Analysis

  • max time kernel
    94s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 14:09

General

  • Target

    b1909dd26bbfa6822c3ca7374d1380b19a9b8198fbf9831733947de26b05412fN.exe

  • Size

    128KB

  • MD5

    0fdf6f905a8379563f6d3d905a972f90

  • SHA1

    b3a24eb74b1a72c5b821ceda79b66749434c6123

  • SHA256

    b1909dd26bbfa6822c3ca7374d1380b19a9b8198fbf9831733947de26b05412f

  • SHA512

    ad4d4cbf50bbda1500e49a10cedaf9d2ce800a076f97d08040e19e4cec46fb416b338810dbdaa7fea577f7c6144c52cc3fb40b232138cca100d4d8441c640260

  • SSDEEP

    3072:jcqMNYYA4nx8o8qPxMeEvPOdgujv6NLPfFFrKP9:iYYAAx78qJML3OdgawrFZKP

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1909dd26bbfa6822c3ca7374d1380b19a9b8198fbf9831733947de26b05412fN.exe
    "C:\Users\Admin\AppData\Local\Temp\b1909dd26bbfa6822c3ca7374d1380b19a9b8198fbf9831733947de26b05412fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Windows\SysWOW64\Lpnlpnih.exe
      C:\Windows\system32\Lpnlpnih.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Windows\SysWOW64\Ldjhpl32.exe
        C:\Windows\system32\Ldjhpl32.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3844
        • C:\Windows\SysWOW64\Lfhdlh32.exe
          C:\Windows\system32\Lfhdlh32.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3816
          • C:\Windows\SysWOW64\Lmbmibhb.exe
            C:\Windows\system32\Lmbmibhb.exe
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Windows\SysWOW64\Lpqiemge.exe
              C:\Windows\system32\Lpqiemge.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:4880
              • C:\Windows\SysWOW64\Lenamdem.exe
                C:\Windows\system32\Lenamdem.exe
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:3252
                • C:\Windows\SysWOW64\Lmdina32.exe
                  C:\Windows\system32\Lmdina32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4460
                  • C:\Windows\SysWOW64\Ldoaklml.exe
                    C:\Windows\system32\Ldoaklml.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2300
                    • C:\Windows\SysWOW64\Lepncd32.exe
                      C:\Windows\system32\Lepncd32.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:1900
                      • C:\Windows\SysWOW64\Lmgfda32.exe
                        C:\Windows\system32\Lmgfda32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:5068
                        • C:\Windows\SysWOW64\Lpebpm32.exe
                          C:\Windows\system32\Lpebpm32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:4084
                          • C:\Windows\SysWOW64\Lllcen32.exe
                            C:\Windows\system32\Lllcen32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4808
                            • C:\Windows\SysWOW64\Mdckfk32.exe
                              C:\Windows\system32\Mdckfk32.exe
                              14⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:720
                              • C:\Windows\SysWOW64\Mmlpoqpg.exe
                                C:\Windows\system32\Mmlpoqpg.exe
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:3808
                                • C:\Windows\SysWOW64\Mchhggno.exe
                                  C:\Windows\system32\Mchhggno.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:1880
                                  • C:\Windows\SysWOW64\Mlampmdo.exe
                                    C:\Windows\system32\Mlampmdo.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of WriteProcessMemory
                                    PID:4724
                                    • C:\Windows\SysWOW64\Mckemg32.exe
                                      C:\Windows\system32\Mckemg32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:1688
                                      • C:\Windows\SysWOW64\Miemjaci.exe
                                        C:\Windows\system32\Miemjaci.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:1360
                                        • C:\Windows\SysWOW64\Mpoefk32.exe
                                          C:\Windows\system32\Mpoefk32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:456
                                          • C:\Windows\SysWOW64\Mcmabg32.exe
                                            C:\Windows\system32\Mcmabg32.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:952
                                            • C:\Windows\SysWOW64\Mpablkhc.exe
                                              C:\Windows\system32\Mpablkhc.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:4160
                                              • C:\Windows\SysWOW64\Miifeq32.exe
                                                C:\Windows\system32\Miifeq32.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                PID:840
                                                • C:\Windows\SysWOW64\Npcoakfp.exe
                                                  C:\Windows\system32\Npcoakfp.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4664
                                                  • C:\Windows\SysWOW64\Nilcjp32.exe
                                                    C:\Windows\system32\Nilcjp32.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    PID:3716
                                                    • C:\Windows\SysWOW64\Npfkgjdn.exe
                                                      C:\Windows\system32\Npfkgjdn.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      PID:316
                                                      • C:\Windows\SysWOW64\Ncdgcf32.exe
                                                        C:\Windows\system32\Ncdgcf32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies registry class
                                                        PID:3684
                                                        • C:\Windows\SysWOW64\Ngpccdlj.exe
                                                          C:\Windows\system32\Ngpccdlj.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4964
                                                          • C:\Windows\SysWOW64\Njnpppkn.exe
                                                            C:\Windows\system32\Njnpppkn.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2640
                                                            • C:\Windows\SysWOW64\Nnjlpo32.exe
                                                              C:\Windows\system32\Nnjlpo32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              PID:2684
                                                              • C:\Windows\SysWOW64\Ndcdmikd.exe
                                                                C:\Windows\system32\Ndcdmikd.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry class
                                                                PID:1428
                                                                • C:\Windows\SysWOW64\Npjebj32.exe
                                                                  C:\Windows\system32\Npjebj32.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:3516
                                                                  • C:\Windows\SysWOW64\Ncianepl.exe
                                                                    C:\Windows\system32\Ncianepl.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    PID:1036
                                                                    • C:\Windows\SysWOW64\Ngdmod32.exe
                                                                      C:\Windows\system32\Ngdmod32.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:232
                                                                      • C:\Windows\SysWOW64\Nckndeni.exe
                                                                        C:\Windows\system32\Nckndeni.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        PID:3672
                                                                        • C:\Windows\SysWOW64\Nggjdc32.exe
                                                                          C:\Windows\system32\Nggjdc32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1096
                                                                          • C:\Windows\SysWOW64\Olcbmj32.exe
                                                                            C:\Windows\system32\Olcbmj32.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            PID:2860
                                                                            • C:\Windows\SysWOW64\Oponmilc.exe
                                                                              C:\Windows\system32\Oponmilc.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1480
                                                                              • C:\Windows\SysWOW64\Odkjng32.exe
                                                                                C:\Windows\system32\Odkjng32.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:2980
                                                                                • C:\Windows\SysWOW64\Ojgbfocc.exe
                                                                                  C:\Windows\system32\Ojgbfocc.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:2872
                                                                                  • C:\Windows\SysWOW64\Odmgcgbi.exe
                                                                                    C:\Windows\system32\Odmgcgbi.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:4816
                                                                                    • C:\Windows\SysWOW64\Ojjolnaq.exe
                                                                                      C:\Windows\system32\Ojjolnaq.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:2460
                                                                                      • C:\Windows\SysWOW64\Olhlhjpd.exe
                                                                                        C:\Windows\system32\Olhlhjpd.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:4772
                                                                                        • C:\Windows\SysWOW64\Odocigqg.exe
                                                                                          C:\Windows\system32\Odocigqg.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          PID:2192
                                                                                          • C:\Windows\SysWOW64\Ojllan32.exe
                                                                                            C:\Windows\system32\Ojllan32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:4216
                                                                                            • C:\Windows\SysWOW64\Olkhmi32.exe
                                                                                              C:\Windows\system32\Olkhmi32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3032
                                                                                              • C:\Windows\SysWOW64\Ocdqjceo.exe
                                                                                                C:\Windows\system32\Ocdqjceo.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2100
                                                                                                • C:\Windows\SysWOW64\Ojoign32.exe
                                                                                                  C:\Windows\system32\Ojoign32.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:1496
                                                                                                  • C:\Windows\SysWOW64\Olmeci32.exe
                                                                                                    C:\Windows\system32\Olmeci32.exe
                                                                                                    49⤵
                                                                                                    • Drops file in System32 directory
                                                                                                    PID:4788
                                                                                                    • C:\Windows\SysWOW64\Ojaelm32.exe
                                                                                                      C:\Windows\system32\Ojaelm32.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:3112
                                                                                                      • C:\Windows\SysWOW64\Pdfjifjo.exe
                                                                                                        C:\Windows\system32\Pdfjifjo.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1128
                                                                                                        • C:\Windows\SysWOW64\Pfhfan32.exe
                                                                                                          C:\Windows\system32\Pfhfan32.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:1564
                                                                                                          • C:\Windows\SysWOW64\Pmannhhj.exe
                                                                                                            C:\Windows\system32\Pmannhhj.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            PID:1624
                                                                                                            • C:\Windows\SysWOW64\Pclgkb32.exe
                                                                                                              C:\Windows\system32\Pclgkb32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:4768
                                                                                                              • C:\Windows\SysWOW64\Pggbkagp.exe
                                                                                                                C:\Windows\system32\Pggbkagp.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Modifies registry class
                                                                                                                PID:2996
                                                                                                                • C:\Windows\SysWOW64\Pnakhkol.exe
                                                                                                                  C:\Windows\system32\Pnakhkol.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:1016
                                                                                                                  • C:\Windows\SysWOW64\Pqpgdfnp.exe
                                                                                                                    C:\Windows\system32\Pqpgdfnp.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Modifies registry class
                                                                                                                    PID:4364
                                                                                                                    • C:\Windows\SysWOW64\Pdkcde32.exe
                                                                                                                      C:\Windows\system32\Pdkcde32.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:4028
                                                                                                                      • C:\Windows\SysWOW64\Pgioqq32.exe
                                                                                                                        C:\Windows\system32\Pgioqq32.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:3484
                                                                                                                        • C:\Windows\SysWOW64\Pncgmkmj.exe
                                                                                                                          C:\Windows\system32\Pncgmkmj.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          PID:3208
                                                                                                                          • C:\Windows\SysWOW64\Pqbdjfln.exe
                                                                                                                            C:\Windows\system32\Pqbdjfln.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Modifies registry class
                                                                                                                            PID:4524
                                                                                                                            • C:\Windows\SysWOW64\Pdmpje32.exe
                                                                                                                              C:\Windows\system32\Pdmpje32.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2352
                                                                                                                              • C:\Windows\SysWOW64\Pfolbmje.exe
                                                                                                                                C:\Windows\system32\Pfolbmje.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1336
                                                                                                                                • C:\Windows\SysWOW64\Pnfdcjkg.exe
                                                                                                                                  C:\Windows\system32\Pnfdcjkg.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:1668
                                                                                                                                  • C:\Windows\SysWOW64\Pmidog32.exe
                                                                                                                                    C:\Windows\system32\Pmidog32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:4780
                                                                                                                                    • C:\Windows\SysWOW64\Pdpmpdbd.exe
                                                                                                                                      C:\Windows\system32\Pdpmpdbd.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:5020
                                                                                                                                      • C:\Windows\SysWOW64\Pgnilpah.exe
                                                                                                                                        C:\Windows\system32\Pgnilpah.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        PID:2760
                                                                                                                                        • C:\Windows\SysWOW64\Pfaigm32.exe
                                                                                                                                          C:\Windows\system32\Pfaigm32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:1920
                                                                                                                                          • C:\Windows\SysWOW64\Qqfmde32.exe
                                                                                                                                            C:\Windows\system32\Qqfmde32.exe
                                                                                                                                            69⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:1732
                                                                                                                                            • C:\Windows\SysWOW64\Qgqeappe.exe
                                                                                                                                              C:\Windows\system32\Qgqeappe.exe
                                                                                                                                              70⤵
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:3780
                                                                                                                                              • C:\Windows\SysWOW64\Qddfkd32.exe
                                                                                                                                                C:\Windows\system32\Qddfkd32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:3960
                                                                                                                                                • C:\Windows\SysWOW64\Qcgffqei.exe
                                                                                                                                                  C:\Windows\system32\Qcgffqei.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:4820
                                                                                                                                                  • C:\Windows\SysWOW64\Anmjcieo.exe
                                                                                                                                                    C:\Windows\system32\Anmjcieo.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:1992
                                                                                                                                                    • C:\Windows\SysWOW64\Aqkgpedc.exe
                                                                                                                                                      C:\Windows\system32\Aqkgpedc.exe
                                                                                                                                                      74⤵
                                                                                                                                                        PID:2216
                                                                                                                                                        • C:\Windows\SysWOW64\Acjclpcf.exe
                                                                                                                                                          C:\Windows\system32\Acjclpcf.exe
                                                                                                                                                          75⤵
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:3656
                                                                                                                                                          • C:\Windows\SysWOW64\Aqncedbp.exe
                                                                                                                                                            C:\Windows\system32\Aqncedbp.exe
                                                                                                                                                            76⤵
                                                                                                                                                              PID:556
                                                                                                                                                              • C:\Windows\SysWOW64\Aclpap32.exe
                                                                                                                                                                C:\Windows\system32\Aclpap32.exe
                                                                                                                                                                77⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:3696
                                                                                                                                                                • C:\Windows\SysWOW64\Ajfhnjhq.exe
                                                                                                                                                                  C:\Windows\system32\Ajfhnjhq.exe
                                                                                                                                                                  78⤵
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  PID:4856
                                                                                                                                                                  • C:\Windows\SysWOW64\Aqppkd32.exe
                                                                                                                                                                    C:\Windows\system32\Aqppkd32.exe
                                                                                                                                                                    79⤵
                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:3356
                                                                                                                                                                    • C:\Windows\SysWOW64\Afmhck32.exe
                                                                                                                                                                      C:\Windows\system32\Afmhck32.exe
                                                                                                                                                                      80⤵
                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                      PID:1308
                                                                                                                                                                      • C:\Windows\SysWOW64\Amgapeea.exe
                                                                                                                                                                        C:\Windows\system32\Amgapeea.exe
                                                                                                                                                                        81⤵
                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:3276
                                                                                                                                                                        • C:\Windows\SysWOW64\Acqimo32.exe
                                                                                                                                                                          C:\Windows\system32\Acqimo32.exe
                                                                                                                                                                          82⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:3604
                                                                                                                                                                          • C:\Windows\SysWOW64\Anfmjhmd.exe
                                                                                                                                                                            C:\Windows\system32\Anfmjhmd.exe
                                                                                                                                                                            83⤵
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:2372
                                                                                                                                                                            • C:\Windows\SysWOW64\Agoabn32.exe
                                                                                                                                                                              C:\Windows\system32\Agoabn32.exe
                                                                                                                                                                              84⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:1888
                                                                                                                                                                              • C:\Windows\SysWOW64\Bfabnjjp.exe
                                                                                                                                                                                C:\Windows\system32\Bfabnjjp.exe
                                                                                                                                                                                85⤵
                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:5152
                                                                                                                                                                                • C:\Windows\SysWOW64\Bmkjkd32.exe
                                                                                                                                                                                  C:\Windows\system32\Bmkjkd32.exe
                                                                                                                                                                                  86⤵
                                                                                                                                                                                    PID:5196
                                                                                                                                                                                    • C:\Windows\SysWOW64\Bagflcje.exe
                                                                                                                                                                                      C:\Windows\system32\Bagflcje.exe
                                                                                                                                                                                      87⤵
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:5240
                                                                                                                                                                                      • C:\Windows\SysWOW64\Bebblb32.exe
                                                                                                                                                                                        C:\Windows\system32\Bebblb32.exe
                                                                                                                                                                                        88⤵
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        PID:5284
                                                                                                                                                                                        • C:\Windows\SysWOW64\Bfdodjhm.exe
                                                                                                                                                                                          C:\Windows\system32\Bfdodjhm.exe
                                                                                                                                                                                          89⤵
                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5328
                                                                                                                                                                                          • C:\Windows\SysWOW64\Bjokdipf.exe
                                                                                                                                                                                            C:\Windows\system32\Bjokdipf.exe
                                                                                                                                                                                            90⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            PID:5368
                                                                                                                                                                                            • C:\Windows\SysWOW64\Bmngqdpj.exe
                                                                                                                                                                                              C:\Windows\system32\Bmngqdpj.exe
                                                                                                                                                                                              91⤵
                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                              PID:5416
                                                                                                                                                                                              • C:\Windows\SysWOW64\Beeoaapl.exe
                                                                                                                                                                                                C:\Windows\system32\Beeoaapl.exe
                                                                                                                                                                                                92⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:5460
                                                                                                                                                                                                • C:\Windows\SysWOW64\Bgcknmop.exe
                                                                                                                                                                                                  C:\Windows\system32\Bgcknmop.exe
                                                                                                                                                                                                  93⤵
                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  PID:5504
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Bjagjhnc.exe
                                                                                                                                                                                                    C:\Windows\system32\Bjagjhnc.exe
                                                                                                                                                                                                    94⤵
                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                    PID:5548
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Beglgani.exe
                                                                                                                                                                                                      C:\Windows\system32\Beglgani.exe
                                                                                                                                                                                                      95⤵
                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:5592
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Bjddphlq.exe
                                                                                                                                                                                                        C:\Windows\system32\Bjddphlq.exe
                                                                                                                                                                                                        96⤵
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                        PID:5636
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Bmbplc32.exe
                                                                                                                                                                                                          C:\Windows\system32\Bmbplc32.exe
                                                                                                                                                                                                          97⤵
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:5680
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Beihma32.exe
                                                                                                                                                                                                            C:\Windows\system32\Beihma32.exe
                                                                                                                                                                                                            98⤵
                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                            PID:5724
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Bhhdil32.exe
                                                                                                                                                                                                              C:\Windows\system32\Bhhdil32.exe
                                                                                                                                                                                                              99⤵
                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:5768
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Bjfaeh32.exe
                                                                                                                                                                                                                C:\Windows\system32\Bjfaeh32.exe
                                                                                                                                                                                                                100⤵
                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                PID:5812
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Bmemac32.exe
                                                                                                                                                                                                                  C:\Windows\system32\Bmemac32.exe
                                                                                                                                                                                                                  101⤵
                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                  PID:5856
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Belebq32.exe
                                                                                                                                                                                                                    C:\Windows\system32\Belebq32.exe
                                                                                                                                                                                                                    102⤵
                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                    PID:5904
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Cfmajipb.exe
                                                                                                                                                                                                                      C:\Windows\system32\Cfmajipb.exe
                                                                                                                                                                                                                      103⤵
                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                      PID:5948
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Cndikf32.exe
                                                                                                                                                                                                                        C:\Windows\system32\Cndikf32.exe
                                                                                                                                                                                                                        104⤵
                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                        PID:5992
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Cmgjgcgo.exe
                                                                                                                                                                                                                          C:\Windows\system32\Cmgjgcgo.exe
                                                                                                                                                                                                                          105⤵
                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                          PID:6036
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Cdabcm32.exe
                                                                                                                                                                                                                            C:\Windows\system32\Cdabcm32.exe
                                                                                                                                                                                                                            106⤵
                                                                                                                                                                                                                              PID:6080
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Cfpnph32.exe
                                                                                                                                                                                                                                C:\Windows\system32\Cfpnph32.exe
                                                                                                                                                                                                                                107⤵
                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:6124
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Cnffqf32.exe
                                                                                                                                                                                                                                  C:\Windows\system32\Cnffqf32.exe
                                                                                                                                                                                                                                  108⤵
                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                  PID:5136
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Ceqnmpfo.exe
                                                                                                                                                                                                                                    C:\Windows\system32\Ceqnmpfo.exe
                                                                                                                                                                                                                                    109⤵
                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                    PID:5236
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Chokikeb.exe
                                                                                                                                                                                                                                      C:\Windows\system32\Chokikeb.exe
                                                                                                                                                                                                                                      110⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                      PID:5292
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Cjmgfgdf.exe
                                                                                                                                                                                                                                        C:\Windows\system32\Cjmgfgdf.exe
                                                                                                                                                                                                                                        111⤵
                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                        PID:5356
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Cmlcbbcj.exe
                                                                                                                                                                                                                                          C:\Windows\system32\Cmlcbbcj.exe
                                                                                                                                                                                                                                          112⤵
                                                                                                                                                                                                                                            PID:2520
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Ceckcp32.exe
                                                                                                                                                                                                                                              C:\Windows\system32\Ceckcp32.exe
                                                                                                                                                                                                                                              113⤵
                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              PID:1104
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Cdfkolkf.exe
                                                                                                                                                                                                                                                C:\Windows\system32\Cdfkolkf.exe
                                                                                                                                                                                                                                                114⤵
                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:5400
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Cfdhkhjj.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\Cfdhkhjj.exe
                                                                                                                                                                                                                                                  115⤵
                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                  PID:1784
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Cjpckf32.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\Cjpckf32.exe
                                                                                                                                                                                                                                                    116⤵
                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                    PID:5516
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Ceehho32.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\Ceehho32.exe
                                                                                                                                                                                                                                                      117⤵
                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                      PID:5580
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Cffdpghg.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\Cffdpghg.exe
                                                                                                                                                                                                                                                        118⤵
                                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                        PID:5652
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Cjbpaf32.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\Cjbpaf32.exe
                                                                                                                                                                                                                                                          119⤵
                                                                                                                                                                                                                                                            PID:5720
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Calhnpgn.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\Calhnpgn.exe
                                                                                                                                                                                                                                                              120⤵
                                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                                              PID:5804
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Ddjejl32.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\Ddjejl32.exe
                                                                                                                                                                                                                                                                121⤵
                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                PID:5872
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Dfiafg32.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\Dfiafg32.exe
                                                                                                                                                                                                                                                                  122⤵
                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                  PID:5940
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Dmcibama.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\Dmcibama.exe
                                                                                                                                                                                                                                                                    123⤵
                                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                    PID:6012
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Danecp32.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\Danecp32.exe
                                                                                                                                                                                                                                                                      124⤵
                                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                      PID:6076
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Ddmaok32.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\Ddmaok32.exe
                                                                                                                                                                                                                                                                        125⤵
                                                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                                        PID:5124
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Dfknkg32.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\Dfknkg32.exe
                                                                                                                                                                                                                                                                          126⤵
                                                                                                                                                                                                                                                                            PID:5256
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Dmefhako.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\Dmefhako.exe
                                                                                                                                                                                                                                                                              127⤵
                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                              PID:5344
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Delnin32.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\Delnin32.exe
                                                                                                                                                                                                                                                                                128⤵
                                                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                PID:1728
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Dhkjej32.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\Dhkjej32.exe
                                                                                                                                                                                                                                                                                  129⤵
                                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                  PID:5424
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Dfnjafap.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\Dfnjafap.exe
                                                                                                                                                                                                                                                                                    130⤵
                                                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                    PID:5468
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Dmgbnq32.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\Dmgbnq32.exe
                                                                                                                                                                                                                                                                                      131⤵
                                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                      PID:5588
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Deokon32.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\Deokon32.exe
                                                                                                                                                                                                                                                                                        132⤵
                                                                                                                                                                                                                                                                                          PID:5716
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Dhmgki32.exe
                                                                                                                                                                                                                                                                                            C:\Windows\system32\Dhmgki32.exe
                                                                                                                                                                                                                                                                                            133⤵
                                                                                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                            PID:5820
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Dogogcpo.exe
                                                                                                                                                                                                                                                                                              C:\Windows\system32\Dogogcpo.exe
                                                                                                                                                                                                                                                                                              134⤵
                                                                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                                                                              PID:5932
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Daekdooc.exe
                                                                                                                                                                                                                                                                                                C:\Windows\system32\Daekdooc.exe
                                                                                                                                                                                                                                                                                                135⤵
                                                                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                PID:6072
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Dddhpjof.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\system32\Dddhpjof.exe
                                                                                                                                                                                                                                                                                                  136⤵
                                                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                                  PID:5140
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Dknpmdfc.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\system32\Dknpmdfc.exe
                                                                                                                                                                                                                                                                                                    137⤵
                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                    PID:5320
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Dmllipeg.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\Dmllipeg.exe
                                                                                                                                                                                                                                                                                                      138⤵
                                                                                                                                                                                                                                                                                                        PID:2732
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 420
                                                                                                                                                                                                                                                                                                          139⤵
                                                                                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                                                                                          PID:5688
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2732 -ip 2732
                      1⤵
                        PID:5564

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\SysWOW64\Acjclpcf.exe

                        Filesize

                        128KB

                        MD5

                        9f254d79fbf0ec1a4cf007b52f06ff55

                        SHA1

                        c29225e7dab098614e86eedf3dcb7bf78ead967e

                        SHA256

                        53a93331175ad1163e185a4eb335af48f45881b81dea115a90c530ccae43aba2

                        SHA512

                        386b42e2efe680f45ebb84e90e96b7dca2e7179fe9f07582521b39d6de505ba3bbfe522134649dcd40c4abdddf3b76db95dd574f2b2484a3d0315ee556fbe24c

                      • C:\Windows\SysWOW64\Acqimo32.exe

                        Filesize

                        128KB

                        MD5

                        93e802fc36ba39f312274a2c405e1030

                        SHA1

                        963c338bbf33dc001356af7ce5bd7f0cdcf9f8ff

                        SHA256

                        091191b3f0865cf566d5da243ab8d315f342adfef42120b38f678a0a87c7394b

                        SHA512

                        84b76fad6356d825cdcb3575d6356f16273e2a10f99187ca35d7e5e692f83b5cdf6a5236d4799c8da8cb2875b603c806a88222fe61b6b83e9628b0290c935438

                      • C:\Windows\SysWOW64\Anmjcieo.exe

                        Filesize

                        128KB

                        MD5

                        4b9e3347b2d0241511a513bf024e8bec

                        SHA1

                        bb75c03a6fc3563d4e07c885dec6a6a91e6c30e9

                        SHA256

                        158e9710b3bff7062c6d6fd6ff19146bcf1ceef5ed5420d037c97a01e72cad1c

                        SHA512

                        db7b84c33a1b8cd80871f213c0163f9b13ffabb0b393c8cb755490e79c54c8b01d0848f9bb29ec3d3227614543e6d0b73f162ce08acd5305978eea89aac8602e

                      • C:\Windows\SysWOW64\Bfabnjjp.exe

                        Filesize

                        128KB

                        MD5

                        834611fab377a7249327502a79587e33

                        SHA1

                        2c9c8ad36170d1524968d2e61fadab28fb061bda

                        SHA256

                        b97404a8ac06e325ce11bc035b8d664a9632eeaa8245b668bea1ba9005c64fd6

                        SHA512

                        a7c76b62c5426b3bd8562c97bd541bdfd19280f6cb8f2753084a53071056641a64ef78cedcfba8e2f9d3f4b1de21cb189c0057fe7acf965719d1556f9e225290

                      • C:\Windows\SysWOW64\Bjddphlq.exe

                        Filesize

                        128KB

                        MD5

                        8fc21047d2aa2567d2cabfe011f061e1

                        SHA1

                        81e3d150df0dd52d06ab41671a4a8159768fd37f

                        SHA256

                        9740a79827d13a418c34a63dc3cc1d55850e543d8b990734ebd2f451ba65dbb4

                        SHA512

                        0603b04972524d16c81a9013651a29b4c34541c56c0b64ea7a245796c0d805e7a625c1208bea1246cc46878c7398b309d49e17b966bddb97336a205c11b66d4e

                      • C:\Windows\SysWOW64\Bjfaeh32.exe

                        Filesize

                        128KB

                        MD5

                        11cdac6befec92f09daf774703cef13d

                        SHA1

                        eda3868cd3c2f64b64529fe1b7a7283af33b22c9

                        SHA256

                        be9b015cef81f3dd9dd0ac4669609df84490088acf9b4c553501348cbd1d012b

                        SHA512

                        dab765102dc3c79a60560eed98737ffcb6bffeea99fbed7553afc2dbc754081a935b63740d3808fa174ceefec70196c1133a93819455039a86d0367e889bf4ad

                      • C:\Windows\SysWOW64\Cdabcm32.exe

                        Filesize

                        128KB

                        MD5

                        1f50a01aea9be758aa1aad257b028314

                        SHA1

                        ca064d8366fd1c508e98c884b0e3e90d2ed9c82d

                        SHA256

                        7048b836b5ee001f414124cb67c33edf50aa4e50bae5dce0e133f252116ff3f0

                        SHA512

                        b7a40f38770bfb134df722c32e21a25808d461a3cbd10f5f739c8d94c938dad1565919ef37d07b0bace0c8e92b869c7dfe1aa2ac95d301e8049097229538a5ee

                      • C:\Windows\SysWOW64\Ceckcp32.exe

                        Filesize

                        128KB

                        MD5

                        fb573fca53e2e19d2d453199bea91869

                        SHA1

                        236f7ee9de0feab77cf531bdb64a935153853026

                        SHA256

                        51c890d1ddd3a934d5bc2527aa7b77f57f55ea90ae9457aa24a30ba247d75973

                        SHA512

                        ee5c2a3e27a73b9fd64a03a880bf72a0b5674e91038e83c440c5a5a9b4742d2a585bdcbfaad5c1fae3f79dbaaec1b90396e1e343845d87f3aa7877a7d08412e2

                      • C:\Windows\SysWOW64\Cffdpghg.exe

                        Filesize

                        128KB

                        MD5

                        b8a9d599f3b00be425d9466007464da4

                        SHA1

                        a3ef33c1f0870d41f1c2edd6f530ace631b37880

                        SHA256

                        002b183f41e81a2b51649c527adaabec96b71952c87db14ce7cc01b589d768be

                        SHA512

                        760d49423abeac49fb875434d526eace3475566c9e9523dc5b64c0256303e7c34d8930e9f10bed800ddea4fd4402742a8022983afa7af696227f3ff1811c65fd

                      • C:\Windows\SysWOW64\Chokikeb.exe

                        Filesize

                        128KB

                        MD5

                        16b9d595b12c733ed3feee22aee70f21

                        SHA1

                        73633183a4fd57c94d1b06363e7f66b956f30ba6

                        SHA256

                        31233ad4d6dbd7732d295dbd81e04c1c1eac974b48044fe2e67aa2dbea2834b7

                        SHA512

                        b2b2e90dbcde67d1f5f276a732d974f2c0b8ab218a6d052742d064f2e45a863c2debc2b9f7c0e5b9e329556cde12d3606f9df8634841f681f24638db5a3d62cb

                      • C:\Windows\SysWOW64\Danecp32.exe

                        Filesize

                        128KB

                        MD5

                        5dcbf4f4308e49272ab52d6feac663f8

                        SHA1

                        0030b73ee4c9016dcd6a317e37695fc09078f891

                        SHA256

                        0c5b50b29fa0a35145df5cb04d3a0b07fa25ed5016d79c2e98cac586dbc9613a

                        SHA512

                        974cf48add74490e3576ef1a260a299b063abf306338dae375aafd0782ef3360da8c26a5cfdadcf042058cf44b7c5744aba8548fe8bf1f8a64d1870e3b9ce41b

                      • C:\Windows\SysWOW64\Dfknkg32.exe

                        Filesize

                        128KB

                        MD5

                        9238cad63a2d36614200c91ea60204f2

                        SHA1

                        51928b1dc36bfb848eebe278c12c5eccdac42d17

                        SHA256

                        d06dcb6ac1bd10e53456ce7bea5010786594fdff0386728aceaf1a28c5a6ac08

                        SHA512

                        c04eaaa2cfbe1646978a9c7e5c89c48582d6b90816a9d1c04668bfef1286cd84d2f872416b2f0b0ba06bee50f23fd08046e38b1c71a0a02017fc8e5e473f2f88

                      • C:\Windows\SysWOW64\Dhkjej32.exe

                        Filesize

                        128KB

                        MD5

                        0b60ba249574029e211b596c0df28030

                        SHA1

                        14e96154ef879a3c562025dd65844584ea977cb8

                        SHA256

                        ba3e8ece0c98de9cbb6c622fa3b3a45fe8533d4302dc5a58fe4ddde156ca2de1

                        SHA512

                        65e0f03b2a76de857ddcce59c90569e75fc7a6bade8453bb3fe27aebff9a4338844c479543abc0cb3c534c473f026e82daf43c33c53cb76879bff3a2fd4af2fe

                      • C:\Windows\SysWOW64\Fojhkmkj.dll

                        Filesize

                        7KB

                        MD5

                        51920915f4a17a30b0aef05efb5d7bd4

                        SHA1

                        2c3f9a18d07323b18052dbcd28e0530ba2dd1f70

                        SHA256

                        3daf91230e846e5172bd1bc944ba507186a6d10ce15a04594b9ac5fc0209c591

                        SHA512

                        11e10202ef03cf9113d71b38916cbc89a1851d98b80d8c3105ec3353de189a8163de8257ddaa3123c23ab8accaff7f2b968ff07c7c2275323d94ab8435998597

                      • C:\Windows\SysWOW64\Ldjhpl32.exe

                        Filesize

                        128KB

                        MD5

                        a31b282ce7db41745e6a1216fb9e91be

                        SHA1

                        63ffb8df02600543db377e203d57f7bea98d7aa4

                        SHA256

                        b45b7fdb91a956c6ffb81b5cf1a88e914b341551f05db0391a903e5dc3846c16

                        SHA512

                        c81b9e711d0c43cdc1714b27c277095e4178dcdfc58b708087662fde5e0a4ba0bdf108d69f59193209db2fe97ce5a1a16aba8d30c3dab0d1dc0477040f11c1f4

                      • C:\Windows\SysWOW64\Ldoaklml.exe

                        Filesize

                        128KB

                        MD5

                        977113e70218d6c422cbc452575f3d25

                        SHA1

                        5e2cdb4b553978e9830137d428804f391f38a685

                        SHA256

                        693d1e0503fc2736e97abdbe24182fc5082e34bf0831d0faf2b0e2aca5210eb9

                        SHA512

                        936b11c3c33f9029258885793a1f0c20c4cea55f4d740cf3ba267f69c2798e244fd1d3e8cd896dffec1ddafe595ed37c272f81f73694750766f5a700d6e6fffb

                      • C:\Windows\SysWOW64\Lenamdem.exe

                        Filesize

                        128KB

                        MD5

                        e84888b9c649de5d64a9427d7290d9e0

                        SHA1

                        99203c9a7c7fbf4de91456d1314a2bc1945008ad

                        SHA256

                        cb4aad1b1cc46601ff81605dd55820271c1eb626732c7712ed40086f4d6e46eb

                        SHA512

                        7d0d9156a6327685778d4b11b78f1eda9e1be4c5eb5ad1d09e969146500227b99023fe14fa90cc47b4f9f5d5d8f0037f31288213e6b6e603e7e56521e6511d40

                      • C:\Windows\SysWOW64\Lepncd32.exe

                        Filesize

                        128KB

                        MD5

                        1085defb1f62ab73a14b59d0c96fe683

                        SHA1

                        95539fa81b47306efc6a11570c83524962835999

                        SHA256

                        55445d680f13f1ba291d05089062c3a8fad2b92b5ac5cca6b07c95abfd4d4d9b

                        SHA512

                        61d576ffb3d3d521a62e74069ae880a9e4e6928a19b5ba4312ed4f25a77a556e4d9cd86ef9129c18b90346182f9ca64f359c358399b7dd269032fba742c42930

                      • C:\Windows\SysWOW64\Lfhdlh32.exe

                        Filesize

                        128KB

                        MD5

                        7fd4a524e91bb9a31dd28048a354e553

                        SHA1

                        47e40c6b7b80a826f9d37c6c45ec06cf4e70d48a

                        SHA256

                        e6ebf05986b85edf2456568ca5fbd2ae497ef2ae5774b22a811f393d6cb1cacd

                        SHA512

                        acf94c5154ed250b1af92d63cbd35ac816496b3b87e3bf11d1f112226d263f05c856bf917fe0c1f40369419f2cf7fb621f9e8e4fb01a085085344217b92a0e1f

                      • C:\Windows\SysWOW64\Lllcen32.exe

                        Filesize

                        128KB

                        MD5

                        028a9eb452e622d544df3eebcb44ee50

                        SHA1

                        9d789e4e8e422ceb6008a0151651092f5cd4ffbc

                        SHA256

                        1e51b930e7b9cb0ad21c64334e1fffc635be5279456cb91024b68de1e34358dd

                        SHA512

                        73104de1cfe25d7c4def3e2545faaa796d9739725891daf7e2c0e76b82ba74e19116cd9321a07b08af4b19aade379cbc062f1bc7d58d2466e4b710963e97bdc9

                      • C:\Windows\SysWOW64\Lmbmibhb.exe

                        Filesize

                        128KB

                        MD5

                        6b177850a343bf8f59bb5aa4462453d9

                        SHA1

                        34c30ca341b817300da708cfaff328b6851044df

                        SHA256

                        0a39d5931314b3ec11638cf794e87a9ee175e460e9fca6ec36739127b5ac9101

                        SHA512

                        84ce95af5ab446e878ccb8e91169b876a6b33c07d896f7efe20387febb5e4c657143861c759e10ac544de8508708f82a8dca37b88ab9ebbeedcb24b115b497f2

                      • C:\Windows\SysWOW64\Lmdina32.exe

                        Filesize

                        128KB

                        MD5

                        6ec83048657d9ba0328d344a246078e7

                        SHA1

                        34f8696ed9319f72e6d6401def3e26127165914d

                        SHA256

                        8c34125c132b8dc87b66ad24f4f6c443b222339ccf2344ba08a7043b11a6d43c

                        SHA512

                        ffa361a236a14a77d7a4b71d72e3afa19ee9488c71b43c60a501ee52570ed5d0d61eebc4277c7788065ff67d839d6e38735673b9be7186ab1b38088055f49976

                      • C:\Windows\SysWOW64\Lmgfda32.exe

                        Filesize

                        128KB

                        MD5

                        2b9f8c26c41cabc056b30200820562c9

                        SHA1

                        864cd36fd6a24d76c020296e02c73135bb189f5e

                        SHA256

                        36016d0ad03b70e6d7dc807defdb2bfe3d2b3285d13f18c8bb2f38e4a64f910a

                        SHA512

                        cfad5f388cada738821e225f62305c2a0d7c190a8198d0334a6cd178874f916ab260f3adbb965d275698f35bb93f91cad2878a3d659b3c8e4e364f8adc6befc2

                      • C:\Windows\SysWOW64\Lpebpm32.exe

                        Filesize

                        128KB

                        MD5

                        8be40508c988dd0ddafb094b4cbcca03

                        SHA1

                        9edf9d59ca9654787b85a26d0b3173cd7f10ad0f

                        SHA256

                        ae70bb92f5dea4e3578366c82d37f83822ed67c4680fe46eb37b01a6aa2f4542

                        SHA512

                        35bfad0bdc99313f9092ab7d2bad83466e635417c3c196ec1f8ea1e6a6899e4d8b9f91aec2e5f2dce267083592931ae4c27c8072642facaf299c8a3d5266236f

                      • C:\Windows\SysWOW64\Lpnlpnih.exe

                        Filesize

                        128KB

                        MD5

                        e1cd3ec378b0b779db9bfbf977d6902f

                        SHA1

                        888a9710790a08494248ce78cd9b65dd9a62447f

                        SHA256

                        d0b36cd1a6d8948f8602d8d3972a19a770e7c1bdb3362d3829cb2201e8d4bdec

                        SHA512

                        cccba50af34ad8712b54de6ed3cd0794c51842c90274a862701f4cc65e9393dbe9daa296cb4b33fe4c85c59fbaec8c6b80c6feb771488f6f82f438604c7e9bd6

                      • C:\Windows\SysWOW64\Lpqiemge.exe

                        Filesize

                        128KB

                        MD5

                        f734c2c2a76f4f76879df130fd2bffa5

                        SHA1

                        bd7593f6a2308ff95086ecd9a3ad75e9ae95ab63

                        SHA256

                        6ccd486c80905368284f2e643b6c67450cf8408af5a58e2611de858040812742

                        SHA512

                        3fdc4853c68d6a6dfc34dce5cecffd461470754c347ddf5862a0f96944ee21a340d5ef0d54429726d52e1e38e82bc8033b18007ad62ad94770c51afc6a704be9

                      • C:\Windows\SysWOW64\Mchhggno.exe

                        Filesize

                        128KB

                        MD5

                        4de73e3a99c03eec77762d07bb6160f8

                        SHA1

                        3b5d5d80ae25963673732ac172e73f4894db1481

                        SHA256

                        b32c6960ee224eb4fdc23f37d11f6e15a6373bfc462e95c8dca90409400d0b14

                        SHA512

                        5f4e9415eb04a56669395d6f98a881ec99fd8107a86cb4035e763f32e4614165ef696f095ae1c1c0f9a3a2b55d389a78e6803e5133f389572d78276c9e25fc9c

                      • C:\Windows\SysWOW64\Mckemg32.exe

                        Filesize

                        128KB

                        MD5

                        a37ecd60071352edb669b614710a5169

                        SHA1

                        a7bb76a29a5921bcde9a24291ff3ff016351fa53

                        SHA256

                        c5b110a25cd13724aab96b9d532cdd6c63e15f00e6b579bd83f97569c8292f67

                        SHA512

                        24f66b0761e038e35c407d47c4554a75836e600e5aaa0f2523c3eb4f2807bdab7aeeac3c1610911837c1af5d9ba3ffebbcad1c35e66fe4b441dade95bad9e5f9

                      • C:\Windows\SysWOW64\Mcmabg32.exe

                        Filesize

                        128KB

                        MD5

                        d46d0a6ef36e9813e9b1bca16c9b7a9e

                        SHA1

                        2e6b65ce6870fd08cb25d9da801f5f3bc5ca3f8d

                        SHA256

                        189d176e2eca1ee262049ef4d87fa2d85ede3ca362194225d8decc2e0a3b68ba

                        SHA512

                        ad8612fef9e3474eb2d0f71009e4137cdd856663be4b8063db986910aaea4ab8d1af313aee539e0cc7f139d779ffc828c8435df0d01ca799e34a7dbe00f87d41

                      • C:\Windows\SysWOW64\Mdckfk32.exe

                        Filesize

                        128KB

                        MD5

                        4169521ba3eb880d143c9da19c6d8bb8

                        SHA1

                        7e063b72a63d66ced2705a72c8141598b7fb79ce

                        SHA256

                        78110b6f26872a198eb0b448f23d490730a3f8b6aaa76476fe36233b835b8ac3

                        SHA512

                        cc3948b19b3a04e43f0ba5b45d62daac60134e7975a493307533b6ffcc26fed7ae33bb95818aacb21ed6dd083e79c06511a25352cfd725ee764c69af4738b689

                      • C:\Windows\SysWOW64\Miemjaci.exe

                        Filesize

                        128KB

                        MD5

                        465b1174176b4fef29d2bb20edca348a

                        SHA1

                        2e6fd3f0fa42d60df272164dd4ba2bd8fc071064

                        SHA256

                        5fec73d95a1a879adf2a5984595420a3dd7df9906aaf83de1cdc2850b20675c9

                        SHA512

                        872a905a733ab51899b5b1467a1929f533d9ff241d80b9bf1efeedf247993fc2df38f1f277872e7e183ae933d1fbfcca47db7f78d2f1cacb253f101759029b77

                      • C:\Windows\SysWOW64\Miifeq32.exe

                        Filesize

                        128KB

                        MD5

                        7f7ba366b7fc0740d7b28a6bb0f213e2

                        SHA1

                        afaf6346d9fce54799f121fce3efe1cb6a6690f3

                        SHA256

                        328d9a6fb6fd78992aebd7b13a079cf6d67ded7311c1e2dff16cab968bf66a08

                        SHA512

                        ba39bf0bfdd930bb568d75b1474e1921a4de80e41af60810ebc62f54ba55379d41ce8b63789f882c8ef412bb917a5b69ebfe064649408077c4b1ee2c9036c7f1

                      • C:\Windows\SysWOW64\Mlampmdo.exe

                        Filesize

                        128KB

                        MD5

                        ce9a6d5e6089ff486eb63073088f4c58

                        SHA1

                        3dd1bbc17e0c7ea8cdd083fd4d85f1bed9ac480f

                        SHA256

                        8aee954eb9bbf092d8751e26bb579fa7ee5e3d851dd253bd42e420444fa1808b

                        SHA512

                        dd3b88d49a4236afae9c2ed72f837568ffaa7530f3fcf90b1f71a4b6a3c039f4cca9dac78417e80bb3d22fbe1204bd60b02216c54064b24d881f496f446de023

                      • C:\Windows\SysWOW64\Mmlpoqpg.exe

                        Filesize

                        128KB

                        MD5

                        861547bed4106059f25c2f89f6918605

                        SHA1

                        066dc3d19178e4ec1a7870127fe8086927fc2f77

                        SHA256

                        57cebca07267cdf8aa634aa633a95b9ece8f62a3104e03180a5a604f77fea353

                        SHA512

                        792db0d0f9e2d335d96ae8e5294420cf9e97d632c1429048bd441c26b248d6af1ab977016dac215e793e9e5386f31dd0f11a00f64f73f8ac08065e5656734ea7

                      • C:\Windows\SysWOW64\Mpablkhc.exe

                        Filesize

                        128KB

                        MD5

                        fb5fd0857cebcd63cfbc6f659e204ed4

                        SHA1

                        123f0ec33e8042791c9a8c88e3bfd01b4a6a53b6

                        SHA256

                        4c6f2496d8f45ca2108ad6274bd8508d3527a84fdeef9aebcde38b668299a98b

                        SHA512

                        4954543e1899a496b3e5e366981e5be67b900460089417b489f952742037136a3f632eaccb7fdfcfbd79e33a90e2533d4388004e4f3b12db385e7e52e53a4e99

                      • C:\Windows\SysWOW64\Mpoefk32.exe

                        Filesize

                        128KB

                        MD5

                        6852766dda9c65629e38aa43bf022251

                        SHA1

                        949c2b9fceec8617be0d8eea1f7b0dc0289a2f5e

                        SHA256

                        820551e00e47f5614009626d836448f40dbc81ad0aedd84d3c2eff422212cba4

                        SHA512

                        35969d618b288969bf8508a80483d9d380868c419f1353db7b9c6639dcf804401f65929e8a6d667399493243162bdd8645d48069bc1c6f40eb8adcc131f146b5

                      • C:\Windows\SysWOW64\Ncdgcf32.exe

                        Filesize

                        128KB

                        MD5

                        a4020290037c4bdb73e6637fb84ba05c

                        SHA1

                        79ed214dcc21d982ea5b5cc3b384d7db3c9e1501

                        SHA256

                        c11d6b132f9a17c386fee16a8d7e747824a6b36cfc3ee600ef05a5c288240487

                        SHA512

                        4682b19a2c3d8101b4a67fa4f1eea6ddd8709af71f112a758cb0a60d4a435be79a65f5232aa76d0c43befa4fc2024fc353a18d809287263749a988a7609807c6

                      • C:\Windows\SysWOW64\Ncianepl.exe

                        Filesize

                        128KB

                        MD5

                        67b798569f89f455098101de3670e670

                        SHA1

                        37cb78a590ad3c603f52e58128b9d18c04c59c7f

                        SHA256

                        7ff8fa7248e90e21ac5dd64d5e3afe9515765cddd7ca0d7307343a42fac213e5

                        SHA512

                        e1bd4bfc753e07e5b3b10e4667fcfb9cdbb4e6693f119b61aedfc7e8443a9b853817de8f9c48de9e495c790ee10e2cd8fc7811b752555677ae3079163a4fa8fc

                      • C:\Windows\SysWOW64\Ndcdmikd.exe

                        Filesize

                        128KB

                        MD5

                        d6aa631a6b5a069ea3aed17280a936d9

                        SHA1

                        2c6faac7306e7a2b3dd7520099728daa87b5fbef

                        SHA256

                        da1e2ae8875edaa3899beace33104c9b4d6aa33aba0d5269e0556a266ea77b82

                        SHA512

                        6d82cbf7ca61df5b6bb9e7fb69993fa74f453a1410c176e6fe17bdba1208ca465d69401fd15202a6f222fe460629c55ed055091a456288d0e1aa42272cb2c1ab

                      • C:\Windows\SysWOW64\Ngpccdlj.exe

                        Filesize

                        128KB

                        MD5

                        1f95303fc23efcc7a4e1306fbf15a3c0

                        SHA1

                        5340f17f57bac6748a8bf8a6685fb08a7e0a50f5

                        SHA256

                        235b500d7947ca7210c3bfa47e69f2d3ffd901413ca7d5dddbe2344e839234b6

                        SHA512

                        88b57de9143776e596bd145518fe16e7ed0dab7914e8f592da41ed6f4ede2116de17759edf7a2dcb4fa34c8388458c6dde0fd7527ed8a3f3824fe99f706a663e

                      • C:\Windows\SysWOW64\Nilcjp32.exe

                        Filesize

                        128KB

                        MD5

                        3f601483e3a201906a2a255381fcd70f

                        SHA1

                        70199276ba78fd9a6043200ebda25c0a5ea85b5a

                        SHA256

                        89043c091192c2b6a0060ccc93bb7ac1feb440a00a670dd0bdc097cc9f8f9ecb

                        SHA512

                        ba34efb8a620fd0c666c741fc44b550ec815f8c785b4e18f1b20c9c30d510863f801b1c1d544d89b3d24f15b02a24a6e22962caf1faad7fbd9aab0448a23e4e1

                      • C:\Windows\SysWOW64\Njnpppkn.exe

                        Filesize

                        128KB

                        MD5

                        ba1ed47a9b89afde57e2d7acdf5de338

                        SHA1

                        271df1a19ca4e29f98ed8f080084dfab4693ea2a

                        SHA256

                        f0de677161379e58a0313dc3bfd810d8faf20d0fb84acc512a57f76b7e02ead0

                        SHA512

                        9c70b21056559c0d2e11b2b9f5d6c63565a0cb2d7f62aeca72f01d7cd7cd5efadba1ad91e5ff844974124390d6e65ff51925edddbf2038a47c3735415514b4c2

                      • C:\Windows\SysWOW64\Nnjlpo32.exe

                        Filesize

                        128KB

                        MD5

                        5ea178fc4c072d97423c9327a4e60253

                        SHA1

                        6898fac6fe57e4e3d8e7fc164d1e591ddf2611c8

                        SHA256

                        865c81081a519075baccd90677e46ba5b70dd11b5b84f2e9fb2cb2460dafb56f

                        SHA512

                        655ac29672e2939d65ac560838df8fa962ecf14b9fe5f4f5a0ddc881890e80a2afd9a6ae5995bcf84386288e06c98db64e8223bd5b72d9101e1267974782a3cf

                      • C:\Windows\SysWOW64\Npcoakfp.exe

                        Filesize

                        128KB

                        MD5

                        b97530477bd3a62addeb0ebd08efbc31

                        SHA1

                        ff0128bc3089ebafff912c14bb5f5ccdbe20bb43

                        SHA256

                        facd024c245383e84ab0d04138021b1169e9d3de8b26d12020d4bd8caefbbe8d

                        SHA512

                        e46ca9becf7a5824dc4679fcdb4f504f5b419bdf86fa4e0537670699639dccf130f86c95e9fb81f6eedcb8480b543806e1eaf78e9865182f2d9edf1c0fc171fd

                      • C:\Windows\SysWOW64\Npfkgjdn.exe

                        Filesize

                        128KB

                        MD5

                        0ec79ca28b4553514d94dc65f47f92fc

                        SHA1

                        04c02cbbcab9bef77048ed09a15c97fd72572d85

                        SHA256

                        f8035a01b86b1ed551b5949f82d7fc7d8a568a8dbbd95cfbe45875a3c067e803

                        SHA512

                        2d1b96d9261f0fbf9b3da2f0730e86072963dcd2d83ff0da891008437a8ac9ec199bafb546bbfa9747a827b34d69c359561d6d9203055e4e482f782e701ee044

                      • C:\Windows\SysWOW64\Npjebj32.exe

                        Filesize

                        128KB

                        MD5

                        424f5c8b7591dcc308465a8356f92a66

                        SHA1

                        924c2b7a8843772bcd3204d635fb72ff6882dac3

                        SHA256

                        e536b63876f745b95a183558fff8dd6316b623816ff3a444b9ea33a88718ca50

                        SHA512

                        ad0f8e14fbc177500338b5b1c1fef279df0cd6bfa82b59662984a4afde2ee2e4373a603d9a37f4fb8e50e1f9af452ae5e65e2f627f37c86e162ef96a2a967937

                      • C:\Windows\SysWOW64\Odmgcgbi.exe

                        Filesize

                        128KB

                        MD5

                        9571f296085c3db4c18f7c761187fb5d

                        SHA1

                        c3c2a56d67c5df5ae8045a0899372ece1434b899

                        SHA256

                        72321bb0bc64981a146ba96b13817c2f2d59a73ebe5c02dc74423b70597eccb3

                        SHA512

                        6318922fffcf3c20df49ab9e2aa197f9da66e659820c539308c1198def56a0364c5426c8e1a0e354ebc5b4b5f48bbb1021d36e41cdeb7b7b81e5a9eb9e355260

                      • C:\Windows\SysWOW64\Pqpgdfnp.exe

                        Filesize

                        128KB

                        MD5

                        fc9cf50bce2a17b53fdb9c622548cd61

                        SHA1

                        075bb25916e790142388a9fea9486d44cfbda57a

                        SHA256

                        d5ab98c762a2c91e3ba256862390221c6a08b762954acf190aaebb47bd3247ba

                        SHA512

                        3bfc7adc01a7cda7239d9261422bba9fbdf2c54ca2141abd46c0d70a3ecc6836e2071671661a3737d9e43adb97ebc8702d025e7d79b7e25ac59a8279832d3563

                      • memory/228-80-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/228-0-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/232-352-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/232-286-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/316-216-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/316-299-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/456-162-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/456-251-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/720-108-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/720-196-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/840-278-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/840-189-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/952-170-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/952-260-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1036-345-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1036-279-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1096-365-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1096-300-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1128-396-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1360-246-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1360-152-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1428-261-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1428-332-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1480-379-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1480-313-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1496-380-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1564-403-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1624-410-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1688-238-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1688-143-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1880-125-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1880-215-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1900-161-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/1900-71-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2100-373-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2144-115-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2144-32-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2192-416-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2192-353-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2300-151-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2300-63-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2460-339-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2460-402-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2640-247-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2684-325-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2684-252-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2860-372-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2860-307-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2872-388-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2872-326-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2980-381-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2980-319-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/2996-424-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3032-366-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3112-389-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3252-47-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3252-133-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3516-275-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3660-88-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3660-8-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3672-298-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3684-306-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3684-229-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3716-296-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3716-206-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3808-116-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3808-205-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3816-23-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3816-106-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3844-97-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/3844-16-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4084-178-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4084-90-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4160-269-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4160-179-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4216-359-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4216-423-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4460-142-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4460-55-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4664-198-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4664-285-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4724-224-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4724-134-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4768-417-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4772-346-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4772-409-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4788-382-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4808-187-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4808-99-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4816-333-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4816-395-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4880-124-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4880-39-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/4964-239-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/5068-169-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB

                      • memory/5068-85-0x0000000000400000-0x0000000000445000-memory.dmp

                        Filesize

                        276KB