32.exe54⤵
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Bbifelba.exeC:\Windows\system32\Bbifelba.exe55⤵
- Executes dropped EXE
PID:800 -
C:\Windows\SysWOW64\Behbag32.exeC:\Windows\system32\Behbag32.exe56⤵
- Executes dropped EXE
PID:3104 -
C:\Windows\SysWOW64\Bhfonc32.exeC:\Windows\system32\Bhfonc32.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:4084 -
C:\Windows\SysWOW64\Bjdkjo32.exeC:\Windows\system32\Bjdkjo32.exe58⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\Bblckl32.exeC:\Windows\system32\Bblckl32.exe59⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\Bejogg32.exeC:\Windows\system32\Bejogg32.exe60⤵
- Executes dropped EXE
PID:3196 -
C:\Windows\SysWOW64\Bjghpn32.exeC:\Windows\system32\Bjghpn32.exe61⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\Bbnpqk32.exeC:\Windows\system32\Bbnpqk32.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:4228 -
C:\Windows\SysWOW64\Bdolhc32.exeC:\Windows\system32\Bdolhc32.exe63⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Cbqlfkmi.exeC:\Windows\system32\Cbqlfkmi.exe64⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\Cdainc32.exeC:\Windows\system32\Cdainc32.exe65⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\SysWOW64\Cklaknjd.exeC:\Windows\system32\Cklaknjd.exe66⤵PID:2288
-
C:\Windows\SysWOW64\Cafigg32.exeC:\Windows\system32\Cafigg32.exe67⤵PID:1796
-
C:\Windows\SysWOW64\Chpada32.exeC:\Windows\system32\Chpada32.exe68⤵PID:4220
-
C:\Windows\SysWOW64\Cknnpm32.exeC:\Windows\system32\Cknnpm32.exe69⤵PID:512
-
C:\Windows\SysWOW64\Cahfmgoo.exeC:\Windows\system32\Cahfmgoo.exe70⤵PID:4856
-
C:\Windows\SysWOW64\Cdfbibnb.exeC:\Windows\system32\Cdfbibnb.exe71⤵PID:3020
-
C:\Windows\SysWOW64\Clnjjpod.exeC:\Windows\system32\Clnjjpod.exe72⤵PID:3544
-
C:\Windows\SysWOW64\Ckpjfm32.exeC:\Windows\system32\Ckpjfm32.exe73⤵PID:1716
-
C:\Windows\SysWOW64\Cajcbgml.exeC:\Windows\system32\Cajcbgml.exe74⤵PID:3288
-
C:\Windows\SysWOW64\Cdiooblp.exeC:\Windows\system32\Cdiooblp.exe75⤵PID:4592
-
C:\Windows\SysWOW64\Clpgpp32.exeC:\Windows\system32\Clpgpp32.exe76⤵PID:5096
-
C:\Windows\SysWOW64\Conclk32.exeC:\Windows\system32\Conclk32.exe77⤵PID:1192
-
C:\Windows\SysWOW64\Camphf32.exeC:\Windows\system32\Camphf32.exe78⤵PID:4680
-
C:\Windows\SysWOW64\Cdkldb32.exeC:\Windows\system32\Cdkldb32.exe79⤵
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\Clbceo32.exeC:\Windows\system32\Clbceo32.exe80⤵PID:4652
-
C:\Windows\SysWOW64\Doqpak32.exeC:\Windows\system32\Doqpak32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1944 -
C:\Windows\SysWOW64\Dekhneap.exeC:\Windows\system32\Dekhneap.exe82⤵PID:3624
-
C:\Windows\SysWOW64\Dhidjpqc.exeC:\Windows\system32\Dhidjpqc.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4332 -
C:\Windows\SysWOW64\Dboigi32.exeC:\Windows\system32\Dboigi32.exe84⤵
- Drops file in System32 directory
PID:4304 -
C:\Windows\SysWOW64\Dlgmpogj.exeC:\Windows\system32\Dlgmpogj.exe85⤵PID:3712
-
C:\Windows\SysWOW64\Doeiljfn.exeC:\Windows\system32\Doeiljfn.exe86⤵PID:4516
-
C:\Windows\SysWOW64\Dadeieea.exeC:\Windows\system32\Dadeieea.exe87⤵
- Modifies registry class
PID:2432 -
C:\Windows\SysWOW64\Ddbbeade.exeC:\Windows\system32\Ddbbeade.exe88⤵PID:4016
-
C:\Windows\SysWOW64\Dlijfneg.exeC:\Windows\system32\Dlijfneg.exe89⤵PID:4588
-
C:\Windows\SysWOW64\Dohfbj32.exeC:\Windows\system32\Dohfbj32.exe90⤵
- Modifies registry class
PID:856 -
C:\Windows\SysWOW64\Dojcgi32.exeC:\Windows\system32\Dojcgi32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3564 -
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe92⤵PID:2120
-
C:\Windows\SysWOW64\Edihepnm.exeC:\Windows\system32\Edihepnm.exe93⤵
- Modifies registry class
PID:4272 -
C:\Windows\SysWOW64\Elppfmoo.exeC:\Windows\system32\Elppfmoo.exe94⤵PID:3100
-
C:\Windows\SysWOW64\Ecjhcg32.exeC:\Windows\system32\Ecjhcg32.exe95⤵PID:5136
-
C:\Windows\SysWOW64\Edkdkplj.exeC:\Windows\system32\Edkdkplj.exe96⤵PID:5176
-
C:\Windows\SysWOW64\Eapedd32.exeC:\Windows\system32\Eapedd32.exe97⤵PID:5228
-
C:\Windows\SysWOW64\Ednaqo32.exeC:\Windows\system32\Ednaqo32.exe98⤵PID:5264
-
C:\Windows\SysWOW64\Ekhjmiad.exeC:\Windows\system32\Ekhjmiad.exe99⤵PID:5316
-
C:\Windows\SysWOW64\Eocenh32.exeC:\Windows\system32\Eocenh32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5348 -
C:\Windows\SysWOW64\Eabbjc32.exeC:\Windows\system32\Eabbjc32.exe101⤵PID:5396
-
C:\Windows\SysWOW64\Ehljfnpn.exeC:\Windows\system32\Ehljfnpn.exe102⤵PID:5440
-
C:\Windows\SysWOW64\Ekjfcipa.exeC:\Windows\system32\Ekjfcipa.exe103⤵PID:5480
-
C:\Windows\SysWOW64\Ecandfpd.exeC:\Windows\system32\Ecandfpd.exe104⤵PID:5524
-
C:\Windows\SysWOW64\Eepjpb32.exeC:\Windows\system32\Eepjpb32.exe105⤵PID:5572
-
C:\Windows\SysWOW64\Ehnglm32.exeC:\Windows\system32\Ehnglm32.exe106⤵PID:5608
-
C:\Windows\SysWOW64\Fkmchi32.exeC:\Windows\system32\Fkmchi32.exe107⤵PID:5648
-
C:\Windows\SysWOW64\Fafkecel.exeC:\Windows\system32\Fafkecel.exe108⤵PID:5692
-
C:\Windows\SysWOW64\Fdegandp.exeC:\Windows\system32\Fdegandp.exe109⤵PID:5732
-
C:\Windows\SysWOW64\Fkopnh32.exeC:\Windows\system32\Fkopnh32.exe110⤵PID:5776
-
C:\Windows\SysWOW64\Fcfhof32.exeC:\Windows\system32\Fcfhof32.exe111⤵PID:5816
-
C:\Windows\SysWOW64\Faihkbci.exeC:\Windows\system32\Faihkbci.exe112⤵PID:5864
-
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe113⤵PID:5904
-
C:\Windows\SysWOW64\Fkalchij.exeC:\Windows\system32\Fkalchij.exe114⤵PID:5948
-
C:\Windows\SysWOW64\Fchddejl.exeC:\Windows\system32\Fchddejl.exe115⤵PID:5992
-
C:\Windows\SysWOW64\Ffgqqaip.exeC:\Windows\system32\Ffgqqaip.exe116⤵PID:6036
-
C:\Windows\SysWOW64\Fhemmlhc.exeC:\Windows\system32\Fhemmlhc.exe117⤵PID:6076
-
C:\Windows\SysWOW64\Fkciihgg.exeC:\Windows\system32\Fkciihgg.exe118⤵PID:6116
-
C:\Windows\SysWOW64\Fckajehi.exeC:\Windows\system32\Fckajehi.exe119⤵PID:5184
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe120⤵PID:4956
-
C:\Windows\SysWOW64\Fhgjblfq.exeC:\Windows\system32\Fhgjblfq.exe121⤵PID:5156
-
C:\Windows\SysWOW64\Fkffog32.exeC:\Windows\system32\Fkffog32.exe122⤵PID:5272
-
C:\Windows\SysWOW64\Fcmnpe32.exeC:\Windows\system32\Fcmnpe32.exe123⤵PID:5336
-
C:\Windows\SysWOW64\Fdnjgmle.exeC:\Windows\system32\Fdnjgmle.exe124⤵PID:5412
-
C:\Windows\SysWOW64\Glebhjlg.exeC:\Windows\system32\Glebhjlg.exe125⤵PID:5460
-
C:\Windows\SysWOW64\Gododflk.exeC:\Windows\system32\Gododflk.exe126⤵PID:5540
-
C:\Windows\SysWOW64\Gcojed32.exeC:\Windows\system32\Gcojed32.exe127⤵PID:5616
-
C:\Windows\SysWOW64\Gdqgmmjb.exeC:\Windows\system32\Gdqgmmjb.exe128⤵PID:5684
-
C:\Windows\SysWOW64\Glhonj32.exeC:\Windows\system32\Glhonj32.exe129⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5752 -
C:\Windows\SysWOW64\Gofkje32.exeC:\Windows\system32\Gofkje32.exe130⤵PID:5824
-
C:\Windows\SysWOW64\Gcagkdba.exeC:\Windows\system32\Gcagkdba.exe131⤵PID:5896
-
C:\Windows\SysWOW64\Gfpcgpae.exeC:\Windows\system32\Gfpcgpae.exe132⤵PID:5960
-
C:\Windows\SysWOW64\Gmjlcj32.exeC:\Windows\system32\Gmjlcj32.exe133⤵PID:6028
-
C:\Windows\SysWOW64\Gcddpdpo.exeC:\Windows\system32\Gcddpdpo.exe134⤵PID:6104
-
C:\Windows\SysWOW64\Gfbploob.exeC:\Windows\system32\Gfbploob.exe135⤵PID:2872
-
C:\Windows\SysWOW64\Ghaliknf.exeC:\Windows\system32\Ghaliknf.exe136⤵PID:5216
-
C:\Windows\SysWOW64\Gkoiefmj.exeC:\Windows\system32\Gkoiefmj.exe137⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5312 -
C:\Windows\SysWOW64\Gcfqfc32.exeC:\Windows\system32\Gcfqfc32.exe138⤵PID:5428
-
C:\Windows\SysWOW64\Gfembo32.exeC:\Windows\system32\Gfembo32.exe139⤵PID:5508
-
C:\Windows\SysWOW64\Gicinj32.exeC:\Windows\system32\Gicinj32.exe140⤵PID:5644
-
C:\Windows\SysWOW64\Gkaejf32.exeC:\Windows\system32\Gkaejf32.exe141⤵
- Modifies registry class
PID:5740 -
C:\Windows\SysWOW64\Gcimkc32.exeC:\Windows\system32\Gcimkc32.exe142⤵PID:5800
-
C:\Windows\SysWOW64\Hiefcj32.exeC:\Windows\system32\Hiefcj32.exe143⤵PID:5936
-
C:\Windows\SysWOW64\Hkdbpe32.exeC:\Windows\system32\Hkdbpe32.exe144⤵PID:6100
-
C:\Windows\SysWOW64\Hfifmnij.exeC:\Windows\system32\Hfifmnij.exe145⤵PID:112
-
C:\Windows\SysWOW64\Hihbijhn.exeC:\Windows\system32\Hihbijhn.exe146⤵
- Modifies registry class
PID:5300 -
C:\Windows\SysWOW64\Hkfoeega.exeC:\Windows\system32\Hkfoeega.exe147⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5512 -
C:\Windows\SysWOW64\Hcmgfbhd.exeC:\Windows\system32\Hcmgfbhd.exe148⤵PID:5628
-
C:\Windows\SysWOW64\Hflcbngh.exeC:\Windows\system32\Hflcbngh.exe149⤵PID:5808
-
C:\Windows\SysWOW64\Hkikkeeo.exeC:\Windows\system32\Hkikkeeo.exe150⤵PID:6024
-
C:\Windows\SysWOW64\Hcpclbfa.exeC:\Windows\system32\Hcpclbfa.exe151⤵PID:1932
-
C:\Windows\SysWOW64\Hfnphn32.exeC:\Windows\system32\Hfnphn32.exe152⤵PID:5408
-
C:\Windows\SysWOW64\Hmhhehlb.exeC:\Windows\system32\Hmhhehlb.exe153⤵PID:5768
-
C:\Windows\SysWOW64\Hcbpab32.exeC:\Windows\system32\Hcbpab32.exe154⤵PID:6072
-
C:\Windows\SysWOW64\Hecmijim.exeC:\Windows\system32\Hecmijim.exe155⤵PID:5492
-
C:\Windows\SysWOW64\Hkmefd32.exeC:\Windows\system32\Hkmefd32.exe156⤵PID:1544
-
C:\Windows\SysWOW64\Iefioj32.exeC:\Windows\system32\Iefioj32.exe157⤵PID:3980
-
C:\Windows\SysWOW64\Ikpaldog.exeC:\Windows\system32\Ikpaldog.exe158⤵PID:2572
-
C:\Windows\SysWOW64\Icgjmapi.exeC:\Windows\system32\Icgjmapi.exe159⤵PID:5260
-
C:\Windows\SysWOW64\Ifefimom.exeC:\Windows\system32\Ifefimom.exe160⤵PID:1004
-
C:\Windows\SysWOW64\Iicbehnq.exeC:\Windows\system32\Iicbehnq.exe161⤵
- Drops file in System32 directory
PID:3324 -
C:\Windows\SysWOW64\Iejcji32.exeC:\Windows\system32\Iejcji32.exe162⤵PID:5132
-
C:\Windows\SysWOW64\Ickchq32.exeC:\Windows\system32\Ickchq32.exe163⤵PID:2340
-
C:\Windows\SysWOW64\Iemppiab.exeC:\Windows\system32\Iemppiab.exe164⤵
- Modifies registry class
PID:3224 -
C:\Windows\SysWOW64\Icnpmp32.exeC:\Windows\system32\Icnpmp32.exe165⤵PID:6008
-
C:\Windows\SysWOW64\Ilidbbgl.exeC:\Windows\system32\Ilidbbgl.exe166⤵PID:2088
-
C:\Windows\SysWOW64\Icplcpgo.exeC:\Windows\system32\Icplcpgo.exe167⤵PID:6184
-
C:\Windows\SysWOW64\Ibcmom32.exeC:\Windows\system32\Ibcmom32.exe168⤵PID:6224
-
C:\Windows\SysWOW64\Jimekgff.exeC:\Windows\system32\Jimekgff.exe169⤵PID:6264
-
C:\Windows\SysWOW64\Jcbihpel.exeC:\Windows\system32\Jcbihpel.exe170⤵PID:6304
-
C:\Windows\SysWOW64\Jfaedkdp.exeC:\Windows\system32\Jfaedkdp.exe171⤵PID:6344
-
C:\Windows\SysWOW64\Jedeph32.exeC:\Windows\system32\Jedeph32.exe172⤵PID:6380
-
C:\Windows\SysWOW64\Jlnnmb32.exeC:\Windows\system32\Jlnnmb32.exe173⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6428 -
C:\Windows\SysWOW64\Jianff32.exeC:\Windows\system32\Jianff32.exe174⤵PID:6468
-
C:\Windows\SysWOW64\Jplfcpin.exeC:\Windows\system32\Jplfcpin.exe175⤵PID:6508
-
C:\Windows\SysWOW64\Jehokgge.exeC:\Windows\system32\Jehokgge.exe176⤵PID:6548
-
C:\Windows\SysWOW64\Jmpgldhg.exeC:\Windows\system32\Jmpgldhg.exe177⤵PID:6588
-
C:\Windows\SysWOW64\Jblpek32.exeC:\Windows\system32\Jblpek32.exe178⤵PID:6628
-
C:\Windows\SysWOW64\Jmbdbd32.exeC:\Windows\system32\Jmbdbd32.exe179⤵PID:6668
-
C:\Windows\SysWOW64\Jcllonma.exeC:\Windows\system32\Jcllonma.exe180⤵PID:6708
-
C:\Windows\SysWOW64\Kemhff32.exeC:\Windows\system32\Kemhff32.exe181⤵PID:6748
-
C:\Windows\SysWOW64\Kmdqgd32.exeC:\Windows\system32\Kmdqgd32.exe182⤵PID:6788
-
C:\Windows\SysWOW64\Kpbmco32.exeC:\Windows\system32\Kpbmco32.exe183⤵PID:6828
-
C:\Windows\SysWOW64\Kbaipkbi.exeC:\Windows\system32\Kbaipkbi.exe184⤵PID:6864
-
C:\Windows\SysWOW64\Kikame32.exeC:\Windows\system32\Kikame32.exe185⤵PID:6920
-
C:\Windows\SysWOW64\Kbceejpf.exeC:\Windows\system32\Kbceejpf.exe186⤵PID:6960
-
C:\Windows\SysWOW64\Kdcbom32.exeC:\Windows\system32\Kdcbom32.exe187⤵PID:7004
-
C:\Windows\SysWOW64\Kedoge32.exeC:\Windows\system32\Kedoge32.exe188⤵PID:7044
-
C:\Windows\SysWOW64\Kdeoemeg.exeC:\Windows\system32\Kdeoemeg.exe189⤵PID:7084
-
C:\Windows\SysWOW64\Kmncnb32.exeC:\Windows\system32\Kmncnb32.exe190⤵PID:7124
-
C:\Windows\SysWOW64\Lbjlfi32.exeC:\Windows\system32\Lbjlfi32.exe191⤵PID:7164
-
C:\Windows\SysWOW64\Llcpoo32.exeC:\Windows\system32\Llcpoo32.exe192⤵PID:6176
-
C:\Windows\SysWOW64\Ldjhpl32.exeC:\Windows\system32\Ldjhpl32.exe193⤵PID:6256
-
C:\Windows\SysWOW64\Lekehdgp.exeC:\Windows\system32\Lekehdgp.exe194⤵PID:6292
-
C:\Windows\SysWOW64\Llemdo32.exeC:\Windows\system32\Llemdo32.exe195⤵PID:6376
-
C:\Windows\SysWOW64\Lboeaifi.exeC:\Windows\system32\Lboeaifi.exe196⤵PID:6444
-
C:\Windows\SysWOW64\Liimncmf.exeC:\Windows\system32\Liimncmf.exe197⤵PID:6504
-
C:\Windows\SysWOW64\Llgjjnlj.exeC:\Windows\system32\Llgjjnlj.exe198⤵PID:6580
-
C:\Windows\SysWOW64\Lgmngglp.exeC:\Windows\system32\Lgmngglp.exe199⤵
- Drops file in System32 directory
PID:6664 -
C:\Windows\SysWOW64\Lepncd32.exeC:\Windows\system32\Lepncd32.exe200⤵
- Drops file in System32 directory
PID:6700 -
C:\Windows\SysWOW64\Lbdolh32.exeC:\Windows\system32\Lbdolh32.exe201⤵PID:6780
-
C:\Windows\SysWOW64\Lllcen32.exeC:\Windows\system32\Lllcen32.exe202⤵PID:6860
-
C:\Windows\SysWOW64\Mbfkbhpa.exeC:\Windows\system32\Mbfkbhpa.exe203⤵PID:6908
-
C:\Windows\SysWOW64\Mmlpoqpg.exeC:\Windows\system32\Mmlpoqpg.exe204⤵PID:6988
-
C:\Windows\SysWOW64\Mlopkm32.exeC:\Windows\system32\Mlopkm32.exe205⤵PID:7068
-
C:\Windows\SysWOW64\Mgddhf32.exeC:\Windows\system32\Mgddhf32.exe206⤵
- Modifies registry class
PID:7116 -
C:\Windows\SysWOW64\Mdhdajea.exeC:\Windows\system32\Mdhdajea.exe207⤵PID:4168
-
C:\Windows\SysWOW64\Meiaib32.exeC:\Windows\system32\Meiaib32.exe208⤵PID:6300
-
C:\Windows\SysWOW64\Mlcifmbl.exeC:\Windows\system32\Mlcifmbl.exe209⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6416 -
C:\Windows\SysWOW64\Mcmabg32.exeC:\Windows\system32\Mcmabg32.exe210⤵PID:6544
-
C:\Windows\SysWOW64\Migjoaaf.exeC:\Windows\system32\Migjoaaf.exe211⤵PID:6636
-
C:\Windows\SysWOW64\Mcpnhfhf.exeC:\Windows\system32\Mcpnhfhf.exe212⤵PID:6740
-
C:\Windows\SysWOW64\Menjdbgj.exeC:\Windows\system32\Menjdbgj.exe213⤵PID:6872
-
C:\Windows\SysWOW64\Mlhbal32.exeC:\Windows\system32\Mlhbal32.exe214⤵PID:6976
-
C:\Windows\SysWOW64\Nngokoej.exeC:\Windows\system32\Nngokoej.exe215⤵PID:7112
-
C:\Windows\SysWOW64\Ncdgcf32.exeC:\Windows\system32\Ncdgcf32.exe216⤵
- Drops file in System32 directory
PID:6284 -
C:\Windows\SysWOW64\Nnjlpo32.exeC:\Windows\system32\Nnjlpo32.exe217⤵PID:6492
-
C:\Windows\SysWOW64\Nphhmj32.exeC:\Windows\system32\Nphhmj32.exe218⤵PID:6596
-
C:\Windows\SysWOW64\Ngbpidjh.exeC:\Windows\system32\Ngbpidjh.exe219⤵PID:6856
-
C:\Windows\SysWOW64\Njqmepik.exeC:\Windows\system32\Njqmepik.exe220⤵PID:7036
-
C:\Windows\SysWOW64\Ndfqbhia.exeC:\Windows\system32\Ndfqbhia.exe221⤵PID:6208
-
C:\Windows\SysWOW64\Ncianepl.exeC:\Windows\system32\Ncianepl.exe222⤵PID:6616
-
C:\Windows\SysWOW64\Njciko32.exeC:\Windows\system32\Njciko32.exe223⤵PID:6816
-
C:\Windows\SysWOW64\Nlaegk32.exeC:\Windows\system32\Nlaegk32.exe224⤵PID:956
-
C:\Windows\SysWOW64\Nggjdc32.exeC:\Windows\system32\Nggjdc32.exe225⤵PID:6556
-
C:\Windows\SysWOW64\Njefqo32.exeC:\Windows\system32\Njefqo32.exe226⤵PID:7096
-
C:\Windows\SysWOW64\Oflgep32.exeC:\Windows\system32\Oflgep32.exe227⤵PID:6904
-
C:\Windows\SysWOW64\Oncofm32.exeC:\Windows\system32\Oncofm32.exe228⤵PID:6288
-
C:\Windows\SysWOW64\Opakbi32.exeC:\Windows\system32\Opakbi32.exe229⤵
- Drops file in System32 directory
PID:6436 -
C:\Windows\SysWOW64\Oneklm32.exeC:\Windows\system32\Oneklm32.exe230⤵PID:7196
-
C:\Windows\SysWOW64\Olhlhjpd.exeC:\Windows\system32\Olhlhjpd.exe231⤵PID:7240
-
C:\Windows\SysWOW64\Ocbddc32.exeC:\Windows\system32\Ocbddc32.exe232⤵PID:7284
-
C:\Windows\SysWOW64\Olkhmi32.exeC:\Windows\system32\Olkhmi32.exe233⤵PID:7332
-
C:\Windows\SysWOW64\Ofcmfodb.exeC:\Windows\system32\Ofcmfodb.exe234⤵
- Drops file in System32 directory
PID:7376 -
C:\Windows\SysWOW64\Ofeilobp.exeC:\Windows\system32\Ofeilobp.exe235⤵PID:7424
-
C:\Windows\SysWOW64\Pnlaml32.exeC:\Windows\system32\Pnlaml32.exe236⤵PID:7468
-
C:\Windows\SysWOW64\Pcijeb32.exeC:\Windows\system32\Pcijeb32.exe237⤵PID:7512
-
C:\Windows\SysWOW64\Pnonbk32.exeC:\Windows\system32\Pnonbk32.exe238⤵PID:7564
-
C:\Windows\SysWOW64\Pdifoehl.exeC:\Windows\system32\Pdifoehl.exe239⤵PID:7604
-
C:\Windows\SysWOW64\Pjeoglgc.exeC:\Windows\system32\Pjeoglgc.exe240⤵PID:7648
-
C:\Windows\SysWOW64\Pdkcde32.exeC:\Windows\system32\Pdkcde32.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7692 -
C:\Windows\SysWOW64\Pgioqq32.exeC:\Windows\system32\Pgioqq32.exe242⤵PID:7736