Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 04:47

General

  • Target

    e0f49add12a205dc17898e01d8f2320d19a35ac5d31396f774fb22960293a2b0.exe

  • Size

    144KB

  • MD5

    612ee674c13ecdc3ff7114ac78298891

  • SHA1

    1dc0592a52070100334bf6e416dcdf605da9e4a9

  • SHA256

    e0f49add12a205dc17898e01d8f2320d19a35ac5d31396f774fb22960293a2b0

  • SHA512

    28174f80ab430b0490ef686a86cb757fd5b6533f047849b23396a104b0af7b1cd90afe93175554d34824d33a0f83451097f3985633ebf09f760cad3fd52d1763

  • SSDEEP

    3072:hTQ6lx5hgrRrE5aoEzGYJpD9r8XxrYnQg4sIb:hNh6o2GyZ6Yub

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0f49add12a205dc17898e01d8f2320d19a35ac5d31396f774fb22960293a2b0.exe
    "C:\Users\Admin\AppData\Local\Temp\e0f49add12a205dc17898e01d8f2320d19a35ac5d31396f774fb22960293a2b0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Windows\SysWOW64\Hfcicmqp.exe
      C:\Windows\system32\Hfcicmqp.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3956
      • C:\Windows\SysWOW64\Ikpaldog.exe
        C:\Windows\system32\Ikpaldog.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Windows\SysWOW64\Iehfdi32.exe
          C:\Windows\system32\Iehfdi32.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1180
          • C:\Windows\SysWOW64\Ipnjab32.exe
            C:\Windows\system32\Ipnjab32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5000
            • C:\Windows\SysWOW64\Ildkgc32.exe
              C:\Windows\system32\Ildkgc32.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:804
              • C:\Windows\SysWOW64\Ibnccmbo.exe
                C:\Windows\system32\Ibnccmbo.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4700
                • C:\Windows\SysWOW64\Imdgqfbd.exe
                  C:\Windows\system32\Imdgqfbd.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3120
                  • C:\Windows\SysWOW64\Ieolehop.exe
                    C:\Windows\system32\Ieolehop.exe
                    9⤵
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:5084
                    • C:\Windows\SysWOW64\Icplcpgo.exe
                      C:\Windows\system32\Icplcpgo.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:408
                      • C:\Windows\SysWOW64\Jeaikh32.exe
                        C:\Windows\system32\Jeaikh32.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:4620
                        • C:\Windows\SysWOW64\Jcbihpel.exe
                          C:\Windows\system32\Jcbihpel.exe
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:3160
                          • C:\Windows\SysWOW64\Jpijnqkp.exe
                            C:\Windows\system32\Jpijnqkp.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of WriteProcessMemory
                            PID:4932
                            • C:\Windows\SysWOW64\Jfcbjk32.exe
                              C:\Windows\system32\Jfcbjk32.exe
                              14⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:4308
                              • C:\Windows\SysWOW64\Jbjcolha.exe
                                C:\Windows\system32\Jbjcolha.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:4512
                                • C:\Windows\SysWOW64\Jpnchp32.exe
                                  C:\Windows\system32\Jpnchp32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:2000
                                  • C:\Windows\SysWOW64\Jfhlejnh.exe
                                    C:\Windows\system32\Jfhlejnh.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:116
                                    • C:\Windows\SysWOW64\Jlednamo.exe
                                      C:\Windows\system32\Jlednamo.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:5048
                                      • C:\Windows\SysWOW64\Jcllonma.exe
                                        C:\Windows\system32\Jcllonma.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of WriteProcessMemory
                                        PID:4924
                                        • C:\Windows\SysWOW64\Kpbmco32.exe
                                          C:\Windows\system32\Kpbmco32.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:4216
                                          • C:\Windows\SysWOW64\Kikame32.exe
                                            C:\Windows\system32\Kikame32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:3124
                                            • C:\Windows\SysWOW64\Kbceejpf.exe
                                              C:\Windows\system32\Kbceejpf.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:2108
                                              • C:\Windows\SysWOW64\Kebbafoj.exe
                                                C:\Windows\system32\Kebbafoj.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                PID:3560
                                                • C:\Windows\SysWOW64\Kpgfooop.exe
                                                  C:\Windows\system32\Kpgfooop.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  PID:3888
                                                  • C:\Windows\SysWOW64\Kfankifm.exe
                                                    C:\Windows\system32\Kfankifm.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4528
                                                    • C:\Windows\SysWOW64\Kmkfhc32.exe
                                                      C:\Windows\system32\Kmkfhc32.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      PID:4652
                                                      • C:\Windows\SysWOW64\Kdeoemeg.exe
                                                        C:\Windows\system32\Kdeoemeg.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies registry class
                                                        PID:4764
                                                        • C:\Windows\SysWOW64\Lbjlfi32.exe
                                                          C:\Windows\system32\Lbjlfi32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5092
                                                          • C:\Windows\SysWOW64\Ldjhpl32.exe
                                                            C:\Windows\system32\Ldjhpl32.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            PID:1812
                                                            • C:\Windows\SysWOW64\Lmbmibhb.exe
                                                              C:\Windows\system32\Lmbmibhb.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:1624
                                                              • C:\Windows\SysWOW64\Lenamdem.exe
                                                                C:\Windows\system32\Lenamdem.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:4376
                                                                • C:\Windows\SysWOW64\Ldoaklml.exe
                                                                  C:\Windows\system32\Ldoaklml.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4464
                                                                  • C:\Windows\SysWOW64\Lljfpnjg.exe
                                                                    C:\Windows\system32\Lljfpnjg.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    PID:1104
                                                                    • C:\Windows\SysWOW64\Lebkhc32.exe
                                                                      C:\Windows\system32\Lebkhc32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1764
                                                                      • C:\Windows\SysWOW64\Lphoelqn.exe
                                                                        C:\Windows\system32\Lphoelqn.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3648
                                                                        • C:\Windows\SysWOW64\Mbfkbhpa.exe
                                                                          C:\Windows\system32\Mbfkbhpa.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:624
                                                                          • C:\Windows\SysWOW64\Mipcob32.exe
                                                                            C:\Windows\system32\Mipcob32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies registry class
                                                                            PID:4868
                                                                            • C:\Windows\SysWOW64\Mdehlk32.exe
                                                                              C:\Windows\system32\Mdehlk32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              PID:5012
                                                                              • C:\Windows\SysWOW64\Megdccmb.exe
                                                                                C:\Windows\system32\Megdccmb.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:3660
                                                                                • C:\Windows\SysWOW64\Mdhdajea.exe
                                                                                  C:\Windows\system32\Mdhdajea.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:3224
                                                                                  • C:\Windows\SysWOW64\Meiaib32.exe
                                                                                    C:\Windows\system32\Meiaib32.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:4272
                                                                                    • C:\Windows\SysWOW64\Mpoefk32.exe
                                                                                      C:\Windows\system32\Mpoefk32.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:2476
                                                                                      • C:\Windows\SysWOW64\Melnob32.exe
                                                                                        C:\Windows\system32\Melnob32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:1864
                                                                                        • C:\Windows\SysWOW64\Mpablkhc.exe
                                                                                          C:\Windows\system32\Mpablkhc.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:1732
                                                                                          • C:\Windows\SysWOW64\Mgkjhe32.exe
                                                                                            C:\Windows\system32\Mgkjhe32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:5116
                                                                                            • C:\Windows\SysWOW64\Mlhbal32.exe
                                                                                              C:\Windows\system32\Mlhbal32.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Modifies registry class
                                                                                              PID:4772
                                                                                              • C:\Windows\SysWOW64\Ncbknfed.exe
                                                                                                C:\Windows\system32\Ncbknfed.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4136
                                                                                                • C:\Windows\SysWOW64\Nilcjp32.exe
                                                                                                  C:\Windows\system32\Nilcjp32.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Modifies registry class
                                                                                                  PID:3704
                                                                                                  • C:\Windows\SysWOW64\Nebdoa32.exe
                                                                                                    C:\Windows\system32\Nebdoa32.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    PID:4000
                                                                                                    • C:\Windows\SysWOW64\Ndcdmikd.exe
                                                                                                      C:\Windows\system32\Ndcdmikd.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:1484
                                                                                                      • C:\Windows\SysWOW64\Njqmepik.exe
                                                                                                        C:\Windows\system32\Njqmepik.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:4860
                                                                                                        • C:\Windows\SysWOW64\Ndfqbhia.exe
                                                                                                          C:\Windows\system32\Ndfqbhia.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Modifies registry class
                                                                                                          PID:3244
                                                                                                          • C:\Windows\SysWOW64\Ngdmod32.exe
                                                                                                            C:\Windows\system32\Ngdmod32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:2880
                                                                                                            • C:\Windows\SysWOW64\Njciko32.exe
                                                                                                              C:\Windows\system32\Njciko32.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:3792
                                                                                                              • C:\Windows\SysWOW64\Ndhmhh32.exe
                                                                                                                C:\Windows\system32\Ndhmhh32.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Modifies registry class
                                                                                                                PID:4760
                                                                                                                • C:\Windows\SysWOW64\Nfjjppmm.exe
                                                                                                                  C:\Windows\system32\Nfjjppmm.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:4372
                                                                                                                  • C:\Windows\SysWOW64\Olcbmj32.exe
                                                                                                                    C:\Windows\system32\Olcbmj32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    PID:4560
                                                                                                                    • C:\Windows\SysWOW64\Oflgep32.exe
                                                                                                                      C:\Windows\system32\Oflgep32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:2388
                                                                                                                      • C:\Windows\SysWOW64\Olfobjbg.exe
                                                                                                                        C:\Windows\system32\Olfobjbg.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:548
                                                                                                                        • C:\Windows\SysWOW64\Ofnckp32.exe
                                                                                                                          C:\Windows\system32\Ofnckp32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:3220
                                                                                                                          • C:\Windows\SysWOW64\Odocigqg.exe
                                                                                                                            C:\Windows\system32\Odocigqg.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:644
                                                                                                                            • C:\Windows\SysWOW64\Onhhamgg.exe
                                                                                                                              C:\Windows\system32\Onhhamgg.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:2844
                                                                                                                              • C:\Windows\SysWOW64\Onjegled.exe
                                                                                                                                C:\Windows\system32\Onjegled.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:4400
                                                                                                                                • C:\Windows\SysWOW64\Oddmdf32.exe
                                                                                                                                  C:\Windows\system32\Oddmdf32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  PID:4888
                                                                                                                                  • C:\Windows\SysWOW64\Pnlaml32.exe
                                                                                                                                    C:\Windows\system32\Pnlaml32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:4056
                                                                                                                                    • C:\Windows\SysWOW64\Pdfjifjo.exe
                                                                                                                                      C:\Windows\system32\Pdfjifjo.exe
                                                                                                                                      66⤵
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:3588
                                                                                                                                      • C:\Windows\SysWOW64\Pmannhhj.exe
                                                                                                                                        C:\Windows\system32\Pmannhhj.exe
                                                                                                                                        67⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:1392
                                                                                                                                        • C:\Windows\SysWOW64\Pfjcgn32.exe
                                                                                                                                          C:\Windows\system32\Pfjcgn32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:3176
                                                                                                                                          • C:\Windows\SysWOW64\Pmdkch32.exe
                                                                                                                                            C:\Windows\system32\Pmdkch32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:1968
                                                                                                                                            • C:\Windows\SysWOW64\Pcncpbmd.exe
                                                                                                                                              C:\Windows\system32\Pcncpbmd.exe
                                                                                                                                              70⤵
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:4900
                                                                                                                                              • C:\Windows\SysWOW64\Pmfhig32.exe
                                                                                                                                                C:\Windows\system32\Pmfhig32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:4348
                                                                                                                                                • C:\Windows\SysWOW64\Pgllfp32.exe
                                                                                                                                                  C:\Windows\system32\Pgllfp32.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  PID:3480
                                                                                                                                                  • C:\Windows\SysWOW64\Pnfdcjkg.exe
                                                                                                                                                    C:\Windows\system32\Pnfdcjkg.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    PID:2356
                                                                                                                                                    • C:\Windows\SysWOW64\Pdpmpdbd.exe
                                                                                                                                                      C:\Windows\system32\Pdpmpdbd.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:2740
                                                                                                                                                      • C:\Windows\SysWOW64\Pjmehkqk.exe
                                                                                                                                                        C:\Windows\system32\Pjmehkqk.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:3156
                                                                                                                                                        • C:\Windows\SysWOW64\Qqfmde32.exe
                                                                                                                                                          C:\Windows\system32\Qqfmde32.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:400
                                                                                                                                                          • C:\Windows\SysWOW64\Qgqeappe.exe
                                                                                                                                                            C:\Windows\system32\Qgqeappe.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:2956
                                                                                                                                                            • C:\Windows\SysWOW64\Qjoankoi.exe
                                                                                                                                                              C:\Windows\system32\Qjoankoi.exe
                                                                                                                                                              78⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:4016
                                                                                                                                                              • C:\Windows\SysWOW64\Qqijje32.exe
                                                                                                                                                                C:\Windows\system32\Qqijje32.exe
                                                                                                                                                                79⤵
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:1032
                                                                                                                                                                • C:\Windows\SysWOW64\Qffbbldm.exe
                                                                                                                                                                  C:\Windows\system32\Qffbbldm.exe
                                                                                                                                                                  80⤵
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:2408
                                                                                                                                                                  • C:\Windows\SysWOW64\Aqkgpedc.exe
                                                                                                                                                                    C:\Windows\system32\Aqkgpedc.exe
                                                                                                                                                                    81⤵
                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    PID:2828
                                                                                                                                                                    • C:\Windows\SysWOW64\Ageolo32.exe
                                                                                                                                                                      C:\Windows\system32\Ageolo32.exe
                                                                                                                                                                      82⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:1648
                                                                                                                                                                      • C:\Windows\SysWOW64\Anogiicl.exe
                                                                                                                                                                        C:\Windows\system32\Anogiicl.exe
                                                                                                                                                                        83⤵
                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        PID:4776
                                                                                                                                                                        • C:\Windows\SysWOW64\Aclpap32.exe
                                                                                                                                                                          C:\Windows\system32\Aclpap32.exe
                                                                                                                                                                          84⤵
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:4604
                                                                                                                                                                          • C:\Windows\SysWOW64\Amddjegd.exe
                                                                                                                                                                            C:\Windows\system32\Amddjegd.exe
                                                                                                                                                                            85⤵
                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:5148
                                                                                                                                                                            • C:\Windows\SysWOW64\Afmhck32.exe
                                                                                                                                                                              C:\Windows\system32\Afmhck32.exe
                                                                                                                                                                              86⤵
                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                              PID:5232
                                                                                                                                                                              • C:\Windows\SysWOW64\Acqimo32.exe
                                                                                                                                                                                C:\Windows\system32\Acqimo32.exe
                                                                                                                                                                                87⤵
                                                                                                                                                                                  PID:5312
                                                                                                                                                                                  • C:\Windows\SysWOW64\Aglemn32.exe
                                                                                                                                                                                    C:\Windows\system32\Aglemn32.exe
                                                                                                                                                                                    88⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    PID:5352
                                                                                                                                                                                    • C:\Windows\SysWOW64\Ajkaii32.exe
                                                                                                                                                                                      C:\Windows\system32\Ajkaii32.exe
                                                                                                                                                                                      89⤵
                                                                                                                                                                                        PID:5404
                                                                                                                                                                                        • C:\Windows\SysWOW64\Aadifclh.exe
                                                                                                                                                                                          C:\Windows\system32\Aadifclh.exe
                                                                                                                                                                                          90⤵
                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:5448
                                                                                                                                                                                          • C:\Windows\SysWOW64\Bfabnjjp.exe
                                                                                                                                                                                            C:\Windows\system32\Bfabnjjp.exe
                                                                                                                                                                                            91⤵
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            PID:5496
                                                                                                                                                                                            • C:\Windows\SysWOW64\Bnhjohkb.exe
                                                                                                                                                                                              C:\Windows\system32\Bnhjohkb.exe
                                                                                                                                                                                              92⤵
                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              PID:5556
                                                                                                                                                                                              • C:\Windows\SysWOW64\Bebblb32.exe
                                                                                                                                                                                                C:\Windows\system32\Bebblb32.exe
                                                                                                                                                                                                93⤵
                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                PID:5604
                                                                                                                                                                                                • C:\Windows\SysWOW64\Bganhm32.exe
                                                                                                                                                                                                  C:\Windows\system32\Bganhm32.exe
                                                                                                                                                                                                  94⤵
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  PID:5648
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Bmngqdpj.exe
                                                                                                                                                                                                    C:\Windows\system32\Bmngqdpj.exe
                                                                                                                                                                                                    95⤵
                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    PID:5692
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Bgcknmop.exe
                                                                                                                                                                                                      C:\Windows\system32\Bgcknmop.exe
                                                                                                                                                                                                      96⤵
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:5736
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Bjagjhnc.exe
                                                                                                                                                                                                        C:\Windows\system32\Bjagjhnc.exe
                                                                                                                                                                                                        97⤵
                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:5780
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Bmpcfdmg.exe
                                                                                                                                                                                                          C:\Windows\system32\Bmpcfdmg.exe
                                                                                                                                                                                                          98⤵
                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                          PID:5824
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Beglgani.exe
                                                                                                                                                                                                            C:\Windows\system32\Beglgani.exe
                                                                                                                                                                                                            99⤵
                                                                                                                                                                                                              PID:5872
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Bgehcmmm.exe
                                                                                                                                                                                                                C:\Windows\system32\Bgehcmmm.exe
                                                                                                                                                                                                                100⤵
                                                                                                                                                                                                                  PID:5916
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Bjddphlq.exe
                                                                                                                                                                                                                    C:\Windows\system32\Bjddphlq.exe
                                                                                                                                                                                                                    101⤵
                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                    PID:5968
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Bmbplc32.exe
                                                                                                                                                                                                                      C:\Windows\system32\Bmbplc32.exe
                                                                                                                                                                                                                      102⤵
                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                      PID:6012
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Beihma32.exe
                                                                                                                                                                                                                        C:\Windows\system32\Beihma32.exe
                                                                                                                                                                                                                        103⤵
                                                                                                                                                                                                                          PID:6060
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Bhhdil32.exe
                                                                                                                                                                                                                            C:\Windows\system32\Bhhdil32.exe
                                                                                                                                                                                                                            104⤵
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                            PID:6104
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Bjfaeh32.exe
                                                                                                                                                                                                                              C:\Windows\system32\Bjfaeh32.exe
                                                                                                                                                                                                                              105⤵
                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                              PID:1792
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Bmemac32.exe
                                                                                                                                                                                                                                C:\Windows\system32\Bmemac32.exe
                                                                                                                                                                                                                                106⤵
                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                PID:5132
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Cjinkg32.exe
                                                                                                                                                                                                                                  C:\Windows\system32\Cjinkg32.exe
                                                                                                                                                                                                                                  107⤵
                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                  PID:5248
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Cmgjgcgo.exe
                                                                                                                                                                                                                                    C:\Windows\system32\Cmgjgcgo.exe
                                                                                                                                                                                                                                    108⤵
                                                                                                                                                                                                                                      PID:5380
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Cenahpha.exe
                                                                                                                                                                                                                                        C:\Windows\system32\Cenahpha.exe
                                                                                                                                                                                                                                        109⤵
                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                        PID:5360
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Chmndlge.exe
                                                                                                                                                                                                                                          C:\Windows\system32\Chmndlge.exe
                                                                                                                                                                                                                                          110⤵
                                                                                                                                                                                                                                            PID:5508
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Cjkjpgfi.exe
                                                                                                                                                                                                                                              C:\Windows\system32\Cjkjpgfi.exe
                                                                                                                                                                                                                                              111⤵
                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              PID:5596
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Cmiflbel.exe
                                                                                                                                                                                                                                                C:\Windows\system32\Cmiflbel.exe
                                                                                                                                                                                                                                                112⤵
                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:5632
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Cdcoim32.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\Cdcoim32.exe
                                                                                                                                                                                                                                                  113⤵
                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                  PID:5748
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Cfbkeh32.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\Cfbkeh32.exe
                                                                                                                                                                                                                                                    114⤵
                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                    PID:5816
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Cmlcbbcj.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\Cmlcbbcj.exe
                                                                                                                                                                                                                                                      115⤵
                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                      PID:5884
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Cdfkolkf.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\Cdfkolkf.exe
                                                                                                                                                                                                                                                        116⤵
                                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                        PID:5948
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Chagok32.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\Chagok32.exe
                                                                                                                                                                                                                                                          117⤵
                                                                                                                                                                                                                                                            PID:6028
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Cmnpgb32.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\Cmnpgb32.exe
                                                                                                                                                                                                                                                              118⤵
                                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                              PID:6096
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Cdhhdlid.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\Cdhhdlid.exe
                                                                                                                                                                                                                                                                119⤵
                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                PID:544
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Cffdpghg.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\Cffdpghg.exe
                                                                                                                                                                                                                                                                  120⤵
                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                  PID:5344
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Cmqmma32.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\Cmqmma32.exe
                                                                                                                                                                                                                                                                    121⤵
                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                    PID:5460
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Cegdnopg.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\Cegdnopg.exe
                                                                                                                                                                                                                                                                      122⤵
                                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                      PID:5588
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Dhfajjoj.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\Dhfajjoj.exe
                                                                                                                                                                                                                                                                        123⤵
                                                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                        PID:5676
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Djdmffnn.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\Djdmffnn.exe
                                                                                                                                                                                                                                                                          124⤵
                                                                                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                          PID:5792
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Dmcibama.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\Dmcibama.exe
                                                                                                                                                                                                                                                                            125⤵
                                                                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                            PID:5908
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Dejacond.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\Dejacond.exe
                                                                                                                                                                                                                                                                              126⤵
                                                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                              PID:6000
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Dhhnpjmh.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\Dhhnpjmh.exe
                                                                                                                                                                                                                                                                                127⤵
                                                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                PID:5136
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Djgjlelk.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\Djgjlelk.exe
                                                                                                                                                                                                                                                                                  128⤵
                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                  PID:5388
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Dmefhako.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\Dmefhako.exe
                                                                                                                                                                                                                                                                                    129⤵
                                                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                    PID:5528
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Delnin32.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\Delnin32.exe
                                                                                                                                                                                                                                                                                      130⤵
                                                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                      PID:5532
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Dfnjafap.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\Dfnjafap.exe
                                                                                                                                                                                                                                                                                        131⤵
                                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                                                        PID:5880
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Daconoae.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\Daconoae.exe
                                                                                                                                                                                                                                                                                          132⤵
                                                                                                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                          PID:6092
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Dfpgffpm.exe
                                                                                                                                                                                                                                                                                            C:\Windows\system32\Dfpgffpm.exe
                                                                                                                                                                                                                                                                                            133⤵
                                                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                            PID:5392
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Dkkcge32.exe
                                                                                                                                                                                                                                                                                              C:\Windows\system32\Dkkcge32.exe
                                                                                                                                                                                                                                                                                              134⤵
                                                                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                              PID:5688
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Dmjocp32.exe
                                                                                                                                                                                                                                                                                                C:\Windows\system32\Dmjocp32.exe
                                                                                                                                                                                                                                                                                                135⤵
                                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                                PID:6080
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Dknpmdfc.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\system32\Dknpmdfc.exe
                                                                                                                                                                                                                                                                                                  136⤵
                                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                                  PID:5436
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Dmllipeg.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\system32\Dmllipeg.exe
                                                                                                                                                                                                                                                                                                    137⤵
                                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                    PID:5868
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5868 -s 408
                                                                                                                                                                                                                                                                                                      138⤵
                                                                                                                                                                                                                                                                                                      • Program crash
                                                                                                                                                                                                                                                                                                      PID:404
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5868 -ip 5868
                    1⤵
                      PID:5680
                    • C:\Windows\system32\backgroundTaskHost.exe
                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                      1⤵
                        PID:6104

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\SysWOW64\Aadifclh.exe

                        Filesize

                        144KB

                        MD5

                        3e431f03864079c6c9eb753a548aa0f2

                        SHA1

                        5716b4c8deade0e2579a2525a7fce6285bc95f0f

                        SHA256

                        9e58cf159aa212b8728278721317675d8fb8af186f51819cc8cd4f9586270af8

                        SHA512

                        5816653d2d8badc8b2ad9daacc8fb8184c3d2fd61035622b4441a9655764b315a14dd3f6dc297a47f2d3dbda715ec4f58a3de1291483d1b1e7a9159c6b636d7a

                      • C:\Windows\SysWOW64\Amddjegd.exe

                        Filesize

                        144KB

                        MD5

                        a4e030a2d956c532e959bbc1d662d901

                        SHA1

                        5a20ca1376ec24d998628fc6669903a615a465be

                        SHA256

                        a1da50dc3ebcb4ff7d5c2990054666ac8aebc23f97661d305a5b6ef2b2f0b4af

                        SHA512

                        7922a30af8d98249dcb5b8b3ebce9a1c08423e8a13156212781da7f5420beeadb26b13b31b35706e0bbf2ee69111af5749e9b192c7070963a97f85486c2bf3b0

                      • C:\Windows\SysWOW64\Bganhm32.exe

                        Filesize

                        144KB

                        MD5

                        54dc301197c4ecb42fecc87b77af6239

                        SHA1

                        f7b839b5b6f24940f9a3ea0b7883c2b58b497211

                        SHA256

                        98e655e9069f11a2290355fccc1e9ac2411a87f1aa6d58d39e616ed33b991003

                        SHA512

                        c3c54b8e24d0129aab21ff294ff08aa5d19c7a7bb1e879442770c50c8dbfbb65a6c89e3e4ebe8effdb80cdc02c7597e681e76025ca97f4c6fdfc368c9a192d34

                      • C:\Windows\SysWOW64\Bgcknmop.exe

                        Filesize

                        144KB

                        MD5

                        44979687b33fd24deeae9116284e67eb

                        SHA1

                        5d5fb61ddab985b72283c365db17f5da1a3bea89

                        SHA256

                        4e4fe7604e920af88640e29d47d210c80bcab75076a119790e8fc19130be88ae

                        SHA512

                        1dd6b26a223eff6ae2fd0c8eb11a121c30b5a64de9caecc3fdda2c6edc3e1ae523732e4f6a36aa89b7193456cb8baf750a26f41997ed055d3e00ff35c17aea7a

                      • C:\Windows\SysWOW64\Bgehcmmm.exe

                        Filesize

                        144KB

                        MD5

                        9c839f62f3168e22ee1e04680b2c5cc8

                        SHA1

                        f2d2ecb56d847cf4d6eb76ac7a2f75c6664e3f63

                        SHA256

                        6eb00c00bc47eeb4d6c29c5faa10a67957e2bdddf300fe9ddc21089ea948c5c5

                        SHA512

                        583678e50f50ef2331d7200682eb17e62b35e96ca0b84d423caa75a53fb0de61f9e462cf92b2e5ea34fe60ce17e007a6f2849f713fb98676d4215a7cf12ca34a

                      • C:\Windows\SysWOW64\Cegdnopg.exe

                        Filesize

                        144KB

                        MD5

                        6f130684d020ba2f8ae30203f9e2a527

                        SHA1

                        f13dc3ebda875a828555fc3eb3c61b21f565d1e0

                        SHA256

                        1b7d586458b12f6e119f898846744e1b60038264bae4bebb5ebb760beef92696

                        SHA512

                        9b85d68d4fcf950142cc79cc96166ae95ee767c6073669de79dc2dea07a1835a3a3a45865c0d125423d00a3d80871005a5e14e3fa1f845ff98f17013e314f39f

                      • C:\Windows\SysWOW64\Cmiflbel.exe

                        Filesize

                        144KB

                        MD5

                        4573eda2ba10e5c87de53d25b7d32ceb

                        SHA1

                        2e76789fede645a83d0d417965453b94d7d87b90

                        SHA256

                        237c74399c9983577d53dac2954fb33127f0f2c97d52151ffb5b0047593bc669

                        SHA512

                        3a84521b40f0a107a2298b66c5bb3269efc80b9aeb81a3928898bd471bfe26427de4a77966e38e2b0a36974da1b65c74283aa8c31b7ff884550a0ec5bb1228ad

                      • C:\Windows\SysWOW64\Cmnpgb32.exe

                        Filesize

                        144KB

                        MD5

                        5c6527aed34db660aa6a1c9378e10840

                        SHA1

                        42a78685bdf1753ec782f1c32da03cb55f196a7c

                        SHA256

                        3e2c4237eb4f6c66b8add74fa90ed81c2dec814b63fda420d42e55bd55f7265f

                        SHA512

                        1ca70120f75b7a708403f2b7bad14dbf980aa94c5d41ce668d23c44cfec6fbbd8053f7a24e663b6ce4954a8f5f4fc6ad411739644ae418e7c7bd4487a2a2ee9d

                      • C:\Windows\SysWOW64\Daconoae.exe

                        Filesize

                        144KB

                        MD5

                        9c29c29c14de0f5fb45d74d9e64e1c54

                        SHA1

                        ae9be1b09ca6aa4a471ab4e541ae458f2b48e31e

                        SHA256

                        144a614faf6e04eff839c373849f616dd7c68dab453623c2caac50fd28e8c522

                        SHA512

                        4d0c4eb0d070a762a705757df6230f535834a5c0bf3964e7258feb926804e21d55f95ccf5a7451f742ac4c69807dd2bb6ae2949b3d71e5d844626f8baafe8496

                      • C:\Windows\SysWOW64\Dejacond.exe

                        Filesize

                        144KB

                        MD5

                        bf35aa3199a5f40afb42fa9b272b4a73

                        SHA1

                        4f9d332d072e422313674c1f9c4d1620cf6c4a3c

                        SHA256

                        10ca57952a7b2f50eac0119f939487841373ccbff09f2542ae354042fe40a789

                        SHA512

                        984ca7948a9e9a5f79c77a5420a11590ffab4167192af4d85098a4ed6a68e05069500a28e674a6edbe078ff5c91993db154f4778e8af95b381a7c83bf9fb8744

                      • C:\Windows\SysWOW64\Delnin32.exe

                        Filesize

                        128KB

                        MD5

                        6fc29d6f3c101d40bd25ea5688ffefd2

                        SHA1

                        c96e88f035068e7cb89ea348311b68f7d66efc46

                        SHA256

                        019859b819ea17717a8401d64fcda9c73b45108046dbf89fb09512128cdb6923

                        SHA512

                        62fce1ea1e5a3a470ebb4493ec833e7dcf985a93b834afd85ec9c5fc6f558b767ee26c928d570651d8f053c6b376f644ca747753902be86df15fd63af2b9d2c6

                      • C:\Windows\SysWOW64\Dkkcge32.exe

                        Filesize

                        144KB

                        MD5

                        7b3ea3c3f8bbc747c180900bb434fde6

                        SHA1

                        ca5c5ba153bd645a3ed566c59547aa6fc7195d33

                        SHA256

                        11f48eb963572e6b683b62421c9ff10705df50ae8af3099231709d53b8906730

                        SHA512

                        a27551dd462f9ad29c074896881df04e58acb13c357afa99d0cc48de83eea72cd319ed624569f11adf5a1ce655c47997cc914e3e342ff064214b6182ea35f488

                      • C:\Windows\SysWOW64\Hfcicmqp.exe

                        Filesize

                        144KB

                        MD5

                        9b9d63fc8d58b8078ae96979756e470b

                        SHA1

                        79a8e0532288bdb648a76f45d7ec66f5482d2c4a

                        SHA256

                        22cb6b05356fa126c944920bf25b6a57497d6e293e387903ef80ef46af6ce903

                        SHA512

                        12bb33b8dd95bb754bc4dadd76bd2587a734c2d4ebe1f5837dedfe3b580e6718aefbd0d1a29fe88d70dd18777c6e4a37a4568742f45eaced704e9785ea8bf48a

                      • C:\Windows\SysWOW64\Ibnccmbo.exe

                        Filesize

                        144KB

                        MD5

                        91c995db8013d86635d1fa60d6912f48

                        SHA1

                        519bd1840a1e11d810d94a545aaae63fd6e1e097

                        SHA256

                        9121f3667997e60591b265fd297ffadb2f4f67b617574fac5e4ad45589a9a4b6

                        SHA512

                        e717e6c0283356c4869770a2f8d4223ef537d4ac9980bb101bf3946b412dc25d3d20a54a6d2d01915ea4bf3444f38ee4ff7d16a4145ccfa491526eab13576e8e

                      • C:\Windows\SysWOW64\Icplcpgo.exe

                        Filesize

                        144KB

                        MD5

                        d20246e3770b9cba9bde38c81ce8ae2f

                        SHA1

                        3b1a028bf584f81064caa6b27b88062339d8f1d3

                        SHA256

                        1a610be5b03e686ffacb2ab53c8fb35c188d0d02f60ea8b0e61b5b1d596aefa1

                        SHA512

                        7a96f60ddb3ab038612549f1b174bb9271e75868af6b97d33149bfd6fce9e53a716002be66c149fe1c3d103c6aba4eb0fe2b0ba3da51f98060aa3ceebd46b742

                      • C:\Windows\SysWOW64\Iehfdi32.exe

                        Filesize

                        144KB

                        MD5

                        09134316edaf448274608eb6b6c0c0ff

                        SHA1

                        e67a27b224b9e175c2a5a62ebd67085674739a02

                        SHA256

                        35cf97836a02c9037745747bbaf905e67cc8b7a7bb501265d837e972c623df46

                        SHA512

                        cae9552fba6df9f0b8dc6c7350a918facb64d9c0877e54120ba89344001782c8733fc9b0d1d52a962e2d1b2a85a38a549c409ef44b603e0cee5e03a87c6ab5c0

                      • C:\Windows\SysWOW64\Ieolehop.exe

                        Filesize

                        144KB

                        MD5

                        bb15f04c0e1a86aedc738d2068255bad

                        SHA1

                        b63059eeea73c3a20f6801d59a206318973996c8

                        SHA256

                        079b608ed2dd75d71be5a2c2e52025fb23015dd5d785f008ed573c012331c8a8

                        SHA512

                        4c0e1363e403f144273f1262d4186b13796628981592cc1e7b14151af0d257dcb5ef856d1b51c6afcea82b3d13f200080e07314d69d805d1e911148ef0ffa42f

                      • C:\Windows\SysWOW64\Ikpaldog.exe

                        Filesize

                        144KB

                        MD5

                        adda0e4130dd4474250907dd38a34f55

                        SHA1

                        999f8c07e11ff64dac72d0e51dd2d5dc2d9f59f4

                        SHA256

                        87c43fea8c459705dfc78d50fd85b88b375862ed74886acbb1166d01a2fa225e

                        SHA512

                        709662655f39b7b2088eb2bb07bdf78f274a154cc62a6802cfb01e7c98fb7832ccc01226dcf87d2f72478eb2348cd400531a7686e037cf7fe053419644d9ff4d

                      • C:\Windows\SysWOW64\Ildkgc32.exe

                        Filesize

                        144KB

                        MD5

                        10821084a2711462276bafbd01d46315

                        SHA1

                        54309b522b93c8208fa177d483776383655357fb

                        SHA256

                        16a77c210bb75e202cef546b594501d1dbfde6046bc009e97f08f7e1faf66bd6

                        SHA512

                        497c9e9f668d452cfd087019ed603ebaa0e04f592707fc606ff4406b5d8d360d75efbf19cd327bfd17580fc190b724f212e205e90512b5abca635e9535cd9044

                      • C:\Windows\SysWOW64\Imdgqfbd.exe

                        Filesize

                        144KB

                        MD5

                        1dd8842ad2f0ee5c6bbb0e1422102aa5

                        SHA1

                        e31101c4f4013a77e70da0b0bd9d8812d71fe5f0

                        SHA256

                        6c3e74c27624d3ed7466d08dec3e643f43734b280a60ef32f92e1e39bcb485eb

                        SHA512

                        9cd838a9dd7c31f397d58226c1c95f6ecead1390f3079163de52ef7b5e6dce8d9e2624dc9a5c1d1a00998ff26d6b0e3960d5e6d2cdeead6de6f0fa66acf58ae8

                      • C:\Windows\SysWOW64\Ipnjab32.exe

                        Filesize

                        144KB

                        MD5

                        86ddfa4fe14d8b4c4bb8b6fd22ad680f

                        SHA1

                        b56d0d08f11b2fdf7c7fbdcec29c1bb79cdb9b81

                        SHA256

                        d974344c3b2569a9f948bd875a6bcc3837a2a36c47a29032cbea276a5a5bf18f

                        SHA512

                        72d68944f4f1ce5fb61ecd5f0023fef3de3cbac764f8a2d2f6b9f821634a554d85389236de4a51e61aa002dfb7bf034857de97adb4c87b70327c335d3d28ee02

                      • C:\Windows\SysWOW64\Jbjcolha.exe

                        Filesize

                        144KB

                        MD5

                        31d253d9971074237c284e4fd8426c8b

                        SHA1

                        67e1975631fde4f1a8c8133e86805b7a270bd62f

                        SHA256

                        8764bac2cb9d62f4cc6897acd7472b51cf32cfd5dc29ca8ef56576c3edee3a4f

                        SHA512

                        ce6333910626e064c6395db38c9c9d1a65fec7c510bd45d724429db268935b9e7a44aca9ae2ec502da3598c3c1ea5100f57c0088d858f61959233dd93aa4fdd0

                      • C:\Windows\SysWOW64\Jcbihpel.exe

                        Filesize

                        144KB

                        MD5

                        18476a8feb9dd50d7c71068f0b7c6358

                        SHA1

                        4ddeef142f445632109ce0e6d643c99370cafd75

                        SHA256

                        8db9742f5075b1a8367177f23f391dd122ff19c195c5be8f7d0d912ce6d5c686

                        SHA512

                        af3628b8786d2a3ede029894b784fa2a730013777b279b6849aa2902417a9316bbb3367f33db7b66b3753cecd09228bb7fd52fedfac6d7b687a3d4f8b4233085

                      • C:\Windows\SysWOW64\Jcllonma.exe

                        Filesize

                        144KB

                        MD5

                        0c74b0165d3c185ebed456a3835b4dd0

                        SHA1

                        039d2f9842b5778d876f56e26d2fe051478c8484

                        SHA256

                        b6fdb9f36df678d860e0b13afe38a65cc930771649d8e2844d26db1d934e3cf3

                        SHA512

                        c0f976d287dd1f71ffec040b9f3bf2e26dcea81cc902f4a9620ea4cb210825befbad355d7a8f94a2813f41a4082bb99ed5fa3cfee53f1b6a132c3a3f340fb58f

                      • C:\Windows\SysWOW64\Jeaikh32.exe

                        Filesize

                        144KB

                        MD5

                        3fcbe82b9ff4de7d1ed1154c53dd8131

                        SHA1

                        e480add63e677b40ccd22f04863544e00772354f

                        SHA256

                        4d7eb1f1f0029ac35c55066fb294280fbf8e6a67f8d7c24b094cf648f9c93ba3

                        SHA512

                        48b6bcdc9bc294fadb82c7f63b3c7561b66fbd82480862138806a215df4839d1ded527200ebf04c0fa6570fd67eb11124a0912972b20c662024320997989eb38

                      • C:\Windows\SysWOW64\Jfcbjk32.exe

                        Filesize

                        144KB

                        MD5

                        e43217c1d3d9222a5207cba604ebd734

                        SHA1

                        5e1982f4836a2d03cc6dac502f4a2d293f478376

                        SHA256

                        47d81d58a4eb17d90355d0200786a3c76f661caf879e3a465935dbd8c9495c2d

                        SHA512

                        71c46a6b29a27f4fb844ab5abd33968b18cac64d18c1f37dd16765ba6572623e29a826fb98a4d8b7ef23ac1f39d4bb762fbcaa2ce091ba583f3da9066a3c01bf

                      • C:\Windows\SysWOW64\Jfhlejnh.exe

                        Filesize

                        144KB

                        MD5

                        abc1bd5de46a88c4d279096cf82f3cc3

                        SHA1

                        f95e8e8c83a789584f98a6e351fb1bfcc884d69c

                        SHA256

                        e6a4d11a22a40e9a43a2dd442feaa20fb01de8a6adaa803e47b1a28af04f29c3

                        SHA512

                        28b612a5228a10d415576e6a07b3d1fd20a22d5593c996d37de3549e463f6762a95f7c1773c54d4650a57a6c13370be99def1365cbda70d8efb7965d2f2a338e

                      • C:\Windows\SysWOW64\Jlednamo.exe

                        Filesize

                        144KB

                        MD5

                        584549b9c6d8be082e2d874b6258a5d5

                        SHA1

                        09ced9d81c14d47616a1ad49dd315076f4548586

                        SHA256

                        67429d772087c35a6fffdfff0b846f452d2a10d7be78a36264c5b3159d3b4bb6

                        SHA512

                        216cb9b127ca6d4cdfabf6a8dd60e1c72830d0cbb968e5ad5bf3b0e7ec7cd6db7507d16bb6b204c915ff39028a94b39caca120a02862b5b3df9d1a14812e3ad3

                      • C:\Windows\SysWOW64\Jpijnqkp.exe

                        Filesize

                        144KB

                        MD5

                        7213d6588b36c4b6075f7aa4940428a9

                        SHA1

                        8c611bf5260a00fbb1f7168689ba8dbdc43d7e65

                        SHA256

                        187e54c38c7d339f30e4d69a216e062417950e92a0c6843b7d85af9dc7e0df1c

                        SHA512

                        52922c264e54fa65c8d8b972f61b8411a5fdb23dcc970def48bf6680d569dd6dd651416677263661a1ef6cb1da0e536419774d998b1b1796c32c13883cf4e9a4

                      • C:\Windows\SysWOW64\Jpnchp32.exe

                        Filesize

                        144KB

                        MD5

                        1dc18c7e083d0ca040be92c0ee2dafe1

                        SHA1

                        37a105bf0c3bb47330c451711592492943893d88

                        SHA256

                        65e5e73a68d79cd55ea3373317ea819cb7b6c2ee9dcc1e0fec7efbc3ce6c7648

                        SHA512

                        c149bab85186edb62ac76ebfaf5919c01a4551112d738f3fa0c54aa9ce58f13b32e89345d693ca097197a698432c3f07daab62769d22d6545377f0af73492268

                      • C:\Windows\SysWOW64\Kbceejpf.exe

                        Filesize

                        144KB

                        MD5

                        5c1805a104f4b7ac3809235f5f1cd0d7

                        SHA1

                        14fb344c7d5c03aa5723be28779c98fd71bea416

                        SHA256

                        bad0745031083361af4faf6fad4b5b7e483944fd7b6cb8f8a84b8e43cf9decef

                        SHA512

                        890d8419335c35b7873b5719313ffbfae3d26f672d16834ac4a5a046eed76c393b8504a73108cc93735f75376a8decc9f914455328ba7457d2fca1a4f340f35f

                      • C:\Windows\SysWOW64\Kdeoemeg.exe

                        Filesize

                        144KB

                        MD5

                        e283c64b46e5e0022abde07cc97358d4

                        SHA1

                        0737a98b6acb1837aaac370a1bebfb1520a78dac

                        SHA256

                        405898f7c9a4991705524e7966b2e402e7dba5562794d6911f5adae232516352

                        SHA512

                        e14fdc276963b6557c60b8621db00c3fc4768495a41cf09e9f0600e104db4990663a15eb37da0ecda7842d1e8bb56b6beaa86ef111165c824461cb1391a3a8fc

                      • C:\Windows\SysWOW64\Kebbafoj.exe

                        Filesize

                        144KB

                        MD5

                        9888b40541ae23703c8040ccc004c6b9

                        SHA1

                        623d1ddedf5a592b952a6805b002221e260ebc37

                        SHA256

                        392b379a05b371c500fec1c0548e0cd4abd9fa3559757ecc2431cd851c3354ea

                        SHA512

                        5cd070ddfd4a9a6670ef9206adf4512a452e3580715da74ef410196e4e87cf556dfb47e9946acb219a6bd4e4210537d3075f0ffcfaf21fa5708b64d783afdcb9

                      • C:\Windows\SysWOW64\Kfankifm.exe

                        Filesize

                        144KB

                        MD5

                        34f53a56040b8858b71e43ffc14a8b8b

                        SHA1

                        f799b28d03d0f341c874d42fc4d671b46a7fd664

                        SHA256

                        9686d7b8832c47656d3e38ac5efeff0e266af66316206080d6df80af601813ab

                        SHA512

                        d4b9486d282463fc273fa2b264f31d2f3263e63cb4c279a67348e148b3dad8255a25f1c34ff7aab7c3ac40365fb09713be5cd00800fa0ff926dc491ab75ff891

                      • C:\Windows\SysWOW64\Kikame32.exe

                        Filesize

                        144KB

                        MD5

                        7294453cd1ba6f508d5b2e0915840171

                        SHA1

                        de8cb6128b6d6e8a2b452f8e4a054700465303fc

                        SHA256

                        4c711b8312088179a69e8580a841af4961cf206cae140657af6af6e1337a7f6f

                        SHA512

                        ab32ee5056476623d1a8071aea25a1eb4d4f8b27043f1d444f2d016e46cf92836758481e6913c2a0a1ee63e56c1fdf11b6ca0910b8ee38bfed7c5e3beb5257b2

                      • C:\Windows\SysWOW64\Kmkfhc32.exe

                        Filesize

                        144KB

                        MD5

                        25495e4949069a8f941cb4269e66bf4c

                        SHA1

                        b485a21ca415c8060b26c86f6ab054d4681c90de

                        SHA256

                        a3b06dded30540ced7284e0ec0602e86d4d2f6a82a4ab8f68de2e6b13077ec7a

                        SHA512

                        ab7abfdfd35d22e238b17e4f47d80716591d3c818a55144fc90468fb708f11884053d8de9a23478239759e19e35ecc0ab0cc496af24ab4f482eb86f7aaab2a61

                      • C:\Windows\SysWOW64\Kpbmco32.exe

                        Filesize

                        144KB

                        MD5

                        be8248b93000f3315fb98d24d53ab0d5

                        SHA1

                        87053ddcba7884b809070ccc313a0b76a666231f

                        SHA256

                        15bb212c4e9804f57ad913864bf7450ae632018c4d926b2ea8946131b0418673

                        SHA512

                        ec0e928fdbfe1e252d30efc9a0503cfcfb30d4d956c5cfd3492b6116381c544e4b0024f35e396e06643f692f313867e004a7b584a982e5a60d18f3e1064509e6

                      • C:\Windows\SysWOW64\Kpgfooop.exe

                        Filesize

                        144KB

                        MD5

                        ccabaff36aa08a525cf18fa79c67b67c

                        SHA1

                        2a7d64512bc35c30194cd5ea787d83a326a2165f

                        SHA256

                        d764e5a2401e1180ac20879b309133653ecab4d637b12ca05615f01d65807bdf

                        SHA512

                        5e1d84a5b967cb3958aff5309a0451475d432d702d1bee6759038779f40df4bc596b1b013d1a748d71af1ad4770d66cf72eac209b9f908946cb9f04cc0b7bc42

                      • C:\Windows\SysWOW64\Lbjlfi32.exe

                        Filesize

                        144KB

                        MD5

                        3a7f19023839e318e52ef998292161aa

                        SHA1

                        2b67d615787716ebe8ec81edc6c262d172a963b1

                        SHA256

                        43c487ea4a94a82db9e5f029f428a2950bc6074cd909e4bea98ca1b7ed4006a1

                        SHA512

                        f97550bd081e9703cbac54895ed8198445c6f84757c762416f53f7ba269aa1a8a4bff5ab425029cd0132f67206f5969d8e8c0dc30abcca1d070231e1841e1786

                      • C:\Windows\SysWOW64\Ldjhpl32.exe

                        Filesize

                        144KB

                        MD5

                        fbc06d80803deefe9ca5faf3a130a307

                        SHA1

                        bfd763e2bed5eae09725035135be3b9cc5462f7d

                        SHA256

                        f393b0cace8d73a711a7f9cc9bc44eed529b38fd64f0c96e8f9ad06a88070c6d

                        SHA512

                        f59a1a397b69c6b766f5ed8b0f3715e58b0a6e59a9422800244ac11af2085609268e1a96b9018df34fac53c448c71d34743f1b5b8a2a180495c1e5dc4ca556e9

                      • C:\Windows\SysWOW64\Ldoaklml.exe

                        Filesize

                        144KB

                        MD5

                        4e84929589726ddcdfb4920e7021cd17

                        SHA1

                        8cb67909225050610d18ebea91ebcbf1106af7e1

                        SHA256

                        c9edf8e4ed99dab405252626e2f09341945ea9616af1a6c61bdf84c3c7cb5946

                        SHA512

                        1331a3de425c5952568b1f21a58526b349205c4f1561bd3bc571baa31c60637f0975acc5ec781b4d0af0775b96f04bf93a2b3de747fce9ddc65b057230ea3b86

                      • C:\Windows\SysWOW64\Lenamdem.exe

                        Filesize

                        144KB

                        MD5

                        a40bb93a983510dbeb747fa2479fb3c6

                        SHA1

                        46815d7bb45e27931fefc1d97149b6616198f08f

                        SHA256

                        effe68e0e5bc4b7dd3fa0ae6eba838cb9690fe671ab14f48534e7bf10996d97b

                        SHA512

                        a0f5c947f97a6d282ba5ed0a79f4daea489f1afdf403b28a3d3f92f899322cd22f0a6bc7f5b54ce7e2946c30926a63407904e60308416525878927e23bc95fb7

                      • C:\Windows\SysWOW64\Lljfpnjg.exe

                        Filesize

                        144KB

                        MD5

                        5ea420b39afd8e50e2ac0429b1282042

                        SHA1

                        7ccc615ba61572f09dc7ab58ff5e6f63e74c57f8

                        SHA256

                        39590c5c527adb2f3d8ba94e78e06c4f2b391a85384641700c60a8179c705489

                        SHA512

                        5a07ff4ed0a3d0ce4048faa4b422d75d54fa8372f2d31fd066f2e254e6d99b7aed07949311b8669c63517bbb7c2443bc1b882010187d674adc3657b767d58a28

                      • C:\Windows\SysWOW64\Lljfpnjg.exe

                        Filesize

                        144KB

                        MD5

                        8ad22e4efbe1323deb68c6371046c97b

                        SHA1

                        e91cf9cbd46c02a20ba211d7d6e7ba53b7a7132e

                        SHA256

                        d8171343e142ea9b87f198f853b2dad91b05cdfd8a6bdbe0af5d2f48d2f59b40

                        SHA512

                        a284eb736146ddd4c08bd886cd72e15424d9b1760b1dc0207acaedbc9c21078a22e6bb65afbbcfdf109ab18c2356583a1afc1fbef8170fca18af02a3d01d5418

                      • C:\Windows\SysWOW64\Lmbmibhb.exe

                        Filesize

                        144KB

                        MD5

                        a880bcee3c88060d4a85c357a8dd6f88

                        SHA1

                        b0b4980f78a46e66a2e069da9b02868700ed14d1

                        SHA256

                        d05e565c2786be7fe266797c174276fb5fbaaa0818b6e4ad3bddd5370f16cca4

                        SHA512

                        a4b5b1e95e39578f220479bf70f62ea86b91da0ea2b4ce4f47dbbffaf37b84c0186d12ac841bf5af778e8cbe24a6ffca7f5d7e23e73423cd29157d215636b0b7

                      • C:\Windows\SysWOW64\Mfadpi32.dll

                        Filesize

                        7KB

                        MD5

                        c0d2d2402a48fd3fa8651dd520d1e042

                        SHA1

                        5148e9235987710deb85424ba9eb2edf444928a1

                        SHA256

                        166ed96ed7e62768e8356202539f6de6cb41286c1552bfde4e4a3101be219861

                        SHA512

                        dcc67b3f9368b5e9d2abfd44c43796d87fac0de57a8cc0ac4957d6ea2e345b6589e0f1518567ae01e1c180cb65cfd9c1308c63e5573b5a5cfe1f0cf4cc99da8d

                      • C:\Windows\SysWOW64\Mpoefk32.exe

                        Filesize

                        144KB

                        MD5

                        b065d51af8364ada9ae76b48ed732a20

                        SHA1

                        b2f28b90550183884c778fc278575a1816754640

                        SHA256

                        d616e89dd2566e1f497c8cc310303b5a9d6032774dab747b5765d1c5286f8e6d

                        SHA512

                        9bdf9dfa6b77c8fd049bb658cdb86e1385a79a48a6da25299bf5917d69706228cc3106d5d7df9a9525f0614e1e9351c7107aa0ce956879da322393257e93478d

                      • C:\Windows\SysWOW64\Ndhmhh32.exe

                        Filesize

                        144KB

                        MD5

                        1092aab01db252e0751db47c5453983c

                        SHA1

                        3f6a51bad00c25b7928e6558b67b0f57412b6576

                        SHA256

                        7d54e7e3c756fe3dc73be99e97adfee4953fdf9ccfe4da8ad115f89d70b7cc9a

                        SHA512

                        d072b7d71edf026b3f2fdf8aa615025cd45ae33452114db690a92f90ac55f87ac0bca822f2f24335e2d640c50ece3fac701f0ac1f166235bb202a1900e535f13

                      • C:\Windows\SysWOW64\Njqmepik.exe

                        Filesize

                        144KB

                        MD5

                        8f3d63889ab9e4b77b8cd6f619cddafa

                        SHA1

                        d8750eafa48282d59266812677fdc21e4be8f5e0

                        SHA256

                        92a7356f2fcad553e877babdfe6d0fbdc62aeafc73530c02ea18dc369b886cbe

                        SHA512

                        45fd6dfa17b8b3ea64b4c97a0545e266e62a04f2fd2d23e17ce5b70496c5d23e7d1c827b6de40b35c24a8f11aed0c5fd658f4f9ad6c425947f7bc973d4575b78

                      • C:\Windows\SysWOW64\Odocigqg.exe

                        Filesize

                        144KB

                        MD5

                        3577bd6103347835c20470615412e2b9

                        SHA1

                        bce98261d983ecc3fbcc9136de7bf53b1595e768

                        SHA256

                        61994e6b05e47b0b4b133cb5d3a170c4d37535ced08dd660dec1a161829fb5d8

                        SHA512

                        e58c51d7a27e7adc294c6409716dbc9b55295b3912bdf9b016998554469a4dc8e63f9a4dc7c5f79f9d152570f9c8c86434dff9ba6be8b0729c9978d396c741a6

                      • C:\Windows\SysWOW64\Pmfhig32.exe

                        Filesize

                        144KB

                        MD5

                        a18dd0147c5a455558f4b3a914615520

                        SHA1

                        91b5201b17278344b32442b8b8894af5974e293b

                        SHA256

                        d1913e10e8a47cb369e2a0dd7a9ab9bb079d37d7f11f358f0ee860c49b47b458

                        SHA512

                        67366e5f3bd520bd9e86917f925d5e0524ccae07c587e7bb95d8043e6657fd99ae4bf4e012b8e21591f76fb6c52c53130fb0ec45901cfbd55ec9570650a142b2

                      • C:\Windows\SysWOW64\Qffbbldm.exe

                        Filesize

                        144KB

                        MD5

                        47490956d81e383346c127b809b560ad

                        SHA1

                        b89b5e75997d304e992e6cf61eaa64769f837c00

                        SHA256

                        2308c6dde3fe74a139912f683cab4926cfcd3092c8fb4d0d97505c17acba8d0a

                        SHA512

                        a016a1ee205b019ee39cd6ad278b1d9c47e81b9ac27fb7a337f3c78c2f7d23741d8ba142d86ce0cf0f4ee79e73b4b7efdb685606d66c0ce29bd7d58ac0783d20

                      • memory/116-128-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/400-514-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/408-71-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/544-968-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/548-412-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/624-274-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/644-424-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/804-39-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/804-579-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1032-532-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1032-1045-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1104-255-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1180-24-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1180-565-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1392-460-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1484-358-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1624-232-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1648-552-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1732-322-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1764-262-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1812-228-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1864-316-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/1968-472-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2000-120-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2108-167-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2276-558-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2276-15-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2356-496-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2388-406-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2408-538-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2476-310-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2740-502-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2828-545-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2844-430-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2880-381-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/2956-520-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3096-0-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3096-544-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3120-593-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3120-56-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3124-159-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3156-508-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3160-87-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3176-466-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3220-418-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3224-298-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3244-370-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3480-490-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3560-176-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3588-458-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3648-273-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3660-292-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3704-346-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3792-382-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3888-189-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3956-551-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/3956-7-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4000-352-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4016-526-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4056-448-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4136-340-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4216-151-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4272-304-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4308-103-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4348-484-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4372-394-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4376-239-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4400-436-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4464-247-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4512-111-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4528-196-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4560-400-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4604-566-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4620-79-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4652-199-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4700-48-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4700-586-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4760-388-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4764-207-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4772-334-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4776-559-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4860-364-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4868-280-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4888-442-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4900-478-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4924-143-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4932-95-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5000-572-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5000-32-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5012-286-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5048-136-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5084-63-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5092-215-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5116-328-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5148-573-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5232-580-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5312-591-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5352-598-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5392-942-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/5908-956-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB