Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe
Resource
win10v2004-20240802-en
General
-
Target
eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe
-
Size
5.4MB
-
MD5
7cf019dedf525bcac4a3d51d50d61350
-
SHA1
acbf66dd26f61e6c8cc3745a1683ebc2fc546d00
-
SHA256
eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90
-
SHA512
42a060b5e14ad5799e8efa3e498981da6b29287f7470bb1304bf4412918677e2dcf3f54cc51fa0ddf0d8a4cc5873bc99d4f73a3afc948042e5c01036127833df
-
SSDEEP
49152:VpwnFw/WtwnFwaZwnFw/WtwnFwSpwnFw/WtwnFwaZwnFw/WtwnFw:P0FqI0FXZ0FqI0FJ0FqI0FXZ0FqI0F
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqdaal32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqgngk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqgngk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqdaal32.exe -
Executes dropped EXE 2 IoCs
pid Process 2236 Nqdaal32.exe 2292 Nqgngk32.exe -
Loads dropped DLL 4 IoCs
pid Process 1956 eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe 1956 eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe 2236 Nqdaal32.exe 2236 Nqdaal32.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Oefcdgnb.dll Nqdaal32.exe File created C:\Windows\SysWOW64\Onhnjclg.exe Nqgngk32.exe File created C:\Windows\SysWOW64\Fgmlfo32.dll Nqgngk32.exe File created C:\Windows\SysWOW64\Nqdaal32.exe eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe File created C:\Windows\SysWOW64\Nqgngk32.exe Nqdaal32.exe File opened for modification C:\Windows\SysWOW64\Nqgngk32.exe Nqdaal32.exe File opened for modification C:\Windows\SysWOW64\Onhnjclg.exe Nqgngk32.exe File opened for modification C:\Windows\SysWOW64\Nqdaal32.exe eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe File created C:\Windows\SysWOW64\Cjjdgm32.dll eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqdaal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nqgngk32.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqgngk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqgngk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjjdgm32.dll" eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgmlfo32.dll" Nqgngk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqdaal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oefcdgnb.dll" Nqdaal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqdaal32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2236 1956 eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe 29 PID 1956 wrote to memory of 2236 1956 eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe 29 PID 1956 wrote to memory of 2236 1956 eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe 29 PID 1956 wrote to memory of 2236 1956 eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe 29 PID 2236 wrote to memory of 2292 2236 Nqdaal32.exe 30 PID 2236 wrote to memory of 2292 2236 Nqdaal32.exe 30 PID 2236 wrote to memory of 2292 2236 Nqdaal32.exe 30 PID 2236 wrote to memory of 2292 2236 Nqdaal32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe"C:\Users\Admin\AppData\Local\Temp\eb61b0413eb161ac3559ef6dd5166d52ee276a04bec048c9a88da90740a96d90N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Nqdaal32.exeC:\Windows\system32\Nqdaal32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Nqgngk32.exeC:\Windows\system32\Nqgngk32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2292 -
C:\Windows\SysWOW64\Onhnjclg.exeC:\Windows\system32\Onhnjclg.exe4⤵PID:2828
-
C:\Windows\SysWOW64\Oedclm32.exeC:\Windows\system32\Oedclm32.exe5⤵PID:2744
-
C:\Windows\SysWOW64\Pmdalo32.exeC:\Windows\system32\Pmdalo32.exe6⤵PID:2784
-
C:\Windows\SysWOW64\Bcobdgoj.exeC:\Windows\system32\Bcobdgoj.exe7⤵PID:2652
-
C:\Windows\SysWOW64\Djibogkn.exeC:\Windows\system32\Djibogkn.exe8⤵PID:2264
-
C:\Windows\SysWOW64\Gdjblboj.exeC:\Windows\system32\Gdjblboj.exe9⤵PID:360
-
C:\Windows\SysWOW64\Hfiofefm.exeC:\Windows\system32\Hfiofefm.exe10⤵PID:2584
-
C:\Windows\SysWOW64\Hmlmacfn.exeC:\Windows\system32\Hmlmacfn.exe11⤵PID:2864
-
C:\Windows\SysWOW64\Hqjfgb32.exeC:\Windows\system32\Hqjfgb32.exe12⤵PID:2944
-
C:\Windows\SysWOW64\Llooad32.exeC:\Windows\system32\Llooad32.exe13⤵PID:2536
-
C:\Windows\SysWOW64\Licpki32.exeC:\Windows\system32\Licpki32.exe14⤵PID:1748
-
C:\Windows\SysWOW64\Lhkiae32.exeC:\Windows\system32\Lhkiae32.exe15⤵PID:2288
-
C:\Windows\SysWOW64\Maejpj32.exeC:\Windows\system32\Maejpj32.exe16⤵PID:580
-
C:\Windows\SysWOW64\Kplhfo32.exeC:\Windows\system32\Kplhfo32.exe17⤵PID:2116
-
C:\Windows\SysWOW64\Kfhmhi32.exeC:\Windows\system32\Kfhmhi32.exe18⤵PID:2524
-
C:\Windows\SysWOW64\Mchmblji.exeC:\Windows\system32\Mchmblji.exe19⤵PID:1620
-
C:\Windows\SysWOW64\Mcjihk32.exeC:\Windows\system32\Mcjihk32.exe20⤵PID:2000
-
C:\Windows\SysWOW64\Ngmoao32.exeC:\Windows\system32\Ngmoao32.exe21⤵PID:2308
-
C:\Windows\SysWOW64\Npgppdpc.exeC:\Windows\system32\Npgppdpc.exe22⤵PID:368
-
C:\Windows\SysWOW64\Ojdndi32.exeC:\Windows\system32\Ojdndi32.exe23⤵PID:1584
-
C:\Windows\SysWOW64\Ojgkih32.exeC:\Windows\system32\Ojgkih32.exe24⤵PID:2568
-
C:\Windows\SysWOW64\Oeeeeehe.exeC:\Windows\system32\Oeeeeehe.exe25⤵PID:2352
-
C:\Windows\SysWOW64\Pnminkof.exeC:\Windows\system32\Pnminkof.exe26⤵PID:2208
-
C:\Windows\SysWOW64\Pcokaa32.exeC:\Windows\system32\Pcokaa32.exe27⤵PID:2140
-
C:\Windows\SysWOW64\Apjbpemb.exeC:\Windows\system32\Apjbpemb.exe28⤵PID:2916
-
C:\Windows\SysWOW64\Belcck32.exeC:\Windows\system32\Belcck32.exe29⤵PID:2816
-
C:\Windows\SysWOW64\Benpik32.exeC:\Windows\system32\Benpik32.exe30⤵PID:1804
-
C:\Windows\SysWOW64\Cjdonndl.exeC:\Windows\system32\Cjdonndl.exe31⤵PID:2400
-
C:\Windows\SysWOW64\Cjglcmbi.exeC:\Windows\system32\Cjglcmbi.exe32⤵PID:2852
-
C:\Windows\SysWOW64\Dndahokk.exeC:\Windows\system32\Dndahokk.exe33⤵PID:2196
-
C:\Windows\SysWOW64\Efbbba32.exeC:\Windows\system32\Efbbba32.exe34⤵PID:2668
-
C:\Windows\SysWOW64\Flhnqf32.exeC:\Windows\system32\Flhnqf32.exe35⤵PID:2412
-
C:\Windows\SysWOW64\Filnjk32.exeC:\Windows\system32\Filnjk32.exe36⤵PID:924
-
C:\Windows\SysWOW64\Fhakkg32.exeC:\Windows\system32\Fhakkg32.exe37⤵PID:2436
-
C:\Windows\SysWOW64\Fhfdffll.exeC:\Windows\system32\Fhfdffll.exe38⤵PID:2028
-
C:\Windows\SysWOW64\Gfkagc32.exeC:\Windows\system32\Gfkagc32.exe39⤵PID:1688
-
C:\Windows\SysWOW64\Giljinne.exeC:\Windows\system32\Giljinne.exe40⤵PID:2156
-
C:\Windows\SysWOW64\Gphokhco.exeC:\Windows\system32\Gphokhco.exe41⤵PID:932
-
C:\Windows\SysWOW64\Gkbplepn.exeC:\Windows\system32\Gkbplepn.exe42⤵PID:1444
-
C:\Windows\SysWOW64\Hacoio32.exeC:\Windows\system32\Hacoio32.exe43⤵PID:1532
-
C:\Windows\SysWOW64\Hnjonpgg.exeC:\Windows\system32\Hnjonpgg.exe44⤵PID:2548
-
C:\Windows\SysWOW64\Igdqmeke.exeC:\Windows\system32\Igdqmeke.exe45⤵PID:944
-
C:\Windows\SysWOW64\Jknlfg32.exeC:\Windows\system32\Jknlfg32.exe46⤵PID:2064
-
C:\Windows\SysWOW64\Jnnehb32.exeC:\Windows\system32\Jnnehb32.exe47⤵PID:1488
-
C:\Windows\SysWOW64\Jjefmc32.exeC:\Windows\system32\Jjefmc32.exe48⤵PID:2004
-
C:\Windows\SysWOW64\Jjjohbgl.exeC:\Windows\system32\Jjjohbgl.exe49⤵PID:1736
-
C:\Windows\SysWOW64\Kcbcah32.exeC:\Windows\system32\Kcbcah32.exe50⤵PID:2072
-
C:\Windows\SysWOW64\Knldaf32.exeC:\Windows\system32\Knldaf32.exe51⤵PID:1564
-
C:\Windows\SysWOW64\Kiaiooja.exeC:\Windows\system32\Kiaiooja.exe52⤵PID:2616
-
C:\Windows\SysWOW64\Kgibeklf.exeC:\Windows\system32\Kgibeklf.exe53⤵PID:1588
-
C:\Windows\SysWOW64\Lneghd32.exeC:\Windows\system32\Lneghd32.exe54⤵PID:2832
-
C:\Windows\SysWOW64\Lafpipoa.exeC:\Windows\system32\Lafpipoa.exe55⤵PID:2468
-
C:\Windows\SysWOW64\Lmmaoq32.exeC:\Windows\system32\Lmmaoq32.exe56⤵PID:2248
-
C:\Windows\SysWOW64\Licbca32.exeC:\Windows\system32\Licbca32.exe57⤵PID:2464
-
C:\Windows\SysWOW64\Lejbhbpn.exeC:\Windows\system32\Lejbhbpn.exe58⤵PID:424
-
C:\Windows\SysWOW64\Mlfgkleh.exeC:\Windows\system32\Mlfgkleh.exe59⤵PID:620
-
C:\Windows\SysWOW64\Mhbakmgg.exeC:\Windows\system32\Mhbakmgg.exe60⤵PID:1240
-
C:\Windows\SysWOW64\Miekhd32.exeC:\Windows\system32\Miekhd32.exe61⤵PID:2200
-
C:\Windows\SysWOW64\Nihgndip.exeC:\Windows\system32\Nihgndip.exe62⤵PID:2344
-
C:\Windows\SysWOW64\Ndhooaog.exeC:\Windows\system32\Ndhooaog.exe63⤵PID:1500
-
C:\Windows\SysWOW64\Okecak32.exeC:\Windows\system32\Okecak32.exe64⤵PID:1556
-
C:\Windows\SysWOW64\Oqdioaqf.exeC:\Windows\system32\Oqdioaqf.exe65⤵PID:1504
-
C:\Windows\SysWOW64\Onhihepp.exeC:\Windows\system32\Onhihepp.exe66⤵PID:804
-
C:\Windows\SysWOW64\Ofcnmh32.exeC:\Windows\system32\Ofcnmh32.exe67⤵PID:1652
-
C:\Windows\SysWOW64\Polbemck.exeC:\Windows\system32\Polbemck.exe68⤵PID:2712
-
C:\Windows\SysWOW64\Pfjdmggb.exeC:\Windows\system32\Pfjdmggb.exe69⤵PID:2508
-
C:\Windows\SysWOW64\Peoanckj.exeC:\Windows\system32\Peoanckj.exe70⤵PID:2024
-
C:\Windows\SysWOW64\Qklfqm32.exeC:\Windows\system32\Qklfqm32.exe71⤵PID:2164
-
C:\Windows\SysWOW64\Qcgkeonp.exeC:\Windows\system32\Qcgkeonp.exe72⤵PID:2680
-
C:\Windows\SysWOW64\Algida32.exeC:\Windows\system32\Algida32.exe73⤵PID:1812
-
C:\Windows\SysWOW64\Aflmbj32.exeC:\Windows\system32\Aflmbj32.exe74⤵PID:2144
-
C:\Windows\SysWOW64\Caajmilh.exeC:\Windows\system32\Caajmilh.exe75⤵PID:1740
-
C:\Windows\SysWOW64\Djokgk32.exeC:\Windows\system32\Djokgk32.exe76⤵PID:2960
-
C:\Windows\SysWOW64\Dcjleq32.exeC:\Windows\system32\Dcjleq32.exe77⤵PID:2268
-
C:\Windows\SysWOW64\Dbaflm32.exeC:\Windows\system32\Dbaflm32.exe78⤵PID:2236
-
C:\Windows\SysWOW64\Edieng32.exeC:\Windows\system32\Edieng32.exe79⤵PID:2588
-
C:\Windows\SysWOW64\Jomnpdjb.exeC:\Windows\system32\Jomnpdjb.exe80⤵PID:828
-
C:\Windows\SysWOW64\Kiihcmoi.exeC:\Windows\system32\Kiihcmoi.exe81⤵PID:2924
-
C:\Windows\SysWOW64\Lnpcabef.exeC:\Windows\system32\Lnpcabef.exe82⤵PID:2324
-
C:\Windows\SysWOW64\Ngajeg32.exeC:\Windows\system32\Ngajeg32.exe83⤵PID:2740
-
C:\Windows\SysWOW64\Odckho32.exeC:\Windows\system32\Odckho32.exe84⤵PID:2404
-
C:\Windows\SysWOW64\Phacnm32.exeC:\Windows\system32\Phacnm32.exe85⤵PID:1000
-
C:\Windows\SysWOW64\Pgfpoimj.exeC:\Windows\system32\Pgfpoimj.exe86⤵PID:2648
-
C:\Windows\SysWOW64\Pkdiehca.exeC:\Windows\system32\Pkdiehca.exe87⤵PID:2580
-
C:\Windows\SysWOW64\Pdlmnm32.exeC:\Windows\system32\Pdlmnm32.exe88⤵PID:2620
-
C:\Windows\SysWOW64\Pofnok32.exeC:\Windows\system32\Pofnok32.exe89⤵PID:940
-
C:\Windows\SysWOW64\Qcdgei32.exeC:\Windows\system32\Qcdgei32.exe90⤵PID:600
-
C:\Windows\SysWOW64\Qiclcp32.exeC:\Windows\system32\Qiclcp32.exe91⤵PID:1780
-
C:\Windows\SysWOW64\Akdedkfl.exeC:\Windows\system32\Akdedkfl.exe92⤵PID:2136
-
C:\Windows\SysWOW64\Agkfil32.exeC:\Windows\system32\Agkfil32.exe93⤵PID:2892
-
C:\Windows\SysWOW64\Aeofcpjj.exeC:\Windows\system32\Aeofcpjj.exe94⤵PID:2980
-
C:\Windows\SysWOW64\Aaegha32.exeC:\Windows\system32\Aaegha32.exe95⤵PID:2032
-
C:\Windows\SysWOW64\Bajqcqli.exeC:\Windows\system32\Bajqcqli.exe96⤵PID:2536
-
C:\Windows\SysWOW64\Belfldoh.exeC:\Windows\system32\Belfldoh.exe97⤵PID:3048
-
C:\Windows\SysWOW64\Bbbckh32.exeC:\Windows\system32\Bbbckh32.exe98⤵PID:2884
-
C:\Windows\SysWOW64\Cbdpag32.exeC:\Windows\system32\Cbdpag32.exe99⤵PID:2968
-
C:\Windows\SysWOW64\Ckpdej32.exeC:\Windows\system32\Ckpdej32.exe100⤵PID:1516
-
C:\Windows\SysWOW64\Cdhino32.exeC:\Windows\system32\Cdhino32.exe101⤵PID:2432
-
C:\Windows\SysWOW64\Caligc32.exeC:\Windows\system32\Caligc32.exe102⤵PID:2896
-
C:\Windows\SysWOW64\Cmcjldbf.exeC:\Windows\system32\Cmcjldbf.exe103⤵PID:1988
-
C:\Windows\SysWOW64\Ccbojk32.exeC:\Windows\system32\Ccbojk32.exe104⤵PID:2480
-
C:\Windows\SysWOW64\Dpfpco32.exeC:\Windows\system32\Dpfpco32.exe105⤵PID:2516
-
C:\Windows\SysWOW64\Dlmqip32.exeC:\Windows\system32\Dlmqip32.exe106⤵PID:788
-
C:\Windows\SysWOW64\Ddjbbbna.exeC:\Windows\system32\Ddjbbbna.exe107⤵PID:1580
-
C:\Windows\SysWOW64\Danblfmk.exeC:\Windows\system32\Danblfmk.exe108⤵PID:2304
-
C:\Windows\SysWOW64\Dobcekld.exeC:\Windows\system32\Dobcekld.exe109⤵PID:644
-
C:\Windows\SysWOW64\Ehkgnpbe.exeC:\Windows\system32\Ehkgnpbe.exe110⤵PID:572
-
C:\Windows\SysWOW64\Edahca32.exeC:\Windows\system32\Edahca32.exe111⤵PID:896
-
C:\Windows\SysWOW64\Ephihbnm.exeC:\Windows\system32\Ephihbnm.exe112⤵PID:1288
-
C:\Windows\SysWOW64\Ehfjbd32.exeC:\Windows\system32\Ehfjbd32.exe113⤵PID:3020
-
C:\Windows\SysWOW64\Fflgahfm.exeC:\Windows\system32\Fflgahfm.exe114⤵PID:884
-
C:\Windows\SysWOW64\Fbchfi32.exeC:\Windows\system32\Fbchfi32.exe115⤵PID:1956
-
C:\Windows\SysWOW64\Fogipnjj.exeC:\Windows\system32\Fogipnjj.exe116⤵PID:2152
-
C:\Windows\SysWOW64\Fgbmdphe.exeC:\Windows\system32\Fgbmdphe.exe117⤵PID:472
-
C:\Windows\SysWOW64\Fqjbme32.exeC:\Windows\system32\Fqjbme32.exe118⤵PID:1272
-
C:\Windows\SysWOW64\Fqmobelc.exeC:\Windows\system32\Fqmobelc.exe119⤵PID:2768
-
C:\Windows\SysWOW64\Gmcogf32.exeC:\Windows\system32\Gmcogf32.exe120⤵PID:3008
-
C:\Windows\SysWOW64\Iobdopna.exeC:\Windows\system32\Iobdopna.exe121⤵PID:2056
-
C:\Windows\SysWOW64\Jpbmhf32.exeC:\Windows\system32\Jpbmhf32.exe122⤵PID:3012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-