Analysis
-
max time kernel
152s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 17:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3d658b93096667889e19f695f57bfb65.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d658b93096667889e19f695f57bfb65.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
3d658b93096667889e19f695f57bfb65.exe
-
Size
440KB
-
MD5
3d658b93096667889e19f695f57bfb65
-
SHA1
568b48c0ff50628b9c3161b1c53b61c96a499b8e
-
SHA256
a4593a8cf855fb4135d986d8b44d6ca9cb95872aea0d163dd70703209763f582
-
SHA512
a45fd819625ff72fe0f32238cf0a0ffa09dbdf2ab59e5837f001280f925f7df0c67e3e3f5ea3cc27e9ec670027029d14476b32f4fe02d84304b4e9e5b8d3124a
-
SSDEEP
12288:FRUGYuQNdkb2jJZp82jJ7iSbJt2jJZp82jJ:QGYuQNdk6FzUPFz
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fomohc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miabik32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onnmdcjm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjcqffkm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fomohc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oookbega.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdembk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgiojf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhnqoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lapopm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgbmliee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpofbobf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knpmhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dabpgbpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edkddeag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kicdke32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgephccp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lebijnak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjjlep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbcaemdg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldmlih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klapgq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nifldj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbphglbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jglaepim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kckgff32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcmfnd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfjola32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcapicdj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdkkjl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlmfeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfmekm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dblnid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npldnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgdklb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcggbd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adkgje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fljedg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgmlde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ognginic.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omjpeo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmphaaln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciaddaaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfeibf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Femgia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbmaog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpkpbpko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkbfafel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcphkhad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkbohc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imfmgcdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hllkqdli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmihpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbbggeli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdfmfmdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Keakqeal.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikpjkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcblpdgg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icpecm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldohogfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjcbkbnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmdgikhi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmpido32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmmgae32.exe -
Executes dropped EXE 64 IoCs
pid Process 2520 Hcblpdgg.exe 2284 Ipflihfq.exe 1140 Iinqbn32.exe 4848 Igbalblk.exe 2600 Idfaefkd.exe 5016 Innfnl32.exe 3844 Iggjga32.exe 4564 Ikdcmpnl.exe 4816 Jncoikmp.exe 4764 Jcphab32.exe 1616 Jlhljhbg.exe 2608 Jjlmclqa.exe 4484 Jlmfeg32.exe 960 Jknfcofa.exe 4820 Jcikgacl.exe 4100 Kjccdkki.exe 4844 Kkconn32.exe 4428 Kdkdgchl.exe 3576 Kkeldnpi.exe 4060 Kdmqmc32.exe 4368 Kjjiej32.exe 2716 Kmieae32.exe 4376 Knhakh32.exe 2300 Ljhefhha.exe 4680 Mminhceb.exe 1460 Mjmoag32.exe 1764 Mcecjmkl.exe 396 Mkmkkjko.exe 1148 Maiccajf.exe 4184 Mchppmij.exe 4292 Mjahlgpf.exe 224 Mcjmel32.exe 632 Mnpabe32.exe 2296 Nclikl32.exe 2000 Nlcalieg.exe 2236 Nnbnhedj.exe 720 Napjdpcn.exe 4496 Ncofplba.exe 2780 Njinmf32.exe 2476 Nabfjpak.exe 4856 Nhmofj32.exe 684 Nnfgcd32.exe 3404 Nccokk32.exe 3296 Njmhhefi.exe 1620 Nagpeo32.exe 2944 Ndflak32.exe 1164 Njpdnedf.exe 2336 Ohcegi32.exe 3604 Onnmdcjm.exe 1016 Ojdnid32.exe 4500 Oanfen32.exe 3888 Oaqbkn32.exe 448 Olfghg32.exe 4960 Oacoqnci.exe 4084 Olicnfco.exe 3256 Omjpeo32.exe 2004 Palbgl32.exe 728 Pdkoch32.exe 2528 Popbpqjh.exe 228 Pejkmk32.exe 2204 Pocpfphe.exe 4420 Qhkdof32.exe 5040 Qmhlgmmm.exe 2208 Qdbdcg32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kjeqge32.dll Mnpabe32.exe File created C:\Windows\SysWOW64\Hegaehem.dll Bhbcfbjk.exe File created C:\Windows\SysWOW64\Eaegqc32.exe Nbmmoklg.exe File created C:\Windows\SysWOW64\Ibjqlj32.exe Ijolhg32.exe File created C:\Windows\SysWOW64\Ogence32.dll Fkalmn32.exe File created C:\Windows\SysWOW64\Nlhbja32.exe Niifnf32.exe File created C:\Windows\SysWOW64\Kfedpccg.dll Fhkcfmbp.exe File created C:\Windows\SysWOW64\Iiibdc32.exe Ibojgikg.exe File created C:\Windows\SysWOW64\Mlnijmhc.exe Miomnaip.exe File opened for modification C:\Windows\SysWOW64\Iloimopp.exe Inlibb32.exe File created C:\Windows\SysWOW64\Mjahlgpf.exe Mchppmij.exe File opened for modification C:\Windows\SysWOW64\Nfjola32.exe Nopfpgip.exe File created C:\Windows\SysWOW64\Okndkohj.dll Ioicnn32.exe File created C:\Windows\SysWOW64\Jicdlc32.exe Jcgldl32.exe File opened for modification C:\Windows\SysWOW64\Jggapj32.exe Jqmicpbj.exe File created C:\Windows\SysWOW64\Hjgedjco.dll Bdhfaj32.exe File created C:\Windows\SysWOW64\Fdijkmbl.exe Fajnoabh.exe File created C:\Windows\SysWOW64\Elbmebbj.exe Edkddeag.exe File created C:\Windows\SysWOW64\Ijgakgej.exe Hjbhph32.exe File created C:\Windows\SysWOW64\Fjbopnqa.dll Dljqjjnp.exe File created C:\Windows\SysWOW64\Fmapag32.exe Fblldn32.exe File created C:\Windows\SysWOW64\Hcbgen32.exe Hbcklkee.exe File opened for modification C:\Windows\SysWOW64\Aenpeoom.exe Alfkli32.exe File created C:\Windows\SysWOW64\Kdlcbjfj.exe Kpagbk32.exe File created C:\Windows\SysWOW64\Bjdkcd32.exe Bdkbgj32.exe File created C:\Windows\SysWOW64\Jdgjbd32.dll Gkcbhgii.exe File opened for modification C:\Windows\SysWOW64\Aednci32.exe Aojefobm.exe File opened for modification C:\Windows\SysWOW64\Necqbo32.exe Moeoje32.exe File opened for modification C:\Windows\SysWOW64\Fpnkdfko.exe Fidbgm32.exe File opened for modification C:\Windows\SysWOW64\Jicdlc32.exe Jcgldl32.exe File created C:\Windows\SysWOW64\Gflapl32.exe Gbqeonfj.exe File opened for modification C:\Windows\SysWOW64\Innfgb32.exe Ikpjkf32.exe File created C:\Windows\SysWOW64\Jkchlonc.dll Cofnik32.exe File created C:\Windows\SysWOW64\Fcdfimja.dll Imfmgcdn.exe File created C:\Windows\SysWOW64\Ipbdcofa.dll Jjklcf32.exe File created C:\Windows\SysWOW64\Kmegkp32.exe Kkfkod32.exe File created C:\Windows\SysWOW64\Balfko32.exe Bjbnndgl.exe File opened for modification C:\Windows\SysWOW64\Mikcbb32.exe Lihfmb32.exe File created C:\Windows\SysWOW64\Fdiqhf32.dll Ljncnhhk.exe File created C:\Windows\SysWOW64\Hicihp32.exe Gohhik32.exe File created C:\Windows\SysWOW64\Pqknbmhc.exe Pjaefc32.exe File created C:\Windows\SysWOW64\Oapaicmk.dll Fdfmfmdo.exe File opened for modification C:\Windows\SysWOW64\Ighhed32.exe Gkcbhgii.exe File opened for modification C:\Windows\SysWOW64\Kmegkp32.exe Kkfkod32.exe File created C:\Windows\SysWOW64\Hcahde32.dll Pqhammje.exe File created C:\Windows\SysWOW64\Blhpjnbe.exe Bfngmd32.exe File opened for modification C:\Windows\SysWOW64\Jikojcaa.exe Ifmcmg32.exe File created C:\Windows\SysWOW64\Kgipmdmn.exe Kdkdqinj.exe File created C:\Windows\SysWOW64\Fadggj32.dll Aojefobm.exe File opened for modification C:\Windows\SysWOW64\Jglaepim.exe Jfmekm32.exe File created C:\Windows\SysWOW64\Ggaoeo32.dll Malnklgg.exe File opened for modification C:\Windows\SysWOW64\Ffekom32.exe Fcfocb32.exe File opened for modification C:\Windows\SysWOW64\Gmfilfep.exe Gflapl32.exe File opened for modification C:\Windows\SysWOW64\Kjccna32.exe Kgefae32.exe File opened for modification C:\Windows\SysWOW64\Bnkbcj32.exe Bhnikc32.exe File opened for modification C:\Windows\SysWOW64\Imhjlb32.exe Ijjnpg32.exe File created C:\Windows\SysWOW64\Pbkagfba.exe Pjdifibo.exe File opened for modification C:\Windows\SysWOW64\Fhkcfmbp.exe Femgia32.exe File created C:\Windows\SysWOW64\Kcgnkgkl.exe Kddnpj32.exe File opened for modification C:\Windows\SysWOW64\Jpffgp32.exe Jeqbjgoo.exe File created C:\Windows\SysWOW64\Lknocb32.exe Lcggbd32.exe File opened for modification C:\Windows\SysWOW64\Klbnajqc.exe Jifecp32.exe File created C:\Windows\SysWOW64\Ichelm32.dll Kpqggh32.exe File created C:\Windows\SysWOW64\Nimmifgo.exe Nodiqp32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhjfpqcj.dll" Pclnon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbmaog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjjpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iggjga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlofcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmlpjdgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhleefhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjqjbanf.dll" Nbmmoklg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcphab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgemimck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hbpgle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cedidk32.dll" Olhlaoea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcbdph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oqgkadod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmamgp32.dll" Hmpjfdcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjhndf32.dll" Nnidcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjbopnqa.dll" Dljqjjnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckghid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onneeceo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpbfbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlflog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Panfad32.dll" Jnhinq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adkgje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boeebnhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dblnid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idjmfmgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clknnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmmnjnld.dll" Njpdnedf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdecgbfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibjqlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldmlih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkmdoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpcgoa32.dll" Plbmhadm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cijpkmml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlcalieg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpkefnho.dll" Nagpeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Popbpqjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elepei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkbcbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odmgmmhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlhljhbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iolhpo32.dll" Kpilekqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpjelibg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldohogfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Donceaac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Honohb32.dll" Kmbkfp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pabknbef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blhpjnbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpjlgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anhaoj32.dll" Cocjiehd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edkddeag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlhbja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afmfjgde.dll" Fdbdkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afddge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcflag32.dll" Mdokmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgkimn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lqfnqjpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Necqbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alhbab32.dll" Gbdgpfni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlcchn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jknfcofa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nimmifgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elighial.dll" Djnaco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lacihleo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2520 1808 3d658b93096667889e19f695f57bfb65.exe 91 PID 1808 wrote to memory of 2520 1808 3d658b93096667889e19f695f57bfb65.exe 91 PID 1808 wrote to memory of 2520 1808 3d658b93096667889e19f695f57bfb65.exe 91 PID 2520 wrote to memory of 2284 2520 Hcblpdgg.exe 187 PID 2520 wrote to memory of 2284 2520 Hcblpdgg.exe 187 PID 2520 wrote to memory of 2284 2520 Hcblpdgg.exe 187 PID 2284 wrote to memory of 1140 2284 Ipflihfq.exe 186 PID 2284 wrote to memory of 1140 2284 Ipflihfq.exe 186 PID 2284 wrote to memory of 1140 2284 Ipflihfq.exe 186 PID 1140 wrote to memory of 4848 1140 Iinqbn32.exe 95 PID 1140 wrote to memory of 4848 1140 Iinqbn32.exe 95 PID 1140 wrote to memory of 4848 1140 Iinqbn32.exe 95 PID 4848 wrote to memory of 2600 4848 Igbalblk.exe 92 PID 4848 wrote to memory of 2600 4848 Igbalblk.exe 92 PID 4848 wrote to memory of 2600 4848 Igbalblk.exe 92 PID 2600 wrote to memory of 5016 2600 Idfaefkd.exe 93 PID 2600 wrote to memory of 5016 2600 Idfaefkd.exe 93 PID 2600 wrote to memory of 5016 2600 Idfaefkd.exe 93 PID 5016 wrote to memory of 3844 5016 Innfnl32.exe 94 PID 5016 wrote to memory of 3844 5016 Innfnl32.exe 94 PID 5016 wrote to memory of 3844 5016 Innfnl32.exe 94 PID 3844 wrote to memory of 4564 3844 Iggjga32.exe 96 PID 3844 wrote to memory of 4564 3844 Iggjga32.exe 96 PID 3844 wrote to memory of 4564 3844 Iggjga32.exe 96 PID 4564 wrote to memory of 4816 4564 Ikdcmpnl.exe 97 PID 4564 wrote to memory of 4816 4564 Ikdcmpnl.exe 97 PID 4564 wrote to memory of 4816 4564 Ikdcmpnl.exe 97 PID 4816 wrote to memory of 4764 4816 Jncoikmp.exe 99 PID 4816 wrote to memory of 4764 4816 Jncoikmp.exe 99 PID 4816 wrote to memory of 4764 4816 Jncoikmp.exe 99 PID 4764 wrote to memory of 1616 4764 Jcphab32.exe 98 PID 4764 wrote to memory of 1616 4764 Jcphab32.exe 98 PID 4764 wrote to memory of 1616 4764 Jcphab32.exe 98 PID 1616 wrote to memory of 2608 1616 Jlhljhbg.exe 100 PID 1616 wrote to memory of 2608 1616 Jlhljhbg.exe 100 PID 1616 wrote to memory of 2608 1616 Jlhljhbg.exe 100 PID 2608 wrote to memory of 4484 2608 Jjlmclqa.exe 185 PID 2608 wrote to memory of 4484 2608 Jjlmclqa.exe 185 PID 2608 wrote to memory of 4484 2608 Jjlmclqa.exe 185 PID 4484 wrote to memory of 960 4484 Jlmfeg32.exe 101 PID 4484 wrote to memory of 960 4484 Jlmfeg32.exe 101 PID 4484 wrote to memory of 960 4484 Jlmfeg32.exe 101 PID 960 wrote to memory of 4820 960 Jknfcofa.exe 184 PID 960 wrote to memory of 4820 960 Jknfcofa.exe 184 PID 960 wrote to memory of 4820 960 Jknfcofa.exe 184 PID 4820 wrote to memory of 4100 4820 Jcikgacl.exe 183 PID 4820 wrote to memory of 4100 4820 Jcikgacl.exe 183 PID 4820 wrote to memory of 4100 4820 Jcikgacl.exe 183 PID 4100 wrote to memory of 4844 4100 Kjccdkki.exe 102 PID 4100 wrote to memory of 4844 4100 Kjccdkki.exe 102 PID 4100 wrote to memory of 4844 4100 Kjccdkki.exe 102 PID 4844 wrote to memory of 4428 4844 Kkconn32.exe 107 PID 4844 wrote to memory of 4428 4844 Kkconn32.exe 107 PID 4844 wrote to memory of 4428 4844 Kkconn32.exe 107 PID 4428 wrote to memory of 3576 4428 Kdkdgchl.exe 106 PID 4428 wrote to memory of 3576 4428 Kdkdgchl.exe 106 PID 4428 wrote to memory of 3576 4428 Kdkdgchl.exe 106 PID 3576 wrote to memory of 4060 3576 Kkeldnpi.exe 103 PID 3576 wrote to memory of 4060 3576 Kkeldnpi.exe 103 PID 3576 wrote to memory of 4060 3576 Kkeldnpi.exe 103 PID 4060 wrote to memory of 4368 4060 Kdmqmc32.exe 105 PID 4060 wrote to memory of 4368 4060 Kdmqmc32.exe 105 PID 4060 wrote to memory of 4368 4060 Kdmqmc32.exe 105 PID 4368 wrote to memory of 2716 4368 Kjjiej32.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d658b93096667889e19f695f57bfb65.exe"C:\Users\Admin\AppData\Local\Temp\3d658b93096667889e19f695f57bfb65.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\Hcblpdgg.exeC:\Windows\system32\Hcblpdgg.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Ipflihfq.exeC:\Windows\system32\Ipflihfq.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284
-
-
-
C:\Windows\SysWOW64\Idfaefkd.exeC:\Windows\system32\Idfaefkd.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Innfnl32.exeC:\Windows\system32\Innfnl32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\Iggjga32.exeC:\Windows\system32\Iggjga32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\Ikdcmpnl.exeC:\Windows\system32\Ikdcmpnl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\Jncoikmp.exeC:\Windows\system32\Jncoikmp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\Jcphab32.exeC:\Windows\system32\Jcphab32.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4764
-
-
-
-
-
-
C:\Windows\SysWOW64\Igbalblk.exeC:\Windows\system32\Igbalblk.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848
-
C:\Windows\SysWOW64\Jlhljhbg.exeC:\Windows\system32\Jlhljhbg.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\Jjlmclqa.exeC:\Windows\system32\Jjlmclqa.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Jlmfeg32.exeC:\Windows\system32\Jlmfeg32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484
-
-
-
C:\Windows\SysWOW64\Jknfcofa.exeC:\Windows\system32\Jknfcofa.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\Jcikgacl.exeC:\Windows\system32\Jcikgacl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820
-
-
C:\Windows\SysWOW64\Kkconn32.exeC:\Windows\system32\Kkconn32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\Kdkdgchl.exeC:\Windows\system32\Kdkdgchl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428
-
-
C:\Windows\SysWOW64\Kdmqmc32.exeC:\Windows\system32\Kdmqmc32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\Kjjiej32.exeC:\Windows\system32\Kjjiej32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368
-
-
C:\Windows\SysWOW64\Kmieae32.exeC:\Windows\system32\Kmieae32.exe1⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Knhakh32.exeC:\Windows\system32\Knhakh32.exe2⤵
- Executes dropped EXE
PID:4376
-
-
C:\Windows\SysWOW64\Kkeldnpi.exeC:\Windows\system32\Kkeldnpi.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576
-
C:\Windows\SysWOW64\Mchppmij.exeC:\Windows\system32\Mchppmij.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4184 -
C:\Windows\SysWOW64\Mjahlgpf.exeC:\Windows\system32\Mjahlgpf.exe2⤵
- Executes dropped EXE
PID:4292
-
-
C:\Windows\SysWOW64\Mnpabe32.exeC:\Windows\system32\Mnpabe32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:632 -
C:\Windows\SysWOW64\Nclikl32.exeC:\Windows\system32\Nclikl32.exe2⤵
- Executes dropped EXE
PID:2296
-
-
C:\Windows\SysWOW64\Nlcalieg.exeC:\Windows\system32\Nlcalieg.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Nnbnhedj.exeC:\Windows\system32\Nnbnhedj.exe2⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\Napjdpcn.exeC:\Windows\system32\Napjdpcn.exe3⤵
- Executes dropped EXE
PID:720
-
-
-
C:\Windows\SysWOW64\Ncofplba.exeC:\Windows\system32\Ncofplba.exe1⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\Njinmf32.exeC:\Windows\system32\Njinmf32.exe2⤵
- Executes dropped EXE
PID:2780 -
C:\Windows\SysWOW64\Nabfjpak.exeC:\Windows\system32\Nabfjpak.exe3⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\Nhmofj32.exeC:\Windows\system32\Nhmofj32.exe4⤵
- Executes dropped EXE
PID:4856 -
C:\Windows\SysWOW64\Nnfgcd32.exeC:\Windows\system32\Nnfgcd32.exe5⤵
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\Nccokk32.exeC:\Windows\system32\Nccokk32.exe6⤵
- Executes dropped EXE
PID:3404
-
-
-
-
-
C:\Windows\SysWOW64\Nifldj32.exeC:\Windows\system32\Nifldj32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:9540 -
C:\Windows\SysWOW64\Noeaaqlq.exeC:\Windows\system32\Noeaaqlq.exe4⤵PID:9608
-
C:\Windows\SysWOW64\Nhmejf32.exeC:\Windows\system32\Nhmejf32.exe5⤵PID:9644
-
C:\Windows\SysWOW64\Noijmp32.exeC:\Windows\system32\Noijmp32.exe6⤵PID:684
-
-
-
-
-
-
C:\Windows\SysWOW64\Ndflak32.exeC:\Windows\system32\Ndflak32.exe1⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\Njpdnedf.exeC:\Windows\system32\Njpdnedf.exe2⤵
- Executes dropped EXE
- Modifies registry class
PID:1164 -
C:\Windows\SysWOW64\Ohcegi32.exeC:\Windows\system32\Ohcegi32.exe3⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Onnmdcjm.exeC:\Windows\system32\Onnmdcjm.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3604
-
-
-
-
C:\Windows\SysWOW64\Ojdnid32.exeC:\Windows\system32\Ojdnid32.exe1⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\Oanfen32.exeC:\Windows\system32\Oanfen32.exe2⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\Oaqbkn32.exeC:\Windows\system32\Oaqbkn32.exe3⤵
- Executes dropped EXE
PID:3888 -
C:\Windows\SysWOW64\Olfghg32.exeC:\Windows\system32\Olfghg32.exe4⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\Oacoqnci.exeC:\Windows\system32\Oacoqnci.exe5⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\Olicnfco.exeC:\Windows\system32\Olicnfco.exe6⤵
- Executes dropped EXE
PID:4084 -
C:\Windows\SysWOW64\Omjpeo32.exeC:\Windows\system32\Omjpeo32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3256 -
C:\Windows\SysWOW64\Palbgl32.exeC:\Windows\system32\Palbgl32.exe8⤵
- Executes dropped EXE
PID:2004
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Popbpqjh.exeC:\Windows\system32\Popbpqjh.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:2528 -
C:\Windows\SysWOW64\Pejkmk32.exeC:\Windows\system32\Pejkmk32.exe2⤵
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\Pocpfphe.exeC:\Windows\system32\Pocpfphe.exe3⤵
- Executes dropped EXE
PID:2204
-
-
-
C:\Windows\SysWOW64\Qhkdof32.exeC:\Windows\system32\Qhkdof32.exe1⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\Qmhlgmmm.exeC:\Windows\system32\Qmhlgmmm.exe2⤵
- Executes dropped EXE
PID:5040
-
-
C:\Windows\SysWOW64\Qdbdcg32.exeC:\Windows\system32\Qdbdcg32.exe1⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\Amjillkj.exeC:\Windows\system32\Amjillkj.exe2⤵PID:4624
-
C:\Windows\SysWOW64\Aojefobm.exeC:\Windows\system32\Aojefobm.exe3⤵
- Drops file in System32 directory
PID:4928
-
-
-
C:\Windows\SysWOW64\Pdkoch32.exeC:\Windows\system32\Pdkoch32.exe1⤵
- Executes dropped EXE
PID:728
-
C:\Windows\SysWOW64\Aednci32.exeC:\Windows\system32\Aednci32.exe1⤵PID:3176
-
C:\Windows\SysWOW64\Akqfkp32.exeC:\Windows\system32\Akqfkp32.exe2⤵PID:4472
-
C:\Windows\SysWOW64\Aefjii32.exeC:\Windows\system32\Aefjii32.exe3⤵PID:4556
-
-
-
C:\Windows\SysWOW64\Akccap32.exeC:\Windows\system32\Akccap32.exe1⤵PID:5172
-
C:\Windows\SysWOW64\Aamknj32.exeC:\Windows\system32\Aamknj32.exe2⤵PID:5212
-
C:\Windows\SysWOW64\Adkgje32.exeC:\Windows\system32\Adkgje32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5256 -
C:\Windows\SysWOW64\Akepfpcl.exeC:\Windows\system32\Akepfpcl.exe4⤵PID:5296
-
C:\Windows\SysWOW64\Aekddhcb.exeC:\Windows\system32\Aekddhcb.exe5⤵PID:5340
-
C:\Windows\SysWOW64\Ahippdbe.exeC:\Windows\system32\Ahippdbe.exe6⤵PID:5380
-
C:\Windows\SysWOW64\Bochmn32.exeC:\Windows\system32\Bochmn32.exe7⤵PID:5420
-
C:\Windows\SysWOW64\Bemqih32.exeC:\Windows\system32\Bemqih32.exe8⤵PID:5460
-
C:\Windows\SysWOW64\Blgifbil.exeC:\Windows\system32\Blgifbil.exe9⤵PID:5500
-
C:\Windows\SysWOW64\Boeebnhp.exeC:\Windows\system32\Boeebnhp.exe10⤵
- Modifies registry class
PID:5540
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Adikdfna.exeC:\Windows\system32\Adikdfna.exe1⤵PID:5132
-
C:\Windows\SysWOW64\Badanigc.exeC:\Windows\system32\Badanigc.exe1⤵PID:5580
-
C:\Windows\SysWOW64\Bhnikc32.exeC:\Windows\system32\Bhnikc32.exe2⤵
- Drops file in System32 directory
PID:5616 -
C:\Windows\SysWOW64\Bnkbcj32.exeC:\Windows\system32\Bnkbcj32.exe3⤵PID:5664
-
C:\Windows\SysWOW64\Bhpfqcln.exeC:\Windows\system32\Bhpfqcln.exe4⤵PID:5708
-
C:\Windows\SysWOW64\Bkobmnka.exeC:\Windows\system32\Bkobmnka.exe5⤵PID:5752
-
-
-
-
-
C:\Windows\SysWOW64\Bahkih32.exeC:\Windows\system32\Bahkih32.exe1⤵PID:5800
-
C:\Windows\SysWOW64\Bhbcfbjk.exeC:\Windows\system32\Bhbcfbjk.exe2⤵
- Drops file in System32 directory
PID:5844 -
C:\Windows\SysWOW64\Bkaobnio.exeC:\Windows\system32\Bkaobnio.exe3⤵PID:5884
-
C:\Windows\SysWOW64\Bomkcm32.exeC:\Windows\system32\Bomkcm32.exe4⤵PID:5932
-
C:\Windows\SysWOW64\Cbbnpg32.exeC:\Windows\system32\Cbbnpg32.exe5⤵PID:5976
-
C:\Windows\SysWOW64\Cofnik32.exeC:\Windows\system32\Cofnik32.exe6⤵
- Drops file in System32 directory
PID:6024 -
C:\Windows\SysWOW64\Cbdjeg32.exeC:\Windows\system32\Cbdjeg32.exe7⤵PID:6068
-
C:\Windows\SysWOW64\Cljobphg.exeC:\Windows\system32\Cljobphg.exe8⤵PID:6112
-
C:\Windows\SysWOW64\Cdecgbfa.exeC:\Windows\system32\Cdecgbfa.exe9⤵
- Modifies registry class
PID:5152
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Nagpeo32.exeC:\Windows\system32\Nagpeo32.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:1620
-
C:\Windows\SysWOW64\Chqogq32.exeC:\Windows\system32\Chqogq32.exe1⤵PID:5236
-
C:\Windows\SysWOW64\Dnmhpg32.exeC:\Windows\system32\Dnmhpg32.exe2⤵PID:5648
-
-
C:\Windows\SysWOW64\Njmhhefi.exeC:\Windows\system32\Njmhhefi.exe1⤵
- Executes dropped EXE
PID:3296
-
C:\Windows\SysWOW64\Mcjmel32.exeC:\Windows\system32\Mcjmel32.exe1⤵
- Executes dropped EXE
PID:224
-
C:\Windows\SysWOW64\Maiccajf.exeC:\Windows\system32\Maiccajf.exe1⤵
- Executes dropped EXE
PID:1148
-
C:\Windows\SysWOW64\Mkmkkjko.exeC:\Windows\system32\Mkmkkjko.exe1⤵
- Executes dropped EXE
PID:396
-
C:\Windows\SysWOW64\Mcecjmkl.exeC:\Windows\system32\Mcecjmkl.exe1⤵
- Executes dropped EXE
PID:1764
-
C:\Windows\SysWOW64\Mjmoag32.exeC:\Windows\system32\Mjmoag32.exe1⤵
- Executes dropped EXE
PID:1460
-
C:\Windows\SysWOW64\Mminhceb.exeC:\Windows\system32\Mminhceb.exe1⤵
- Executes dropped EXE
PID:4680
-
C:\Windows\SysWOW64\Ljhefhha.exeC:\Windows\system32\Ljhefhha.exe1⤵
- Executes dropped EXE
PID:2300
-
C:\Windows\SysWOW64\Kjccdkki.exeC:\Windows\system32\Kjccdkki.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100
-
C:\Windows\SysWOW64\Iinqbn32.exeC:\Windows\system32\Iinqbn32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140
-
C:\Windows\SysWOW64\Mjaabq32.exeC:\Windows\system32\Mjaabq32.exe1⤵PID:5812
-
C:\Windows\SysWOW64\Nnojho32.exeC:\Windows\system32\Nnojho32.exe2⤵PID:4340
-
-
C:\Windows\SysWOW64\Nopfpgip.exeC:\Windows\system32\Nopfpgip.exe1⤵
- Drops file in System32 directory
PID:5960 -
C:\Windows\SysWOW64\Nfjola32.exeC:\Windows\system32\Nfjola32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6052 -
C:\Windows\SysWOW64\Nmdgikhi.exeC:\Windows\system32\Nmdgikhi.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1516 -
C:\Windows\SysWOW64\Cocjiehd.exeC:\Windows\system32\Cocjiehd.exe4⤵
- Modifies registry class
PID:5628 -
C:\Windows\SysWOW64\Fijdjfdb.exeC:\Windows\system32\Fijdjfdb.exe5⤵PID:2016
-
C:\Windows\SysWOW64\Jifecp32.exeC:\Windows\system32\Jifecp32.exe6⤵
- Drops file in System32 directory
PID:3088 -
C:\Windows\SysWOW64\Klbnajqc.exeC:\Windows\system32\Klbnajqc.exe7⤵PID:5672
-
C:\Windows\SysWOW64\Kcmfnd32.exeC:\Windows\system32\Kcmfnd32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5952 -
C:\Windows\SysWOW64\Kekbjo32.exeC:\Windows\system32\Kekbjo32.exe9⤵PID:5676
-
C:\Windows\SysWOW64\Khiofk32.exeC:\Windows\system32\Khiofk32.exe10⤵PID:5516
-
C:\Windows\SysWOW64\Kpqggh32.exeC:\Windows\system32\Kpqggh32.exe11⤵
- Drops file in System32 directory
PID:620 -
C:\Windows\SysWOW64\Kcoccc32.exeC:\Windows\system32\Kcoccc32.exe12⤵PID:2256
-
-
C:\Windows\SysWOW64\Lmkbpk32.exeC:\Windows\system32\Lmkbpk32.exe12⤵PID:4460
-
C:\Windows\SysWOW64\Lqfnqjpi.exeC:\Windows\system32\Lqfnqjpi.exe13⤵
- Modifies registry class
PID:960 -
C:\Windows\SysWOW64\Lcejmeol.exeC:\Windows\system32\Lcejmeol.exe14⤵PID:3976
-
C:\Windows\SysWOW64\Ljobiofi.exeC:\Windows\system32\Ljobiofi.exe15⤵PID:9720
-
C:\Windows\SysWOW64\Lmmoekem.exeC:\Windows\system32\Lmmoekem.exe16⤵PID:8072
-
C:\Windows\SysWOW64\Lddgghfo.exeC:\Windows\system32\Lddgghfo.exe17⤵PID:7548
-
C:\Windows\SysWOW64\Lcggbd32.exeC:\Windows\system32\Lcggbd32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:7780
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Gflapl32.exeC:\Windows\system32\Gflapl32.exe11⤵
- Drops file in System32 directory
PID:984 -
C:\Windows\SysWOW64\Gmfilfep.exeC:\Windows\system32\Gmfilfep.exe12⤵PID:4452
-
C:\Windows\SysWOW64\Godehbed.exeC:\Windows\system32\Godehbed.exe13⤵PID:6268
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kemooo32.exeC:\Windows\system32\Kemooo32.exe1⤵PID:4640
-
C:\Windows\SysWOW64\Khlklj32.exeC:\Windows\system32\Khlklj32.exe2⤵PID:5180
-
C:\Windows\SysWOW64\Kpccmhdg.exeC:\Windows\system32\Kpccmhdg.exe3⤵PID:4724
-
C:\Windows\SysWOW64\Kcapicdj.exeC:\Windows\system32\Kcapicdj.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3996 -
C:\Windows\SysWOW64\Lepleocn.exeC:\Windows\system32\Lepleocn.exe5⤵PID:5452
-
C:\Windows\SysWOW64\Lhnhajba.exeC:\Windows\system32\Lhnhajba.exe6⤵PID:5972
-
C:\Windows\SysWOW64\Lohqnd32.exeC:\Windows\system32\Lohqnd32.exe7⤵PID:5604
-
C:\Windows\SysWOW64\Lebijnak.exeC:\Windows\system32\Lebijnak.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5524 -
C:\Windows\SysWOW64\Lhqefjpo.exeC:\Windows\system32\Lhqefjpo.exe9⤵PID:4348
-
C:\Windows\SysWOW64\Lojmcdgl.exeC:\Windows\system32\Lojmcdgl.exe10⤵PID:4756
-
C:\Windows\SysWOW64\Ledepn32.exeC:\Windows\system32\Ledepn32.exe11⤵PID:4744
-
C:\Windows\SysWOW64\Lhcali32.exeC:\Windows\system32\Lhcali32.exe12⤵PID:5964
-
C:\Windows\SysWOW64\Lpjjmg32.exeC:\Windows\system32\Lpjjmg32.exe13⤵PID:2604
-
C:\Windows\SysWOW64\Lchfib32.exeC:\Windows\system32\Lchfib32.exe14⤵PID:2560
-
C:\Windows\SysWOW64\Loofnccf.exeC:\Windows\system32\Loofnccf.exe15⤵PID:5716
-
C:\Windows\SysWOW64\Lancko32.exeC:\Windows\system32\Lancko32.exe16⤵PID:4824
-
C:\Windows\SysWOW64\Lhgkgijg.exeC:\Windows\system32\Lhgkgijg.exe17⤵PID:4476
-
C:\Windows\SysWOW64\Lpochfji.exeC:\Windows\system32\Lpochfji.exe18⤵PID:4752
-
C:\Windows\SysWOW64\Mapppn32.exeC:\Windows\system32\Mapppn32.exe19⤵PID:384
-
C:\Windows\SysWOW64\Mfkkqmiq.exeC:\Windows\system32\Mfkkqmiq.exe20⤵PID:6008
-
C:\Windows\SysWOW64\Mhjhmhhd.exeC:\Windows\system32\Mhjhmhhd.exe21⤵PID:6196
-
C:\Windows\SysWOW64\Mlofcf32.exeC:\Windows\system32\Mlofcf32.exe22⤵
- Modifies registry class
PID:6232 -
C:\Windows\SysWOW64\Nciopppp.exeC:\Windows\system32\Nciopppp.exe23⤵PID:6284
-
C:\Windows\SysWOW64\Nhegig32.exeC:\Windows\system32\Nhegig32.exe24⤵PID:6336
-
C:\Windows\SysWOW64\Noppeaed.exeC:\Windows\system32\Noppeaed.exe25⤵PID:6388
-
C:\Windows\SysWOW64\Nbnlaldg.exeC:\Windows\system32\Nbnlaldg.exe26⤵PID:6432
-
C:\Windows\SysWOW64\Njedbjej.exeC:\Windows\system32\Njedbjej.exe27⤵PID:6480
-
C:\Windows\SysWOW64\Nqoloc32.exeC:\Windows\system32\Nqoloc32.exe28⤵PID:6524
-
C:\Windows\SysWOW64\Nbphglbe.exeC:\Windows\system32\Nbphglbe.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6568 -
C:\Windows\SysWOW64\Nijqcf32.exeC:\Windows\system32\Nijqcf32.exe30⤵PID:6616
-
C:\Windows\SysWOW64\Nodiqp32.exeC:\Windows\system32\Nodiqp32.exe31⤵
- Drops file in System32 directory
PID:6660 -
C:\Windows\SysWOW64\Nimmifgo.exeC:\Windows\system32\Nimmifgo.exe32⤵
- Modifies registry class
PID:6704 -
C:\Windows\SysWOW64\Ooibkpmi.exeC:\Windows\system32\Ooibkpmi.exe33⤵PID:6752
-
C:\Windows\SysWOW64\Pfepdg32.exeC:\Windows\system32\Pfepdg32.exe34⤵PID:6796
-
C:\Windows\SysWOW64\Pmphaaln.exeC:\Windows\system32\Pmphaaln.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6904 -
C:\Windows\SysWOW64\Bpbpecen.exeC:\Windows\system32\Bpbpecen.exe36⤵PID:6988
-
C:\Windows\SysWOW64\Bikeni32.exeC:\Windows\system32\Bikeni32.exe37⤵PID:7156
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Afinbdon.exeC:\Windows\system32\Afinbdon.exe8⤵PID:9904
-
C:\Windows\SysWOW64\Bbpoge32.exeC:\Windows\system32\Bbpoge32.exe9⤵PID:7068
-
C:\Windows\SysWOW64\Bjgghc32.exeC:\Windows\system32\Bjgghc32.exe10⤵PID:6168
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Fdogjk32.exeC:\Windows\system32\Fdogjk32.exe1⤵PID:6740
-
C:\Windows\SysWOW64\Ggbmafnm.exeC:\Windows\system32\Ggbmafnm.exe2⤵PID:1852
-
C:\Windows\SysWOW64\Jnapgjdo.exeC:\Windows\system32\Jnapgjdo.exe3⤵PID:1060
-
C:\Windows\SysWOW64\Jfmekm32.exeC:\Windows\system32\Jfmekm32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4396 -
C:\Windows\SysWOW64\Jglaepim.exeC:\Windows\system32\Jglaepim.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:220 -
C:\Windows\SysWOW64\Jjknakhq.exeC:\Windows\system32\Jjknakhq.exe6⤵PID:5184
-
C:\Windows\SysWOW64\Khonkogj.exeC:\Windows\system32\Khonkogj.exe7⤵PID:5312
-
C:\Windows\SysWOW64\Knifging.exeC:\Windows\system32\Knifging.exe8⤵PID:5512
-
C:\Windows\SysWOW64\Kagbdenk.exeC:\Windows\system32\Kagbdenk.exe9⤵PID:3840
-
C:\Windows\SysWOW64\Khfdlnab.exeC:\Windows\system32\Khfdlnab.exe10⤵PID:3492
-
C:\Windows\SysWOW64\Knpmhh32.exeC:\Windows\system32\Knpmhh32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2744 -
C:\Windows\SysWOW64\Kaqejcep.exeC:\Windows\system32\Kaqejcep.exe12⤵PID:2424
-
C:\Windows\SysWOW64\Lhjnfn32.exeC:\Windows\system32\Lhjnfn32.exe13⤵PID:3920
-
C:\Windows\SysWOW64\Lndfchdj.exeC:\Windows\system32\Lndfchdj.exe14⤵PID:5984
-
C:\Windows\SysWOW64\Lfbgmj32.exeC:\Windows\system32\Lfbgmj32.exe15⤵PID:5996
-
C:\Windows\SysWOW64\Ljncnhhk.exeC:\Windows\system32\Ljncnhhk.exe16⤵
- Drops file in System32 directory
PID:4848 -
C:\Windows\SysWOW64\Lmlpjdgo.exeC:\Windows\system32\Lmlpjdgo.exe17⤵
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\Loniiflo.exeC:\Windows\system32\Loniiflo.exe18⤵PID:396
-
C:\Windows\SysWOW64\Mdokmm32.exeC:\Windows\system32\Mdokmm32.exe19⤵
- Modifies registry class
PID:388 -
C:\Windows\SysWOW64\Moeoje32.exeC:\Windows\system32\Moeoje32.exe20⤵
- Drops file in System32 directory
PID:4500 -
C:\Windows\SysWOW64\Necqbo32.exeC:\Windows\system32\Necqbo32.exe21⤵
- Modifies registry class
PID:5132 -
C:\Windows\SysWOW64\Nggjog32.exeC:\Windows\system32\Nggjog32.exe22⤵PID:7060
-
C:\Windows\SysWOW64\Nonbqd32.exeC:\Windows\system32\Nonbqd32.exe23⤵PID:5664
-
C:\Windows\SysWOW64\Nkebee32.exeC:\Windows\system32\Nkebee32.exe24⤵PID:6192
-
C:\Windows\SysWOW64\Ndmgnkja.exeC:\Windows\system32\Ndmgnkja.exe25⤵PID:6312
-
C:\Windows\SysWOW64\Nockkcjg.exeC:\Windows\system32\Nockkcjg.exe26⤵PID:6396
-
C:\Windows\SysWOW64\Noehac32.exeC:\Windows\system32\Noehac32.exe27⤵PID:6204
-
C:\Windows\SysWOW64\Ogqmee32.exeC:\Windows\system32\Ogqmee32.exe28⤵PID:6300
-
C:\Windows\SysWOW64\Okneldkf.exeC:\Windows\system32\Okneldkf.exe29⤵PID:6640
-
C:\Windows\SysWOW64\Ogefqeaj.exeC:\Windows\system32\Ogefqeaj.exe30⤵PID:4684
-
C:\Windows\SysWOW64\Oakjnnap.exeC:\Windows\system32\Oakjnnap.exe31⤵PID:3276
-
C:\Windows\SysWOW64\Okcogc32.exeC:\Windows\system32\Okcogc32.exe32⤵PID:4472
-
C:\Windows\SysWOW64\Ofhcdlgg.exeC:\Windows\system32\Ofhcdlgg.exe33⤵PID:6612
-
C:\Windows\SysWOW64\Okeklcen.exeC:\Windows\system32\Okeklcen.exe34⤵PID:6784
-
C:\Windows\SysWOW64\Pgllad32.exeC:\Windows\system32\Pgllad32.exe35⤵PID:5176
-
C:\Windows\SysWOW64\Pocdba32.exeC:\Windows\system32\Pocdba32.exe36⤵PID:5464
-
C:\Windows\SysWOW64\Phlikg32.exeC:\Windows\system32\Phlikg32.exe37⤵PID:6780
-
C:\Windows\SysWOW64\Pkjegb32.exeC:\Windows\system32\Pkjegb32.exe38⤵PID:5384
-
C:\Windows\SysWOW64\Pbdmdlie.exeC:\Windows\system32\Pbdmdlie.exe39⤵PID:6736
-
C:\Windows\SysWOW64\Pdbiphhi.exeC:\Windows\system32\Pdbiphhi.exe40⤵PID:6840
-
C:\Windows\SysWOW64\Pfbfjk32.exeC:\Windows\system32\Pfbfjk32.exe41⤵PID:4728
-
C:\Windows\SysWOW64\Bpaikm32.exeC:\Windows\system32\Bpaikm32.exe42⤵PID:6860
-
C:\Windows\SysWOW64\Ciaddaaj.exeC:\Windows\system32\Ciaddaaj.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4432 -
C:\Windows\SysWOW64\Cehdib32.exeC:\Windows\system32\Cehdib32.exe44⤵PID:6584
-
C:\Windows\SysWOW64\Cnbfgh32.exeC:\Windows\system32\Cnbfgh32.exe45⤵PID:2880
-
C:\Windows\SysWOW64\Cnebmgjj.exeC:\Windows\system32\Cnebmgjj.exe46⤵PID:5388
-
C:\Windows\SysWOW64\Dbehienn.exeC:\Windows\system32\Dbehienn.exe47⤵PID:2472
-
C:\Windows\SysWOW64\Decdeama.exeC:\Windows\system32\Decdeama.exe48⤵PID:6916
-
C:\Windows\SysWOW64\Dolinf32.exeC:\Windows\system32\Dolinf32.exe49⤵PID:5680
-
C:\Windows\SysWOW64\Dpkehi32.exeC:\Windows\system32\Dpkehi32.exe50⤵PID:1944
-
C:\Windows\SysWOW64\Dblnid32.exeC:\Windows\system32\Dblnid32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4836 -
C:\Windows\SysWOW64\Ehifak32.exeC:\Windows\system32\Ehifak32.exe52⤵PID:4376
-
C:\Windows\SysWOW64\Epbkhhel.exeC:\Windows\system32\Epbkhhel.exe53⤵PID:3576
-
C:\Windows\SysWOW64\Eflceb32.exeC:\Windows\system32\Eflceb32.exe54⤵PID:6600
-
C:\Windows\SysWOW64\Elilmi32.exeC:\Windows\system32\Elilmi32.exe55⤵PID:5196
-
C:\Windows\SysWOW64\Eipilmgh.exeC:\Windows\system32\Eipilmgh.exe56⤵PID:4816
-
C:\Windows\SysWOW64\Eoladdeo.exeC:\Windows\system32\Eoladdeo.exe57⤵PID:1500
-
C:\Windows\SysWOW64\Fibfbm32.exeC:\Windows\system32\Fibfbm32.exe58⤵PID:1764
-
C:\Windows\SysWOW64\Fplnogmb.exeC:\Windows\system32\Fplnogmb.exe59⤵PID:3604
-
C:\Windows\SysWOW64\Fbjjkble.exeC:\Windows\system32\Fbjjkble.exe60⤵PID:6004
-
C:\Windows\SysWOW64\Fidbgm32.exeC:\Windows\system32\Fidbgm32.exe61⤵
- Drops file in System32 directory
PID:684 -
C:\Windows\SysWOW64\Fpnkdfko.exeC:\Windows\system32\Fpnkdfko.exe62⤵PID:7048
-
C:\Windows\SysWOW64\Fcmgpbjc.exeC:\Windows\system32\Fcmgpbjc.exe63⤵PID:4844
-
C:\Windows\SysWOW64\Fifomlap.exeC:\Windows\system32\Fifomlap.exe64⤵PID:5652
-
C:\Windows\SysWOW64\Fochecog.exeC:\Windows\system32\Fochecog.exe65⤵PID:4740
-
C:\Windows\SysWOW64\Fgjpfqpi.exeC:\Windows\system32\Fgjpfqpi.exe66⤵PID:5956
-
C:\Windows\SysWOW64\Fpcdof32.exeC:\Windows\system32\Fpcdof32.exe67⤵PID:6500
-
C:\Windows\SysWOW64\Fgmllpng.exeC:\Windows\system32\Fgmllpng.exe68⤵PID:6476
-
C:\Windows\SysWOW64\Fljedg32.exeC:\Windows\system32\Fljedg32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2596 -
C:\Windows\SysWOW64\Ginenk32.exeC:\Windows\system32\Ginenk32.exe70⤵PID:6656
-
C:\Windows\SysWOW64\Gpgnjebd.exeC:\Windows\system32\Gpgnjebd.exe71⤵PID:1152
-
C:\Windows\SysWOW64\Gedfblql.exeC:\Windows\system32\Gedfblql.exe72⤵PID:6684
-
C:\Windows\SysWOW64\Gheodg32.exeC:\Windows\system32\Gheodg32.exe73⤵PID:6744
-
C:\Windows\SysWOW64\Gckcap32.exeC:\Windows\system32\Gckcap32.exe74⤵PID:6832
-
C:\Windows\SysWOW64\Ggfobofl.exeC:\Windows\system32\Ggfobofl.exe75⤵PID:780
-
C:\Windows\SysWOW64\Ghgljg32.exeC:\Windows\system32\Ghgljg32.exe76⤵PID:1680
-
C:\Windows\SysWOW64\Gcmpgpkp.exeC:\Windows\system32\Gcmpgpkp.exe77⤵PID:6028
-
C:\Windows\SysWOW64\Gjghdj32.exeC:\Windows\system32\Gjghdj32.exe78⤵PID:3756
-
C:\Windows\SysWOW64\Gledpe32.exeC:\Windows\system32\Gledpe32.exe79⤵PID:2864
-
C:\Windows\SysWOW64\Hodqlq32.exeC:\Windows\system32\Hodqlq32.exe80⤵PID:4720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Hgkimn32.exeC:\Windows\system32\Hgkimn32.exe1⤵
- Modifies registry class
PID:5532 -
C:\Windows\SysWOW64\Hhleefhe.exeC:\Windows\system32\Hhleefhe.exe2⤵
- Modifies registry class
PID:5224 -
C:\Windows\SysWOW64\Hpcmfchg.exeC:\Windows\system32\Hpcmfchg.exe3⤵PID:7012
-
C:\Windows\SysWOW64\Hcaibo32.exeC:\Windows\system32\Hcaibo32.exe4⤵PID:4496
-
C:\Windows\SysWOW64\Hhobjf32.exeC:\Windows\system32\Hhobjf32.exe5⤵PID:4948
-
C:\Windows\SysWOW64\Hpejlc32.exeC:\Windows\system32\Hpejlc32.exe6⤵PID:4084
-
C:\Windows\SysWOW64\Hgpbhmna.exeC:\Windows\system32\Hgpbhmna.exe7⤵PID:728
-
C:\Windows\SysWOW64\Hllkqdli.exeC:\Windows\system32\Hllkqdli.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2296 -
C:\Windows\SysWOW64\Hcfcmnce.exeC:\Windows\system32\Hcfcmnce.exe9⤵PID:6240
-
C:\Windows\SysWOW64\Hfeoijbi.exeC:\Windows\system32\Hfeoijbi.exe10⤵PID:6380
-
C:\Windows\SysWOW64\Hjpkjh32.exeC:\Windows\system32\Hjpkjh32.exe11⤵PID:5444
-
C:\Windows\SysWOW64\Hqjcgbbo.exeC:\Windows\system32\Hqjcgbbo.exe12⤵PID:3724
-
C:\Windows\SysWOW64\Hgdlcm32.exeC:\Windows\system32\Hgdlcm32.exe13⤵PID:6508
-
C:\Windows\SysWOW64\Hjbhph32.exeC:\Windows\system32\Hjbhph32.exe14⤵
- Drops file in System32 directory
PID:5340 -
C:\Windows\SysWOW64\Ijgakgej.exeC:\Windows\system32\Ijgakgej.exe15⤵PID:1792
-
C:\Windows\SysWOW64\Imfmgcdn.exeC:\Windows\system32\Imfmgcdn.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6944 -
C:\Windows\SysWOW64\Icpecm32.exeC:\Windows\system32\Icpecm32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2268 -
C:\Windows\SysWOW64\Ijjnpg32.exeC:\Windows\system32\Ijjnpg32.exe18⤵
- Drops file in System32 directory
PID:408 -
C:\Windows\SysWOW64\Imhjlb32.exeC:\Windows\system32\Imhjlb32.exe19⤵PID:3720
-
C:\Windows\SysWOW64\Ignnjk32.exeC:\Windows\system32\Ignnjk32.exe20⤵PID:4044
-
C:\Windows\SysWOW64\Iiokacgp.exeC:\Windows\system32\Iiokacgp.exe21⤵PID:2364
-
C:\Windows\SysWOW64\Ioicnn32.exeC:\Windows\system32\Ioicnn32.exe22⤵
- Drops file in System32 directory
PID:4028 -
C:\Windows\SysWOW64\Ijngkf32.exeC:\Windows\system32\Ijngkf32.exe23⤵PID:4952
-
C:\Windows\SysWOW64\Jmmcgbnf.exeC:\Windows\system32\Jmmcgbnf.exe24⤵PID:5908
-
C:\Windows\SysWOW64\Jcgldl32.exeC:\Windows\system32\Jcgldl32.exe25⤵
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\Jicdlc32.exeC:\Windows\system32\Jicdlc32.exe26⤵PID:2368
-
C:\Windows\SysWOW64\Jonlimkg.exeC:\Windows\system32\Jonlimkg.exe27⤵PID:3792
-
C:\Windows\SysWOW64\Jjcqffkm.exeC:\Windows\system32\Jjcqffkm.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4764 -
C:\Windows\SysWOW64\Jqmicpbj.exeC:\Windows\system32\Jqmicpbj.exe29⤵
- Drops file in System32 directory
PID:3256 -
C:\Windows\SysWOW64\Jggapj32.exeC:\Windows\system32\Jggapj32.exe30⤵PID:4960
-
C:\Windows\SysWOW64\Jihngboe.exeC:\Windows\system32\Jihngboe.exe31⤵PID:5252
-
C:\Windows\SysWOW64\Jqofippg.exeC:\Windows\system32\Jqofippg.exe32⤵PID:6292
-
C:\Windows\SysWOW64\Jobfdl32.exeC:\Windows\system32\Jobfdl32.exe33⤵PID:6564
-
C:\Windows\SysWOW64\Jginej32.exeC:\Windows\system32\Jginej32.exe34⤵PID:5256
-
C:\Windows\SysWOW64\Jikjmbmb.exeC:\Windows\system32\Jikjmbmb.exe35⤵PID:1388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ciefpn32.exeC:\Windows\system32\Ciefpn32.exe9⤵PID:1968
-
C:\Windows\SysWOW64\Cfigib32.exeC:\Windows\system32\Cfigib32.exe10⤵PID:7060
-
C:\Windows\SysWOW64\Ckfpai32.exeC:\Windows\system32\Ckfpai32.exe11⤵PID:6728
-
C:\Windows\SysWOW64\Cbphncfo.exeC:\Windows\system32\Cbphncfo.exe12⤵PID:10228
-
C:\Windows\SysWOW64\Cijpkmml.exeC:\Windows\system32\Cijpkmml.exe13⤵
- Modifies registry class
PID:2260 -
C:\Windows\SysWOW64\Cjjlep32.exeC:\Windows\system32\Cjjlep32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3792 -
C:\Windows\SysWOW64\Ckkilhjm.exeC:\Windows\system32\Ckkilhjm.exe15⤵PID:9360
-
C:\Windows\SysWOW64\Cbeaib32.exeC:\Windows\system32\Cbeaib32.exe16⤵PID:3968
-
C:\Windows\SysWOW64\Dkmebh32.exeC:\Windows\system32\Dkmebh32.exe17⤵PID:3588
-
C:\Windows\SysWOW64\Dbgnobpg.exeC:\Windows\system32\Dbgnobpg.exe18⤵PID:9456
-
C:\Windows\SysWOW64\Djnfppqi.exeC:\Windows\system32\Djnfppqi.exe19⤵PID:6736
-
C:\Windows\SysWOW64\Dmmblkpm.exeC:\Windows\system32\Dmmblkpm.exe20⤵PID:5636
-
C:\Windows\SysWOW64\Dfefeq32.exeC:\Windows\system32\Dfefeq32.exe21⤵PID:4856
-
C:\Windows\SysWOW64\Dmooak32.exeC:\Windows\system32\Dmooak32.exe22⤵PID:4680
-
C:\Windows\SysWOW64\Dpmknf32.exeC:\Windows\system32\Dpmknf32.exe23⤵PID:2716
-
C:\Windows\SysWOW64\Dfgcjpdk.exeC:\Windows\system32\Dfgcjpdk.exe24⤵PID:5996
-
C:\Windows\SysWOW64\Difpflco.exeC:\Windows\system32\Difpflco.exe25⤵PID:5104
-
C:\Windows\SysWOW64\Dbndoa32.exeC:\Windows\system32\Dbndoa32.exe26⤵PID:4360
-
C:\Windows\SysWOW64\Djelqo32.exeC:\Windows\system32\Djelqo32.exe27⤵PID:6400
-
C:\Windows\SysWOW64\Dflmep32.exeC:\Windows\system32\Dflmep32.exe28⤵PID:5284
-
C:\Windows\SysWOW64\Epdaneff.exeC:\Windows\system32\Epdaneff.exe29⤵PID:9576
-
C:\Windows\SysWOW64\Ecbjdcml.exeC:\Windows\system32\Ecbjdcml.exe30⤵PID:5976
-
C:\Windows\SysWOW64\Hgokikan.exeC:\Windows\system32\Hgokikan.exe31⤵PID:7028
-
C:\Windows\SysWOW64\Hkmdoi32.exeC:\Windows\system32\Hkmdoi32.exe32⤵
- Modifies registry class
PID:5216 -
C:\Windows\SysWOW64\Hpjlgp32.exeC:\Windows\system32\Hpjlgp32.exe33⤵
- Modifies registry class
PID:5464 -
C:\Windows\SysWOW64\Hkpqdifa.exeC:\Windows\system32\Hkpqdifa.exe34⤵PID:9784
-
C:\Windows\SysWOW64\Hgfaij32.exeC:\Windows\system32\Hgfaij32.exe35⤵PID:5300
-
C:\Windows\SysWOW64\Hmpjfdcb.exeC:\Windows\system32\Hmpjfdcb.exe36⤵
- Modifies registry class
PID:4212 -
C:\Windows\SysWOW64\Hpofbobf.exeC:\Windows\system32\Hpofbobf.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4560 -
C:\Windows\SysWOW64\Hlefgphj.exeC:\Windows\system32\Hlefgphj.exe38⤵PID:4004
-
C:\Windows\SysWOW64\Icoodj32.exeC:\Windows\system32\Icoodj32.exe39⤵PID:2368
-
C:\Windows\SysWOW64\Ipcomo32.exeC:\Windows\system32\Ipcomo32.exe40⤵PID:5696
-
C:\Windows\SysWOW64\Icdhojka.exeC:\Windows\system32\Icdhojka.exe41⤵PID:5664
-
C:\Windows\SysWOW64\Ijnqld32.exeC:\Windows\system32\Ijnqld32.exe42⤵PID:2416
-
C:\Windows\SysWOW64\Iphihnjk.exeC:\Windows\system32\Iphihnjk.exe43⤵PID:4008
-
C:\Windows\SysWOW64\Icfediio.exeC:\Windows\system32\Icfediio.exe44⤵PID:6296
-
C:\Windows\SysWOW64\Iknmfg32.exeC:\Windows\system32\Iknmfg32.exe45⤵PID:5752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jpdbjleo.exeC:\Windows\system32\Jpdbjleo.exe1⤵PID:2204
-
C:\Windows\SysWOW64\Jjjggede.exeC:\Windows\system32\Jjjggede.exe2⤵PID:2724
-
C:\Windows\SysWOW64\Kqdodo32.exeC:\Windows\system32\Kqdodo32.exe3⤵PID:4992
-
C:\Windows\SysWOW64\Kcbkpj32.exeC:\Windows\system32\Kcbkpj32.exe4⤵PID:6108
-
C:\Windows\SysWOW64\Kjlcmdbb.exeC:\Windows\system32\Kjlcmdbb.exe5⤵PID:4732
-
-
-
-
-
C:\Windows\SysWOW64\Kmkpipaf.exeC:\Windows\system32\Kmkpipaf.exe1⤵PID:6924
-
C:\Windows\SysWOW64\Kpilekqj.exeC:\Windows\system32\Kpilekqj.exe2⤵
- Modifies registry class
PID:2384 -
C:\Windows\SysWOW64\Kfcdaehf.exeC:\Windows\system32\Kfcdaehf.exe3⤵PID:1244
-
C:\Windows\SysWOW64\Kmpido32.exeC:\Windows\system32\Kmpido32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6180 -
C:\Windows\SysWOW64\Kpnepk32.exeC:\Windows\system32\Kpnepk32.exe5⤵PID:7068
-
C:\Windows\SysWOW64\Kfhnme32.exeC:\Windows\system32\Kfhnme32.exe6⤵PID:1920
-
C:\Windows\SysWOW64\Kifjip32.exeC:\Windows\system32\Kifjip32.exe7⤵PID:6348
-
C:\Windows\SysWOW64\Kanbjn32.exeC:\Windows\system32\Kanbjn32.exe8⤵PID:5276
-
C:\Windows\SysWOW64\Kclnfi32.exeC:\Windows\system32\Kclnfi32.exe9⤵PID:5804
-
C:\Windows\SysWOW64\Kfjjbd32.exeC:\Windows\system32\Kfjjbd32.exe10⤵PID:6848
-
C:\Windows\SysWOW64\Liifnp32.exeC:\Windows\system32\Liifnp32.exe11⤵PID:5372
-
C:\Windows\SysWOW64\Lapopm32.exeC:\Windows\system32\Lapopm32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3588 -
C:\Windows\SysWOW64\Lfmghdpl.exeC:\Windows\system32\Lfmghdpl.exe13⤵PID:5332
-
C:\Windows\SysWOW64\Likcdpop.exeC:\Windows\system32\Likcdpop.exe14⤵PID:924
-
C:\Windows\SysWOW64\Lglcag32.exeC:\Windows\system32\Lglcag32.exe15⤵PID:3580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lccdghmc.exeC:\Windows\system32\Lccdghmc.exe1⤵PID:6628
-
C:\Windows\SysWOW64\Lpjelibg.exeC:\Windows\system32\Lpjelibg.exe2⤵
- Modifies registry class
PID:2280 -
C:\Windows\SysWOW64\Ljoiibbm.exeC:\Windows\system32\Ljoiibbm.exe3⤵PID:3480
-
C:\Windows\SysWOW64\Mjafoapj.exeC:\Windows\system32\Mjafoapj.exe4⤵PID:836
-
C:\Windows\SysWOW64\Malnklgg.exeC:\Windows\system32\Malnklgg.exe5⤵
- Drops file in System32 directory
PID:5484 -
C:\Windows\SysWOW64\Mfhgcbfo.exeC:\Windows\system32\Mfhgcbfo.exe6⤵PID:5280
-
C:\Windows\SysWOW64\Mmbopm32.exeC:\Windows\system32\Mmbopm32.exe7⤵PID:5688
-
C:\Windows\SysWOW64\Mfmpob32.exeC:\Windows\system32\Mfmpob32.exe8⤵PID:1424
-
C:\Windows\SysWOW64\Njmopj32.exeC:\Windows\system32\Njmopj32.exe9⤵PID:2044
-
C:\Windows\SysWOW64\Nmkkle32.exeC:\Windows\system32\Nmkkle32.exe10⤵PID:5440
-
C:\Windows\SysWOW64\Nlnkgbhp.exeC:\Windows\system32\Nlnkgbhp.exe11⤵PID:2416
-
C:\Windows\SysWOW64\Nbhcdl32.exeC:\Windows\system32\Nbhcdl32.exe12⤵PID:3376
-
C:\Windows\SysWOW64\Njokei32.exeC:\Windows\system32\Njokei32.exe13⤵PID:6468
-
C:\Windows\SysWOW64\Nmmgae32.exeC:\Windows\system32\Nmmgae32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2944 -
C:\Windows\SysWOW64\Npldnp32.exeC:\Windows\system32\Npldnp32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3924 -
C:\Windows\SysWOW64\Nbjpjl32.exeC:\Windows\system32\Nbjpjl32.exe16⤵PID:3092
-
C:\Windows\SysWOW64\Nffljjfc.exeC:\Windows\system32\Nffljjfc.exe17⤵PID:6676
-
C:\Windows\SysWOW64\Nidhffef.exeC:\Windows\system32\Nidhffef.exe18⤵PID:6276
-
C:\Windows\SysWOW64\Nlbdba32.exeC:\Windows\system32\Nlbdba32.exe19⤵PID:6392
-
C:\Windows\SysWOW64\Nbmmoklg.exeC:\Windows\system32\Nbmmoklg.exe20⤵
- Drops file in System32 directory
- Modifies registry class
PID:6768 -
C:\Windows\SysWOW64\Eaegqc32.exeC:\Windows\system32\Eaegqc32.exe21⤵PID:384
-
C:\Windows\SysWOW64\Nfnooe32.exeC:\Windows\system32\Nfnooe32.exe22⤵PID:6496
-
C:\Windows\SysWOW64\Nnidcg32.exeC:\Windows\system32\Nnidcg32.exe23⤵
- Modifies registry class
PID:364 -
C:\Windows\SysWOW64\Nbepdfnc.exeC:\Windows\system32\Nbepdfnc.exe24⤵PID:4372
-
C:\Windows\SysWOW64\Npipnjmm.exeC:\Windows\system32\Npipnjmm.exe25⤵PID:6492
-
C:\Windows\SysWOW64\Oecego32.exeC:\Windows\system32\Oecego32.exe26⤵PID:6732
-
C:\Windows\SysWOW64\Dqhpjohb.exeC:\Windows\system32\Dqhpjohb.exe27⤵PID:1060
-
C:\Windows\SysWOW64\Dcglfjgf.exeC:\Windows\system32\Dcglfjgf.exe28⤵PID:3008
-
C:\Windows\SysWOW64\Dfeibf32.exeC:\Windows\system32\Dfeibf32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7136 -
C:\Windows\SysWOW64\Enlqdc32.exeC:\Windows\system32\Enlqdc32.exe30⤵PID:4776
-
C:\Windows\SysWOW64\Chbenm32.exeC:\Windows\system32\Chbenm32.exe31⤵PID:2996
-
C:\Windows\SysWOW64\Dabpgbpm.exeC:\Windows\system32\Dabpgbpm.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2988 -
C:\Windows\SysWOW64\Dhlhcl32.exeC:\Windows\system32\Dhlhcl32.exe33⤵PID:1180
-
C:\Windows\SysWOW64\Dofpqfof.exeC:\Windows\system32\Dofpqfof.exe34⤵PID:4368
-
C:\Windows\SysWOW64\Dadlmanj.exeC:\Windows\system32\Dadlmanj.exe35⤵PID:5240
-
C:\Windows\SysWOW64\Djkdnool.exeC:\Windows\system32\Djkdnool.exe36⤵PID:4100
-
C:\Windows\SysWOW64\Dljqjjnp.exeC:\Windows\system32\Dljqjjnp.exe37⤵
- Drops file in System32 directory
- Modifies registry class
PID:2604 -
C:\Windows\SysWOW64\Dohmff32.exeC:\Windows\system32\Dohmff32.exe38⤵PID:4464
-
C:\Windows\SysWOW64\Dfbebpdq.exeC:\Windows\system32\Dfbebpdq.exe39⤵PID:5088
-
C:\Windows\SysWOW64\Djnaco32.exeC:\Windows\system32\Djnaco32.exe40⤵
- Modifies registry class
PID:5124 -
C:\Windows\SysWOW64\Dllmoj32.exeC:\Windows\system32\Dllmoj32.exe41⤵PID:316
-
C:\Windows\SysWOW64\Ecfeldcj.exeC:\Windows\system32\Ecfeldcj.exe42⤵PID:1764
-
C:\Windows\SysWOW64\Efdbhpbn.exeC:\Windows\system32\Efdbhpbn.exe43⤵PID:684
-
C:\Windows\SysWOW64\Elepei32.exeC:\Windows\system32\Elepei32.exe44⤵
- Modifies registry class
PID:5648 -
C:\Windows\SysWOW64\Fiajfi32.exeC:\Windows\system32\Fiajfi32.exe45⤵PID:6792
-
C:\Windows\SysWOW64\Fcfocb32.exeC:\Windows\system32\Fcfocb32.exe46⤵
- Drops file in System32 directory
PID:540 -
C:\Windows\SysWOW64\Ffekom32.exeC:\Windows\system32\Ffekom32.exe47⤵PID:4284
-
C:\Windows\SysWOW64\Ficgkico.exeC:\Windows\system32\Ficgkico.exe48⤵PID:6576
-
C:\Windows\SysWOW64\Fomohc32.exeC:\Windows\system32\Fomohc32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3176 -
C:\Windows\SysWOW64\Fblldn32.exeC:\Windows\system32\Fblldn32.exe50⤵
- Drops file in System32 directory
PID:6684 -
C:\Windows\SysWOW64\Fmapag32.exeC:\Windows\system32\Fmapag32.exe51⤵PID:5292
-
C:\Windows\SysWOW64\Foplnb32.exeC:\Windows\system32\Foplnb32.exe52⤵PID:4164
-
C:\Windows\SysWOW64\Ffjdjmpf.exeC:\Windows\system32\Ffjdjmpf.exe53⤵PID:3304
-
C:\Windows\SysWOW64\Fjepkk32.exeC:\Windows\system32\Fjepkk32.exe54⤵PID:5764
-
C:\Windows\SysWOW64\Gqohge32.exeC:\Windows\system32\Gqohge32.exe55⤵PID:5532
-
C:\Windows\SysWOW64\Gbqeonfj.exeC:\Windows\system32\Gbqeonfj.exe56⤵
- Drops file in System32 directory
PID:5516
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ooqqmoac.exeC:\Windows\system32\Ooqqmoac.exe44⤵PID:9716
-
C:\Windows\SysWOW64\Okgabpgg.exeC:\Windows\system32\Okgabpgg.exe45⤵PID:1964
-
C:\Windows\SysWOW64\Oboicmhj.exeC:\Windows\system32\Oboicmhj.exe46⤵PID:6256
-
C:\Windows\SysWOW64\Oemephgn.exeC:\Windows\system32\Oemephgn.exe47⤵PID:764
-
C:\Windows\SysWOW64\Pcjioknl.exeC:\Windows\system32\Pcjioknl.exe48⤵PID:5472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jmpnppap.exeC:\Windows\system32\Jmpnppap.exe3⤵PID:836
-
C:\Windows\SysWOW64\Jdjfmjhm.exeC:\Windows\system32\Jdjfmjhm.exe4⤵PID:5244
-
C:\Windows\SysWOW64\Kkdnjd32.exeC:\Windows\system32\Kkdnjd32.exe5⤵PID:6892
-
-
-
-
-
C:\Windows\SysWOW64\Gbcaemdg.exeC:\Windows\system32\Gbcaemdg.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:912 -
C:\Windows\SysWOW64\Gjjjfkdj.exeC:\Windows\system32\Gjjjfkdj.exe2⤵PID:5444
-
C:\Windows\SysWOW64\Gjlfkj32.exeC:\Windows\system32\Gjlfkj32.exe3⤵PID:6588
-
C:\Windows\SysWOW64\Hcidoo32.exeC:\Windows\system32\Hcidoo32.exe4⤵PID:5180
-
C:\Windows\SysWOW64\Hifmhf32.exeC:\Windows\system32\Hifmhf32.exe5⤵PID:6196
-
C:\Windows\SysWOW64\Hihimfag.exeC:\Windows\system32\Hihimfag.exe6⤵PID:3404
-
C:\Windows\SysWOW64\Hcnnjoam.exeC:\Windows\system32\Hcnnjoam.exe7⤵PID:6452
-
C:\Windows\SysWOW64\Hbcklkee.exeC:\Windows\system32\Hbcklkee.exe8⤵
- Drops file in System32 directory
PID:3520 -
C:\Windows\SysWOW64\Hcbgen32.exeC:\Windows\system32\Hcbgen32.exe9⤵PID:5016
-
C:\Windows\SysWOW64\Iippne32.exeC:\Windows\system32\Iippne32.exe10⤵PID:1068
-
C:\Windows\SysWOW64\Ijolhg32.exeC:\Windows\system32\Ijolhg32.exe11⤵
- Drops file in System32 directory
PID:3232 -
C:\Windows\SysWOW64\Ibjqlj32.exeC:\Windows\system32\Ibjqlj32.exe12⤵
- Modifies registry class
PID:740 -
C:\Windows\SysWOW64\Ijaimg32.exeC:\Windows\system32\Ijaimg32.exe13⤵PID:6520
-
C:\Windows\SysWOW64\Iakajagl.exeC:\Windows\system32\Iakajagl.exe14⤵PID:4028
-
C:\Windows\SysWOW64\Idjmfmgp.exeC:\Windows\system32\Idjmfmgp.exe15⤵
- Modifies registry class
PID:5364 -
C:\Windows\SysWOW64\Ifhibhfc.exeC:\Windows\system32\Ifhibhfc.exe16⤵PID:2100
-
C:\Windows\SysWOW64\Iiffoc32.exeC:\Windows\system32\Iiffoc32.exe17⤵PID:2292
-
C:\Windows\SysWOW64\Iannpa32.exeC:\Windows\system32\Iannpa32.exe18⤵PID:7032
-
C:\Windows\SysWOW64\Ibojgikg.exeC:\Windows\system32\Ibojgikg.exe19⤵
- Drops file in System32 directory
PID:3256 -
C:\Windows\SysWOW64\Iiibdc32.exeC:\Windows\system32\Iiibdc32.exe20⤵PID:6620
-
C:\Windows\SysWOW64\Ipckqnja.exeC:\Windows\system32\Ipckqnja.exe21⤵PID:1236
-
C:\Windows\SysWOW64\Ifmcmg32.exeC:\Windows\system32\Ifmcmg32.exe22⤵
- Drops file in System32 directory
PID:1796 -
C:\Windows\SysWOW64\Jikojcaa.exeC:\Windows\system32\Jikojcaa.exe23⤵PID:6032
-
C:\Windows\SysWOW64\Jabgkpad.exeC:\Windows\system32\Jabgkpad.exe24⤵PID:6660
-
C:\Windows\SysWOW64\Jbccbi32.exeC:\Windows\system32\Jbccbi32.exe25⤵PID:4992
-
C:\Windows\SysWOW64\Jjklcf32.exeC:\Windows\system32\Jjklcf32.exe26⤵
- Drops file in System32 directory
PID:6604 -
C:\Windows\SysWOW64\Jmihpa32.exeC:\Windows\system32\Jmihpa32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7068 -
C:\Windows\SysWOW64\Jpgdlm32.exeC:\Windows\system32\Jpgdlm32.exe28⤵PID:5756
-
C:\Windows\SysWOW64\Jbfphh32.exeC:\Windows\system32\Jbfphh32.exe29⤵PID:5372
-
C:\Windows\SysWOW64\Jiphebml.exeC:\Windows\system32\Jiphebml.exe30⤵PID:5904
-
C:\Windows\SysWOW64\Jmkdeaee.exeC:\Windows\system32\Jmkdeaee.exe31⤵PID:1548
-
C:\Windows\SysWOW64\Jdembk32.exeC:\Windows\system32\Jdembk32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2208 -
C:\Windows\SysWOW64\Jaimko32.exeC:\Windows\system32\Jaimko32.exe33⤵PID:5172
-
C:\Windows\SysWOW64\Jdhigk32.exeC:\Windows\system32\Jdhigk32.exe34⤵PID:5552
-
C:\Windows\SysWOW64\Jfffcf32.exeC:\Windows\system32\Jfffcf32.exe35⤵PID:6136
-
C:\Windows\SysWOW64\Jidbpa32.exeC:\Windows\system32\Jidbpa32.exe36⤵PID:2280
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Aepklffh.exeC:\Windows\system32\Aepklffh.exe14⤵PID:2620
-
C:\Windows\SysWOW64\Acclejeb.exeC:\Windows\system32\Acclejeb.exe15⤵PID:6540
-
C:\Windows\SysWOW64\Afddge32.exeC:\Windows\system32\Afddge32.exe16⤵
- Modifies registry class
PID:6920 -
C:\Windows\SysWOW64\Aakelfhg.exeC:\Windows\system32\Aakelfhg.exe17⤵PID:5604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kmbkfp32.exeC:\Windows\system32\Kmbkfp32.exe1⤵
- Modifies registry class
PID:4244 -
C:\Windows\SysWOW64\Kpagbk32.exeC:\Windows\system32\Kpagbk32.exe2⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\Kdlcbjfj.exeC:\Windows\system32\Kdlcbjfj.exe3⤵PID:4936
-
C:\Windows\SysWOW64\Kkfkod32.exeC:\Windows\system32\Kkfkod32.exe4⤵
- Drops file in System32 directory
PID:2756 -
C:\Windows\SysWOW64\Kmegkp32.exeC:\Windows\system32\Kmegkp32.exe5⤵PID:4756
-
C:\Windows\SysWOW64\Kdophj32.exeC:\Windows\system32\Kdophj32.exe6⤵PID:4716
-
C:\Windows\SysWOW64\Kgmlde32.exeC:\Windows\system32\Kgmlde32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3576 -
C:\Windows\SysWOW64\Kilhqq32.exeC:\Windows\system32\Kilhqq32.exe8⤵PID:6428
-
C:\Windows\SysWOW64\Kabpan32.exeC:\Windows\system32\Kabpan32.exe9⤵PID:1148
-
C:\Windows\SysWOW64\Kgphje32.exeC:\Windows\system32\Kgphje32.exe10⤵PID:3564
-
C:\Windows\SysWOW64\Kinefp32.exeC:\Windows\system32\Kinefp32.exe11⤵PID:6016
-
-
-
-
C:\Windows\SysWOW64\Ipjocgdm.exeC:\Windows\system32\Ipjocgdm.exe9⤵PID:9232
-
C:\Windows\SysWOW64\Iomood32.exeC:\Windows\system32\Iomood32.exe10⤵PID:7352
-
C:\Windows\SysWOW64\Iefgln32.exeC:\Windows\system32\Iefgln32.exe11⤵PID:8996
-
C:\Windows\SysWOW64\Iibclmkn.exeC:\Windows\system32\Iibclmkn.exe12⤵PID:7524
-
C:\Windows\SysWOW64\Jlqohhja.exeC:\Windows\system32\Jlqohhja.exe13⤵PID:2900
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kaemgn32.exeC:\Windows\system32\Kaemgn32.exe1⤵PID:692
-
C:\Windows\SysWOW64\Kdcicipb.exeC:\Windows\system32\Kdcicipb.exe2⤵PID:5956
-
C:\Windows\SysWOW64\Kgbepdpf.exeC:\Windows\system32\Kgbepdpf.exe3⤵PID:4052
-
C:\Windows\SysWOW64\Kagimmol.exeC:\Windows\system32\Kagimmol.exe4⤵PID:6688
-
-
-
-
C:\Windows\SysWOW64\Lmnjan32.exeC:\Windows\system32\Lmnjan32.exe1⤵PID:3928
-
C:\Windows\SysWOW64\Lajfbmmi.exeC:\Windows\system32\Lajfbmmi.exe2⤵PID:5060
-
C:\Windows\SysWOW64\Ldhbnhlm.exeC:\Windows\system32\Ldhbnhlm.exe3⤵PID:3432
-
C:\Windows\SysWOW64\Lgfojd32.exeC:\Windows\system32\Lgfojd32.exe4⤵PID:5596
-
-
-
-
C:\Windows\SysWOW64\Liekgo32.exeC:\Windows\system32\Liekgo32.exe1⤵PID:3968
-
C:\Windows\SysWOW64\Lalchm32.exeC:\Windows\system32\Lalchm32.exe2⤵PID:7100
-
-
C:\Windows\SysWOW64\Lpocciba.exeC:\Windows\system32\Lpocciba.exe1⤵PID:6424
-
C:\Windows\SysWOW64\Lcmopeae.exeC:\Windows\system32\Lcmopeae.exe2⤵PID:396
-
C:\Windows\SysWOW64\Lkdgqbag.exeC:\Windows\system32\Lkdgqbag.exe3⤵PID:1972
-
C:\Windows\SysWOW64\Lnccmnak.exeC:\Windows\system32\Lnccmnak.exe4⤵PID:7040
-
C:\Windows\SysWOW64\Ldmlih32.exeC:\Windows\system32\Ldmlih32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2900 -
C:\Windows\SysWOW64\Lgkhec32.exeC:\Windows\system32\Lgkhec32.exe6⤵PID:4392
-
C:\Windows\SysWOW64\Lpcmoi32.exeC:\Windows\system32\Lpcmoi32.exe7⤵PID:2364
-
C:\Windows\SysWOW64\Ldohogfe.exeC:\Windows\system32\Ldohogfe.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4880 -
C:\Windows\SysWOW64\Lkiqla32.exeC:\Windows\system32\Lkiqla32.exe9⤵PID:6932
-
C:\Windows\SysWOW64\Lacihleo.exeC:\Windows\system32\Lacihleo.exe10⤵
- Modifies registry class
PID:4104 -
C:\Windows\SysWOW64\Mkkmaalo.exeC:\Windows\system32\Mkkmaalo.exe11⤵PID:2252
-
C:\Windows\SysWOW64\Maefnk32.exeC:\Windows\system32\Maefnk32.exe12⤵PID:1388
-
C:\Windows\SysWOW64\Mcgbfcij.exeC:\Windows\system32\Mcgbfcij.exe13⤵PID:6172
-
C:\Windows\SysWOW64\Mgbnfb32.exeC:\Windows\system32\Mgbnfb32.exe14⤵PID:1932
-
C:\Windows\SysWOW64\Mdfopf32.exeC:\Windows\system32\Mdfopf32.exe15⤵PID:5284
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jookdcie.exeC:\Windows\system32\Jookdcie.exe6⤵PID:6088
-
C:\Windows\SysWOW64\Jcjgeb32.exeC:\Windows\system32\Jcjgeb32.exe7⤵PID:4564
-
C:\Windows\SysWOW64\Jeidan32.exeC:\Windows\system32\Jeidan32.exe8⤵PID:4948
-
C:\Windows\SysWOW64\Jgmjfpco.exeC:\Windows\system32\Jgmjfpco.exe9⤵PID:8376
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Mgdklb32.exeC:\Windows\system32\Mgdklb32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6224 -
C:\Windows\SysWOW64\Mjcghm32.exeC:\Windows\system32\Mjcghm32.exe2⤵PID:2936
-
C:\Windows\SysWOW64\Majoikof.exeC:\Windows\system32\Majoikof.exe3⤵PID:4324
-
C:\Windows\SysWOW64\Mdhkefnj.exeC:\Windows\system32\Mdhkefnj.exe4⤵PID:6040
-
C:\Windows\SysWOW64\Mkbcbp32.exeC:\Windows\system32\Mkbcbp32.exe5⤵
- Modifies registry class
PID:4016 -
C:\Windows\SysWOW64\Mallojmd.exeC:\Windows\system32\Mallojmd.exe6⤵PID:2904
-
C:\Windows\SysWOW64\Mcnhfb32.exeC:\Windows\system32\Mcnhfb32.exe7⤵PID:5856
-
C:\Windows\SysWOW64\Mkepgp32.exeC:\Windows\system32\Mkepgp32.exe8⤵PID:3852
-
C:\Windows\SysWOW64\Maohdj32.exeC:\Windows\system32\Maohdj32.exe9⤵PID:3180
-
C:\Windows\SysWOW64\Ndmepe32.exeC:\Windows\system32\Ndmepe32.exe10⤵PID:6260
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Nglala32.exeC:\Windows\system32\Nglala32.exe1⤵PID:3604
-
C:\Windows\SysWOW64\Njjmil32.exeC:\Windows\system32\Njjmil32.exe2⤵PID:7048
-
C:\Windows\SysWOW64\Naaejj32.exeC:\Windows\system32\Naaejj32.exe3⤵PID:5812
-
C:\Windows\SysWOW64\Ncbaabom.exeC:\Windows\system32\Ncbaabom.exe4⤵PID:2004
-
C:\Windows\SysWOW64\Njljnl32.exeC:\Windows\system32\Njljnl32.exe5⤵PID:6248
-
C:\Windows\SysWOW64\Nacboi32.exeC:\Windows\system32\Nacboi32.exe6⤵PID:1916
-
C:\Windows\SysWOW64\Nqfbkf32.exeC:\Windows\system32\Nqfbkf32.exe7⤵PID:3396
-
C:\Windows\SysWOW64\Ngpjgpec.exeC:\Windows\system32\Ngpjgpec.exe8⤵PID:6380
-
C:\Windows\SysWOW64\Njogdldg.exeC:\Windows\system32\Njogdldg.exe9⤵PID:6288
-
C:\Windows\SysWOW64\Nnjbdj32.exeC:\Windows\system32\Nnjbdj32.exe10⤵PID:6344
-
C:\Windows\SysWOW64\Nddkaddm.exeC:\Windows\system32\Nddkaddm.exe11⤵PID:1140
-
C:\Windows\SysWOW64\Ngbgmpcq.exeC:\Windows\system32\Ngbgmpcq.exe12⤵PID:5888
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Njacikbd.exeC:\Windows\system32\Njacikbd.exe1⤵PID:5968
-
C:\Windows\SysWOW64\Nbhkjicf.exeC:\Windows\system32\Nbhkjicf.exe2⤵PID:4960
-
C:\Windows\SysWOW64\Ndfgfd32.exeC:\Windows\system32\Ndfgfd32.exe3⤵PID:5456
-
C:\Windows\SysWOW64\Nkqpcnig.exeC:\Windows\system32\Nkqpcnig.exe4⤵PID:2124
-
C:\Windows\SysWOW64\Odidld32.exeC:\Windows\system32\Odidld32.exe5⤵PID:1276
-
C:\Windows\SysWOW64\Okeinn32.exeC:\Windows\system32\Okeinn32.exe6⤵PID:5464
-
C:\Windows\SysWOW64\Oqbagd32.exeC:\Windows\system32\Oqbagd32.exe7⤵PID:3888
-
C:\Windows\SysWOW64\Ocqncp32.exeC:\Windows\system32\Ocqncp32.exe8⤵PID:4188
-
C:\Windows\SysWOW64\Okgfdm32.exeC:\Windows\system32\Okgfdm32.exe9⤵PID:5556
-
C:\Windows\SysWOW64\Onfbpi32.exeC:\Windows\system32\Onfbpi32.exe10⤵PID:4212
-
C:\Windows\SysWOW64\Oqdnld32.exeC:\Windows\system32\Oqdnld32.exe11⤵PID:6600
-
C:\Windows\SysWOW64\Occkhp32.exeC:\Windows\system32\Occkhp32.exe12⤵PID:3768
-
C:\Windows\SysWOW64\Ognginic.exeC:\Windows\system32\Ognginic.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7108 -
C:\Windows\SysWOW64\Onhoehpp.exeC:\Windows\system32\Onhoehpp.exe14⤵PID:5416
-
C:\Windows\SysWOW64\Oqgkadod.exeC:\Windows\system32\Oqgkadod.exe15⤵
- Modifies registry class
PID:5980 -
C:\Windows\SysWOW64\Ocegnoog.exeC:\Windows\system32\Ocegnoog.exe16⤵PID:4896
-
C:\Windows\SysWOW64\Onklkhnn.exeC:\Windows\system32\Onklkhnn.exe17⤵PID:5540
-
C:\Windows\SysWOW64\Peddhb32.exeC:\Windows\system32\Peddhb32.exe18⤵PID:5436
-
C:\Windows\SysWOW64\Pkoldl32.exeC:\Windows\system32\Pkoldl32.exe19⤵PID:7084
-
C:\Windows\SysWOW64\Pnmhqh32.exeC:\Windows\system32\Pnmhqh32.exe20⤵PID:4696
-
C:\Windows\SysWOW64\Pegqmbch.exeC:\Windows\system32\Pegqmbch.exe21⤵PID:5944
-
C:\Windows\SysWOW64\Pgemimck.exeC:\Windows\system32\Pgemimck.exe22⤵
- Modifies registry class
PID:5696 -
C:\Windows\SysWOW64\Pjdifibo.exeC:\Windows\system32\Pjdifibo.exe23⤵
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\Pbkagfba.exeC:\Windows\system32\Pbkagfba.exe24⤵PID:4420
-
C:\Windows\SysWOW64\Pclnon32.exeC:\Windows\system32\Pclnon32.exe25⤵
- Modifies registry class
PID:5676 -
C:\Windows\SysWOW64\Pkcepl32.exeC:\Windows\system32\Pkcepl32.exe26⤵PID:5752
-
C:\Windows\SysWOW64\Pnaalghe.exeC:\Windows\system32\Pnaalghe.exe27⤵PID:3580
-
C:\Windows\SysWOW64\Papnhbgi.exeC:\Windows\system32\Papnhbgi.exe28⤵PID:1580
-
C:\Windows\SysWOW64\Peljha32.exeC:\Windows\system32\Peljha32.exe29⤵PID:3932
-
-
-
-
C:\Windows\SysWOW64\Inlibb32.exeC:\Windows\system32\Inlibb32.exe27⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\Iloimopp.exeC:\Windows\system32\Iloimopp.exe28⤵PID:5256
-
C:\Windows\SysWOW64\Idfaolpb.exeC:\Windows\system32\Idfaolpb.exe29⤵PID:3952
-
C:\Windows\SysWOW64\Iciaji32.exeC:\Windows\system32\Iciaji32.exe30⤵PID:3856
-
C:\Windows\SysWOW64\Ikpjkf32.exeC:\Windows\system32\Ikpjkf32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:9892 -
C:\Windows\SysWOW64\Innfgb32.exeC:\Windows\system32\Innfgb32.exe32⤵PID:5268
-
C:\Windows\SysWOW64\Ipmbcm32.exeC:\Windows\system32\Ipmbcm32.exe33⤵PID:6604
-
C:\Windows\SysWOW64\Jkbfafel.exeC:\Windows\system32\Jkbfafel.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6096 -
C:\Windows\SysWOW64\Jnqbmadp.exeC:\Windows\system32\Jnqbmadp.exe35⤵PID:9956
-
C:\Windows\SysWOW64\Jlcchn32.exeC:\Windows\system32\Jlcchn32.exe36⤵
- Modifies registry class
PID:4844 -
C:\Windows\SysWOW64\Jdkkjl32.exeC:\Windows\system32\Jdkkjl32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:832 -
C:\Windows\SysWOW64\Jkdcffci.exeC:\Windows\system32\Jkdcffci.exe38⤵PID:5412
-
C:\Windows\SysWOW64\Jjgcbb32.exeC:\Windows\system32\Jjgcbb32.exe39⤵PID:6252
-
C:\Windows\SysWOW64\Jlfpnn32.exeC:\Windows\system32\Jlfpnn32.exe40⤵PID:836
-
C:\Windows\SysWOW64\Jdmgok32.exeC:\Windows\system32\Jdmgok32.exe41⤵PID:6436
-
C:\Windows\SysWOW64\Jcphkhad.exeC:\Windows\system32\Jcphkhad.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2864 -
C:\Windows\SysWOW64\Jkgpleaf.exeC:\Windows\system32\Jkgpleaf.exe43⤵PID:5952
-
C:\Windows\SysWOW64\Jjjpgb32.exeC:\Windows\system32\Jjjpgb32.exe44⤵
- Modifies registry class
PID:3552 -
C:\Windows\SysWOW64\Jlhlcnge.exeC:\Windows\system32\Jlhlcnge.exe45⤵PID:6488
-
C:\Windows\SysWOW64\Jdodekhg.exeC:\Windows\system32\Jdodekhg.exe46⤵PID:6372
-
C:\Windows\SysWOW64\Jcbdph32.exeC:\Windows\system32\Jcbdph32.exe47⤵
- Modifies registry class
PID:7156 -
C:\Windows\SysWOW64\Jgnqafgk.exeC:\Windows\system32\Jgnqafgk.exe48⤵PID:4296
-
C:\Windows\SysWOW64\Jnhinq32.exeC:\Windows\system32\Jnhinq32.exe49⤵
- Modifies registry class
PID:6404 -
C:\Windows\SysWOW64\Jqfejl32.exeC:\Windows\system32\Jqfejl32.exe50⤵PID:9276
-
C:\Windows\SysWOW64\Jcdafg32.exeC:\Windows\system32\Jcdafg32.exe51⤵PID:9320
-
C:\Windows\SysWOW64\Jkligd32.exeC:\Windows\system32\Jkligd32.exe52⤵PID:3096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Pgjfdm32.exeC:\Windows\system32\Pgjfdm32.exe1⤵PID:3044
-
C:\Windows\SysWOW64\Pndoagfc.exeC:\Windows\system32\Pndoagfc.exe2⤵PID:1944
-
C:\Windows\SysWOW64\Pabknbef.exeC:\Windows\system32\Pabknbef.exe3⤵
- Modifies registry class
PID:3568 -
C:\Windows\SysWOW64\Pcagjndj.exeC:\Windows\system32\Pcagjndj.exe4⤵PID:6748
-
C:\Windows\SysWOW64\Pkhokkel.exeC:\Windows\system32\Pkhokkel.exe5⤵PID:3088
-
C:\Windows\SysWOW64\Qbbggeli.exeC:\Windows\system32\Qbbggeli.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5160 -
C:\Windows\SysWOW64\Qgopplkq.exeC:\Windows\system32\Qgopplkq.exe7⤵PID:2972
-
C:\Windows\SysWOW64\Qnihlf32.exeC:\Windows\system32\Qnihlf32.exe8⤵PID:6216
-
C:\Windows\SysWOW64\Qagdia32.exeC:\Windows\system32\Qagdia32.exe9⤵PID:6128
-
C:\Windows\SysWOW64\Qcepem32.exeC:\Windows\system32\Qcepem32.exe10⤵PID:5268
-
C:\Windows\SysWOW64\Qlmhfj32.exeC:\Windows\system32\Qlmhfj32.exe11⤵PID:4824
-
C:\Windows\SysWOW64\Abfqbdhd.exeC:\Windows\system32\Abfqbdhd.exe12⤵PID:6812
-
C:\Windows\SysWOW64\Agcikk32.exeC:\Windows\system32\Agcikk32.exe13⤵PID:6756
-
C:\Windows\SysWOW64\Ajbegg32.exeC:\Windows\system32\Ajbegg32.exe14⤵PID:3924
-
C:\Windows\SysWOW64\Abimhd32.exeC:\Windows\system32\Abimhd32.exe15⤵PID:5312
-
C:\Windows\SysWOW64\Alaaajmb.exeC:\Windows\system32\Alaaajmb.exe16⤵PID:6456
-
C:\Windows\SysWOW64\Anpnmele.exeC:\Windows\system32\Anpnmele.exe17⤵PID:832
-
C:\Windows\SysWOW64\Ahhbfkbf.exeC:\Windows\system32\Ahhbfkbf.exe18⤵PID:5716
-
C:\Windows\SysWOW64\Ajfobfaj.exeC:\Windows\system32\Ajfobfaj.exe19⤵PID:6724
-
C:\Windows\SysWOW64\Adockl32.exeC:\Windows\system32\Adockl32.exe20⤵PID:5412
-
C:\Windows\SysWOW64\Alfkli32.exeC:\Windows\system32\Alfkli32.exe21⤵
- Drops file in System32 directory
PID:6116 -
C:\Windows\SysWOW64\Aenpeoom.exeC:\Windows\system32\Aenpeoom.exe22⤵PID:5804
-
C:\Windows\SysWOW64\Adapqk32.exeC:\Windows\system32\Adapqk32.exe23⤵PID:6232
-
C:\Windows\SysWOW64\Beqljn32.exeC:\Windows\system32\Beqljn32.exe24⤵PID:4224
-
C:\Windows\SysWOW64\Bdcmfkde.exeC:\Windows\system32\Bdcmfkde.exe25⤵PID:6004
-
C:\Windows\SysWOW64\Bjnece32.exeC:\Windows\system32\Bjnece32.exe26⤵PID:5560
-
C:\Windows\SysWOW64\Bhaeli32.exeC:\Windows\system32\Bhaeli32.exe27⤵PID:6956
-
C:\Windows\SysWOW64\Bjpaheio.exeC:\Windows\system32\Bjpaheio.exe28⤵PID:1320
-
C:\Windows\SysWOW64\Bdhfaj32.exeC:\Windows\system32\Bdhfaj32.exe29⤵
- Drops file in System32 directory
PID:3860 -
C:\Windows\SysWOW64\Bjbnndgl.exeC:\Windows\system32\Bjbnndgl.exe30⤵
- Drops file in System32 directory
PID:6404 -
C:\Windows\SysWOW64\Balfko32.exeC:\Windows\system32\Balfko32.exe31⤵PID:2608
-
C:\Windows\SysWOW64\Bdkbgj32.exeC:\Windows\system32\Bdkbgj32.exe32⤵
- Drops file in System32 directory
PID:6852 -
C:\Windows\SysWOW64\Bjdkcd32.exeC:\Windows\system32\Bjdkcd32.exe33⤵PID:5392
-
C:\Windows\SysWOW64\Baocpnmf.exeC:\Windows\system32\Baocpnmf.exe34⤵PID:3096
-
C:\Windows\SysWOW64\Bdmpljlj.exeC:\Windows\system32\Bdmpljlj.exe35⤵PID:6204
-
C:\Windows\SysWOW64\Ckghid32.exeC:\Windows\system32\Ckghid32.exe36⤵
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\Cdolbijg.exeC:\Windows\system32\Cdolbijg.exe37⤵PID:5548
-
C:\Windows\SysWOW64\Ceoillaj.exeC:\Windows\system32\Ceoillaj.exe38⤵PID:6720
-
C:\Windows\SysWOW64\Ckladcoa.exeC:\Windows\system32\Ckladcoa.exe39⤵PID:7208
-
C:\Windows\SysWOW64\Ceaealoh.exeC:\Windows\system32\Ceaealoh.exe40⤵PID:7252
-
C:\Windows\SysWOW64\Clknnf32.exeC:\Windows\system32\Clknnf32.exe41⤵
- Modifies registry class
PID:7296 -
C:\Windows\SysWOW64\Cbefkp32.exeC:\Windows\system32\Cbefkp32.exe42⤵PID:7340
-
C:\Windows\SysWOW64\Clmjcfdb.exeC:\Windows\system32\Clmjcfdb.exe43⤵PID:7380
-
C:\Windows\SysWOW64\Cbgbpp32.exeC:\Windows\system32\Cbgbpp32.exe44⤵PID:7424
-
C:\Windows\SysWOW64\Dhdkig32.exeC:\Windows\system32\Dhdkig32.exe45⤵PID:7464
-
C:\Windows\SysWOW64\Donceaac.exeC:\Windows\system32\Donceaac.exe46⤵
- Modifies registry class
PID:7508 -
C:\Windows\SysWOW64\Dhfhnfhc.exeC:\Windows\system32\Dhfhnfhc.exe47⤵PID:7548
-
C:\Windows\SysWOW64\Dejhgkgm.exeC:\Windows\system32\Dejhgkgm.exe48⤵PID:7600
-
C:\Windows\SysWOW64\Ecjhmm32.exeC:\Windows\system32\Ecjhmm32.exe49⤵PID:7644
-
C:\Windows\SysWOW64\Edkddeag.exeC:\Windows\system32\Edkddeag.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:7684 -
C:\Windows\SysWOW64\Elbmebbj.exeC:\Windows\system32\Elbmebbj.exe51⤵PID:7736
-
C:\Windows\SysWOW64\Eoaianan.exeC:\Windows\system32\Eoaianan.exe52⤵PID:7776
-
C:\Windows\SysWOW64\Eaoenjqa.exeC:\Windows\system32\Eaoenjqa.exe53⤵PID:7816
-
C:\Windows\SysWOW64\Eekanh32.exeC:\Windows\system32\Eekanh32.exe54⤵PID:7856
-
C:\Windows\SysWOW64\Ehimkd32.exeC:\Windows\system32\Ehimkd32.exe55⤵PID:7908
-
C:\Windows\SysWOW64\Ekhjgoga.exeC:\Windows\system32\Ekhjgoga.exe56⤵PID:7956
-
C:\Windows\SysWOW64\Eaabci32.exeC:\Windows\system32\Eaabci32.exe57⤵PID:8008
-
C:\Windows\SysWOW64\Femndhgh.exeC:\Windows\system32\Femndhgh.exe58⤵PID:8056
-
C:\Windows\SysWOW64\Fhljpcfk.exeC:\Windows\system32\Fhljpcfk.exe59⤵PID:8100
-
C:\Windows\SysWOW64\Fkjfloeo.exeC:\Windows\system32\Fkjfloeo.exe60⤵PID:8140
-
C:\Windows\SysWOW64\Fcanmlea.exeC:\Windows\system32\Fcanmlea.exe61⤵PID:2008
-
C:\Windows\SysWOW64\Ffpjihee.exeC:\Windows\system32\Ffpjihee.exe62⤵PID:7216
-
C:\Windows\SysWOW64\Fcckcl32.exeC:\Windows\system32\Fcckcl32.exe63⤵PID:7280
-
C:\Windows\SysWOW64\Fhpckb32.exeC:\Windows\system32\Fhpckb32.exe64⤵PID:7372
-
C:\Windows\SysWOW64\Fkalmn32.exeC:\Windows\system32\Fkalmn32.exe65⤵
- Drops file in System32 directory
PID:7416 -
C:\Windows\SysWOW64\Fbkdjh32.exeC:\Windows\system32\Fbkdjh32.exe66⤵PID:7504
-
C:\Windows\SysWOW64\Fdiafc32.exeC:\Windows\system32\Fdiafc32.exe67⤵PID:7560
-
C:\Windows\SysWOW64\Flqigq32.exeC:\Windows\system32\Flqigq32.exe68⤵PID:7636
-
C:\Windows\SysWOW64\Fooecl32.exeC:\Windows\system32\Fooecl32.exe69⤵PID:7704
-
C:\Windows\SysWOW64\Gbmaog32.exeC:\Windows\system32\Gbmaog32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:7756 -
C:\Windows\SysWOW64\Gdlnkc32.exeC:\Windows\system32\Gdlnkc32.exe71⤵PID:7848
-
C:\Windows\SysWOW64\Goabhl32.exeC:\Windows\system32\Goabhl32.exe72⤵PID:7920
-
C:\Windows\SysWOW64\Gfkjef32.exeC:\Windows\system32\Gfkjef32.exe73⤵PID:7992
-
C:\Windows\SysWOW64\Goconkah.exeC:\Windows\system32\Goconkah.exe74⤵PID:8048
-
C:\Windows\SysWOW64\Gbbkjgpl.exeC:\Windows\system32\Gbbkjgpl.exe75⤵PID:8108
-
C:\Windows\SysWOW64\Ghlcga32.exeC:\Windows\system32\Ghlcga32.exe76⤵PID:8184
-
C:\Windows\SysWOW64\Gofkckoe.exeC:\Windows\system32\Gofkckoe.exe77⤵PID:7232
-
C:\Windows\SysWOW64\Gbdgpfni.exeC:\Windows\system32\Gbdgpfni.exe78⤵
- Modifies registry class
PID:6484 -
C:\Windows\SysWOW64\Gmjlmo32.exeC:\Windows\system32\Gmjlmo32.exe79⤵PID:7388
-
C:\Windows\SysWOW64\Gohhik32.exeC:\Windows\system32\Gohhik32.exe80⤵
- Drops file in System32 directory
PID:7516 -
C:\Windows\SysWOW64\Hicihp32.exeC:\Windows\system32\Hicihp32.exe81⤵PID:2836
-
C:\Windows\SysWOW64\Hkaedk32.exeC:\Windows\system32\Hkaedk32.exe82⤵PID:7732
-
C:\Windows\SysWOW64\Hcimei32.exeC:\Windows\system32\Hcimei32.exe83⤵PID:7800
-
C:\Windows\SysWOW64\Hfgjad32.exeC:\Windows\system32\Hfgjad32.exe84⤵PID:7916
-
C:\Windows\SysWOW64\Hiefmp32.exeC:\Windows\system32\Hiefmp32.exe85⤵PID:8016
-
C:\Windows\SysWOW64\Hckjjh32.exeC:\Windows\system32\Hckjjh32.exe86⤵PID:8092
-
C:\Windows\SysWOW64\Hfiffd32.exeC:\Windows\system32\Hfiffd32.exe87⤵PID:6420
-
C:\Windows\SysWOW64\Helfbqeb.exeC:\Windows\system32\Helfbqeb.exe88⤵PID:7308
-
C:\Windows\SysWOW64\Hoakpi32.exeC:\Windows\system32\Hoakpi32.exe89⤵PID:7436
-
C:\Windows\SysWOW64\Hbpgle32.exeC:\Windows\system32\Hbpgle32.exe90⤵
- Modifies registry class
PID:7612 -
C:\Windows\SysWOW64\Hkhkdjkl.exeC:\Windows\system32\Hkhkdjkl.exe91⤵PID:7748
-
C:\Windows\SysWOW64\Hbbdad32.exeC:\Windows\system32\Hbbdad32.exe92⤵PID:7972
-
C:\Windows\SysWOW64\Meknhh32.exeC:\Windows\system32\Meknhh32.exe93⤵PID:8176
-
C:\Windows\SysWOW64\Nlefebfg.exeC:\Windows\system32\Nlefebfg.exe94⤵PID:7324
-
C:\Windows\SysWOW64\Ndmnfofi.exeC:\Windows\system32\Ndmnfofi.exe95⤵PID:840
-
C:\Windows\SysWOW64\Ngkjbkem.exeC:\Windows\system32\Ngkjbkem.exe96⤵PID:7744
-
C:\Windows\SysWOW64\Niifnf32.exeC:\Windows\system32\Niifnf32.exe97⤵
- Drops file in System32 directory
PID:5840 -
C:\Windows\SysWOW64\Nlhbja32.exeC:\Windows\system32\Nlhbja32.exe98⤵
- Modifies registry class
PID:8084 -
C:\Windows\SysWOW64\Njlcdf32.exeC:\Windows\system32\Njlcdf32.exe99⤵PID:8040
-
C:\Windows\SysWOW64\Ndagao32.exeC:\Windows\system32\Ndagao32.exe100⤵PID:7368
-
C:\Windows\SysWOW64\Nebdighb.exeC:\Windows\system32\Nebdighb.exe101⤵PID:7760
-
C:\Windows\SysWOW64\Nphhfp32.exeC:\Windows\system32\Nphhfp32.exe102⤵PID:5940
-
C:\Windows\SysWOW64\Ncfdbk32.exeC:\Windows\system32\Ncfdbk32.exe103⤵PID:2844
-
C:\Windows\SysWOW64\Nfeqnf32.exeC:\Windows\system32\Nfeqnf32.exe104⤵PID:7444
-
C:\Windows\SysWOW64\Npjelo32.exeC:\Windows\system32\Npjelo32.exe105⤵PID:6708
-
C:\Windows\SysWOW64\Ofgmdf32.exeC:\Windows\system32\Ofgmdf32.exe106⤵PID:8124
-
C:\Windows\SysWOW64\Onneeceo.exeC:\Windows\system32\Onneeceo.exe107⤵
- Modifies registry class
PID:6496 -
C:\Windows\SysWOW64\Oncopcqj.exeC:\Windows\system32\Oncopcqj.exe108⤵PID:4804
-
C:\Windows\SysWOW64\Odmgmmhf.exeC:\Windows\system32\Odmgmmhf.exe109⤵
- Modifies registry class
PID:7640 -
C:\Windows\SysWOW64\Ocpghj32.exeC:\Windows\system32\Ocpghj32.exe110⤵PID:4216
-
C:\Windows\SysWOW64\Olhlaoea.exeC:\Windows\system32\Olhlaoea.exe111⤵
- Modifies registry class
PID:7528 -
C:\Windows\SysWOW64\Ocbdni32.exeC:\Windows\system32\Ocbdni32.exe112⤵PID:7728
-
C:\Windows\SysWOW64\Ocdqcikl.exeC:\Windows\system32\Ocdqcikl.exe113⤵PID:8200
-
C:\Windows\SysWOW64\Pqhammje.exeC:\Windows\system32\Pqhammje.exe114⤵
- Drops file in System32 directory
PID:8244 -
C:\Windows\SysWOW64\Pjaefc32.exeC:\Windows\system32\Pjaefc32.exe115⤵
- Drops file in System32 directory
PID:8288 -
C:\Windows\SysWOW64\Pqknbmhc.exeC:\Windows\system32\Pqknbmhc.exe116⤵PID:8344
-
C:\Windows\SysWOW64\Pjcbkbnc.exeC:\Windows\system32\Pjcbkbnc.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:8384 -
C:\Windows\SysWOW64\Pqmjhm32.exeC:\Windows\system32\Pqmjhm32.exe118⤵PID:8428
-
C:\Windows\SysWOW64\Pggbdgmm.exeC:\Windows\system32\Pggbdgmm.exe119⤵PID:8472
-
C:\Windows\SysWOW64\Pgiojf32.exeC:\Windows\system32\Pgiojf32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:8516 -
C:\Windows\SysWOW64\Pmfhbm32.exeC:\Windows\system32\Pmfhbm32.exe121⤵PID:8564
-
C:\Windows\SysWOW64\Qjjhla32.exeC:\Windows\system32\Qjjhla32.exe122⤵PID:8608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-