Resubmissions
12-09-2024 02:23
240912-cvfznswere 1004-09-2024 00:09
240904-afvheascla 1003-09-2024 18:57
240903-xl8csavfrb 1003-09-2024 18:12
240903-ws828asgnm 10Analysis
-
max time kernel
308s -
max time network
313s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
12-09-2024 02:23
Behavioral task
behavioral1
Sample
Archive.zip
Resource
win10-20240611-en
General
-
Target
Archive.zip
-
Size
25.8MB
-
MD5
83671dbfab2418604f11993fdc392094
-
SHA1
5386d1fb94ec2974736a4d8895a2218855ffda69
-
SHA256
60b290310f67adb0ae186b4b938ca466a6b55653b2519261fa425127f5500a1f
-
SHA512
9cf982c9b2949f05ea4ab7d27b369924334cb9f8a0b85c374cf08ac059281ecf96c97088bb983f74033a1a8fba01f09c2f3f41ae3a60e7c79db8b6312edd5138
-
SSDEEP
786432:+r/Da8WA3C5BENmtAWzdVTkvq+GY8NEXcJap4DFEME/:4/W8WAS5BENmtZ1kvq+GYi8pw+T
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/2jTT3Lnj
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cipppc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daiegp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daiegp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Berbew.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Berbew.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cipppc32.exe -
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/4388-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2332-169-0x00000000000C0000-0x00000000000F0000-memory.dmp family_xworm -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
AgentTesla payload 2 IoCs
resource yara_rule behavioral1/memory/8848-1518-0x0000000000E40000-0x0000000000EEC000-memory.dmp family_agenttesla behavioral1/files/0x000700000001ae11-7909.dat family_agenttesla -
resource yara_rule behavioral1/files/0x000400000002b0dc-12269.dat cryptone -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2992-37-0x0000000000400000-0x000000000049F000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 3348 Cipppc32.exe 1360 Daiegp32.exe 4696 Dmbbaq32.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 9664 icacls.exe 7332 icacls.exe 7388 icacls.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/8848-1530-0x0000000002FA0000-0x0000000002FB4000-memory.dmp agile_net -
resource yara_rule behavioral1/memory/6028-605-0x0000000000400000-0x0000000002CE4000-memory.dmp upx behavioral1/memory/3652-408-0x0000000000400000-0x0000000002CE4000-memory.dmp upx behavioral1/memory/3652-213-0x0000000000400000-0x0000000002CE4000-memory.dmp upx behavioral1/memory/4388-40-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 61 iplogger.org 66 iplogger.org -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 geoiptool.com 26 ip-api.com 60 ip-api.com -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dmbbaq32.exe Daiegp32.exe File created C:\Windows\SysWOW64\Ffbhnh32.dll Daiegp32.exe File created C:\Windows\SysWOW64\Cipppc32.exe Berbew.exe File created C:\Windows\SysWOW64\Idngkghj.dll Berbew.exe File opened for modification C:\Windows\SysWOW64\Daiegp32.exe Cipppc32.exe File created C:\Windows\SysWOW64\Oddeop32.dll Cipppc32.exe File created C:\Windows\SysWOW64\Dmbbaq32.exe Daiegp32.exe File opened for modification C:\Windows\SysWOW64\Cipppc32.exe Berbew.exe File created C:\Windows\SysWOW64\Daiegp32.exe Cipppc32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2992 set thread context of 4328 2992 BetaBot.exe 92 PID 5104 set thread context of 4408 5104 SmokeLoader.exe 93 -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1744 sc.exe 1576 sc.exe 4044 sc.exe 6300 sc.exe 5980 sc.exe 5820 sc.exe 504 sc.exe 2968 sc.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 8872 7756 WerFault.exe 350 8552 7756 WerFault.exe 350 9376 7756 WerFault.exe 350 10208 7756 WerFault.exe 350 8588 6280 WerFault.exe 311 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmbbaq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SmokeLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BetaBot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language criticalupdate01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cipppc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daiegp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phorphiex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Berbew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Azorult.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 10160 timeout.exe 8868 timeout.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 8824 vssadmin.exe -
Kills process with taskkill 47 IoCs
pid Process 2044 taskkill.exe 1512 taskkill.exe 4884 taskkill.exe 2660 taskkill.exe 6120 taskkill.exe 2836 taskkill.exe 1764 taskkill.exe 2404 taskkill.exe 2940 taskkill.exe 2032 taskkill.exe 2212 taskkill.exe 3592 taskkill.exe 6128 taskkill.exe 1592 taskkill.exe 2012 taskkill.exe 3156 taskkill.exe 4560 taskkill.exe 5504 taskkill.exe 2808 taskkill.exe 2028 taskkill.exe 2732 taskkill.exe 304 taskkill.exe 3300 taskkill.exe 5084 taskkill.exe 4792 taskkill.exe 4076 taskkill.exe 6136 taskkill.exe 2664 taskkill.exe 2752 taskkill.exe 3588 taskkill.exe 1940 taskkill.exe 4760 taskkill.exe 2924 taskkill.exe 2004 taskkill.exe 4576 taskkill.exe 1896 taskkill.exe 1864 taskkill.exe 4556 taskkill.exe 2460 taskkill.exe 3320 taskkill.exe 2076 taskkill.exe 3256 taskkill.exe 2676 taskkill.exe 3816 taskkill.exe 2620 taskkill.exe 4732 taskkill.exe 3856 taskkill.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Berbew.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffbhnh32.dll" Daiegp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daiegp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node Berbew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} Berbew.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idngkghj.dll" Berbew.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oddeop32.dll" Cipppc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cipppc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daiegp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Berbew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID Berbew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cipppc32.exe -
Runs .reg file with regedit 2 IoCs
pid Process 8976 regedit.exe 9064 regedit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7432 schtasks.exe 11596 schtasks.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2024 31.exe 4976 Azorult.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3348 2788 Berbew.exe 493 PID 2788 wrote to memory of 3348 2788 Berbew.exe 493 PID 2788 wrote to memory of 3348 2788 Berbew.exe 493 PID 3348 wrote to memory of 1360 3348 Cipppc32.exe 90 PID 3348 wrote to memory of 1360 3348 Cipppc32.exe 90 PID 3348 wrote to memory of 1360 3348 Cipppc32.exe 90 PID 2992 wrote to memory of 4328 2992 BetaBot.exe 92 PID 2992 wrote to memory of 4328 2992 BetaBot.exe 92 PID 2992 wrote to memory of 4328 2992 BetaBot.exe 92 PID 5104 wrote to memory of 4408 5104 SmokeLoader.exe 93 PID 5104 wrote to memory of 4408 5104 SmokeLoader.exe 93 PID 5104 wrote to memory of 4408 5104 SmokeLoader.exe 93 PID 1360 wrote to memory of 4696 1360 Daiegp32.exe 94 PID 1360 wrote to memory of 4696 1360 Daiegp32.exe 94 PID 1360 wrote to memory of 4696 1360 Daiegp32.exe 94 PID 2992 wrote to memory of 4328 2992 BetaBot.exe 92 PID 2992 wrote to memory of 4328 2992 BetaBot.exe 92 PID 5104 wrote to memory of 4408 5104 SmokeLoader.exe 93 PID 5104 wrote to memory of 4408 5104 SmokeLoader.exe 93 PID 5104 wrote to memory of 4408 5104 SmokeLoader.exe 93
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Archive.zip1⤵PID:4892
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4752
-
C:\Users\Admin\Desktop\anal\SmokeLoader.exe"C:\Users\Admin\Desktop\anal\SmokeLoader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\Desktop\anal\SmokeLoader.exe"C:\Users\Admin\Desktop\anal\SmokeLoader.exe"2⤵PID:4408
-
-
C:\Users\Admin\Desktop\anal\BetaBot.exe"C:\Users\Admin\Desktop\anal\BetaBot.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\Desktop\anal\BetaBot.exe"C:\Users\Admin\Desktop\anal\BetaBot.exe"2⤵PID:4328
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:6912
-
-
-
C:\Users\Admin\Desktop\anal\Phorphiex.exe"C:\Users\Admin\Desktop\anal\Phorphiex.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3652 -
C:\Windows\3049586940303040\wcfgmgr32.exeC:\Windows\3049586940303040\wcfgmgr32.exe2⤵PID:6028
-
-
C:\Users\Admin\Desktop\anal\Berbew.exe"C:\Users\Admin\Desktop\anal\Berbew.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Cipppc32.exeC:\Windows\system32\Cipppc32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\Daiegp32.exeC:\Windows\system32\Daiegp32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\Dmbbaq32.exeC:\Windows\system32\Dmbbaq32.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4696 -
C:\Windows\SysWOW64\Ehlpjikd.exeC:\Windows\system32\Ehlpjikd.exe5⤵PID:4964
-
C:\Windows\SysWOW64\Fabqdl32.exeC:\Windows\system32\Fabqdl32.exe6⤵PID:2440
-
C:\Windows\SysWOW64\Gmqgjl32.exeC:\Windows\system32\Gmqgjl32.exe7⤵PID:4080
-
C:\Windows\SysWOW64\Ghmbhd32.exeC:\Windows\system32\Ghmbhd32.exe8⤵PID:5416
-
C:\Windows\SysWOW64\Hhdhhchf.exeC:\Windows\system32\Hhdhhchf.exe9⤵PID:5680
-
C:\Windows\SysWOW64\Jqpfccgo.exeC:\Windows\system32\Jqpfccgo.exe10⤵PID:4084
-
C:\Windows\SysWOW64\Jkjclk32.exeC:\Windows\system32\Jkjclk32.exe11⤵PID:2856
-
C:\Windows\SysWOW64\Kdgapp32.exeC:\Windows\system32\Kdgapp32.exe12⤵PID:3408
-
C:\Windows\SysWOW64\Kkechjib.exeC:\Windows\system32\Kkechjib.exe13⤵PID:1928
-
C:\Windows\SysWOW64\Lgamhjja.exeC:\Windows\system32\Lgamhjja.exe14⤵PID:5148
-
C:\Windows\SysWOW64\Meefhl32.exeC:\Windows\system32\Meefhl32.exe15⤵PID:5756
-
C:\Windows\SysWOW64\Nejpckgc.exeC:\Windows\system32\Nejpckgc.exe16⤵PID:6108
-
C:\Windows\SysWOW64\Oeccijoh.exeC:\Windows\system32\Oeccijoh.exe17⤵PID:3500
-
C:\Windows\SysWOW64\Pklkmo32.exeC:\Windows\system32\Pklkmo32.exe18⤵PID:808
-
C:\Windows\SysWOW64\Phddbbnf.exeC:\Windows\system32\Phddbbnf.exe19⤵PID:504
-
C:\Windows\SysWOW64\Pkencn32.exeC:\Windows\system32\Pkencn32.exe20⤵PID:6196
-
C:\Windows\SysWOW64\Qaabfgpa.exeC:\Windows\system32\Qaabfgpa.exe21⤵PID:6260
-
C:\Windows\SysWOW64\Ajkgmd32.exeC:\Windows\system32\Ajkgmd32.exe22⤵PID:6380
-
C:\Windows\SysWOW64\Allpnplb.exeC:\Windows\system32\Allpnplb.exe23⤵PID:6456
-
C:\Windows\SysWOW64\Ackbfioj.exeC:\Windows\system32\Ackbfioj.exe24⤵PID:6664
-
C:\Windows\SysWOW64\Bfkkhdlk.exeC:\Windows\system32\Bfkkhdlk.exe25⤵PID:6756
-
C:\Windows\SysWOW64\Bjlpcbqo.exeC:\Windows\system32\Bjlpcbqo.exe26⤵PID:6940
-
C:\Windows\SysWOW64\Ckaffjbg.exeC:\Windows\system32\Ckaffjbg.exe27⤵PID:7084
-
C:\Windows\SysWOW64\Cfldob32.exeC:\Windows\system32\Cfldob32.exe28⤵PID:1188
-
C:\Windows\SysWOW64\Diafkl32.exeC:\Windows\system32\Diafkl32.exe29⤵PID:4564
-
C:\Windows\SysWOW64\Dfjpppbh.exeC:\Windows\system32\Dfjpppbh.exe30⤵PID:6560
-
C:\Windows\SysWOW64\Elienf32.exeC:\Windows\system32\Elienf32.exe31⤵PID:2036
-
C:\Windows\SysWOW64\Epikid32.exeC:\Windows\system32\Epikid32.exe32⤵PID:6932
-
C:\Windows\SysWOW64\Fbcfan32.exeC:\Windows\system32\Fbcfan32.exe33⤵PID:1596
-
C:\Windows\SysWOW64\Fmkgdgej.exeC:\Windows\system32\Fmkgdgej.exe34⤵PID:7104
-
C:\Windows\SysWOW64\Gkhkdjli.exeC:\Windows\system32\Gkhkdjli.exe35⤵PID:6744
-
C:\Windows\SysWOW64\Hpabho32.exeC:\Windows\system32\Hpabho32.exe36⤵PID:6784
-
C:\Windows\SysWOW64\Inecac32.exeC:\Windows\system32\Inecac32.exe37⤵PID:5980
-
C:\Windows\SysWOW64\Ingpgcmj.exeC:\Windows\system32\Ingpgcmj.exe38⤵PID:1008
-
C:\Windows\SysWOW64\Jgigfg32.exeC:\Windows\system32\Jgigfg32.exe39⤵PID:7136
-
C:\Windows\SysWOW64\Jjjpgb32.exeC:\Windows\system32\Jjjpgb32.exe40⤵PID:6924
-
C:\Windows\SysWOW64\Jjlmmbfo.exeC:\Windows\system32\Jjlmmbfo.exe41⤵PID:5516
-
C:\Windows\SysWOW64\Kqknekjf.exeC:\Windows\system32\Kqknekjf.exe42⤵PID:6396
-
C:\Windows\SysWOW64\Kmfhelke.exeC:\Windows\system32\Kmfhelke.exe43⤵PID:6648
-
C:\Windows\SysWOW64\Lqfnqjpi.exeC:\Windows\system32\Lqfnqjpi.exe44⤵PID:7080
-
C:\Windows\SysWOW64\Ljcldo32.exeC:\Windows\system32\Ljcldo32.exe45⤵PID:6204
-
C:\Windows\SysWOW64\Mkhajq32.exeC:\Windows\system32\Mkhajq32.exe46⤵PID:7228
-
C:\Windows\SysWOW64\Mebchf32.exeC:\Windows\system32\Mebchf32.exe47⤵PID:7272
-
C:\Windows\SysWOW64\Nmpdbh32.exeC:\Windows\system32\Nmpdbh32.exe48⤵PID:7380
-
C:\Windows\SysWOW64\Nmbaggce.exeC:\Windows\system32\Nmbaggce.exe49⤵PID:7424
-
C:\Windows\SysWOW64\Ncofjaho.exeC:\Windows\system32\Ncofjaho.exe50⤵PID:7496
-
C:\Windows\SysWOW64\Neqoidmo.exeC:\Windows\system32\Neqoidmo.exe51⤵PID:7568
-
C:\Windows\SysWOW64\Odfljp32.exeC:\Windows\system32\Odfljp32.exe52⤵PID:7664
-
C:\Windows\SysWOW64\Oldjlm32.exeC:\Windows\system32\Oldjlm32.exe53⤵PID:7776
-
C:\Windows\SysWOW64\Pecefa32.exeC:\Windows\system32\Pecefa32.exe54⤵PID:7948
-
C:\Windows\SysWOW64\Plpjhk32.exeC:\Windows\system32\Plpjhk32.exe55⤵PID:8024
-
C:\Windows\SysWOW64\Alfpijll.exeC:\Windows\system32\Alfpijll.exe56⤵PID:8088
-
C:\Windows\SysWOW64\Aklmjfad.exeC:\Windows\system32\Aklmjfad.exe57⤵PID:8140
-
C:\Windows\SysWOW64\Aojepe32.exeC:\Windows\system32\Aojepe32.exe58⤵PID:8188
-
C:\Windows\SysWOW64\Aolbedeh.exeC:\Windows\system32\Aolbedeh.exe59⤵PID:6720
-
C:\Windows\SysWOW64\Aehghn32.exeC:\Windows\system32\Aehghn32.exe60⤵PID:2784
-
C:\Windows\SysWOW64\Bekdmnio.exeC:\Windows\system32\Bekdmnio.exe61⤵PID:7260
-
C:\Windows\SysWOW64\Bhkmoifp.exeC:\Windows\system32\Bhkmoifp.exe62⤵PID:7420
-
C:\Windows\SysWOW64\Bklfqd32.exeC:\Windows\system32\Bklfqd32.exe63⤵PID:7488
-
C:\Windows\SysWOW64\Bojogb32.exeC:\Windows\system32\Bojogb32.exe64⤵PID:7588
-
C:\Windows\SysWOW64\Cdlpjicj.exeC:\Windows\system32\Cdlpjicj.exe65⤵PID:7996
-
C:\Windows\SysWOW64\Ddjmkg32.exeC:\Windows\system32\Ddjmkg32.exe66⤵PID:7792
-
C:\Windows\SysWOW64\Efpofi32.exeC:\Windows\system32\Efpofi32.exe67⤵PID:6532
-
C:\Windows\SysWOW64\Fnegqjne.exeC:\Windows\system32\Fnegqjne.exe68⤵PID:7636
-
C:\Windows\SysWOW64\Giaaoa32.exeC:\Windows\system32\Giaaoa32.exe69⤵PID:7888
-
C:\Windows\SysWOW64\Gihgoq32.exeC:\Windows\system32\Gihgoq32.exe70⤵PID:7884
-
C:\Windows\SysWOW64\Iocliecb.exeC:\Windows\system32\Iocliecb.exe71⤵PID:8128
-
C:\Windows\SysWOW64\Igomeb32.exeC:\Windows\system32\Igomeb32.exe72⤵PID:1364
-
C:\Windows\SysWOW64\Ichkpb32.exeC:\Windows\system32\Ichkpb32.exe73⤵PID:6252
-
C:\Windows\SysWOW64\Jmplbk32.exeC:\Windows\system32\Jmplbk32.exe74⤵PID:7376
-
C:\Windows\SysWOW64\Jcoapami.exeC:\Windows\system32\Jcoapami.exe75⤵PID:516
-
C:\Windows\SysWOW64\Kpjgjefj.exeC:\Windows\system32\Kpjgjefj.exe76⤵PID:7836
-
C:\Windows\SysWOW64\Kodnfqgm.exeC:\Windows\system32\Kodnfqgm.exe77⤵PID:7476
-
C:\Windows\SysWOW64\Lngkjhmi.exeC:\Windows\system32\Lngkjhmi.exe78⤵PID:7288
-
C:\Windows\SysWOW64\Lfeldj32.exeC:\Windows\system32\Lfeldj32.exe79⤵PID:5088
-
C:\Windows\SysWOW64\Lfgiii32.exeC:\Windows\system32\Lfgiii32.exe80⤵PID:3948
-
C:\Windows\SysWOW64\Mggecl32.exeC:\Windows\system32\Mggecl32.exe81⤵PID:8020
-
C:\Windows\SysWOW64\Mcdlil32.exeC:\Windows\system32\Mcdlil32.exe82⤵PID:7580
-
C:\Windows\SysWOW64\Npbcollj.exeC:\Windows\system32\Npbcollj.exe83⤵PID:7808
-
C:\Windows\SysWOW64\Oafido32.exeC:\Windows\system32\Oafido32.exe84⤵PID:7412
-
C:\Windows\SysWOW64\Ojajbdde.exeC:\Windows\system32\Ojajbdde.exe85⤵PID:6148
-
C:\Windows\SysWOW64\Pnfiia32.exeC:\Windows\system32\Pnfiia32.exe86⤵PID:356
-
C:\Windows\SysWOW64\Adcjhf32.exeC:\Windows\system32\Adcjhf32.exe87⤵PID:6288
-
C:\Windows\SysWOW64\Amnlfk32.exeC:\Windows\system32\Amnlfk32.exe88⤵PID:7192
-
C:\Windows\SysWOW64\Bmceaj32.exeC:\Windows\system32\Bmceaj32.exe89⤵PID:7820
-
C:\Windows\SysWOW64\Ckphamkp.exeC:\Windows\system32\Ckphamkp.exe90⤵PID:2224
-
C:\Windows\SysWOW64\Dklhmlac.exeC:\Windows\system32\Dklhmlac.exe91⤵PID:8064
-
C:\Windows\SysWOW64\Egjobl32.exeC:\Windows\system32\Egjobl32.exe92⤵PID:7936
-
C:\Windows\SysWOW64\Fkcgdh32.exeC:\Windows\system32\Fkcgdh32.exe93⤵PID:8180
-
C:\Windows\SysWOW64\Fofiff32.exeC:\Windows\system32\Fofiff32.exe94⤵PID:2388
-
C:\Windows\SysWOW64\Giqjdk32.exeC:\Windows\system32\Giqjdk32.exe95⤵PID:1360
-
C:\Windows\SysWOW64\Henajkcc.exeC:\Windows\system32\Henajkcc.exe96⤵PID:8280
-
C:\Windows\SysWOW64\Hhfplejl.exeC:\Windows\system32\Hhfplejl.exe97⤵PID:8428
-
C:\Windows\SysWOW64\Iecclhak.exeC:\Windows\system32\Iecclhak.exe98⤵PID:8552
-
C:\Windows\SysWOW64\Kafcmglb.exeC:\Windows\system32\Kafcmglb.exe99⤵PID:8636
-
C:\Windows\SysWOW64\Mckbhg32.exeC:\Windows\system32\Mckbhg32.exe100⤵PID:8892
-
C:\Windows\SysWOW64\Mjggka32.exeC:\Windows\system32\Mjggka32.exe101⤵PID:8960
-
C:\Windows\SysWOW64\Mcaiif32.exeC:\Windows\system32\Mcaiif32.exe102⤵PID:9008
-
C:\Windows\SysWOW64\Njpjap32.exeC:\Windows\system32\Njpjap32.exe103⤵PID:9096
-
C:\Windows\SysWOW64\Nqolii32.exeC:\Windows\system32\Nqolii32.exe104⤵PID:9188
-
C:\Windows\SysWOW64\Oqcedino.exeC:\Windows\system32\Oqcedino.exe105⤵PID:8220
-
C:\Windows\SysWOW64\Ooibee32.exeC:\Windows\system32\Ooibee32.exe106⤵PID:3380
-
C:\Windows\SysWOW64\Ojqchnpj.exeC:\Windows\system32\Ojqchnpj.exe107⤵PID:8228
-
C:\Windows\SysWOW64\Opphed32.exeC:\Windows\system32\Opphed32.exe108⤵PID:8364
-
C:\Windows\SysWOW64\Pbqago32.exeC:\Windows\system32\Pbqago32.exe109⤵PID:8436
-
C:\Windows\SysWOW64\Pimfji32.exeC:\Windows\system32\Pimfji32.exe110⤵PID:8564
-
C:\Windows\SysWOW64\Piocoi32.exeC:\Windows\system32\Piocoi32.exe111⤵PID:8668
-
C:\Windows\SysWOW64\Piapehkd.exeC:\Windows\system32\Piapehkd.exe112⤵PID:8596
-
C:\Windows\SysWOW64\Amkhfegn.exeC:\Windows\system32\Amkhfegn.exe113⤵PID:8752
-
C:\Windows\SysWOW64\Bffiejkk.exeC:\Windows\system32\Bffiejkk.exe114⤵PID:8808
-
C:\Windows\SysWOW64\Bdlfdnhb.exeC:\Windows\system32\Bdlfdnhb.exe115⤵PID:8968
-
C:\Windows\SysWOW64\Bfmoei32.exeC:\Windows\system32\Bfmoei32.exe116⤵PID:4044
-
C:\Windows\SysWOW64\Bkkhlhlj.exeC:\Windows\system32\Bkkhlhlj.exe117⤵PID:8944
-
C:\Windows\SysWOW64\Caqpdpii.exeC:\Windows\system32\Caqpdpii.exe118⤵PID:8724
-
C:\Windows\SysWOW64\Epalakcd.exeC:\Windows\system32\Epalakcd.exe119⤵PID:8268
-
C:\Windows\SysWOW64\Fboellof.exeC:\Windows\system32\Fboellof.exe120⤵PID:1180
-
C:\Windows\SysWOW64\Gqfochal.exeC:\Windows\system32\Gqfochal.exe121⤵PID:8432
-
C:\Windows\SysWOW64\Gqkhng32.exeC:\Windows\system32\Gqkhng32.exe122⤵PID:8628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-