Analysis

  • max time kernel
    114s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 03:33

General

  • Target

    5963ec7e09fee3c12b1c9e18cbf3e740N.exe

  • Size

    64KB

  • MD5

    5963ec7e09fee3c12b1c9e18cbf3e740

  • SHA1

    de09511af1b8f8084591643e94ad693ded410d21

  • SHA256

    cf00a699ee1856379ab98ffd173b5a94e709a52e9f4223c793eda1ddab219354

  • SHA512

    c75159d32814aba77eedf9c90ca3397db3a7bdbe781699e3cb69c4c39832f04068e24d3307e2d2cf3f1c9cd5a362a7bc0ad545674c7bb5b4a690d925211abd9b

  • SSDEEP

    1536:FK09E0eVka4taAjGxrAKcfAk/6rXOgyzgNtn:F19E0eaaLAXKcYkuozgL

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5963ec7e09fee3c12b1c9e18cbf3e740N.exe
    "C:\Users\Admin\AppData\Local\Temp\5963ec7e09fee3c12b1c9e18cbf3e740N.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Windows\SysWOW64\Iagqgn32.exe
      C:\Windows\system32\Iagqgn32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3372
      • C:\Windows\SysWOW64\Ihaidhgf.exe
        C:\Windows\system32\Ihaidhgf.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4412
        • C:\Windows\SysWOW64\Ilmedf32.exe
          C:\Windows\system32\Ilmedf32.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3344
          • C:\Windows\SysWOW64\Ibgmaqfl.exe
            C:\Windows\system32\Ibgmaqfl.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4844
            • C:\Windows\SysWOW64\Idhiii32.exe
              C:\Windows\system32\Idhiii32.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3672
              • C:\Windows\SysWOW64\Ihceigec.exe
                C:\Windows\system32\Ihceigec.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1196
                • C:\Windows\SysWOW64\Ijbbfc32.exe
                  C:\Windows\system32\Ijbbfc32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:544
                  • C:\Windows\SysWOW64\Jnnnfalp.exe
                    C:\Windows\system32\Jnnnfalp.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4740
                    • C:\Windows\SysWOW64\Jdjfohjg.exe
                      C:\Windows\system32\Jdjfohjg.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:4560
                      • C:\Windows\SysWOW64\Jnpjlajn.exe
                        C:\Windows\system32\Jnpjlajn.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1128
                        • C:\Windows\SysWOW64\Jdmcdhhe.exe
                          C:\Windows\system32\Jdmcdhhe.exe
                          12⤵
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:3444
                          • C:\Windows\SysWOW64\Jldkeeig.exe
                            C:\Windows\system32\Jldkeeig.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4928
                            • C:\Windows\SysWOW64\Jbncbpqd.exe
                              C:\Windows\system32\Jbncbpqd.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:1864
                              • C:\Windows\SysWOW64\Jdopjh32.exe
                                C:\Windows\system32\Jdopjh32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:3652
                                • C:\Windows\SysWOW64\Jhkljfok.exe
                                  C:\Windows\system32\Jhkljfok.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:3340
                                  • C:\Windows\SysWOW64\Jnedgq32.exe
                                    C:\Windows\system32\Jnedgq32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:3232
                                    • C:\Windows\SysWOW64\Jeolckne.exe
                                      C:\Windows\system32\Jeolckne.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:2580
                                      • C:\Windows\SysWOW64\Jjkdlall.exe
                                        C:\Windows\system32\Jjkdlall.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:4788
                                        • C:\Windows\SysWOW64\Jaemilci.exe
                                          C:\Windows\system32\Jaemilci.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:2080
                                          • C:\Windows\SysWOW64\Jddiegbm.exe
                                            C:\Windows\system32\Jddiegbm.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:512
                                            • C:\Windows\SysWOW64\Koimbpbc.exe
                                              C:\Windows\system32\Koimbpbc.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of WriteProcessMemory
                                              PID:2668
                                              • C:\Windows\SysWOW64\Kbeibo32.exe
                                                C:\Windows\system32\Kbeibo32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:3280
                                                • C:\Windows\SysWOW64\Keceoj32.exe
                                                  C:\Windows\system32\Keceoj32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:1100
                                                  • C:\Windows\SysWOW64\Klmnkdal.exe
                                                    C:\Windows\system32\Klmnkdal.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3316
                                                    • C:\Windows\SysWOW64\Kbgfhnhi.exe
                                                      C:\Windows\system32\Kbgfhnhi.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:1836
                                                      • C:\Windows\SysWOW64\Kdhbpf32.exe
                                                        C:\Windows\system32\Kdhbpf32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies registry class
                                                        PID:3676
                                                        • C:\Windows\SysWOW64\Kkbkmqed.exe
                                                          C:\Windows\system32\Kkbkmqed.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          PID:3044
                                                          • C:\Windows\SysWOW64\Kbjbnnfg.exe
                                                            C:\Windows\system32\Kbjbnnfg.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            PID:4816
                                                            • C:\Windows\SysWOW64\Kdkoef32.exe
                                                              C:\Windows\system32\Kdkoef32.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:2504
                                                              • C:\Windows\SysWOW64\Kopcbo32.exe
                                                                C:\Windows\system32\Kopcbo32.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2996
                                                                • C:\Windows\SysWOW64\Kejloi32.exe
                                                                  C:\Windows\system32\Kejloi32.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:1436
                                                                  • C:\Windows\SysWOW64\Khihld32.exe
                                                                    C:\Windows\system32\Khihld32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3816
                                                                    • C:\Windows\SysWOW64\Kocphojh.exe
                                                                      C:\Windows\system32\Kocphojh.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:4524
                                                                      • C:\Windows\SysWOW64\Kaaldjil.exe
                                                                        C:\Windows\system32\Kaaldjil.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:1448
                                                                        • C:\Windows\SysWOW64\Kdpiqehp.exe
                                                                          C:\Windows\system32\Kdpiqehp.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3724
                                                                          • C:\Windows\SysWOW64\Klgqabib.exe
                                                                            C:\Windows\system32\Klgqabib.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:4064
                                                                            • C:\Windows\SysWOW64\Lbqinm32.exe
                                                                              C:\Windows\system32\Lbqinm32.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2652
                                                                              • C:\Windows\SysWOW64\Lacijjgi.exe
                                                                                C:\Windows\system32\Lacijjgi.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:3480
                                                                                • C:\Windows\SysWOW64\Ldbefe32.exe
                                                                                  C:\Windows\system32\Ldbefe32.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:876
                                                                                  • C:\Windows\SysWOW64\Llimgb32.exe
                                                                                    C:\Windows\system32\Llimgb32.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Modifies registry class
                                                                                    PID:2632
                                                                                    • C:\Windows\SysWOW64\Logicn32.exe
                                                                                      C:\Windows\system32\Logicn32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      PID:4344
                                                                                      • C:\Windows\SysWOW64\Lbcedmnl.exe
                                                                                        C:\Windows\system32\Lbcedmnl.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:4284
                                                                                        • C:\Windows\SysWOW64\Lddble32.exe
                                                                                          C:\Windows\system32\Lddble32.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          PID:3236
                                                                                          • C:\Windows\SysWOW64\Llkjmb32.exe
                                                                                            C:\Windows\system32\Llkjmb32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:2092
                                                                                            • C:\Windows\SysWOW64\Lojfin32.exe
                                                                                              C:\Windows\system32\Lojfin32.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              PID:3440
                                                                                              • C:\Windows\SysWOW64\Ledoegkm.exe
                                                                                                C:\Windows\system32\Ledoegkm.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:884
                                                                                                • C:\Windows\SysWOW64\Lhbkac32.exe
                                                                                                  C:\Windows\system32\Lhbkac32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4888
                                                                                                  • C:\Windows\SysWOW64\Lkqgno32.exe
                                                                                                    C:\Windows\system32\Lkqgno32.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:2116
                                                                                                    • C:\Windows\SysWOW64\Lajokiaa.exe
                                                                                                      C:\Windows\system32\Lajokiaa.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Modifies registry class
                                                                                                      PID:3512
                                                                                                      • C:\Windows\SysWOW64\Llpchaqg.exe
                                                                                                        C:\Windows\system32\Llpchaqg.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        PID:4600
                                                                                                        • C:\Windows\SysWOW64\Lamlphoo.exe
                                                                                                          C:\Windows\system32\Lamlphoo.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:1396
                                                                                                          • C:\Windows\SysWOW64\Moalil32.exe
                                                                                                            C:\Windows\system32\Moalil32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:5052
                                                                                                            • C:\Windows\SysWOW64\Mkgmoncl.exe
                                                                                                              C:\Windows\system32\Mkgmoncl.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:1148
                                                                                                              • C:\Windows\SysWOW64\Mcoepkdo.exe
                                                                                                                C:\Windows\system32\Mcoepkdo.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Modifies registry class
                                                                                                                PID:1332
                                                                                                                • C:\Windows\SysWOW64\Moefdljc.exe
                                                                                                                  C:\Windows\system32\Moefdljc.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:1188
                                                                                                                  • C:\Windows\SysWOW64\Madbagif.exe
                                                                                                                    C:\Windows\system32\Madbagif.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Modifies registry class
                                                                                                                    PID:1400
                                                                                                                    • C:\Windows\SysWOW64\Mhnjna32.exe
                                                                                                                      C:\Windows\system32\Mhnjna32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:536
                                                                                                                      • C:\Windows\SysWOW64\Mohbjkgp.exe
                                                                                                                        C:\Windows\system32\Mohbjkgp.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:4580
                                                                                                                        • C:\Windows\SysWOW64\Mafofggd.exe
                                                                                                                          C:\Windows\system32\Mafofggd.exe
                                                                                                                          60⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:1756
                                                                                                                          • C:\Windows\SysWOW64\Mhpgca32.exe
                                                                                                                            C:\Windows\system32\Mhpgca32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:3764
                                                                                                                            • C:\Windows\SysWOW64\Mcfkpjng.exe
                                                                                                                              C:\Windows\system32\Mcfkpjng.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies registry class
                                                                                                                              PID:3208
                                                                                                                              • C:\Windows\SysWOW64\Mdghhb32.exe
                                                                                                                                C:\Windows\system32\Mdghhb32.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                PID:4996
                                                                                                                                • C:\Windows\SysWOW64\Nlnpio32.exe
                                                                                                                                  C:\Windows\system32\Nlnpio32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:3956
                                                                                                                                  • C:\Windows\SysWOW64\Nomlek32.exe
                                                                                                                                    C:\Windows\system32\Nomlek32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:3332
                                                                                                                                    • C:\Windows\SysWOW64\Nakhaf32.exe
                                                                                                                                      C:\Windows\system32\Nakhaf32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:1892
                                                                                                                                      • C:\Windows\SysWOW64\Nheqnpjk.exe
                                                                                                                                        C:\Windows\system32\Nheqnpjk.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:2876
                                                                                                                                        • C:\Windows\SysWOW64\Nooikj32.exe
                                                                                                                                          C:\Windows\system32\Nooikj32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:3064
                                                                                                                                          • C:\Windows\SysWOW64\Nkeipk32.exe
                                                                                                                                            C:\Windows\system32\Nkeipk32.exe
                                                                                                                                            69⤵
                                                                                                                                              PID:5128
                                                                                                                                              • C:\Windows\SysWOW64\Ncmaai32.exe
                                                                                                                                                C:\Windows\system32\Ncmaai32.exe
                                                                                                                                                70⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                PID:5168
                                                                                                                                                • C:\Windows\SysWOW64\Nfknmd32.exe
                                                                                                                                                  C:\Windows\system32\Nfknmd32.exe
                                                                                                                                                  71⤵
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  PID:5208
                                                                                                                                                  • C:\Windows\SysWOW64\Nkhfek32.exe
                                                                                                                                                    C:\Windows\system32\Nkhfek32.exe
                                                                                                                                                    72⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:5256
                                                                                                                                                    • C:\Windows\SysWOW64\Nbbnbemf.exe
                                                                                                                                                      C:\Windows\system32\Nbbnbemf.exe
                                                                                                                                                      73⤵
                                                                                                                                                        PID:5296
                                                                                                                                                        • C:\Windows\SysWOW64\Nfnjbdep.exe
                                                                                                                                                          C:\Windows\system32\Nfnjbdep.exe
                                                                                                                                                          74⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:5336
                                                                                                                                                          • C:\Windows\SysWOW64\Nhlfoodc.exe
                                                                                                                                                            C:\Windows\system32\Nhlfoodc.exe
                                                                                                                                                            75⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:5376
                                                                                                                                                            • C:\Windows\SysWOW64\Nkjckkcg.exe
                                                                                                                                                              C:\Windows\system32\Nkjckkcg.exe
                                                                                                                                                              76⤵
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:5420
                                                                                                                                                              • C:\Windows\SysWOW64\Nfpghccm.exe
                                                                                                                                                                C:\Windows\system32\Nfpghccm.exe
                                                                                                                                                                77⤵
                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                PID:5460
                                                                                                                                                                • C:\Windows\SysWOW64\Oljoen32.exe
                                                                                                                                                                  C:\Windows\system32\Oljoen32.exe
                                                                                                                                                                  78⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:5500
                                                                                                                                                                  • C:\Windows\SysWOW64\Obfhmd32.exe
                                                                                                                                                                    C:\Windows\system32\Obfhmd32.exe
                                                                                                                                                                    79⤵
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:5540
                                                                                                                                                                    • C:\Windows\SysWOW64\Odedipge.exe
                                                                                                                                                                      C:\Windows\system32\Odedipge.exe
                                                                                                                                                                      80⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:5580
                                                                                                                                                                      • C:\Windows\SysWOW64\Okolfj32.exe
                                                                                                                                                                        C:\Windows\system32\Okolfj32.exe
                                                                                                                                                                        81⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:5624
                                                                                                                                                                        • C:\Windows\SysWOW64\Oloipmfd.exe
                                                                                                                                                                          C:\Windows\system32\Oloipmfd.exe
                                                                                                                                                                          82⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:5664
                                                                                                                                                                          • C:\Windows\SysWOW64\Ofgmib32.exe
                                                                                                                                                                            C:\Windows\system32\Ofgmib32.exe
                                                                                                                                                                            83⤵
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:5708
                                                                                                                                                                            • C:\Windows\SysWOW64\Okceaikl.exe
                                                                                                                                                                              C:\Windows\system32\Okceaikl.exe
                                                                                                                                                                              84⤵
                                                                                                                                                                                PID:5748
                                                                                                                                                                                • C:\Windows\SysWOW64\Odljjo32.exe
                                                                                                                                                                                  C:\Windows\system32\Odljjo32.exe
                                                                                                                                                                                  85⤵
                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:5792
                                                                                                                                                                                  • C:\Windows\SysWOW64\Ocmjhfjl.exe
                                                                                                                                                                                    C:\Windows\system32\Ocmjhfjl.exe
                                                                                                                                                                                    86⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    PID:5836
                                                                                                                                                                                    • C:\Windows\SysWOW64\Oflfdbip.exe
                                                                                                                                                                                      C:\Windows\system32\Oflfdbip.exe
                                                                                                                                                                                      87⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:5880
                                                                                                                                                                                      • C:\Windows\SysWOW64\Pkholi32.exe
                                                                                                                                                                                        C:\Windows\system32\Pkholi32.exe
                                                                                                                                                                                        88⤵
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        PID:5920
                                                                                                                                                                                        • C:\Windows\SysWOW64\Pfncia32.exe
                                                                                                                                                                                          C:\Windows\system32\Pfncia32.exe
                                                                                                                                                                                          89⤵
                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5960
                                                                                                                                                                                          • C:\Windows\SysWOW64\Pkklbh32.exe
                                                                                                                                                                                            C:\Windows\system32\Pkklbh32.exe
                                                                                                                                                                                            90⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            PID:6004
                                                                                                                                                                                            • C:\Windows\SysWOW64\Pbddobla.exe
                                                                                                                                                                                              C:\Windows\system32\Pbddobla.exe
                                                                                                                                                                                              91⤵
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              PID:6052
                                                                                                                                                                                              • C:\Windows\SysWOW64\Pecpknke.exe
                                                                                                                                                                                                C:\Windows\system32\Pecpknke.exe
                                                                                                                                                                                                92⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:6088
                                                                                                                                                                                                • C:\Windows\SysWOW64\Poidhg32.exe
                                                                                                                                                                                                  C:\Windows\system32\Poidhg32.exe
                                                                                                                                                                                                  93⤵
                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  PID:6140
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Pbgqdb32.exe
                                                                                                                                                                                                    C:\Windows\system32\Pbgqdb32.exe
                                                                                                                                                                                                    94⤵
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    PID:5176
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Pmmeak32.exe
                                                                                                                                                                                                      C:\Windows\system32\Pmmeak32.exe
                                                                                                                                                                                                      95⤵
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:5244
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Pcfmneaa.exe
                                                                                                                                                                                                        C:\Windows\system32\Pcfmneaa.exe
                                                                                                                                                                                                        96⤵
                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:5316
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Pfeijqqe.exe
                                                                                                                                                                                                          C:\Windows\system32\Pfeijqqe.exe
                                                                                                                                                                                                          97⤵
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:5416
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Pcijce32.exe
                                                                                                                                                                                                            C:\Windows\system32\Pcijce32.exe
                                                                                                                                                                                                            98⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                            PID:5468
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Qfgfpp32.exe
                                                                                                                                                                                                              C:\Windows\system32\Qfgfpp32.exe
                                                                                                                                                                                                              99⤵
                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                              PID:5532
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Qifbll32.exe
                                                                                                                                                                                                                C:\Windows\system32\Qifbll32.exe
                                                                                                                                                                                                                100⤵
                                                                                                                                                                                                                  PID:5612
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Qckfid32.exe
                                                                                                                                                                                                                    C:\Windows\system32\Qckfid32.exe
                                                                                                                                                                                                                    101⤵
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:5692
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Qfjcep32.exe
                                                                                                                                                                                                                      C:\Windows\system32\Qfjcep32.exe
                                                                                                                                                                                                                      102⤵
                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                      PID:5736
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Qihoak32.exe
                                                                                                                                                                                                                        C:\Windows\system32\Qihoak32.exe
                                                                                                                                                                                                                        103⤵
                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                        PID:5876
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Qkfkng32.exe
                                                                                                                                                                                                                          C:\Windows\system32\Qkfkng32.exe
                                                                                                                                                                                                                          104⤵
                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                          PID:5952
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Qcncodki.exe
                                                                                                                                                                                                                            C:\Windows\system32\Qcncodki.exe
                                                                                                                                                                                                                            105⤵
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            PID:6020
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Amfhgj32.exe
                                                                                                                                                                                                                              C:\Windows\system32\Amfhgj32.exe
                                                                                                                                                                                                                              106⤵
                                                                                                                                                                                                                                PID:6100
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Acppddig.exe
                                                                                                                                                                                                                                  C:\Windows\system32\Acppddig.exe
                                                                                                                                                                                                                                  107⤵
                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                  PID:5160
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Aimhmkgn.exe
                                                                                                                                                                                                                                    C:\Windows\system32\Aimhmkgn.exe
                                                                                                                                                                                                                                    108⤵
                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                    PID:5264
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Afqifo32.exe
                                                                                                                                                                                                                                      C:\Windows\system32\Afqifo32.exe
                                                                                                                                                                                                                                      109⤵
                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:5332
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Amkabind.exe
                                                                                                                                                                                                                                        C:\Windows\system32\Amkabind.exe
                                                                                                                                                                                                                                        110⤵
                                                                                                                                                                                                                                          PID:5012
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Afceko32.exe
                                                                                                                                                                                                                                            C:\Windows\system32\Afceko32.exe
                                                                                                                                                                                                                                            111⤵
                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                            PID:1920
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Acgfec32.exe
                                                                                                                                                                                                                                              C:\Windows\system32\Acgfec32.exe
                                                                                                                                                                                                                                              112⤵
                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                              PID:5448
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Abjfqpji.exe
                                                                                                                                                                                                                                                C:\Windows\system32\Abjfqpji.exe
                                                                                                                                                                                                                                                113⤵
                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                PID:5560
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Apngjd32.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\Apngjd32.exe
                                                                                                                                                                                                                                                  114⤵
                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:5660
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Bifkcioc.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\Bifkcioc.exe
                                                                                                                                                                                                                                                    115⤵
                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                    PID:5864
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Bfjllnnm.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\Bfjllnnm.exe
                                                                                                                                                                                                                                                      116⤵
                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                      PID:5928
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Bemlhj32.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\Bemlhj32.exe
                                                                                                                                                                                                                                                        117⤵
                                                                                                                                                                                                                                                          PID:6072
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Bflham32.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\Bflham32.exe
                                                                                                                                                                                                                                                            118⤵
                                                                                                                                                                                                                                                              PID:5156
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Bcpika32.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\Bcpika32.exe
                                                                                                                                                                                                                                                                119⤵
                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                PID:5360
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Bimach32.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\Bimach32.exe
                                                                                                                                                                                                                                                                  120⤵
                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                  PID:4932
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Bpgjpb32.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\Bpgjpb32.exe
                                                                                                                                                                                                                                                                    121⤵
                                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                    PID:1444
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Bbefln32.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\Bbefln32.exe
                                                                                                                                                                                                                                                                      122⤵
                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                      PID:5576
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Bipnihgi.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\Bipnihgi.exe
                                                                                                                                                                                                                                                                        123⤵
                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                        PID:5828
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Bmkjig32.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\Bmkjig32.exe
                                                                                                                                                                                                                                                                          124⤵
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          PID:5972
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Cplckbmc.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\Cplckbmc.exe
                                                                                                                                                                                                                                                                            125⤵
                                                                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                            PID:5124
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Cffkhl32.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\Cffkhl32.exe
                                                                                                                                                                                                                                                                              126⤵
                                                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                              PID:2484
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Cmpcdfll.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\Cmpcdfll.exe
                                                                                                                                                                                                                                                                                127⤵
                                                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                PID:5508
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Cdjlap32.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\Cdjlap32.exe
                                                                                                                                                                                                                                                                                  128⤵
                                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                  PID:5732
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Cekhihig.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\Cekhihig.exe
                                                                                                                                                                                                                                                                                    129⤵
                                                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                    PID:6132
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Cfjeckpj.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\Cfjeckpj.exe
                                                                                                                                                                                                                                                                                      130⤵
                                                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                      PID:5444
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Clgmkbna.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\Clgmkbna.exe
                                                                                                                                                                                                                                                                                        131⤵
                                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                        PID:5968
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Clijablo.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\Clijablo.exe
                                                                                                                                                                                                                                                                                          132⤵
                                                                                                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                          PID:2356
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Dllffa32.exe
                                                                                                                                                                                                                                                                                            C:\Windows\system32\Dllffa32.exe
                                                                                                                                                                                                                                                                                            133⤵
                                                                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                            PID:6044
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Ddcogo32.exe
                                                                                                                                                                                                                                                                                              C:\Windows\system32\Ddcogo32.exe
                                                                                                                                                                                                                                                                                              134⤵
                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                              PID:5648
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Ddekmo32.exe
                                                                                                                                                                                                                                                                                                C:\Windows\system32\Ddekmo32.exe
                                                                                                                                                                                                                                                                                                135⤵
                                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                PID:5720
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Defheg32.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\system32\Defheg32.exe
                                                                                                                                                                                                                                                                                                  136⤵
                                                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                                  PID:6160
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Dpllbp32.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\system32\Dpllbp32.exe
                                                                                                                                                                                                                                                                                                    137⤵
                                                                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                                    PID:6208
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Dbkhnk32.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\Dbkhnk32.exe
                                                                                                                                                                                                                                                                                                      138⤵
                                                                                                                                                                                                                                                                                                        PID:6252
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 6252 -s 400
                                                                                                                                                                                                                                                                                                          139⤵
                                                                                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                                                                                          PID:6336
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4444,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:8
                      1⤵
                        PID:5680
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6252 -ip 6252
                        1⤵
                          PID:6316

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\SysWOW64\Afceko32.exe

                          Filesize

                          64KB

                          MD5

                          d3dd4072e0b91e31ed3766b611d9bae7

                          SHA1

                          334c49d922944f58c1ea6f2e6fdebe27f9f783c1

                          SHA256

                          851fa9da07c7905e554a3b2fb33996f683b4af8a628ba0b42eee4f13d0e66047

                          SHA512

                          18e5701a8401fb34eafcf9afdb86cf9d16545cf5f4f1ed85a5049af6fdfd6f39d463468b3ff7b6e05d99ee686a515381f19c2e8bfe4b4273629e9116d60f1d38

                        • C:\Windows\SysWOW64\Aimhmkgn.exe

                          Filesize

                          64KB

                          MD5

                          209519a4a4399eb2f14e1db35f6de083

                          SHA1

                          2e1e5f940b3608627261cec75e4970b147278dbe

                          SHA256

                          2650cf7904c5f6dc0e02c9e897a673dd7f3c15485c2c4a55aac6770dcaa0d839

                          SHA512

                          b58c2b078340a9a7a7516f3f2e463706698af19d1c7b335715b15599582d871496172413950f40b14e44bdde4b2cf0a576b0a72f0ab554caf23381af85fab918

                        • C:\Windows\SysWOW64\Amfhgj32.exe

                          Filesize

                          64KB

                          MD5

                          4ebb4fd09c41ff0df9249cb49fa4c696

                          SHA1

                          0e985705f6f0da9f703e7bcc68c7da37517c2b1b

                          SHA256

                          591a76aeb9e3edf04aff46e8b225ad1442d4de0dba60989b962584e8db83a030

                          SHA512

                          df1864cca21c6aea1646784a03273090410e0ca8c7bdfbe7a830e9f19f2a7e7be116c7fdacce3c4cf3397e9007a066f02d0dcc868be43b28ad0c7ef3b49f7809

                        • C:\Windows\SysWOW64\Apngjd32.exe

                          Filesize

                          64KB

                          MD5

                          6d3417193d43909e60f7f401978d1f64

                          SHA1

                          e05a438d65410e055d9cf58b0a10a86d785783f9

                          SHA256

                          8b859106813e267a4c1de7680ecbe978307737c6906e82dab227a0a67abb1ffe

                          SHA512

                          90cb3a828a17c6d4788a1061f1574f648318b56e9e282659c67e3efe22a02e04c7f61c6a2c886d6951ba50d3e8c96cf0909f815e4884514823bc6cfc2cf2c8d9

                        • C:\Windows\SysWOW64\Bcpika32.exe

                          Filesize

                          64KB

                          MD5

                          c13e05de7d79e714d1463da3651bbe23

                          SHA1

                          796b13a5ca87078d80e660d4bf153085f38275cc

                          SHA256

                          d51f4b51f18a1f851fa6261b8615789e4dd97068c63c2bcc51e158f53f8523c3

                          SHA512

                          7956f3cc71513c1bf927db57507c13c0c66810afbfbf85aaa992a5bbb5c91ca6f33f02b492ba95d68499360e233c940baca857b4d9ad42432c5bf8bc87632e3f

                        • C:\Windows\SysWOW64\Bemlhj32.exe

                          Filesize

                          64KB

                          MD5

                          11a63506cb23302e01955d7bebee4e12

                          SHA1

                          2ae832868f92030bad7e9cae97178ecb02fd93a6

                          SHA256

                          4bbce40fc9790b4f7b8bef091e4abf4873a9a2518edc24637d46d97f2e5849b6

                          SHA512

                          457e4f4043bca6f35b5b41e198e085c881fb958ce0caed87cf0a81dad1fe81df65f522b447d6a22cfbb483428b506ea2030b2059d96ccd3d39437abd1fa9bac4

                        • C:\Windows\SysWOW64\Bmkjig32.exe

                          Filesize

                          64KB

                          MD5

                          bbc3ac8ef0295c2b4c0ef4a79e4402e9

                          SHA1

                          3248a1e262887b54824eba31f2324c7304e1d073

                          SHA256

                          db4fd810955621fe8498f65b69974878d6ce5284f06400f8424ea9cbc0f1f2a8

                          SHA512

                          ac29c9bc3a47155de7c47d7b7791b9eca1045fc3979094e821859f9d0738ee7a6c716c392913ea7eae4e755e02ffccc862eb33a3b9bb27c19e83ca4e0cbb78aa

                        • C:\Windows\SysWOW64\Cffkhl32.exe

                          Filesize

                          64KB

                          MD5

                          fb4e4c473b7f0ef192e21a0bcc7e9f95

                          SHA1

                          db13f7455781025070067e7a845f1a2cf972da9a

                          SHA256

                          af444b6cc01d4741676b9d0d9afaec473bfabe56266c59221fbdc59a859a0232

                          SHA512

                          68e462599d7b7d8061e9ed9db5c1fad8c1a2d85233ae7fdfa17de28973b3c2cd94a49e920c949479d6eda172f2ef3adb8bc489fd323d775bf573833bfdad3a19

                        • C:\Windows\SysWOW64\Cfjeckpj.exe

                          Filesize

                          64KB

                          MD5

                          81782f5642190df029ea61996625c0b3

                          SHA1

                          d7abd399ac58ccfbc43e96c425966ff1748cc2dc

                          SHA256

                          d50fc78c7be002e66aadf1fb26bf7d34180ba93d1f8a09b5f93d23b4bc183bfc

                          SHA512

                          71af2596111c21afc2e05dfa1cba693d7cf2ea5583653d1050f91f738cb9c5d77f51c952a1ed384ca579789dbb5278fca5b1e7cd28fffb4e301d9ee97e8cfe75

                        • C:\Windows\SysWOW64\Clijablo.exe

                          Filesize

                          64KB

                          MD5

                          819ea96f2e98ae65d732be97affa6479

                          SHA1

                          9e7d49f2d608e52b9eac0acf2a3665c80897b6fa

                          SHA256

                          5b9d8df89d41d5500994c9288e7bbbf933ca3ed6cea22c25cd7681a29bc440f3

                          SHA512

                          443507665f105e7382971c34640192b492139783d324286bf294d0cb9d415bb1be228a805cde7bb7ed1219a3db9206e4ef36407905aab1eb2912331185435e39

                        • C:\Windows\SysWOW64\Ddcogo32.exe

                          Filesize

                          64KB

                          MD5

                          6d076607b7ecbf4f21c534c9a3ebcfa5

                          SHA1

                          6c4ce694a088bf1b5fa61b93e6e0999018be2aa1

                          SHA256

                          02269c2191263bb852b2058cec2d6ad575f364e1756b0b70333d66cf49ac4209

                          SHA512

                          f3027d3797c5657abb4bd738252bfb7e7afb7bb2ac6a6df8943d992b3239f3999f14b895d50f2929ea6d18174c93d1eb7bf1b5949176633e96e348a18c8eeb10

                        • C:\Windows\SysWOW64\Dpllbp32.exe

                          Filesize

                          64KB

                          MD5

                          36eabc5a7a9954b5dd85662ceb3ae5d4

                          SHA1

                          2db9bb2a2d7447f1b2e725f900620dbde450c3c9

                          SHA256

                          5713f4f67e6dd4420ce1573734dbee00712f63f71ff90466c01689cec0c3b84c

                          SHA512

                          1c54d229aa21214155520b030ac1a5b583bda195039e53456b04d281b232ad087027fd9058eca1c3374f85d93e87ac0e7829e40fa662f344733d0534cc582b0e

                        • C:\Windows\SysWOW64\Iagqgn32.exe

                          Filesize

                          64KB

                          MD5

                          a5231cfed395c772d2dbb598a4669007

                          SHA1

                          c8d63d22261362fccdb772b09d4e82fd90c7e3e5

                          SHA256

                          c3b0a53064a0ee19918e8cb4f51320dd2f838d99fb53a31caa90472975417b91

                          SHA512

                          7127454395146871a8fee80bf02ea06f6946f722d365e459da42b5e7287846bb6c9ced876517beafee2a73c23456edf94f4630437d8036b9d19a13991be07435

                        • C:\Windows\SysWOW64\Ibgmaqfl.exe

                          Filesize

                          64KB

                          MD5

                          2b06c6da18c37bd4c924afe14d990c83

                          SHA1

                          3d863fc17191e853149deac4c1aabf7ea2dda586

                          SHA256

                          70046d44f525ede80a6a309853f6065074372ea8a5471b232cc73d897162a3b3

                          SHA512

                          14c2efdb620e3eef55e3f6b70daac2800f1c9fc8f0e97efef63e59b51a325f9992e3070dcb6446141570dfc731db9b20bfba01a0d24246a64841d298b01fc743

                        • C:\Windows\SysWOW64\Idhiii32.exe

                          Filesize

                          64KB

                          MD5

                          94987a9bd17e5798e9dd007a803040fc

                          SHA1

                          ea97908e4ed13e7c62c33c04aa17bdd96d90e3b8

                          SHA256

                          ea786f98d2160d8fd208f437f02d742b3eb1539772d8e4bb98c51c73a463ae2a

                          SHA512

                          79645773b87bcc0b49190246fe6d2e840620aae99f9432a457f9615c830a68ca6f7858714b3e6a79c3cbf46bc248446464e3e257edbe62453e0738e05e78d839

                        • C:\Windows\SysWOW64\Ihaidhgf.exe

                          Filesize

                          64KB

                          MD5

                          dbec914e0e63778413ea86de9be1f9d9

                          SHA1

                          a1c453e3c606bc40f352e6068114141abf370f9f

                          SHA256

                          dc41e28a9e490473f4067f5f1836cbed339434a850cbfedb94a4c50534b87381

                          SHA512

                          a6e440823719bb9367b6418b4862fa926e38bf200c603563b8322b1b58b85096034276775e8907e033a94f0f9b290fe2e3cad510189256755ebcb33ba3778969

                        • C:\Windows\SysWOW64\Ihceigec.exe

                          Filesize

                          64KB

                          MD5

                          2917588a3d6c081d879a4d2e5f48e05f

                          SHA1

                          9ae0ce5bbd5703ea187258063e9ae2b0d35c43fc

                          SHA256

                          b573d215a518b03169fe3bfe4e4a9e868ccf368c1de37e9b196062cc13216ffe

                          SHA512

                          eaba23b8d8a6a56d5fd8d0a8af72e6ee2d70841e61ec07bf894363bc2ca4997369d7c6ffa73c9fa110a51db69526458c2743ae1812cec0786f6fca1ebd257ff7

                        • C:\Windows\SysWOW64\Ijbbfc32.exe

                          Filesize

                          64KB

                          MD5

                          4f06f1b060a40722243dd1bb4f9196ac

                          SHA1

                          6f2e1b32f9b853dedf08f7d3d7df019ba6d9f166

                          SHA256

                          20c9a29946557ea9ae2508a85643731c02f5235dfd2e297e6fa419c937a63a03

                          SHA512

                          fd77bf4cc60f3b1e41ce8590920897f7b6b2b851e9e827f603f6e6618acae0b82c8f8940b221d3da716942fbfddab7def147be5a0c7b8f13fab63efe3121fba2

                        • C:\Windows\SysWOW64\Ilmedf32.exe

                          Filesize

                          64KB

                          MD5

                          4569563297135a13a0d0aba67d47f5b5

                          SHA1

                          f3bcdb9730e96f301584f4f6a6f5a7c02c728ae2

                          SHA256

                          61905040df156b3dd4bfa96ff65495cf23b7281c7d334020ee6c9211c19bdd15

                          SHA512

                          14550a86f0c676a408ed217e71801011514627247518a8fb61819f19659d236926ad3a5143c71c463c7783ff5781e0fcb352e1256738b8f1bf26720dd803ebe8

                        • C:\Windows\SysWOW64\Jaemilci.exe

                          Filesize

                          64KB

                          MD5

                          423a6f7624c483bddddab73c106116d0

                          SHA1

                          94b6c5b4b4654a447dd4765c28e158a09f03ad13

                          SHA256

                          a5cebf00fa7dec27750f5b5db87730fc463eacf026bcf297b35ccdd4e096e615

                          SHA512

                          b9a1f89a9a82ba7ef8cc799e1d1b41a7362a97861484a778665a1c52d4d85ed7065974971fb18730b927a02aa75a57b4b6ba41cce5e9e43436dec2a37043dc72

                        • C:\Windows\SysWOW64\Jbncbpqd.exe

                          Filesize

                          64KB

                          MD5

                          fe28f86382b1403a22ddf6a727299970

                          SHA1

                          ab4174082cc565057cdc6d6bbc9d5d679bb0323a

                          SHA256

                          f69d5f4b02240059640ac906d352726041b91d2050213a8e2a866082bf5827cf

                          SHA512

                          3e7d785c16d8aebc2ded03502beead9996d69454a470a3071a5a7acb0e8957f442183caa8f34ef5be5bb1563bbd07654843648a001cc40f8ce74ec5773b65f7e

                        • C:\Windows\SysWOW64\Jddiegbm.exe

                          Filesize

                          64KB

                          MD5

                          a87cc241120b258021b08a1985508879

                          SHA1

                          0d092126c101126ee3013b314cff678ad6fa880e

                          SHA256

                          2107915b945890166c59b90d90d35ec7d6c696a1c10f7fc82b8fba25e74c637a

                          SHA512

                          baac4b128b902f89574f60729d6002d7e2cc8a8b450506db0a703abd68124265b16306d18d2326fadae82084e5cc610e5fad370b55fe07de68ec454b81509e86

                        • C:\Windows\SysWOW64\Jdjfohjg.exe

                          Filesize

                          64KB

                          MD5

                          b3e28aadb6c7c6e45bae99e3cc7a0008

                          SHA1

                          a0f6d07113ef374bd7123b39b5dd25e30c5ca890

                          SHA256

                          87a0f174b8485fc55f65a49cfcaf8a0b1723597b1a682dbe520147023f530c0d

                          SHA512

                          b03fe5940544bf699f6e6691eb1d29021a5fb5049f2ee398dd9359aae9609fba869da811f643e578a649770b9e60311f2a79cde76ac4c51b585d15b624ec5993

                        • C:\Windows\SysWOW64\Jdmcdhhe.exe

                          Filesize

                          64KB

                          MD5

                          68c249487ae111d0a7b3cf183b936ee2

                          SHA1

                          120c3da4de41c0176e94c6bf130479e5b3866a8f

                          SHA256

                          dbdcbae318c3d5dc9159f51b905b9b8dd2afd30a634fd7372c6480d702092e2e

                          SHA512

                          d642a4cebd0fd83527567e24e044bcf0da9d2e1bc12771ebecae06156d56b7bd943c9af6f3af3d10059578ea19952a96242d197ea523fe407fe4921733a2bbc4

                        • C:\Windows\SysWOW64\Jdopjh32.exe

                          Filesize

                          64KB

                          MD5

                          b3247003f621d93afb56e93ae541d306

                          SHA1

                          4488e486231b2d8c2b9f60aba5394aaaa523df45

                          SHA256

                          5f4575838b9a31614c2a0cdadd9bd47e1772e500aa0c34f9d3bdca14733c304f

                          SHA512

                          276e49e5f7c6bed832923c4e43680efe741327a7759ff172429cc186d45dc849cce4bff9441ba309e95809671dec450435a3741396371b197a21e81e361a19ec

                        • C:\Windows\SysWOW64\Jeolckne.exe

                          Filesize

                          64KB

                          MD5

                          62ac278b2118cb01df0c0b4aab523ad7

                          SHA1

                          8a75c4530d06d92a208cec96ac5877a82d47c361

                          SHA256

                          35e86fdf07072f3f1e90bbcefdc8059fb558912216573100f864383e7985ec2b

                          SHA512

                          b9eadbb00981fb265de8b6242f931ceb94b2c48c409d218d2d8a2dd0e71d8f131f6ad65aa232e594d97b6fe1e547a79f5f7016c54ec4690048d62a074ef31ec7

                        • C:\Windows\SysWOW64\Jhkljfok.exe

                          Filesize

                          64KB

                          MD5

                          fe2a91f72d849d2d63579a052e1f3dfb

                          SHA1

                          2cf7e7269ee0531ea0504cf34e094ba9b452a2a9

                          SHA256

                          91f3e79908e2d94176f79fe5ca549e7999c993a8023bbf612dc34a09eda60bd1

                          SHA512

                          2f80c7373312d9d915df30a0cddbc906bab2bbb9c447e191a558b9ea7c9db6ef7d40767a72c31d499965bf033a666fbbda5c11df5c26d199f2e766d639c7446e

                        • C:\Windows\SysWOW64\Jjkdlall.exe

                          Filesize

                          64KB

                          MD5

                          7339e3e7c266bb603db7fd0274024f0c

                          SHA1

                          7a1d5fce8473765a34feed3ec67eb8df6c0ad793

                          SHA256

                          d954739e7befb377472056cdd73ccfa812d88ac3372884d1920a1c57cc20cb86

                          SHA512

                          5e43828a0abf2511b8e72c1a8305f648341d37a841387f764456daa2ce1475de6f6c6ed375d4543aa9644daf763d782eec83619e1d94c8e1270f8d5fe4c46f1b

                        • C:\Windows\SysWOW64\Jldkeeig.exe

                          Filesize

                          64KB

                          MD5

                          bb4c0fea883127bea77b319d5cdaefe5

                          SHA1

                          65c56f8d537406365bc85df9d41b21357b390a93

                          SHA256

                          26a3dacff92d709c9dc8ae1650edb930ccf34758d492473604ac87ac83139472

                          SHA512

                          25f72ff4f183265b58c422e7261db13f7d9b030877989fa295e9757f980c85ae00b0a8cff62a8c30b6b4a043ec6206c412371fce0be8f44c5684d6cdb3a63884

                        • C:\Windows\SysWOW64\Jnedgq32.exe

                          Filesize

                          64KB

                          MD5

                          a8192239099d3df15c56863c868b695f

                          SHA1

                          4f690128412e7d2cb39b7e607889a41898b52da2

                          SHA256

                          f830406b721f9208f519c6fcaf65d0f38fe93aefe627cbb64773a72f079c0fe3

                          SHA512

                          bbd64153c6005d6c3b97d72b616e3377f7384f3d261fe74929a684efdbeb1f5e25ef4c3d452473e18a341ef118e743aef4b7d44db4a18f58a97431d934100fda

                        • C:\Windows\SysWOW64\Jnnnfalp.exe

                          Filesize

                          64KB

                          MD5

                          da26b3bbb4f1f02cef02815860612a02

                          SHA1

                          85e5a14dfa464c72a093d543b49c1d22cf01d92d

                          SHA256

                          33e4f2b30fb4a1db8a2a394ecf3e32a07e7c37134b2f546ac1d8689b1eadf949

                          SHA512

                          70d26ad7abaec6e270c4bbe73ad13df3230a557660c346655252947a2c52e46c2b423c363027708ff5da514ad1e67ecb595dc2e1ae3984bebd63b517c9232c2f

                        • C:\Windows\SysWOW64\Jnpjlajn.exe

                          Filesize

                          64KB

                          MD5

                          2883383c7fad939f2ede0f55a41d9f18

                          SHA1

                          57c25ab00b8fd1eadc29e4e3bfb9988ba1567b01

                          SHA256

                          865482eed8ec5dc119184359a1a508a77c285244e6849fc7c3f26f38e798bfee

                          SHA512

                          a4e284643d4dbdac25cfd44cfdc13a7efb660b225d6bd59e1a6888f540326a7b0fcd80a90b5a1183e70ee2ed474d2d7660347f023da6439432e95e558a4a9f70

                        • C:\Windows\SysWOW64\Kbeibo32.exe

                          Filesize

                          64KB

                          MD5

                          7a51e5a9aa621472bd12a4b1864cfbfa

                          SHA1

                          0b1dad39c3e5ce959625c7e9c38d93c87c33523d

                          SHA256

                          0feaa62b5b735b425b1de5dcbea236c00e6edc54f838fdd4840b38cc1d85b608

                          SHA512

                          0d696425ce8fd94f75e7d9ac30b66362a5d0cd99a345bbbf45a4b1b76c8771d17ae2d11af78cebfcea94b59559f7dcfc9ad86982da6ec9d4f53a1c7b91cd9b1d

                        • C:\Windows\SysWOW64\Kbgfhnhi.exe

                          Filesize

                          64KB

                          MD5

                          efe063f1102279c4eb49747393435ca9

                          SHA1

                          8e46365a9450bb0d5ec4304db1d1a576ebe8494c

                          SHA256

                          d3da07e619aaaef23ee30695e984f0522cd0a82619d9bdc6272f7ca19a45e19a

                          SHA512

                          16ee6a5e1610c5b21f8927840d6eb603eebd8a96b08ae41773246f0c73a051d60df3201af77d6001887c3a5091064e1fda172fb77bbf5ea1c772912d24830cba

                        • C:\Windows\SysWOW64\Kbjbnnfg.exe

                          Filesize

                          64KB

                          MD5

                          3462804667d3c332921ddeaa0e219806

                          SHA1

                          55929636be69311cd3ba5ea53591dafc713f92a7

                          SHA256

                          8cad8abe71f01f27a934534d2891bffb7bef9cc87b7ca1e2191d795b1cb095f4

                          SHA512

                          08eb16c6d96ecd0485ddc924aa54c176e636824b8ca31d2ed7820f18399e5d8fd9bd1fc14ad2d60a36e7c1a788422c73dadb8eb61feddfc90bc5beca2fb9cf43

                        • C:\Windows\SysWOW64\Kdhbpf32.exe

                          Filesize

                          64KB

                          MD5

                          5d18c9839d4a830b050435843342d400

                          SHA1

                          f61581ae25d9d549f14455583467c9c71fe9cf6f

                          SHA256

                          02002e58f017b1b83a305e2a21db377811f40890eb7889203f1883f72a2df2e8

                          SHA512

                          ad8b3e5242c621f559b55ff9a2d43f62fe6653466340fcb7047651e301cc2f0f26f041a3d929e773cef6a10cd2835df1362f01a1be2c3b18827c91b60e3cf14f

                        • C:\Windows\SysWOW64\Kdkoef32.exe

                          Filesize

                          64KB

                          MD5

                          42f8261370f7ef6ed53db59bbd5b5e91

                          SHA1

                          fa988d167102b8113f4668f2b9a9bdeab348a09a

                          SHA256

                          37d54caad05b3067e38feb48f2724bb62f723a348a45d0251a1a963babde4fc3

                          SHA512

                          2d51ebdcd00aee3fcfa488913a8268d9859c7d81497e13f3e0d047d0c1b16e7d4bde0f715387f396ee84a1773968f22c8bbb37957786bd61f9a222a7890910a8

                        • C:\Windows\SysWOW64\Keceoj32.exe

                          Filesize

                          64KB

                          MD5

                          20fbf5cdb63a2c2a8d7e1283a0f363d0

                          SHA1

                          e9869c8a1e51d91715433ba4315578f38e828dc2

                          SHA256

                          75b2eba2555224915c914705710beccbd274a14c41cd3ce0cbc58b245662e6f6

                          SHA512

                          8f73a7f2e1d1e472e877f70c304fab9881c9b790794e6fea90092625dfe340bd8cf330064fe358cccdaad3f8646e0e3b13a2732cb898a9ee9c587593132ae01f

                        • C:\Windows\SysWOW64\Kejloi32.exe

                          Filesize

                          64KB

                          MD5

                          06c7c14434e4d1f61a5ba89485c93773

                          SHA1

                          fc750dfb254dbceb827da3d49983c5f2fc50bbed

                          SHA256

                          b9272fe87420b56b4bce5a0a7c890be5e60ebf815f142b92a8440945211baafc

                          SHA512

                          c14f4f8cb80ac848c0a5d1a448fb8071b1ff13aee3426bf60feceaa44257c32ed8bfb5698d0d4096d185a625b7c75b0d8733e37956f65aa63aacebd734743f43

                        • C:\Windows\SysWOW64\Khihld32.exe

                          Filesize

                          64KB

                          MD5

                          9f4a7f7a34f43f15e8e64ea414ca7dff

                          SHA1

                          adfc3b09f15bdaf9b106e4517711a603d3bcbbe5

                          SHA256

                          d4d9e072d3964eb47dcfc8f615c77abf22f223559d77de3914719bc4bfc9737c

                          SHA512

                          4b82160a0dd52ea39ebfe2640600d13c7ccba5d6e4ed96288a21181755f369ff42f31ffbde1a770dd3b514e900b28c89e57e90c7afc131498b364a07f60d4aa0

                        • C:\Windows\SysWOW64\Kkbkmqed.exe

                          Filesize

                          64KB

                          MD5

                          199db3de0350afb18cedb82566b4bc46

                          SHA1

                          5e9505b39bfd836d14bb8b06c688653a992f64d3

                          SHA256

                          669c1605a030cb4dbb27e173d544f2c9c6c010c3fc5b2af6c4792c2b4a5507ec

                          SHA512

                          65f767b8cde4fa89a1314198172ab1d1e7d4f956916a4f1e157b0f7dc19a662dcf2db6064a056c28b2c7f43966e96939eb58dd97ae8dd782a5dbe42361b303cb

                        • C:\Windows\SysWOW64\Klmnkdal.exe

                          Filesize

                          64KB

                          MD5

                          1b655e98f7ec9d7273f06ede11803220

                          SHA1

                          0599e970e623c7a0df5c87380cfbdd062c75c1a8

                          SHA256

                          ae677ceb920c2d1a011ca251788712213bd7c8eb24ce95439c6646c52521773b

                          SHA512

                          caa849d393f097abfc98be3286d7ff2dbc53f690e48bdd08ca8f04441416b32a4d243b7c963e71fb7488165266727952695b91c07705f426baf8c18029fcd130

                        • C:\Windows\SysWOW64\Koimbpbc.exe

                          Filesize

                          64KB

                          MD5

                          1b730888ed064ce6a03608509ba4c8da

                          SHA1

                          3c5cd11288d51b0be0b196fe0d214c22c84a898f

                          SHA256

                          41298dc09482e90f6e2326dd744931772373182d87f19801094ef36e3b8c4eee

                          SHA512

                          a520b5483a499fa5ce67dc3126240b91740f5bc4a4ef0d1b2fc66704b5e93f97a8af5a8d16c03c93504b055b03f6e9b3b305f6107bc1fcd8f9248ec6c07e12f6

                        • C:\Windows\SysWOW64\Kopcbo32.exe

                          Filesize

                          64KB

                          MD5

                          e0ae87be010c95a158d45929513be548

                          SHA1

                          63aa7f68427bf14b6b76229948bf4b51fa1ec24f

                          SHA256

                          7c79fa48450d81944df2daf261b1d6347ab410fa239aa6b12e7d59a175eba106

                          SHA512

                          9e5c6afd0a51e2bf77f6e0e10061f335f4c97917631832731bbdd5eabfffed66bd09b20d10e274e31cad7c1509b313607d9ea52c04ba332e74e9394ab2c20beb

                        • C:\Windows\SysWOW64\Mafofggd.exe

                          Filesize

                          64KB

                          MD5

                          5cae7fc843d50d4eb976853096b6a20b

                          SHA1

                          5272414c427d92f16f852ca9c4f979a187b72979

                          SHA256

                          17817e5bc29d0369261db9be772b0ad1d6e2e5ec084e219385cb9fe2a0d4ce9e

                          SHA512

                          d41fd699eaa28addbd82a52108b008916eb2965c13b5bc06cd3de212458ebddffb2fefe4fcdff8888056190cceff409fec5cc1de7fe44d7fae08be1be10aebd3

                        • C:\Windows\SysWOW64\Moalil32.exe

                          Filesize

                          64KB

                          MD5

                          2f5afd63d338b3af3f36793edc2daa94

                          SHA1

                          32a0c6fb13c6269252aed204f40474e5de1de963

                          SHA256

                          21d316313fcc9adf1358def93357eefe0acc89b33de871bb469ca41f4649be22

                          SHA512

                          148274d98551276f9694b8bf1ae1defb643a7bd4390d771fd088f24e1539ea90647fdba6a314922d15288d1d8420a2d12e4e2c6396f250b5bffb5cd61ad8e14d

                        • C:\Windows\SysWOW64\Moefdljc.exe

                          Filesize

                          64KB

                          MD5

                          9ad0a247ab6dbf70f0d39e965dc33651

                          SHA1

                          22765cb5425bae97b4c4c183b86d3e9a7422e63d

                          SHA256

                          c8cd37a5a903426e3918a871559ca9acd1b4a177dd75194735640fe6cf47569e

                          SHA512

                          0491526fd6ca3ccdd2e55ae4f8dab22b5f223b32d1536bb4d3d9d3156c18cad853cc2b8286ff65adea2d0ddfa5269aaa2f09ac188d84910c0499791a4e435bfc

                        • C:\Windows\SysWOW64\Nooikj32.exe

                          Filesize

                          64KB

                          MD5

                          6abee534f2e8d9aa34c3e2b74b5de433

                          SHA1

                          9fa363102a98a6385dbb4b6908e7f0eceb64b380

                          SHA256

                          dfa1cf780433b35b1e18b93b96cb995b51aba357b929749b2695c1e3bedf42a3

                          SHA512

                          8ba2cc57e82ccad33c62e9896bb4fc5d01d3e6e23a2b886ccd45eefa01c0f5e83c4a9bff7ae44b3ae0810f029d0b6b3d833137550e4298fd918df9957b379723

                        • C:\Windows\SysWOW64\Oflfdbip.exe

                          Filesize

                          64KB

                          MD5

                          e21ba10164c1fe944a049fbccce0aaba

                          SHA1

                          c3e44065224e68da7f02936fb14245db4718c87f

                          SHA256

                          4b505c453d97b240113e318c2b4d49d427b5d6a7301bd55a4586485a86713dae

                          SHA512

                          73e640fe32781d842dbc2659f43e7770f65bec16c758245e87813d363b5b76306cbf4eba561c81737eab2a7c00987c712e77e5689567b2234a18d14c9fabef53

                        • C:\Windows\SysWOW64\Pfncia32.exe

                          Filesize

                          64KB

                          MD5

                          653edd50ad99d35985748f2593dbf9bb

                          SHA1

                          d4249b05e51a5b215daef79964c89ee993095ce5

                          SHA256

                          eadd95ffa9b456a8680a619cb47d49ce8a4eb1201ac8db8548135838fad0d8fb

                          SHA512

                          15b68d0de598ea348825562062d373b42880c0041370e58d295d875aeb20ed15817a5a9baca37470a53de8610300e67985f3ec8057ec324c8845fa12f2c69dbe

                        • memory/512-160-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/536-407-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/544-61-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/876-304-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/884-345-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1100-185-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1128-80-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1148-383-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1188-395-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1196-53-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1332-389-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1396-371-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1400-401-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1436-249-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1448-273-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1756-419-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1836-201-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1864-104-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1892-455-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2080-157-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2092-333-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2116-353-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2504-232-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2580-137-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2632-310-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2652-291-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2668-169-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2876-461-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/2996-241-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3044-217-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3064-467-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3208-431-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3232-129-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3236-327-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3280-177-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3316-193-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3332-449-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3340-121-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3344-565-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3344-29-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3372-9-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3372-552-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3440-339-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3444-89-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3480-297-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3512-359-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3652-113-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3672-40-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3672-579-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3676-209-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3724-275-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3764-425-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3816-257-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/3956-443-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4016-1-0x0000000000431000-0x0000000000432000-memory.dmp

                          Filesize

                          4KB

                        • memory/4016-0-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4016-539-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4064-281-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4284-322-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4344-311-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4412-21-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4524-266-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4560-73-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4580-413-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4600-365-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4740-65-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4740-598-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4788-144-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4816-225-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4844-33-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4844-572-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4888-350-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4928-97-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/4996-441-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5052-377-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5128-473-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5168-479-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5208-485-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5256-491-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5296-501-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5336-507-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5376-509-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5420-515-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5460-521-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5500-527-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5540-533-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5580-540-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5624-546-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5664-553-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5708-559-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5748-566-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5792-573-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5836-580-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5880-586-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5920-592-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5960-599-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB