Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 12:07

General

  • Target

    e554c07f335ec11a7dc3da6964140410N.exe

  • Size

    52KB

  • MD5

    e554c07f335ec11a7dc3da6964140410

  • SHA1

    a4ae0116ca8499ec701ba8428761b8e38c63790e

  • SHA256

    9bf0e3ba655ad5bcc77773ec275cd3875969f959d3514db89d00899f4267a19f

  • SHA512

    90e62f86546f3499ca3d3887233ff339bc152c3b5635415317feeaa70ef4198ab198e8aa576643c7f50e82c3f8a7abf7079c07b1f514873caf47a06fd1980fc2

  • SSDEEP

    768:OkrQx1VwZ4UjModnAmUakdKDt+dI9WpjRY75UcAPHeij/1H5F/saMABvKWe:OkrQniNFAmUaWKDlQr25QeiV3MAdKZ

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e554c07f335ec11a7dc3da6964140410N.exe
    "C:\Users\Admin\AppData\Local\Temp\e554c07f335ec11a7dc3da6964140410N.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Windows\SysWOW64\Janghmia.exe
      C:\Windows\system32\Janghmia.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Windows\SysWOW64\Jejbhk32.exe
        C:\Windows\system32\Jejbhk32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Windows\SysWOW64\Jjgkab32.exe
          C:\Windows\system32\Jjgkab32.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3268
          • C:\Windows\SysWOW64\Jaqcnl32.exe
            C:\Windows\system32\Jaqcnl32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4256
            • C:\Windows\SysWOW64\Jhkljfok.exe
              C:\Windows\system32\Jhkljfok.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3792
              • C:\Windows\SysWOW64\Jjihfbno.exe
                C:\Windows\system32\Jjihfbno.exe
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:696
                • C:\Windows\SysWOW64\Jbppgona.exe
                  C:\Windows\system32\Jbppgona.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4468
                  • C:\Windows\SysWOW64\Jhmhpfmi.exe
                    C:\Windows\system32\Jhmhpfmi.exe
                    9⤵
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4704
                    • C:\Windows\SysWOW64\Jlidpe32.exe
                      C:\Windows\system32\Jlidpe32.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:944
                      • C:\Windows\SysWOW64\Jbbmmo32.exe
                        C:\Windows\system32\Jbbmmo32.exe
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:4912
                        • C:\Windows\SysWOW64\Jhoeef32.exe
                          C:\Windows\system32\Jhoeef32.exe
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:3392
                          • C:\Windows\SysWOW64\Koimbpbc.exe
                            C:\Windows\system32\Koimbpbc.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:2528
                            • C:\Windows\SysWOW64\Kdffjgpj.exe
                              C:\Windows\system32\Kdffjgpj.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:4576
                              • C:\Windows\SysWOW64\Khabke32.exe
                                C:\Windows\system32\Khabke32.exe
                                15⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:3472
                                • C:\Windows\SysWOW64\Kefbdjgm.exe
                                  C:\Windows\system32\Kefbdjgm.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:4220
                                  • C:\Windows\SysWOW64\Klpjad32.exe
                                    C:\Windows\system32\Klpjad32.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Suspicious use of WriteProcessMemory
                                    PID:3580
                                    • C:\Windows\SysWOW64\Kongmo32.exe
                                      C:\Windows\system32\Kongmo32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:2156
                                      • C:\Windows\SysWOW64\Kehojiej.exe
                                        C:\Windows\system32\Kehojiej.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Suspicious use of WriteProcessMemory
                                        PID:452
                                        • C:\Windows\SysWOW64\Kdkoef32.exe
                                          C:\Windows\system32\Kdkoef32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:4980
                                          • C:\Windows\SysWOW64\Kkegbpca.exe
                                            C:\Windows\system32\Kkegbpca.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:3988
                                            • C:\Windows\SysWOW64\Klddlckd.exe
                                              C:\Windows\system32\Klddlckd.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of WriteProcessMemory
                                              PID:2672
                                              • C:\Windows\SysWOW64\Kkgdhp32.exe
                                                C:\Windows\system32\Kkgdhp32.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry class
                                                PID:4652
                                                • C:\Windows\SysWOW64\Kbnlim32.exe
                                                  C:\Windows\system32\Kbnlim32.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  PID:4452
                                                  • C:\Windows\SysWOW64\Klgqabib.exe
                                                    C:\Windows\system32\Klgqabib.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    PID:2544
                                                    • C:\Windows\SysWOW64\Lacijjgi.exe
                                                      C:\Windows\system32\Lacijjgi.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      PID:952
                                                      • C:\Windows\SysWOW64\Ldbefe32.exe
                                                        C:\Windows\system32\Ldbefe32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies registry class
                                                        PID:1376
                                                        • C:\Windows\SysWOW64\Logicn32.exe
                                                          C:\Windows\system32\Logicn32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies registry class
                                                          PID:852
                                                          • C:\Windows\SysWOW64\Lddble32.exe
                                                            C:\Windows\system32\Lddble32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            PID:1364
                                                            • C:\Windows\SysWOW64\Lknjhokg.exe
                                                              C:\Windows\system32\Lknjhokg.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Modifies registry class
                                                              PID:4048
                                                              • C:\Windows\SysWOW64\Lojfin32.exe
                                                                C:\Windows\system32\Lojfin32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:4128
                                                                • C:\Windows\SysWOW64\Llngbabj.exe
                                                                  C:\Windows\system32\Llngbabj.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:1056
                                                                  • C:\Windows\SysWOW64\Lbhool32.exe
                                                                    C:\Windows\system32\Lbhool32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    PID:4188
                                                                    • C:\Windows\SysWOW64\Lhdggb32.exe
                                                                      C:\Windows\system32\Lhdggb32.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:4292
                                                                      • C:\Windows\SysWOW64\Loopdmpk.exe
                                                                        C:\Windows\system32\Loopdmpk.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        PID:2944
                                                                        • C:\Windows\SysWOW64\Lehhqg32.exe
                                                                          C:\Windows\system32\Lehhqg32.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          PID:1200
                                                                          • C:\Windows\SysWOW64\Mkepineo.exe
                                                                            C:\Windows\system32\Mkepineo.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:2284
                                                                            • C:\Windows\SysWOW64\Mclhjkfa.exe
                                                                              C:\Windows\system32\Mclhjkfa.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3152
                                                                              • C:\Windows\SysWOW64\Mekdffee.exe
                                                                                C:\Windows\system32\Mekdffee.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Modifies registry class
                                                                                PID:3800
                                                                                • C:\Windows\SysWOW64\Mkgmoncl.exe
                                                                                  C:\Windows\system32\Mkgmoncl.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:3952
                                                                                  • C:\Windows\SysWOW64\Maaekg32.exe
                                                                                    C:\Windows\system32\Maaekg32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    PID:2260
                                                                                    • C:\Windows\SysWOW64\Mdpagc32.exe
                                                                                      C:\Windows\system32\Mdpagc32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:3712
                                                                                      • C:\Windows\SysWOW64\Moefdljc.exe
                                                                                        C:\Windows\system32\Moefdljc.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Modifies registry class
                                                                                        PID:780
                                                                                        • C:\Windows\SysWOW64\Mcabej32.exe
                                                                                          C:\Windows\system32\Mcabej32.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2776
                                                                                          • C:\Windows\SysWOW64\Madbagif.exe
                                                                                            C:\Windows\system32\Madbagif.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:3956
                                                                                            • C:\Windows\SysWOW64\Mccokj32.exe
                                                                                              C:\Windows\system32\Mccokj32.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:2812
                                                                                              • C:\Windows\SysWOW64\Mhpgca32.exe
                                                                                                C:\Windows\system32\Mhpgca32.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:1224
                                                                                                • C:\Windows\SysWOW64\Mkocol32.exe
                                                                                                  C:\Windows\system32\Mkocol32.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1772
                                                                                                  • C:\Windows\SysWOW64\Nhbciqln.exe
                                                                                                    C:\Windows\system32\Nhbciqln.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:220
                                                                                                    • C:\Windows\SysWOW64\Nchhfild.exe
                                                                                                      C:\Windows\system32\Nchhfild.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2040
                                                                                                      • C:\Windows\SysWOW64\Ndidna32.exe
                                                                                                        C:\Windows\system32\Ndidna32.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        PID:1068
                                                                                                        • C:\Windows\SysWOW64\Nlqloo32.exe
                                                                                                          C:\Windows\system32\Nlqloo32.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:1356
                                                                                                          • C:\Windows\SysWOW64\Ncjdki32.exe
                                                                                                            C:\Windows\system32\Ncjdki32.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:2628
                                                                                                            • C:\Windows\SysWOW64\Nfiagd32.exe
                                                                                                              C:\Windows\system32\Nfiagd32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              PID:4588
                                                                                                              • C:\Windows\SysWOW64\Nkeipk32.exe
                                                                                                                C:\Windows\system32\Nkeipk32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Modifies registry class
                                                                                                                PID:5000
                                                                                                                • C:\Windows\SysWOW64\Ncmaai32.exe
                                                                                                                  C:\Windows\system32\Ncmaai32.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:1604
                                                                                                                  • C:\Windows\SysWOW64\Nhjjip32.exe
                                                                                                                    C:\Windows\system32\Nhjjip32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Modifies registry class
                                                                                                                    PID:3900
                                                                                                                    • C:\Windows\SysWOW64\Nkhfek32.exe
                                                                                                                      C:\Windows\system32\Nkhfek32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:1980
                                                                                                                      • C:\Windows\SysWOW64\Nconfh32.exe
                                                                                                                        C:\Windows\system32\Nconfh32.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:1808
                                                                                                                        • C:\Windows\SysWOW64\Ndpjnq32.exe
                                                                                                                          C:\Windows\system32\Ndpjnq32.exe
                                                                                                                          60⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          PID:4820
                                                                                                                          • C:\Windows\SysWOW64\Nlgbon32.exe
                                                                                                                            C:\Windows\system32\Nlgbon32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:3240
                                                                                                                            • C:\Windows\SysWOW64\Nkjckkcg.exe
                                                                                                                              C:\Windows\system32\Nkjckkcg.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:5132
                                                                                                                              • C:\Windows\SysWOW64\Ncaklhdi.exe
                                                                                                                                C:\Windows\system32\Ncaklhdi.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:5172
                                                                                                                                • C:\Windows\SysWOW64\Nbdkhe32.exe
                                                                                                                                  C:\Windows\system32\Nbdkhe32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:5212
                                                                                                                                  • C:\Windows\SysWOW64\Odbgdp32.exe
                                                                                                                                    C:\Windows\system32\Odbgdp32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:5256
                                                                                                                                    • C:\Windows\SysWOW64\Oljoen32.exe
                                                                                                                                      C:\Windows\system32\Oljoen32.exe
                                                                                                                                      66⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:5300
                                                                                                                                      • C:\Windows\SysWOW64\Oohkai32.exe
                                                                                                                                        C:\Windows\system32\Oohkai32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:5348
                                                                                                                                        • C:\Windows\SysWOW64\Obfhmd32.exe
                                                                                                                                          C:\Windows\system32\Obfhmd32.exe
                                                                                                                                          68⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:5392
                                                                                                                                          • C:\Windows\SysWOW64\Odedipge.exe
                                                                                                                                            C:\Windows\system32\Odedipge.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:5432
                                                                                                                                            • C:\Windows\SysWOW64\Ollljmhg.exe
                                                                                                                                              C:\Windows\system32\Ollljmhg.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:5476
                                                                                                                                              • C:\Windows\SysWOW64\Ookhfigk.exe
                                                                                                                                                C:\Windows\system32\Ookhfigk.exe
                                                                                                                                                71⤵
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:5524
                                                                                                                                                • C:\Windows\SysWOW64\Obidcdfo.exe
                                                                                                                                                  C:\Windows\system32\Obidcdfo.exe
                                                                                                                                                  72⤵
                                                                                                                                                    PID:5568
                                                                                                                                                    • C:\Windows\SysWOW64\Ohcmpn32.exe
                                                                                                                                                      C:\Windows\system32\Ohcmpn32.exe
                                                                                                                                                      73⤵
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:5612
                                                                                                                                                      • C:\Windows\SysWOW64\Oomelheh.exe
                                                                                                                                                        C:\Windows\system32\Oomelheh.exe
                                                                                                                                                        74⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:5660
                                                                                                                                                        • C:\Windows\SysWOW64\Ofgmib32.exe
                                                                                                                                                          C:\Windows\system32\Ofgmib32.exe
                                                                                                                                                          75⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:5704
                                                                                                                                                          • C:\Windows\SysWOW64\Odjmdocp.exe
                                                                                                                                                            C:\Windows\system32\Odjmdocp.exe
                                                                                                                                                            76⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:5748
                                                                                                                                                            • C:\Windows\SysWOW64\Omaeem32.exe
                                                                                                                                                              C:\Windows\system32\Omaeem32.exe
                                                                                                                                                              77⤵
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:5792
                                                                                                                                                              • C:\Windows\SysWOW64\Oooaah32.exe
                                                                                                                                                                C:\Windows\system32\Oooaah32.exe
                                                                                                                                                                78⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:5836
                                                                                                                                                                • C:\Windows\SysWOW64\Obnnnc32.exe
                                                                                                                                                                  C:\Windows\system32\Obnnnc32.exe
                                                                                                                                                                  79⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:5880
                                                                                                                                                                  • C:\Windows\SysWOW64\Odljjo32.exe
                                                                                                                                                                    C:\Windows\system32\Odljjo32.exe
                                                                                                                                                                    80⤵
                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                    PID:5924
                                                                                                                                                                    • C:\Windows\SysWOW64\Ohhfknjf.exe
                                                                                                                                                                      C:\Windows\system32\Ohhfknjf.exe
                                                                                                                                                                      81⤵
                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                      PID:5968
                                                                                                                                                                      • C:\Windows\SysWOW64\Okfbgiij.exe
                                                                                                                                                                        C:\Windows\system32\Okfbgiij.exe
                                                                                                                                                                        82⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:6012
                                                                                                                                                                        • C:\Windows\SysWOW64\Ocmjhfjl.exe
                                                                                                                                                                          C:\Windows\system32\Ocmjhfjl.exe
                                                                                                                                                                          83⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          PID:6056
                                                                                                                                                                          • C:\Windows\SysWOW64\Oflfdbip.exe
                                                                                                                                                                            C:\Windows\system32\Oflfdbip.exe
                                                                                                                                                                            84⤵
                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:6100
                                                                                                                                                                            • C:\Windows\SysWOW64\Pijcpmhc.exe
                                                                                                                                                                              C:\Windows\system32\Pijcpmhc.exe
                                                                                                                                                                              85⤵
                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:3936
                                                                                                                                                                              • C:\Windows\SysWOW64\Pkholi32.exe
                                                                                                                                                                                C:\Windows\system32\Pkholi32.exe
                                                                                                                                                                                86⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:5156
                                                                                                                                                                                • C:\Windows\SysWOW64\Pilpfm32.exe
                                                                                                                                                                                  C:\Windows\system32\Pilpfm32.exe
                                                                                                                                                                                  87⤵
                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:5236
                                                                                                                                                                                  • C:\Windows\SysWOW64\Pkklbh32.exe
                                                                                                                                                                                    C:\Windows\system32\Pkklbh32.exe
                                                                                                                                                                                    88⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    PID:5312
                                                                                                                                                                                    • C:\Windows\SysWOW64\Pcbdcf32.exe
                                                                                                                                                                                      C:\Windows\system32\Pcbdcf32.exe
                                                                                                                                                                                      89⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:5384
                                                                                                                                                                                      • C:\Windows\SysWOW64\Pfppoa32.exe
                                                                                                                                                                                        C:\Windows\system32\Pfppoa32.exe
                                                                                                                                                                                        90⤵
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:5464
                                                                                                                                                                                        • C:\Windows\SysWOW64\Piolkm32.exe
                                                                                                                                                                                          C:\Windows\system32\Piolkm32.exe
                                                                                                                                                                                          91⤵
                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5536
                                                                                                                                                                                          • C:\Windows\SysWOW64\Pkmhgh32.exe
                                                                                                                                                                                            C:\Windows\system32\Pkmhgh32.exe
                                                                                                                                                                                            92⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            PID:5604
                                                                                                                                                                                            • C:\Windows\SysWOW64\Pcdqhecd.exe
                                                                                                                                                                                              C:\Windows\system32\Pcdqhecd.exe
                                                                                                                                                                                              93⤵
                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              PID:5672
                                                                                                                                                                                              • C:\Windows\SysWOW64\Pbgqdb32.exe
                                                                                                                                                                                                C:\Windows\system32\Pbgqdb32.exe
                                                                                                                                                                                                94⤵
                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                PID:5740
                                                                                                                                                                                                • C:\Windows\SysWOW64\Peempn32.exe
                                                                                                                                                                                                  C:\Windows\system32\Peempn32.exe
                                                                                                                                                                                                  95⤵
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  PID:5808
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Piaiqlak.exe
                                                                                                                                                                                                    C:\Windows\system32\Piaiqlak.exe
                                                                                                                                                                                                    96⤵
                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    PID:5876
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Pokanf32.exe
                                                                                                                                                                                                      C:\Windows\system32\Pokanf32.exe
                                                                                                                                                                                                      97⤵
                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                      PID:5960
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Pbimjb32.exe
                                                                                                                                                                                                        C:\Windows\system32\Pbimjb32.exe
                                                                                                                                                                                                        98⤵
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:6020
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Pfeijqqe.exe
                                                                                                                                                                                                          C:\Windows\system32\Pfeijqqe.exe
                                                                                                                                                                                                          99⤵
                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                          PID:6084
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Piceflpi.exe
                                                                                                                                                                                                            C:\Windows\system32\Piceflpi.exe
                                                                                                                                                                                                            100⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:2208
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Pkabbgol.exe
                                                                                                                                                                                                              C:\Windows\system32\Pkabbgol.exe
                                                                                                                                                                                                              101⤵
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:5220
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Pbljoafi.exe
                                                                                                                                                                                                                C:\Windows\system32\Pbljoafi.exe
                                                                                                                                                                                                                102⤵
                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                PID:5380
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Qejfkmem.exe
                                                                                                                                                                                                                  C:\Windows\system32\Qejfkmem.exe
                                                                                                                                                                                                                  103⤵
                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                  PID:5468
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Qppkhfec.exe
                                                                                                                                                                                                                    C:\Windows\system32\Qppkhfec.exe
                                                                                                                                                                                                                    104⤵
                                                                                                                                                                                                                      PID:5520
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Qbngeadf.exe
                                                                                                                                                                                                                        C:\Windows\system32\Qbngeadf.exe
                                                                                                                                                                                                                        105⤵
                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                        PID:5668
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Qelcamcj.exe
                                                                                                                                                                                                                          C:\Windows\system32\Qelcamcj.exe
                                                                                                                                                                                                                          106⤵
                                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                          PID:5784
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Qmckbjdl.exe
                                                                                                                                                                                                                            C:\Windows\system32\Qmckbjdl.exe
                                                                                                                                                                                                                            107⤵
                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            PID:5888
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Qkfkng32.exe
                                                                                                                                                                                                                              C:\Windows\system32\Qkfkng32.exe
                                                                                                                                                                                                                              108⤵
                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:6008
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Aijlgkjq.exe
                                                                                                                                                                                                                                C:\Windows\system32\Aijlgkjq.exe
                                                                                                                                                                                                                                109⤵
                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:6108
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Acppddig.exe
                                                                                                                                                                                                                                  C:\Windows\system32\Acppddig.exe
                                                                                                                                                                                                                                  110⤵
                                                                                                                                                                                                                                    PID:5248
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Aimhmkgn.exe
                                                                                                                                                                                                                                      C:\Windows\system32\Aimhmkgn.exe
                                                                                                                                                                                                                                      111⤵
                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                      PID:5452
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Alkeifga.exe
                                                                                                                                                                                                                                        C:\Windows\system32\Alkeifga.exe
                                                                                                                                                                                                                                        112⤵
                                                                                                                                                                                                                                          PID:5532
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Afqifo32.exe
                                                                                                                                                                                                                                            C:\Windows\system32\Afqifo32.exe
                                                                                                                                                                                                                                            113⤵
                                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                            PID:5756
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Aioebj32.exe
                                                                                                                                                                                                                                              C:\Windows\system32\Aioebj32.exe
                                                                                                                                                                                                                                              114⤵
                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              PID:5936
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Acdioc32.exe
                                                                                                                                                                                                                                                C:\Windows\system32\Acdioc32.exe
                                                                                                                                                                                                                                                115⤵
                                                                                                                                                                                                                                                  PID:6092
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Aeffgkkp.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\Aeffgkkp.exe
                                                                                                                                                                                                                                                    116⤵
                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                    PID:5336
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Aehbmk32.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\Aehbmk32.exe
                                                                                                                                                                                                                                                      117⤵
                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                      PID:5716
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Albkieqj.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\Albkieqj.exe
                                                                                                                                                                                                                                                        118⤵
                                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        PID:5912
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Apngjd32.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\Apngjd32.exe
                                                                                                                                                                                                                                                          119⤵
                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                          PID:5292
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Bblcfo32.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\Bblcfo32.exe
                                                                                                                                                                                                                                                            120⤵
                                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                            PID:6052
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Bejobk32.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\Bejobk32.exe
                                                                                                                                                                                                                                                              121⤵
                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                              PID:5844
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Bifkcioc.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\Bifkcioc.exe
                                                                                                                                                                                                                                                                122⤵
                                                                                                                                                                                                                                                                  PID:6000
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Bldgoeog.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\Bldgoeog.exe
                                                                                                                                                                                                                                                                    123⤵
                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                    PID:6160
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Bclppboi.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\Bclppboi.exe
                                                                                                                                                                                                                                                                      124⤵
                                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                      PID:6204
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Bmddihfj.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\Bmddihfj.exe
                                                                                                                                                                                                                                                                        125⤵
                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        PID:6248
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Beoimjce.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\Beoimjce.exe
                                                                                                                                                                                                                                                                          126⤵
                                                                                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                                          PID:6292
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Bcpika32.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\Bcpika32.exe
                                                                                                                                                                                                                                                                            127⤵
                                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                            PID:6336
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Blknpdho.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\Blknpdho.exe
                                                                                                                                                                                                                                                                              128⤵
                                                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                                                              PID:6380
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Bcbeqaia.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\Bcbeqaia.exe
                                                                                                                                                                                                                                                                                129⤵
                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                PID:6424
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Bedbhi32.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\Bedbhi32.exe
                                                                                                                                                                                                                                                                                  130⤵
                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                  PID:6468
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Bmkjig32.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\Bmkjig32.exe
                                                                                                                                                                                                                                                                                    131⤵
                                                                                                                                                                                                                                                                                      PID:6512
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Cpifeb32.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\Cpifeb32.exe
                                                                                                                                                                                                                                                                                        132⤵
                                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                        PID:6556
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Cefoni32.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\Cefoni32.exe
                                                                                                                                                                                                                                                                                          133⤵
                                                                                                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                          PID:6604
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Cmmgof32.exe
                                                                                                                                                                                                                                                                                            C:\Windows\system32\Cmmgof32.exe
                                                                                                                                                                                                                                                                                            134⤵
                                                                                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                            PID:6648
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Cdgolq32.exe
                                                                                                                                                                                                                                                                                              C:\Windows\system32\Cdgolq32.exe
                                                                                                                                                                                                                                                                                              135⤵
                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                              PID:6696
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Cidgdg32.exe
                                                                                                                                                                                                                                                                                                C:\Windows\system32\Cidgdg32.exe
                                                                                                                                                                                                                                                                                                136⤵
                                                                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                                PID:6740
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Cdjlap32.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\system32\Cdjlap32.exe
                                                                                                                                                                                                                                                                                                  137⤵
                                                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                                  PID:6784
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Cifdjg32.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\system32\Cifdjg32.exe
                                                                                                                                                                                                                                                                                                    138⤵
                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                                    PID:6828
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Cemeoh32.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\Cemeoh32.exe
                                                                                                                                                                                                                                                                                                      139⤵
                                                                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                      PID:6876
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Cbaehl32.exe
                                                                                                                                                                                                                                                                                                        C:\Windows\system32\Cbaehl32.exe
                                                                                                                                                                                                                                                                                                        140⤵
                                                                                                                                                                                                                                                                                                          PID:6920
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Clijablo.exe
                                                                                                                                                                                                                                                                                                            C:\Windows\system32\Clijablo.exe
                                                                                                                                                                                                                                                                                                            141⤵
                                                                                                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                                            PID:6964
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Dbcbnlcl.exe
                                                                                                                                                                                                                                                                                                              C:\Windows\system32\Dbcbnlcl.exe
                                                                                                                                                                                                                                                                                                              142⤵
                                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                              PID:7008
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Dllffa32.exe
                                                                                                                                                                                                                                                                                                                C:\Windows\system32\Dllffa32.exe
                                                                                                                                                                                                                                                                                                                143⤵
                                                                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                PID:7052
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Dedkogqm.exe
                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\Dedkogqm.exe
                                                                                                                                                                                                                                                                                                                  144⤵
                                                                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                                  PID:7096
                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Ddekmo32.exe
                                                                                                                                                                                                                                                                                                                    C:\Windows\system32\Ddekmo32.exe
                                                                                                                                                                                                                                                                                                                    145⤵
                                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                    PID:7140
                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Dpllbp32.exe
                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\Dpllbp32.exe
                                                                                                                                                                                                                                                                                                                      146⤵
                                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                                      PID:6168
                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Dbkhnk32.exe
                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\Dbkhnk32.exe
                                                                                                                                                                                                                                                                                                                        147⤵
                                                                                                                                                                                                                                                                                                                          PID:6236
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 6236 -s 400
                                                                                                                                                                                                                                                                                                                            148⤵
                                                                                                                                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                                                                                                                                            PID:6372
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4156,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4124 /prefetch:8
                      1⤵
                        PID:5688
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6236 -ip 6236
                        1⤵
                          PID:6328

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\SysWOW64\Aeffgkkp.exe

                          Filesize

                          52KB

                          MD5

                          d93684960d09bcb923b9f07015985f01

                          SHA1

                          2c003ee3b6468ea4b7de82ad5d229977a1a87f95

                          SHA256

                          565e4da079320d408862848d26fd5a1319ccf9605398b27d92da22327e2c43ca

                          SHA512

                          1fa71d50d7b15f564917b042c0eab4ffcd0ab86edab3f8387634146ba8cbacdabdf789f64982298f89901ca384a807bca17b46ae4a05f8be5886d043b46fb755

                        • C:\Windows\SysWOW64\Bcpika32.exe

                          Filesize

                          52KB

                          MD5

                          99904e0705c6537a4b77299b48de3025

                          SHA1

                          21c9511c5fac39e988766ba026f562b1f96d37b4

                          SHA256

                          3696d86a93005cd0e6e96b163c202967a8e669b0d101c1d31f32534a0a63bc78

                          SHA512

                          33c8c6977d410e6a37af5f801caf6aa7775d7dff4e4e2f8e981837f9274e48af7e7643667014a29c527f904bc37e2bcfdf373c01eeba41e9e17fa0948d0adcc9

                        • C:\Windows\SysWOW64\Cefoni32.exe

                          Filesize

                          52KB

                          MD5

                          cdc3dc4981a2b01313e0fc579ead121e

                          SHA1

                          f4b3665ff68642f1e14ba009f73e82d4280a9297

                          SHA256

                          bf31baa227a2d43562a8b11eaee9a777199552be47ac421ddd4e5f6d15722ddb

                          SHA512

                          f7c37cc85d58ea740c7474aa4c2b071e1667b06fb79778ca5c7cc99720a3dd83e27f9a8903bad06bf81b9e9a013fc5c313cdeddbb914efa4b25507be30fcf6bf

                        • C:\Windows\SysWOW64\Ddekmo32.exe

                          Filesize

                          52KB

                          MD5

                          df8992f899f61a9ddb488deb5fe5b2f1

                          SHA1

                          86628cdaa73370ace9f3df1ce0246a42ae6fa863

                          SHA256

                          8af8486536c95336241a18b24968e31a51c0b2a9d2afa8a9a8f943b9d19e5d16

                          SHA512

                          bb94768115c7500247a9e11441a33449495f82238e4c39dcc942a6e1bceebe7da163e1665110a5e16fff2fcec8f9976892d256bd340ac3f782a80731f5fe7714

                        • C:\Windows\SysWOW64\Janghmia.exe

                          Filesize

                          52KB

                          MD5

                          da94f21f6a8db80aa231a20a2bf82708

                          SHA1

                          c6249e1e4c043c952e2dc86daa3cc99588a897ca

                          SHA256

                          3edcb2cb8308fc998808fdcabc6a79348555db7ac69f0f0f5dfa1070b0688525

                          SHA512

                          b56fc89917bb507434a1d6c0c968bb9f14c89128edfea90b9bcfda92e0758d1159761759f632304784096083baa5762c3dcbce497279dfa9553da2e1178630b5

                        • C:\Windows\SysWOW64\Jaqcnl32.exe

                          Filesize

                          52KB

                          MD5

                          dc3cba5ca4d786da31bbaa123a325dda

                          SHA1

                          1214fcaf6bb396ab589e5aec1823229786f4c387

                          SHA256

                          b8851d1dd7f137c50bced9d15c1b8d4612b7a62630717c40d345da9b1f7fc814

                          SHA512

                          833b463ec28ef68cbf253d979113d48cffaa8e1804821d01bcbd9c4d8b8a5cefc624cd520bfa5ee29614c4fdc32b8d76f0bbac71214d2007e894e706066ca0e9

                        • C:\Windows\SysWOW64\Jbbmmo32.exe

                          Filesize

                          52KB

                          MD5

                          a28be60d1f1479baa97542ae0ecff4c7

                          SHA1

                          6e1c36996e75637a4e5e68ee373de1bd3c2336a8

                          SHA256

                          fdf7d2e99a6c44574f9db1e214b46b43dbc7e4154b4ee16c649daa8c84f2e4f3

                          SHA512

                          dea0953f2ecad543690c2e6fd4406e6718e17ecf6086eb65a6a91ff3cbdab48ad38044f04954b6c995368458c9d819e800efd91e74322bf96f6f77a8866efc96

                        • C:\Windows\SysWOW64\Jbppgona.exe

                          Filesize

                          52KB

                          MD5

                          9cd71c33f52b18ceab76d4a18b2729ee

                          SHA1

                          fce5dc87b6092ec44809ef31ca9bf53f20ea84aa

                          SHA256

                          fd214d775313986860fd1f0729e531286603725bcad8c57596e4a35d8cdb7e8e

                          SHA512

                          65921095d8380b5a20bc4610d5e9f395b62c38e05a688291523e696370c7340e3203e7660dd91e9e30b1a208e6d3e41a30f492b2cf3160b5cce92be053401d44

                        • C:\Windows\SysWOW64\Jejbhk32.exe

                          Filesize

                          52KB

                          MD5

                          9e2c9d8f29de3f122facdc613eaf3689

                          SHA1

                          ba9819dd96ec8f7288811173722585c46e36e171

                          SHA256

                          9f7a61c2abb72f1e78adb337be369576dbb5a3a43ddf1cbace5666ab481b0299

                          SHA512

                          f3536c9cd2c149d0f93648e003f36dddbd4474ba190b4cd78b3069a2fb3e110d68535150b13cfdb71eca05f6073315248495ec35c7dec24bf0540b488ff7e2e5

                        • C:\Windows\SysWOW64\Jhkljfok.exe

                          Filesize

                          52KB

                          MD5

                          16a39a51cbd69c44d128edf52d372aa2

                          SHA1

                          81f7b1066b227e63439048c213bc4a8c750051b6

                          SHA256

                          85b58f70062212eb8eb84a0cd0b407aa0ca008b509879440d7283dec3bde578e

                          SHA512

                          f1675c1d02980ebd46805cd5d6d92e023d483806037a3edfea09b878846e218b4a39c5af7adf63668b5d2953fd3a8d012aba987d579c516f3369c2b908033c63

                        • C:\Windows\SysWOW64\Jhmhpfmi.exe

                          Filesize

                          52KB

                          MD5

                          ec53a34bf20603cfb346b48d21fa979a

                          SHA1

                          2fe41f6ee848ee5489d61af36f0f9189a2d53f01

                          SHA256

                          3509faecb96ec49b37506dea3bcb0a178a86be37d48f3bb4138a1e5f126f5878

                          SHA512

                          420905a6bc7f80766322750c7ac6b495bfd9f3c1f9a57dff76244c28757cc91303ad14d168d6d091ac6f3f54a0d793ec89ad1b3e5e46734d52190428720a5a49

                        • C:\Windows\SysWOW64\Jhoeef32.exe

                          Filesize

                          52KB

                          MD5

                          a945b95893af744f7069c94a4dd7f7cd

                          SHA1

                          9d506cc4f404c6c3c33778829e1465ac2db396d5

                          SHA256

                          37b49a9f4e960e12db1bf12280d367ce8f1fb915b8ccf017603f1da96c204606

                          SHA512

                          c6974ecfdc18ad82e41a7848dce6a70a1fa0d911420fd909be37a1eff74f4cc289b98bc96d99139af2ff4e0c27c1c07e552f15ff239f5c08be9dff08abde82bf

                        • C:\Windows\SysWOW64\Jjgkab32.exe

                          Filesize

                          52KB

                          MD5

                          be2b68c335b3d0c7ad0e7b7b13c8d6b1

                          SHA1

                          26e5f408cce42c82535c5af014c78935a88e8df5

                          SHA256

                          c31c39e5068276960a46b7870f750183edb597875a631854e0407cf185374088

                          SHA512

                          9e97c934434bb2729c87e605c0d4c628393717ff5a404cad87ca7ddf319d144558db9a55645bbae2b2777dc84a64637267e391697d0f21202ab1167d6436c03e

                        • C:\Windows\SysWOW64\Jjihfbno.exe

                          Filesize

                          52KB

                          MD5

                          cc1173939ee8dbddeccf7c1c935a3be4

                          SHA1

                          d0a8c8891a25819f2d0604a761faf56bab11e697

                          SHA256

                          efaeda816a6dd2ef68801ae9a622e07966c3d7c283ceea98301acc83741f31de

                          SHA512

                          eb9d2cf864d4fd867c7f21c0cc21208026729490a0711eb6b308e081a042c55cca3842e87548ee0f56fd674b56e13bb2b67c70feceffbfa2f1328bd1ab8451dc

                        • C:\Windows\SysWOW64\Jlidpe32.exe

                          Filesize

                          52KB

                          MD5

                          9df93d2ecf9d30963f02bbc070428bc8

                          SHA1

                          1407a55f76d3e407534efaf0a836975856274960

                          SHA256

                          ed781bde7cce84bf47ac2d6a4739d554323e49b86ce647ac43d1d8f178b20851

                          SHA512

                          32b967fb657bc4ed6374c48f5967fed7512223d011d600d56417eef8f686b630475e0b3c55a9b0793088f538998d1f2cd4791f880193569bd393cda92de68cf3

                        • C:\Windows\SysWOW64\Kbnlim32.exe

                          Filesize

                          52KB

                          MD5

                          51eff9a056dfce06f34e184e4dd09636

                          SHA1

                          f9d56c84af6684be8f318b7fd26643746b68607b

                          SHA256

                          a43357207fc43716c9753109015fafe3b5b7a8c672f7c05de5771a0e34e70e9c

                          SHA512

                          833d5717a29e59c11cb15950b1bb7fcc0c0ff5594da6daef71d3f4a40c3cc8b45bbcbd52f91e5fe5f91c44f4933480eff6212cbbcc9b348520a98b1cda0a6df2

                        • C:\Windows\SysWOW64\Kdffjgpj.exe

                          Filesize

                          52KB

                          MD5

                          cf434637165394c57afcb88a7670b9c5

                          SHA1

                          546e9f05688a9bfd9ef77faf49a051596276bd02

                          SHA256

                          f05f7ff4adf564110e732c0b6eb581bfcad0f9e2bf4497ac17973c925c3592eb

                          SHA512

                          09395936389be1f50b8eed2c087f22aed869ca3803b37a8882153c69d94c08c91224531da84151cddc2b52ee7a1e087eca57555b9ce71e4e38ee6ff002fd3f67

                        • C:\Windows\SysWOW64\Kdkoef32.exe

                          Filesize

                          52KB

                          MD5

                          f0ad2db9dc63e1bdd4d902835dcf9c83

                          SHA1

                          1918b1ef46494976fd7f4d0f8cae66d5a3022480

                          SHA256

                          7a34c18f7f21b3b8ed38cfa802b18219bb514705f6c980ebe393095a08ac09ce

                          SHA512

                          b0ecfe9e5695361aa98ada12d3429a44dd2044d1b1a6bf65f0ac1127a48e08cd71624538d2eadd84ff1bb9ce9d743c8ca8cd1a7de21df7ec86d550c3be2971d8

                        • C:\Windows\SysWOW64\Kefbdjgm.exe

                          Filesize

                          52KB

                          MD5

                          0d9099ede37c584df7c129f1bdbaa6f4

                          SHA1

                          ce9280e732726ba114cfe1aac6ac144857af3ec6

                          SHA256

                          ec22b37c26b62ddf7007833ce6416d013f124538e82f7b7ff751d4f9eecd1b4b

                          SHA512

                          09f7b010255e8d4dffab7d249f89438b5ac6d79c9788ce67434e24f0cfec3e3c37d27f50a17cfefda99901d5cdfdf2a212dcf1a4c30d39533d658b949c8671eb

                        • C:\Windows\SysWOW64\Kehojiej.exe

                          Filesize

                          52KB

                          MD5

                          afaefe37b4ecd6bbecfe160829b5745d

                          SHA1

                          52b1056ee305b219e12deb37a485ae1df18ca4e9

                          SHA256

                          8896ba625e23683cf36d6933bbcbb536384d953664cdf46868e0c0582ac2b35f

                          SHA512

                          ff4811dc923b9e93184a7a5a248582371f1db26311feec9ccc7c17d638f16818c44c736b045a6db77c3bcb8a191525a93e95674025c1319f472dd2d9f86948ed

                        • C:\Windows\SysWOW64\Khabke32.exe

                          Filesize

                          52KB

                          MD5

                          cb79e1132448aa7e21734fea507972f4

                          SHA1

                          850a1635729a0f659b0dd3eb42f15420a2b60207

                          SHA256

                          5837f9b68e3a12ce4eb1b7cb737c43d275c640e546158bcdee47ce68e5cb10ca

                          SHA512

                          7f850844882e3fa91ce9e3262b53e10551ae491b1c6213fc8ab21c9f2a4c206dd9cccae56cf05fb91a50900c7c64df5e65f487ee9f12ccbef0273f53d44319da

                        • C:\Windows\SysWOW64\Kkegbpca.exe

                          Filesize

                          52KB

                          MD5

                          2eb996ee86e6eb8deddfd5336d44c6d9

                          SHA1

                          39573bd0eb7798cfdab80f35ef1cc37a2ea88344

                          SHA256

                          a73e31ac997d3d0d0d633b45d15425e8a4785cad0fdc9d8f2d74fa9e98146a46

                          SHA512

                          ce5179b599165d36882d0160387f8a9a667ee603f1bc1e3aeca1346cd25da12a361e01a067f32c68df1baeaee74b973c1e8627d6820afbfb9659de21c8d3b7d7

                        • C:\Windows\SysWOW64\Kkgdhp32.exe

                          Filesize

                          52KB

                          MD5

                          1e70b8b33a671361ddc8317a33ba59fa

                          SHA1

                          334fcfe35578a7ba335ee834f0289ac3b5b23041

                          SHA256

                          ffac7eb9b68741b5ff417975af75d5874872e63260cf6a6156fe596cbc477983

                          SHA512

                          593582252a040f9af86b737de8f1f71fbeb68206e27219b99d9fa932a7aa7beade0abf95c160d97decc3362eeb159c973bca9b40622715414fa7cbaf345eef88

                        • C:\Windows\SysWOW64\Klddlckd.exe

                          Filesize

                          52KB

                          MD5

                          528d0234ac413ddc16b29c0fdc86c8f3

                          SHA1

                          3a7b8bedf581e4b86183e1b523627631ee9317e9

                          SHA256

                          161a86f1d5cae5b9188beffab4f8d5cc6dd5a3f2b1ad67de845ca140b6e5b73f

                          SHA512

                          177ccedd53cbf66a584e6fc3053d5e7e3dcf89726e08ffa2749f61a29749bdc4730086c2281634acb883ec408e498ce83e5b6b6521856d4172f48d695283c631

                        • C:\Windows\SysWOW64\Klgqabib.exe

                          Filesize

                          52KB

                          MD5

                          9b881ea42059ade7202c04a4f9390ac0

                          SHA1

                          cb40cdd2d143ae6ad2724f14ca4f231e62ecdf8d

                          SHA256

                          ec3fae012622bf221e1a93acdeec98c6ab5239b906242ba1a09d59a0b897c780

                          SHA512

                          9db57fbc80caf2cd552bbdb63e3e501574730d9dce790d7d3e133dea3b6e53e4bcaccdd16b700d4f273a31121ef1beab2c40c45df154825992a2ae698fe7957b

                        • C:\Windows\SysWOW64\Klpjad32.exe

                          Filesize

                          52KB

                          MD5

                          4b6de7d911b00be45305c6b886493e0b

                          SHA1

                          468c1f45a5bf5e5605d1e818faa6676288a7f21a

                          SHA256

                          35550349c5813d7120507c306fd1fc43f03fc6c6706e0e1197fa32a33045f32a

                          SHA512

                          0ad3d40b7a4435dcb9512c27cabdb91af5a90fd203ea27498d851e4f681cc601c00c5b34e1a8b90f24afbad71edb9460bdb6ea400152c6cedd15140e53285515

                        • C:\Windows\SysWOW64\Koimbpbc.exe

                          Filesize

                          52KB

                          MD5

                          2451de3e52e9df91dd46287dfc002bc5

                          SHA1

                          d0b34d36c00fbdaec1bde87a4e7decadb0c42958

                          SHA256

                          2f72d5f0b3ec5aabbcbad7bdbbd05ea6ccba9ba5934e4a6decb290f71335bdf0

                          SHA512

                          c665708411a094110db29b55b0d8253adbfacda69e0eccc1b8aff73fe7f003f4ddbf6261392459f74790739145abca5a22dbca623b536c495a22e03822456547

                        • C:\Windows\SysWOW64\Kongmo32.exe

                          Filesize

                          52KB

                          MD5

                          94aabca22007fa705188e9f1dc0269ce

                          SHA1

                          7e2c3acdbb8433a07cb1c4978a7a49f2db03b09c

                          SHA256

                          206cd7792334950340cde92d4a09931be3d6872e547582be2176ff083fcd890e

                          SHA512

                          d7daf8a0f4d60c0b70dbdebf4b22946305cde22d1c5830a208c9ffbc1faa5ef7f747dd31f9163a41c457fa951ea6344c67c02b2f5424bdf1c263adbee275500b

                        • C:\Windows\SysWOW64\Lacijjgi.exe

                          Filesize

                          52KB

                          MD5

                          bfc2728fb6396e32659f938389d888de

                          SHA1

                          d208fb311bc722d8837890486fea900c71ef3d8d

                          SHA256

                          dec339339651b5d9d3f4816abe4921016a08bddf9f7e493110d28147fbe6d6b5

                          SHA512

                          e890176c6698c9e09ac5ec5b3cb7ddada52e70d212a02b6da9389094316bb025c33640b326577524aa972568767d419bd7c2ed2a1bb397c9150a19baaad48549

                        • C:\Windows\SysWOW64\Lbhool32.exe

                          Filesize

                          52KB

                          MD5

                          605947df920e2481e69f1026ac477a6e

                          SHA1

                          877408301da8fd094db047bbaa6e2808e0dbcdfb

                          SHA256

                          f382444a4f0ea1eb7f27db866d136f38aec81bb14266aeb1684fa828fa63efb1

                          SHA512

                          b74ec1a562d4a80556ae4912d32d4677af72d419bc1fc5091b740350353f33f4879f21800011ef55cfeb962eaa440b8ebe1384ad0a56a4ef4c32ae992efee0ec

                        • C:\Windows\SysWOW64\Ldbefe32.exe

                          Filesize

                          52KB

                          MD5

                          6156853147a4f5867225fa56be68c63a

                          SHA1

                          f78031a6f2fde18c8e47d0b5373973bdf6845f98

                          SHA256

                          5547874a824f7da4206cfd1e0a85ad8e794ddf4bbc4529a8bac49797c648a9cb

                          SHA512

                          cd2a8a98f9872913ed2d086a0cd12043bf7f6c1bbdff2f43e67f20ec3ff2dd7d8e230f9fbbbf70d21a92b4763b5aaaf3c2f02df0be7e5cd781b290af7efa0094

                        • C:\Windows\SysWOW64\Lddble32.exe

                          Filesize

                          52KB

                          MD5

                          7ab283495b00b914b2a6e73dc7c0d35a

                          SHA1

                          265a11f520a2012e18e745aba1636a97f35091b5

                          SHA256

                          52a8fddb3ab4df5af33fac2135532fb7a0e1d1a378fce83ce05eb1d63f9f8fa3

                          SHA512

                          8dedadda8bfd6db4b5e2adf55444e91a6a49fdd9c08bb472e67f86f0cf7ff4ac58b9452ef3e372cd3359232f4ad824d139558892d8b19ead982259b91eb563a6

                        • C:\Windows\SysWOW64\Lknjhokg.exe

                          Filesize

                          52KB

                          MD5

                          6d67939822ad2555eb750ef316677914

                          SHA1

                          37b31ffa8e63afb7c45037b9745a8ac7d7390ffd

                          SHA256

                          a3a22e2c6570c3f969990d200070f30533dfbad828e7e94b0345ebd11181a732

                          SHA512

                          599ba9621583a4285e125799f72e4a9dbcd7de83fcbd1c11ad345ef3b59208b11a5ba742ea64866454bf26029fbd6558a88aed95109066798250ec1eb8f2838e

                        • C:\Windows\SysWOW64\Llngbabj.exe

                          Filesize

                          52KB

                          MD5

                          835ba858fe73da10b299fb492fed40df

                          SHA1

                          3be80d711ab94af92a23d28141839f468bfcd272

                          SHA256

                          66206e5d4b2c520738ce9fd4b3fbf8010ba52850e8c428d8c1473876c83462af

                          SHA512

                          76f1e7eeb38e2b7735306aec9019b1dba7319844ca68f6f6b8231e76636cbbaea44a42a55a4e2686d07d7e4e7593f87d5e1ef912f953ebc59d30be1195695c27

                        • C:\Windows\SysWOW64\Logicn32.exe

                          Filesize

                          52KB

                          MD5

                          a39b121912070289e2ddba2e2fcb5487

                          SHA1

                          f67c7db7888da69e2c6716e247ccdb9921466596

                          SHA256

                          7c290349d2e8123cd056ea514319e234885826f924e1d104a44d769d33687d0e

                          SHA512

                          02a1997a355aede33cad68f427615c3a97b386240a9c0633fd96a4920ef35174cddf3e4ee63c918dc3e1fd36dff6926b99da4d87039a728b7598417530a1bacb

                        • C:\Windows\SysWOW64\Lojfin32.exe

                          Filesize

                          52KB

                          MD5

                          7c3b1e1b61643df6dfd80500a2c5f748

                          SHA1

                          7829d7019f5b96ff1d3d232e29031721051848fd

                          SHA256

                          6b0c61e8454b5cdb9a701d35a72163e370750b67224448d32309d35ecdf115a5

                          SHA512

                          1b96b36b338a822b65eed7b0ad4aed6fabc9b21d286ce835bc62b52574631447ce2f6991eadca432e1180a48f12e838ec674ac1c3bb645a600db8ceaad55271e

                        • C:\Windows\SysWOW64\Mclhjkfa.exe

                          Filesize

                          52KB

                          MD5

                          27dcbdf42cca5a2ee1de52f510328ca6

                          SHA1

                          4544d3988bf0529fd4fd5dd749ff07639282028a

                          SHA256

                          215a344902de9f6eb3527c3d47baf11ff42091a10aff8ae5f5c383e741421cdd

                          SHA512

                          9f10169001f42bbbf9be42a343397e255d156ae807edbea26443387b91f33442b7d57051ca2667645445953151b38d6ec965380a0a4055e9bf965a989303d0b4

                        • C:\Windows\SysWOW64\Mdpagc32.exe

                          Filesize

                          52KB

                          MD5

                          a8537e6d76350f638afbf95927a5fbd8

                          SHA1

                          5e874de05b53a42678e210957c45d6daa35d3793

                          SHA256

                          ec93634113093f6e9ea15292cb1d8694a077601b80c77e6fdcbcd37445c792f1

                          SHA512

                          bb34ac5f3dfb0d991df1bfe39befc106e46680343676ae0ac88066b63e5d9684f64e93eeb23767bb8baf8c9994e100c6e9fb375c8e87b591730e3d44f172f890

                        • C:\Windows\SysWOW64\Mhpgca32.exe

                          Filesize

                          52KB

                          MD5

                          176ac4a7ea7ab9bf649496d559a7dc43

                          SHA1

                          5405072b0bd7fad5bc878ba520281b847dc408b9

                          SHA256

                          b62fac3799053b1305306ff2aeb6b4665165625bf288391bea6219932ca92217

                          SHA512

                          c81521be7a4732a0b64731faaf94b332c349a403f8908f3beb95c3d27f10376926e85473de45206ea72e3b9119376599815c583065ea91ca6b6395d7254c5acf

                        • C:\Windows\SysWOW64\Ocmjhfjl.exe

                          Filesize

                          52KB

                          MD5

                          e6564c96295eca034fee354672cab94a

                          SHA1

                          f53582d31a88c1aa8ba6e4d150c09ed1ba112f24

                          SHA256

                          aa3b9b40608f79d8afa8520efb95c85032ca803adc6fefa0ae7bc28866e88b61

                          SHA512

                          470dbc10c0ea07fd6c67ae94b134554ec23e29f9d56a48908970ccf94b3bc78f9f7ef3f98fb7d6a22bde839a5ba870560253d9cc1980df2fd896b89ab0bad219

                        • C:\Windows\SysWOW64\Oljoen32.exe

                          Filesize

                          52KB

                          MD5

                          a3fe8257f2e5fe0e4e907c6cb3308d3c

                          SHA1

                          2a1316064acbca1c43642436ee60da34c2c4304c

                          SHA256

                          1ad2ab24afdca700cc3fe3cce4b886abdf0cf7568ba327443c125210d58b7a6d

                          SHA512

                          0face1583116cec8bec9e85278daee1c3af3f2258aefdd600ba38b57806ffb8dd8a1f8d9f27c13cc06ee814eff479dce104efd5483a6f2cac570bf9a5235754a

                        • C:\Windows\SysWOW64\Pbljoafi.exe

                          Filesize

                          52KB

                          MD5

                          118c1dde2c3e751b704f681f754225b0

                          SHA1

                          8412a25b87b6367c143741cae550256e0a2d6ea4

                          SHA256

                          62221291ec73d005e2173196c97b47144339cf1d160b62da4466d1c143dedc21

                          SHA512

                          f2a691b979858c782c66a6b66076bf8cd8746ab10fe34791c92db7c8ae2751408841c7de7e863e64175ce4d80d405ff283598c25e2fe7f7c2fc44c5a8a6924b5

                        • C:\Windows\SysWOW64\Piceflpi.exe

                          Filesize

                          52KB

                          MD5

                          7975f1d84b76627e88f30a3f36fc8a07

                          SHA1

                          3ea989404cb5e30e862e1871ddf4e2f76eddf803

                          SHA256

                          3edc7994f104fc39ac171ed772a084fa0068fbc5647e579f609d128099155efa

                          SHA512

                          d6efba1a7374d626a2f6fb04ac60899307e12f0f3ce0958514472ef3a6128c845f29f9c0aba5c3b646fcfed9e214eda2452efc27dba0d4843d36e89ccb654399

                        • C:\Windows\SysWOW64\Pkmhgh32.exe

                          Filesize

                          52KB

                          MD5

                          c8644935952721bbce2d7f6e1a11c117

                          SHA1

                          2de49f5db18c42beaf0c4b8479a1657578314356

                          SHA256

                          3235b92e866883d33acdbdafb7e7546876810467221008671149ac8118209575

                          SHA512

                          da28ec4218216b275e9024b7b79c77d0efd15fe3e44201ed38f8148c143df7e248dab434e7cec4d5250944e25859c6ff6b331478184c36e9c5c6ef74690e6d1c

                        • memory/220-387-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/452-158-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/452-232-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/696-138-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/696-47-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/780-349-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/852-312-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/852-233-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/944-160-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/944-72-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/952-296-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/952-214-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1056-337-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1056-266-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1068-401-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1200-365-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1200-297-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1224-373-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1356-412-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1364-317-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1364-240-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1376-222-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1376-303-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1604-434-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/1772-380-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2040-394-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2156-230-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2156-142-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2260-331-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2260-400-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2284-304-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2284-372-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2528-187-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2528-97-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2544-289-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2544-205-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2628-418-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2672-183-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2776-356-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2812-433-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2812-366-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2944-290-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/2944-358-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3152-379-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3152-315-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3268-106-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3268-24-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3392-88-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3392-182-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3472-116-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3472-204-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3580-139-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3712-411-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3712-338-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3792-39-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3792-123-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3800-318-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3800-386-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3952-393-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3952-324-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3956-426-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3956-359-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3988-258-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/3988-169-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4048-255-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4128-330-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4128-259-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4188-275-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4188-348-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4220-124-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4220-213-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4256-32-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4256-115-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4292-283-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4292-355-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4408-96-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4408-16-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4452-282-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4452-197-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4468-55-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4468-141-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4576-107-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4576-196-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4588-420-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4600-12-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4632-79-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4632-0-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4652-274-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4652-190-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4704-63-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4704-151-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4912-80-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4912-168-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4980-254-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/4980-165-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB

                        • memory/5000-427-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB